| Publication | Date of Publication | Type |
|---|
| Cryptanalysis of EagleSign | 2025-01-10 | Paper |
| \textsc{SwiftEC}: Shallue-van de Woestijne indifferentiable function to elliptic curves | 2024-12-27 | Paper |
| CDS composition of multi-round protocols | 2024-12-13 | Paper |
| Cryptanalysis of the \textsc{Peregrine} lattice-based signature scheme | 2024-11-12 | Paper |
| Profiling side-channel attacks on Dilithium. A small bit-fiddling leak breaks it all | 2024-10-16 | Paper |
| Verifiable isogeny walks: towards an isogeny-based postquantum VDF | 2024-10-14 | Paper |
| \textsc{Antrag}: annular NTRU trapdoor generation. Making \textsc{Mitaka} as secure as FALCON | 2024-08-30 | Paper |
| Masking the GLP lattice-based signature scheme at any order | 2024-01-23 | Paper |
| Quantum-access security of hash-based signature schemes | 2024-01-11 | Paper |
| \textsc{SwiftEC}: Shallue-van de Woestijne indifferentiable function to elliptic curves. Faster indifferentiable hashing to elliptic curves | 2023-08-25 | Paper |
| Shorter hash-and-sign lattice-based signatures | 2023-06-28 | Paper |
| MuSig-L: lattice-based multi-signature with single-round online phase | 2023-06-28 | Paper |
| SHECS-PIR: Somewhat Homomorphic Encryption-Based Compact and Scalable Private Information Retrieval | 2022-12-22 | Paper |
| \textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon} | 2022-08-30 | Paper |
| On black-box extension of a non-interactive zero-knowledge proof system for secret equality | 2022-07-06 | Paper |
| Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices | 2022-04-21 | Paper |
| On subset-resilient hash function families | 2022-03-21 | Paper |
| Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices | 2021-12-21 | Paper |
| Key recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU lattices | 2021-12-01 | Paper |
| One bit is all it takes: a devastating timing attack on BLISS's non-constant time sign flips | 2021-05-25 | Paper |
| Equidistribution among cosets of elliptic curve points in intervals | 2021-05-03 | Paper |
| Multiparty non-interactive key exchange and more from isogenies on elliptic curves | 2020-06-24 | Paper |
| Recovering secrets from prefix-dependent leakage | 2020-06-24 | Paper |
| Masking Dilithium. Efficient implementation and side-channel evaluation | 2020-01-30 | Paper |
| Cryptanalysis of compact-LWE | 2020-01-21 | Paper |
| A coin-free oracle-based augmented black box framework | 2020-01-10 | Paper |
| Efficient fully structure-preserving signatures and shrinking commitments | 2019-08-13 | Paper |
| Close to Uniform Prime Number Generation With Fewer Random Bits | 2019-01-28 | Paper |
| LWE without modular reduction and improved side-channel attacks against BLISS | 2018-12-20 | Paper |
| Loop-Abort Faults on Lattice-Based Signatures and Key Exchange Protocols | 2018-12-04 | Paper |
| FHE over the integers and modular arithmetic circuits | 2018-10-26 | Paper |
| Invalid curve attacks in a GLS setting | 2018-10-24 | Paper |
| Universal witness signatures | 2018-10-24 | Paper |
| Lower bounds on structure-preserving signatures for bilateral messages | 2018-10-17 | Paper |
| Constructing permutation rational functions from isogenies | 2018-07-20 | Paper |
| Masking the GLP lattice-based signature scheme at any order | 2018-07-09 | Paper |
| Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures | 2018-02-16 | Paper |
| Secure GLS recomposition for sum-of-square cofactors | 2017-08-25 | Paper |
| Zeroizing Attacks on Indistinguishability Obfuscation over CLT13 | 2017-06-13 | Paper |
| Improved elliptic curve hashing and point representation | 2017-02-10 | Paper |
| Cryptanalysis of GGH15 multilinear maps | 2016-10-27 | Paper |
| Tightly secure signatures from lossy identification schemes | 2016-09-21 | Paper |
| Practical cryptanalysis of ISO 9796-2 and EMV signatures | 2016-09-21 | Paper |
| Binary elligator squared | 2016-04-13 | Paper |
| Degenerate curve attacks. Extending invalid curve attacks to Edwards curves and other models | 2016-04-13 | Paper |
| Side-channel analysis of Weierstrass and Koblitz curve ECDSA on Android smartphones | 2016-04-08 | Paper |
| Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations | 2015-12-10 | Paper |
| New Multilinear Maps Over the Integers | 2015-12-10 | Paper |
| Cryptanalysis of the co-ACD assumption | 2015-12-10 | Paper |
| Elligator squared: uniform points on elliptic curves of prime order as uniform random strings | 2015-10-08 | Paper |
| Fully structure-preserving signatures and shrinking commitments | 2015-09-30 | Paper |
| Impossibility of surjective Icart-like encodings | 2015-09-29 | Paper |
| Conversion from arithmetic to Boolean masking with logarithmic complexity | 2015-09-18 | Paper |
| Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds | 2015-08-27 | Paper |
| Making RSA–PSS Provably Secure against Non-random Faults | 2015-07-21 | Paper |
| GLV/GLS decomposition, power analysis, and attacks on ECDSA signatures with single-bit nonce bias | 2015-01-16 | Paper |
| Structure-preserving signatures from type II pairings | 2014-08-07 | Paper |
| Bit-flip faults on elliptic curve base fields, revisited | 2014-07-07 | Paper |
| Close to uniform prime number generation with fewer random bits | 2014-07-01 | Paper |
| Scale-invariant fully homomorphic encryption over the integers | 2014-03-25 | Paper |
| Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures | 2014-02-18 | Paper |
| Recovering private keys generated with weak PRNGs | 2014-01-17 | Paper |
| Practical multilinear maps over the integers | 2013-09-02 | Paper |
| Lattice-based fault attacks on signatures | 2013-07-09 | Paper |
| Injective encodings to elliptic curves | 2013-06-28 | Paper |
| A note on the bivariate Coppersmith theorem | 2013-06-27 | Paper |
| Another look at affine-padding RSA signatures | 2013-06-04 | Paper |
| Batch fully homomorphic encryption over the integers | 2013-05-31 | Paper |
| Indifferentiable deterministic hashing to elliptic and hyperelliptic curves | 2013-03-20 | Paper |
| Attacking RSA-CRT signatures with faults on Montgomery multiplication | 2012-11-13 | Paper |
| Indifferentiable hashing to Barreto-Naehrig curves | 2012-09-21 | Paper |
| Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers | 2012-06-29 | Paper |
| Tightly-secure signatures from lossy identification schemes | 2012-06-29 | Paper |
| A Nagell algorithm in any characteristic | 2012-06-08 | Paper |
| Fully homomorphic encryption over the integers with shorter public keys | 2011-08-12 | Paper |
| Cryptanalysis of the RSA subgroup assumption from TCC 2005 | 2011-03-15 | Paper |
| Deterministic encoding and hashing to odd hyperelliptic curves | 2010-11-26 | Paper |
| Huff's model for elliptic curves | 2010-09-29 | Paper |
| Estimating the size of the image of deterministic hash functions to elliptic curves | 2010-08-31 | Paper |
| Efficient indifferentiable hashing into ordinary elliptic curves | 2010-08-24 | Paper |
| Factoring unbalanced moduli with known bits | 2010-07-16 | Paper |
| On the broadcast and validity-checking security of \textsc{pkcs}\#1 v1.5 encryption | 2010-07-06 | Paper |
| Fault attacks against EMV signatures | 2010-03-16 | Paper |
| Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures | 2009-10-20 | Paper |