Mehdi Tibouchi

From MaRDI portal
(Redirected from Person:315554)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Cryptanalysis of EagleSign2025-01-10Paper
\textsc{SwiftEC}: Shallue-van de Woestijne indifferentiable function to elliptic curves
Journal of Cryptology
2024-12-27Paper
CDS composition of multi-round protocols2024-12-13Paper
Cryptanalysis of the \textsc{Peregrine} lattice-based signature scheme2024-11-12Paper
Profiling side-channel attacks on Dilithium. A small bit-fiddling leak breaks it all2024-10-16Paper
Verifiable isogeny walks: towards an isogeny-based postquantum VDF2024-10-14Paper
\textsc{Antrag}: annular NTRU trapdoor generation. Making \textsc{Mitaka} as secure as FALCON2024-08-30Paper
Masking the GLP lattice-based signature scheme at any order
Journal of Cryptology
2024-01-23Paper
Quantum-access security of hash-based signature schemes2024-01-11Paper
\textsc{SwiftEC}: Shallue-van de Woestijne indifferentiable function to elliptic curves. Faster indifferentiable hashing to elliptic curves
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Shorter hash-and-sign lattice-based signatures
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
MuSig-L: lattice-based multi-signature with single-round online phase
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
SHECS-PIR: Somewhat Homomorphic Encryption-Based Compact and Scalable Private Information Retrieval
1511.68111
2022-12-22Paper
\textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}2022-08-30Paper
On black-box extension of a non-interactive zero-knowledge proof system for secret equality2022-07-06Paper
Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices
Journal of Cryptology
2022-04-21Paper
On subset-resilient hash function families
Designs, Codes and Cryptography
2022-03-21Paper
Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices
Public-Key Cryptography – PKC 2021
2021-12-21Paper
Key recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU lattices2021-12-01Paper
One bit is all it takes: a devastating timing attack on BLISS's non-constant time sign flips
Journal of Mathematical Cryptology
2021-05-25Paper
Equidistribution among cosets of elliptic curve points in intervals
Journal of Mathematical Cryptology
2021-05-03Paper
Multiparty non-interactive key exchange and more from isogenies on elliptic curves
Journal of Mathematical Cryptology
2020-06-24Paper
Recovering secrets from prefix-dependent leakage
Journal of Mathematical Cryptology
2020-06-24Paper
Masking Dilithium. Efficient implementation and side-channel evaluation2020-01-30Paper
Cryptanalysis of compact-LWE2020-01-21Paper
A coin-free oracle-based augmented black box framework2020-01-10Paper
Efficient fully structure-preserving signatures and shrinking commitments
Journal of Cryptology
2019-08-13Paper
Close to Uniform Prime Number Generation With Fewer Random Bits
IEEE Transactions on Information Theory
2019-01-28Paper
LWE without modular reduction and improved side-channel attacks against BLISS2018-12-20Paper
Loop-Abort Faults on Lattice-Based Signatures and Key Exchange Protocols
IEEE Transactions on Computers
2018-12-04Paper
FHE over the integers and modular arithmetic circuits2018-10-26Paper
Invalid curve attacks in a GLS setting2018-10-24Paper
Universal witness signatures2018-10-24Paper
Lower bounds on structure-preserving signatures for bilateral messages2018-10-17Paper
Constructing permutation rational functions from isogenies
SIAM Journal on Discrete Mathematics
2018-07-20Paper
Masking the GLP lattice-based signature scheme at any order2018-07-09Paper
Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures2018-02-16Paper
Secure GLS recomposition for sum-of-square cofactors2017-08-25Paper
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
Lecture Notes in Computer Science
2017-06-13Paper
Improved elliptic curve hashing and point representation
Designs, Codes and Cryptography
2017-02-10Paper
Cryptanalysis of GGH15 multilinear maps
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Tightly secure signatures from lossy identification schemes
Journal of Cryptology
2016-09-21Paper
Practical cryptanalysis of ISO 9796-2 and EMV signatures
Journal of Cryptology
2016-09-21Paper
Binary elligator squared
Selected Areas in Cryptography -- SAC 2014
2016-04-13Paper
Degenerate curve attacks. Extending invalid curve attacks to Edwards curves and other models
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Side-channel analysis of Weierstrass and Koblitz curve ECDSA on Android smartphones
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
Lecture Notes in Computer Science
2015-12-10Paper
New Multilinear Maps Over the Integers
Lecture Notes in Computer Science
2015-12-10Paper
Cryptanalysis of the co-ACD assumption
Lecture Notes in Computer Science
2015-12-10Paper
Elligator squared: uniform points on elliptic curves of prime order as uniform random strings
Financial Cryptography and Data Security
2015-10-08Paper
Fully structure-preserving signatures and shrinking commitments
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Impossibility of surjective Icart-like encodings
Provable Security
2015-09-29Paper
Conversion from arithmetic to Boolean masking with logarithmic complexity
Fast Software Encryption
2015-09-18Paper
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds
Lecture Notes in Computer Science
2015-08-27Paper
Making RSA–PSS Provably Secure against Non-random Faults
Advanced Information Systems Engineering
2015-07-21Paper
GLV/GLS decomposition, power analysis, and attacks on ECDSA signatures with single-bit nonce bias
Lecture Notes in Computer Science
2015-01-16Paper
Structure-preserving signatures from type II pairings
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Bit-flip faults on elliptic curve base fields, revisited
Applied Cryptography and Network Security
2014-07-07Paper
Close to uniform prime number generation with fewer random bits
Automata, Languages, and Programming
2014-07-01Paper
Scale-invariant fully homomorphic encryption over the integers
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures
Theory of Cryptography
2014-02-18Paper
Recovering private keys generated with weak PRNGs
Cryptography and Coding
2014-01-17Paper
Practical multilinear maps over the integers
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Lattice-based fault attacks on signatures
Information Security and Cryptography
2013-07-09Paper
Injective encodings to elliptic curves
Information Security and Privacy
2013-06-28Paper
A note on the bivariate Coppersmith theorem
Journal of Cryptology
2013-06-27Paper
Another look at affine-padding RSA signatures
Lecture Notes in Computer Science
2013-06-04Paper
Batch fully homomorphic encryption over the integers
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves
Mathematics of Computation
2013-03-20Paper
Attacking RSA-CRT signatures with faults on Montgomery multiplication
Cryptographic Hardware and Embedded Systems – CHES 2012
2012-11-13Paper
Indifferentiable hashing to Barreto-Naehrig curves
Progress in Cryptology – LATINCRYPT 2012
2012-09-21Paper
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Tightly-secure signatures from lossy identification schemes
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
A Nagell algorithm in any characteristic
Cryptography and Security: From Theory to Applications
2012-06-08Paper
Fully homomorphic encryption over the integers with shorter public keys
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Cryptanalysis of the RSA subgroup assumption from TCC 2005
Public Key Cryptography – PKC 2011
2011-03-15Paper
Deterministic encoding and hashing to odd hyperelliptic curves
Lecture Notes in Computer Science
2010-11-26Paper
Huff's model for elliptic curves
Lecture Notes in Computer Science
2010-09-29Paper
Estimating the size of the image of deterministic hash functions to elliptic curves
Lecture Notes in Computer Science
2010-08-31Paper
Efficient indifferentiable hashing into ordinary elliptic curves
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Factoring unbalanced moduli with known bits
Information, Security and Cryptology – ICISC 2009
2010-07-16Paper
On the broadcast and validity-checking security of \textsc{pkcs}\#1 v1.5 encryption
Applied Cryptography and Network Security
2010-07-06Paper
Fault attacks against EMV signatures
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper


Research outcomes over time


This page was built for person: Mehdi Tibouchi