Mehdi Tibouchi

From MaRDI portal
Person:315554

Available identifiers

zbMath Open tibouchi.mehdiWikidataQ28002947 ScholiaQ28002947MaRDI QIDQ315554

List of research outcomes

PublicationDate of PublicationType
Masking the GLP lattice-based signature scheme at any order2024-01-23Paper
\textsc{SwiftEC}: Shallue-van de Woestijne indifferentiable function to elliptic curves. Faster indifferentiable hashing to elliptic curves2023-08-25Paper
Shorter hash-and-sign lattice-based signatures2023-06-28Paper
MuSig-L: lattice-based multi-signature with single-round online phase2023-06-28Paper
SHECS-PIR: Somewhat Homomorphic Encryption-Based Compact and Scalable Private Information Retrieval2022-12-22Paper
\textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}2022-08-30Paper
On black-box extension of a non-interactive zero-knowledge proof system for secret equality2022-07-06Paper
Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices2022-04-21Paper
On subset-resilient hash function families2022-03-21Paper
Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices2021-12-21Paper
Key recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU lattices2021-12-01Paper
One bit is all it takes: a devastating timing attack on BLISS's non-constant time sign flips2021-05-25Paper
Equidistribution among cosets of elliptic curve points in intervals2021-05-03Paper
Multiparty non-interactive key exchange and more from isogenies on elliptic curves2020-06-24Paper
Recovering secrets from prefix-dependent leakage2020-06-24Paper
Masking Dilithium. Efficient implementation and side-channel evaluation2020-01-30Paper
Cryptanalysis of compact-LWE2020-01-21Paper
A coin-free oracle-based augmented black box framework2020-01-10Paper
Efficient fully structure-preserving signatures and shrinking commitments2019-08-13Paper
Close to Uniform Prime Number Generation With Fewer Random Bits2019-01-28Paper
LWE without modular reduction and improved side-channel attacks against BLISS2018-12-20Paper
Loop-Abort Faults on Lattice-Based Signatures and Key Exchange Protocols2018-12-04Paper
FHE over the integers and modular arithmetic circuits2018-10-26Paper
Invalid curve attacks in a GLS setting2018-10-24Paper
Universal witness signatures2018-10-24Paper
Lower bounds on structure-preserving signatures for bilateral messages2018-10-17Paper
Constructing Permutation Rational Functions from Isogenies2018-07-20Paper
Masking the GLP lattice-based signature scheme at any order2018-07-09Paper
Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures2018-02-16Paper
Secure GLS recomposition for sum-of-square cofactors2017-08-25Paper
Zeroizing Attacks on Indistinguishability Obfuscation over CLT132017-06-13Paper
Improved elliptic curve hashing and point representation2017-02-10Paper
Cryptanalysis of GGH15 Multilinear Maps2016-10-27Paper
Tightly secure signatures from lossy identification schemes2016-09-21Paper
Practical cryptanalysis of ISO 9796-2 and EMV signatures2016-09-21Paper
Binary Elligator Squared2016-04-13Paper
Degenerate Curve Attacks2016-04-13Paper
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones2016-04-08Paper
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations2015-12-10Paper
New Multilinear Maps Over the Integers2015-12-10Paper
Cryptanalysis of the Co-ACD Assumption2015-12-10Paper
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings2015-10-08Paper
Fully Structure-Preserving Signatures and Shrinking Commitments2015-09-30Paper
Impossibility of Surjective Icart-Like Encodings2015-09-29Paper
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity2015-09-18Paper
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds2015-08-27Paper
Making RSA–PSS Provably Secure against Non-random Faults2015-07-21Paper
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias2015-01-16Paper
Structure-Preserving Signatures from Type II Pairings2014-08-07Paper
Bit-Flip Faults on Elliptic Curve Base Fields, Revisited2014-07-07Paper
Close to Uniform Prime Number Generation with Fewer Random Bits2014-07-01Paper
Scale-Invariant Fully Homomorphic Encryption over the Integers2014-03-25Paper
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures2014-02-18Paper
Recovering Private Keys Generated with Weak PRNGs2014-01-17Paper
Practical Multilinear Maps over the Integers2013-09-02Paper
Lattice-Based Fault Attacks on Signatures2013-07-09Paper
Injective Encodings to Elliptic Curves2013-06-28Paper
A note on the bivariate Coppersmith theorem2013-06-27Paper
Another Look at Affine-Padding RSA Signatures2013-06-04Paper
Batch Fully Homomorphic Encryption over the Integers2013-05-31Paper
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves2013-03-20Paper
Attacking RSA–CRT Signatures with Faults on Montgomery Multiplication2012-11-13Paper
Indifferentiable Hashing to Barreto–Naehrig Curves2012-09-21Paper
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers2012-06-29Paper
Tightly-Secure Signatures from Lossy Identification Schemes2012-06-29Paper
A Nagell Algorithm in Any Characteristic2012-06-08Paper
Fully Homomorphic Encryption over the Integers with Shorter Public Keys2011-08-12Paper
Cryptanalysis of the RSA Subgroup Assumption from TCC 20052011-03-15Paper
Deterministic Encoding and Hashing to Odd Hyperelliptic Curves2010-11-26Paper
Huff’s Model for Elliptic Curves2010-09-29Paper
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves2010-08-31Paper
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves2010-08-24Paper
Factoring Unbalanced Moduli with Known Bits2010-07-16Paper
On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption2010-07-06Paper
Fault Attacks Against emv Signatures2010-03-16Paper
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures2009-10-20Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Mehdi Tibouchi