| Publication | Date of Publication | Type |
|---|
| Cryptanalysis of EagleSign | 2025-01-10 | Paper |
\textsc{SwiftEC}: Shallue-van de Woestijne indifferentiable function to elliptic curves Journal of Cryptology | 2024-12-27 | Paper |
| CDS composition of multi-round protocols | 2024-12-13 | Paper |
| Cryptanalysis of the \textsc{Peregrine} lattice-based signature scheme | 2024-11-12 | Paper |
| Profiling side-channel attacks on Dilithium. A small bit-fiddling leak breaks it all | 2024-10-16 | Paper |
| Verifiable isogeny walks: towards an isogeny-based postquantum VDF | 2024-10-14 | Paper |
| \textsc{Antrag}: annular NTRU trapdoor generation. Making \textsc{Mitaka} as secure as FALCON | 2024-08-30 | Paper |
Masking the GLP lattice-based signature scheme at any order Journal of Cryptology | 2024-01-23 | Paper |
| Quantum-access security of hash-based signature schemes | 2024-01-11 | Paper |
\textsc{SwiftEC}: Shallue-van de Woestijne indifferentiable function to elliptic curves. Faster indifferentiable hashing to elliptic curves Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Shorter hash-and-sign lattice-based signatures Advances in Cryptology – CRYPTO 2022 | 2023-06-28 | Paper |
MuSig-L: lattice-based multi-signature with single-round online phase Advances in Cryptology – CRYPTO 2022 | 2023-06-28 | Paper |
SHECS-PIR: Somewhat Homomorphic Encryption-Based Compact and Scalable Private Information Retrieval 1511.68111 | 2022-12-22 | Paper |
| \textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon} | 2022-08-30 | Paper |
| On black-box extension of a non-interactive zero-knowledge proof system for secret equality | 2022-07-06 | Paper |
Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices Journal of Cryptology | 2022-04-21 | Paper |
On subset-resilient hash function families Designs, Codes and Cryptography | 2022-03-21 | Paper |
Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices Public-Key Cryptography – PKC 2021 | 2021-12-21 | Paper |
| Key recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU lattices | 2021-12-01 | Paper |
One bit is all it takes: a devastating timing attack on BLISS's non-constant time sign flips Journal of Mathematical Cryptology | 2021-05-25 | Paper |
Equidistribution among cosets of elliptic curve points in intervals Journal of Mathematical Cryptology | 2021-05-03 | Paper |
Multiparty non-interactive key exchange and more from isogenies on elliptic curves Journal of Mathematical Cryptology | 2020-06-24 | Paper |
Recovering secrets from prefix-dependent leakage Journal of Mathematical Cryptology | 2020-06-24 | Paper |
| Masking Dilithium. Efficient implementation and side-channel evaluation | 2020-01-30 | Paper |
| Cryptanalysis of compact-LWE | 2020-01-21 | Paper |
| A coin-free oracle-based augmented black box framework | 2020-01-10 | Paper |
Efficient fully structure-preserving signatures and shrinking commitments Journal of Cryptology | 2019-08-13 | Paper |
Close to Uniform Prime Number Generation With Fewer Random Bits IEEE Transactions on Information Theory | 2019-01-28 | Paper |
| LWE without modular reduction and improved side-channel attacks against BLISS | 2018-12-20 | Paper |
Loop-Abort Faults on Lattice-Based Signatures and Key Exchange Protocols IEEE Transactions on Computers | 2018-12-04 | Paper |
| FHE over the integers and modular arithmetic circuits | 2018-10-26 | Paper |
| Invalid curve attacks in a GLS setting | 2018-10-24 | Paper |
| Universal witness signatures | 2018-10-24 | Paper |
| Lower bounds on structure-preserving signatures for bilateral messages | 2018-10-17 | Paper |
Constructing permutation rational functions from isogenies SIAM Journal on Discrete Mathematics | 2018-07-20 | Paper |
| Masking the GLP lattice-based signature scheme at any order | 2018-07-09 | Paper |
| Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures | 2018-02-16 | Paper |
| Secure GLS recomposition for sum-of-square cofactors | 2017-08-25 | Paper |
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13 Lecture Notes in Computer Science | 2017-06-13 | Paper |
Improved elliptic curve hashing and point representation Designs, Codes and Cryptography | 2017-02-10 | Paper |
Cryptanalysis of GGH15 multilinear maps Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
Tightly secure signatures from lossy identification schemes Journal of Cryptology | 2016-09-21 | Paper |
Practical cryptanalysis of ISO 9796-2 and EMV signatures Journal of Cryptology | 2016-09-21 | Paper |
Binary elligator squared Selected Areas in Cryptography -- SAC 2014 | 2016-04-13 | Paper |
Degenerate curve attacks. Extending invalid curve attacks to Edwards curves and other models Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Side-channel analysis of Weierstrass and Koblitz curve ECDSA on Android smartphones Topics in Cryptology - CT-RSA 2016 | 2016-04-08 | Paper |
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations Lecture Notes in Computer Science | 2015-12-10 | Paper |
New Multilinear Maps Over the Integers Lecture Notes in Computer Science | 2015-12-10 | Paper |
Cryptanalysis of the co-ACD assumption Lecture Notes in Computer Science | 2015-12-10 | Paper |
Elligator squared: uniform points on elliptic curves of prime order as uniform random strings Financial Cryptography and Data Security | 2015-10-08 | Paper |
Fully structure-preserving signatures and shrinking commitments Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
Impossibility of surjective Icart-like encodings Provable Security | 2015-09-29 | Paper |
Conversion from arithmetic to Boolean masking with logarithmic complexity Fast Software Encryption | 2015-09-18 | Paper |
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds Lecture Notes in Computer Science | 2015-08-27 | Paper |
Making RSA–PSS Provably Secure against Non-random Faults Advanced Information Systems Engineering | 2015-07-21 | Paper |
GLV/GLS decomposition, power analysis, and attacks on ECDSA signatures with single-bit nonce bias Lecture Notes in Computer Science | 2015-01-16 | Paper |
Structure-preserving signatures from type II pairings Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Bit-flip faults on elliptic curve base fields, revisited Applied Cryptography and Network Security | 2014-07-07 | Paper |
Close to uniform prime number generation with fewer random bits Automata, Languages, and Programming | 2014-07-01 | Paper |
Scale-invariant fully homomorphic encryption over the integers Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures Theory of Cryptography | 2014-02-18 | Paper |
Recovering private keys generated with weak PRNGs Cryptography and Coding | 2014-01-17 | Paper |
Practical multilinear maps over the integers Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Lattice-based fault attacks on signatures Information Security and Cryptography | 2013-07-09 | Paper |
Injective encodings to elliptic curves Information Security and Privacy | 2013-06-28 | Paper |
A note on the bivariate Coppersmith theorem Journal of Cryptology | 2013-06-27 | Paper |
Another look at affine-padding RSA signatures Lecture Notes in Computer Science | 2013-06-04 | Paper |
Batch fully homomorphic encryption over the integers Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves Mathematics of Computation | 2013-03-20 | Paper |
Attacking RSA-CRT signatures with faults on Montgomery multiplication Cryptographic Hardware and Embedded Systems – CHES 2012 | 2012-11-13 | Paper |
Indifferentiable hashing to Barreto-Naehrig curves Progress in Cryptology – LATINCRYPT 2012 | 2012-09-21 | Paper |
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Tightly-secure signatures from lossy identification schemes Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
A Nagell algorithm in any characteristic Cryptography and Security: From Theory to Applications | 2012-06-08 | Paper |
Fully homomorphic encryption over the integers with shorter public keys Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
Cryptanalysis of the RSA subgroup assumption from TCC 2005 Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Deterministic encoding and hashing to odd hyperelliptic curves Lecture Notes in Computer Science | 2010-11-26 | Paper |
Huff's model for elliptic curves Lecture Notes in Computer Science | 2010-09-29 | Paper |
Estimating the size of the image of deterministic hash functions to elliptic curves Lecture Notes in Computer Science | 2010-08-31 | Paper |
Efficient indifferentiable hashing into ordinary elliptic curves Advances in Cryptology – CRYPTO 2010 | 2010-08-24 | Paper |
Factoring unbalanced moduli with known bits Information, Security and Cryptology – ICISC 2009 | 2010-07-16 | Paper |
On the broadcast and validity-checking security of \textsc{pkcs}\#1 v1.5 encryption Applied Cryptography and Network Security | 2010-07-06 | Paper |
Fault attacks against EMV signatures Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |