Mehdi Tibouchi

From MaRDI portal
Person:315554

Available identifiers

zbMath Open tibouchi.mehdiWikidataQ28002947 ScholiaQ28002947MaRDI QIDQ315554

List of research outcomes





PublicationDate of PublicationType
Cryptanalysis of EagleSign2025-01-10Paper
\textsc{SwiftEC}: Shallue-van de Woestijne indifferentiable function to elliptic curves2024-12-27Paper
CDS composition of multi-round protocols2024-12-13Paper
Cryptanalysis of the \textsc{Peregrine} lattice-based signature scheme2024-11-12Paper
Profiling side-channel attacks on Dilithium. A small bit-fiddling leak breaks it all2024-10-16Paper
Verifiable isogeny walks: towards an isogeny-based postquantum VDF2024-10-14Paper
\textsc{Antrag}: annular NTRU trapdoor generation. Making \textsc{Mitaka} as secure as FALCON2024-08-30Paper
Masking the GLP lattice-based signature scheme at any order2024-01-23Paper
Quantum-access security of hash-based signature schemes2024-01-11Paper
\textsc{SwiftEC}: Shallue-van de Woestijne indifferentiable function to elliptic curves. Faster indifferentiable hashing to elliptic curves2023-08-25Paper
Shorter hash-and-sign lattice-based signatures2023-06-28Paper
MuSig-L: lattice-based multi-signature with single-round online phase2023-06-28Paper
SHECS-PIR: Somewhat Homomorphic Encryption-Based Compact and Scalable Private Information Retrieval2022-12-22Paper
\textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}2022-08-30Paper
On black-box extension of a non-interactive zero-knowledge proof system for secret equality2022-07-06Paper
Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices2022-04-21Paper
On subset-resilient hash function families2022-03-21Paper
Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices2021-12-21Paper
Key recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU lattices2021-12-01Paper
One bit is all it takes: a devastating timing attack on BLISS's non-constant time sign flips2021-05-25Paper
Equidistribution among cosets of elliptic curve points in intervals2021-05-03Paper
Multiparty non-interactive key exchange and more from isogenies on elliptic curves2020-06-24Paper
Recovering secrets from prefix-dependent leakage2020-06-24Paper
Masking Dilithium. Efficient implementation and side-channel evaluation2020-01-30Paper
Cryptanalysis of compact-LWE2020-01-21Paper
A coin-free oracle-based augmented black box framework2020-01-10Paper
Efficient fully structure-preserving signatures and shrinking commitments2019-08-13Paper
Close to Uniform Prime Number Generation With Fewer Random Bits2019-01-28Paper
LWE without modular reduction and improved side-channel attacks against BLISS2018-12-20Paper
Loop-Abort Faults on Lattice-Based Signatures and Key Exchange Protocols2018-12-04Paper
FHE over the integers and modular arithmetic circuits2018-10-26Paper
Invalid curve attacks in a GLS setting2018-10-24Paper
Universal witness signatures2018-10-24Paper
Lower bounds on structure-preserving signatures for bilateral messages2018-10-17Paper
Constructing permutation rational functions from isogenies2018-07-20Paper
Masking the GLP lattice-based signature scheme at any order2018-07-09Paper
Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures2018-02-16Paper
Secure GLS recomposition for sum-of-square cofactors2017-08-25Paper
Zeroizing Attacks on Indistinguishability Obfuscation over CLT132017-06-13Paper
Improved elliptic curve hashing and point representation2017-02-10Paper
Cryptanalysis of GGH15 multilinear maps2016-10-27Paper
Tightly secure signatures from lossy identification schemes2016-09-21Paper
Practical cryptanalysis of ISO 9796-2 and EMV signatures2016-09-21Paper
Binary elligator squared2016-04-13Paper
Degenerate curve attacks. Extending invalid curve attacks to Edwards curves and other models2016-04-13Paper
Side-channel analysis of Weierstrass and Koblitz curve ECDSA on Android smartphones2016-04-08Paper
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations2015-12-10Paper
New Multilinear Maps Over the Integers2015-12-10Paper
Cryptanalysis of the co-ACD assumption2015-12-10Paper
Elligator squared: uniform points on elliptic curves of prime order as uniform random strings2015-10-08Paper
Fully structure-preserving signatures and shrinking commitments2015-09-30Paper
Impossibility of surjective Icart-like encodings2015-09-29Paper
Conversion from arithmetic to Boolean masking with logarithmic complexity2015-09-18Paper
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds2015-08-27Paper
Making RSA–PSS Provably Secure against Non-random Faults2015-07-21Paper
GLV/GLS decomposition, power analysis, and attacks on ECDSA signatures with single-bit nonce bias2015-01-16Paper
Structure-preserving signatures from type II pairings2014-08-07Paper
Bit-flip faults on elliptic curve base fields, revisited2014-07-07Paper
Close to uniform prime number generation with fewer random bits2014-07-01Paper
Scale-invariant fully homomorphic encryption over the integers2014-03-25Paper
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures2014-02-18Paper
Recovering private keys generated with weak PRNGs2014-01-17Paper
Practical multilinear maps over the integers2013-09-02Paper
Lattice-based fault attacks on signatures2013-07-09Paper
Injective encodings to elliptic curves2013-06-28Paper
A note on the bivariate Coppersmith theorem2013-06-27Paper
Another look at affine-padding RSA signatures2013-06-04Paper
Batch fully homomorphic encryption over the integers2013-05-31Paper
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves2013-03-20Paper
Attacking RSA-CRT signatures with faults on Montgomery multiplication2012-11-13Paper
Indifferentiable hashing to Barreto-Naehrig curves2012-09-21Paper
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers2012-06-29Paper
Tightly-secure signatures from lossy identification schemes2012-06-29Paper
A Nagell algorithm in any characteristic2012-06-08Paper
Fully homomorphic encryption over the integers with shorter public keys2011-08-12Paper
Cryptanalysis of the RSA subgroup assumption from TCC 20052011-03-15Paper
Deterministic encoding and hashing to odd hyperelliptic curves2010-11-26Paper
Huff's model for elliptic curves2010-09-29Paper
Estimating the size of the image of deterministic hash functions to elliptic curves2010-08-31Paper
Efficient indifferentiable hashing into ordinary elliptic curves2010-08-24Paper
Factoring unbalanced moduli with known bits2010-07-16Paper
On the broadcast and validity-checking security of \textsc{pkcs}\#1 v1.5 encryption2010-07-06Paper
Fault attacks against EMV signatures2010-03-16Paper
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures2009-10-20Paper

Research outcomes over time

This page was built for person: Mehdi Tibouchi