Publication | Date of Publication | Type |
---|
Masking the GLP lattice-based signature scheme at any order | 2024-01-23 | Paper |
\textsc{SwiftEC}: Shallue-van de Woestijne indifferentiable function to elliptic curves. Faster indifferentiable hashing to elliptic curves | 2023-08-25 | Paper |
Shorter hash-and-sign lattice-based signatures | 2023-06-28 | Paper |
MuSig-L: lattice-based multi-signature with single-round online phase | 2023-06-28 | Paper |
SHECS-PIR: Somewhat Homomorphic Encryption-Based Compact and Scalable Private Information Retrieval | 2022-12-22 | Paper |
\textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon} | 2022-08-30 | Paper |
On black-box extension of a non-interactive zero-knowledge proof system for secret equality | 2022-07-06 | Paper |
Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices | 2022-04-21 | Paper |
On subset-resilient hash function families | 2022-03-21 | Paper |
Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices | 2021-12-21 | Paper |
Key recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU lattices | 2021-12-01 | Paper |
One bit is all it takes: a devastating timing attack on BLISS's non-constant time sign flips | 2021-05-25 | Paper |
Equidistribution among cosets of elliptic curve points in intervals | 2021-05-03 | Paper |
Multiparty non-interactive key exchange and more from isogenies on elliptic curves | 2020-06-24 | Paper |
Recovering secrets from prefix-dependent leakage | 2020-06-24 | Paper |
Masking Dilithium. Efficient implementation and side-channel evaluation | 2020-01-30 | Paper |
Cryptanalysis of compact-LWE | 2020-01-21 | Paper |
A coin-free oracle-based augmented black box framework | 2020-01-10 | Paper |
Efficient fully structure-preserving signatures and shrinking commitments | 2019-08-13 | Paper |
Close to Uniform Prime Number Generation With Fewer Random Bits | 2019-01-28 | Paper |
LWE without modular reduction and improved side-channel attacks against BLISS | 2018-12-20 | Paper |
Loop-Abort Faults on Lattice-Based Signatures and Key Exchange Protocols | 2018-12-04 | Paper |
FHE over the integers and modular arithmetic circuits | 2018-10-26 | Paper |
Invalid curve attacks in a GLS setting | 2018-10-24 | Paper |
Universal witness signatures | 2018-10-24 | Paper |
Lower bounds on structure-preserving signatures for bilateral messages | 2018-10-17 | Paper |
Constructing Permutation Rational Functions from Isogenies | 2018-07-20 | Paper |
Masking the GLP lattice-based signature scheme at any order | 2018-07-09 | Paper |
Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures | 2018-02-16 | Paper |
Secure GLS recomposition for sum-of-square cofactors | 2017-08-25 | Paper |
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13 | 2017-06-13 | Paper |
Improved elliptic curve hashing and point representation | 2017-02-10 | Paper |
Cryptanalysis of GGH15 Multilinear Maps | 2016-10-27 | Paper |
Tightly secure signatures from lossy identification schemes | 2016-09-21 | Paper |
Practical cryptanalysis of ISO 9796-2 and EMV signatures | 2016-09-21 | Paper |
Binary Elligator Squared | 2016-04-13 | Paper |
Degenerate Curve Attacks | 2016-04-13 | Paper |
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones | 2016-04-08 | Paper |
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations | 2015-12-10 | Paper |
New Multilinear Maps Over the Integers | 2015-12-10 | Paper |
Cryptanalysis of the Co-ACD Assumption | 2015-12-10 | Paper |
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings | 2015-10-08 | Paper |
Fully Structure-Preserving Signatures and Shrinking Commitments | 2015-09-30 | Paper |
Impossibility of Surjective Icart-Like Encodings | 2015-09-29 | Paper |
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity | 2015-09-18 | Paper |
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds | 2015-08-27 | Paper |
Making RSA–PSS Provably Secure against Non-random Faults | 2015-07-21 | Paper |
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias | 2015-01-16 | Paper |
Structure-Preserving Signatures from Type II Pairings | 2014-08-07 | Paper |
Bit-Flip Faults on Elliptic Curve Base Fields, Revisited | 2014-07-07 | Paper |
Close to Uniform Prime Number Generation with Fewer Random Bits | 2014-07-01 | Paper |
Scale-Invariant Fully Homomorphic Encryption over the Integers | 2014-03-25 | Paper |
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures | 2014-02-18 | Paper |
Recovering Private Keys Generated with Weak PRNGs | 2014-01-17 | Paper |
Practical Multilinear Maps over the Integers | 2013-09-02 | Paper |
Lattice-Based Fault Attacks on Signatures | 2013-07-09 | Paper |
Injective Encodings to Elliptic Curves | 2013-06-28 | Paper |
A note on the bivariate Coppersmith theorem | 2013-06-27 | Paper |
Another Look at Affine-Padding RSA Signatures | 2013-06-04 | Paper |
Batch Fully Homomorphic Encryption over the Integers | 2013-05-31 | Paper |
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves | 2013-03-20 | Paper |
Attacking RSA–CRT Signatures with Faults on Montgomery Multiplication | 2012-11-13 | Paper |
Indifferentiable Hashing to Barreto–Naehrig Curves | 2012-09-21 | Paper |
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers | 2012-06-29 | Paper |
Tightly-Secure Signatures from Lossy Identification Schemes | 2012-06-29 | Paper |
A Nagell Algorithm in Any Characteristic | 2012-06-08 | Paper |
Fully Homomorphic Encryption over the Integers with Shorter Public Keys | 2011-08-12 | Paper |
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005 | 2011-03-15 | Paper |
Deterministic Encoding and Hashing to Odd Hyperelliptic Curves | 2010-11-26 | Paper |
Huff’s Model for Elliptic Curves | 2010-09-29 | Paper |
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves | 2010-08-31 | Paper |
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves | 2010-08-24 | Paper |
Factoring Unbalanced Moduli with Known Bits | 2010-07-16 | Paper |
On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption | 2010-07-06 | Paper |
Fault Attacks Against emv Signatures | 2010-03-16 | Paper |
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures | 2009-10-20 | Paper |