The following pages link to Mehdi Tibouchi (Q315554):
Displaying 50 items.
- Tightly secure signatures from lossy identification schemes (Q315555) (← links)
- Practical cryptanalysis of ISO 9796-2 and EMV signatures (Q315558) (← links)
- Improved elliptic curve hashing and point representation (Q510463) (← links)
- LWE without modular reduction and improved side-channel attacks against BLISS (Q1633471) (← links)
- Masking the GLP lattice-based signature scheme at any order (Q1648842) (← links)
- Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures (Q1698622) (← links)
- Lower bounds on structure-preserving signatures for bilateral messages (Q1796776) (← links)
- Invalid curve attacks in a GLS setting (Q1800571) (← links)
- Universal witness signatures (Q1800730) (← links)
- FHE over the integers and modular arithmetic circuits (Q1801207) (← links)
- Secure GLS recomposition for sum-of-square cofactors (Q2014627) (← links)
- Equidistribution among cosets of elliptic curve points in intervals (Q2023315) (← links)
- One bit is all it takes: a devastating timing attack on BLISS's non-constant time sign flips (Q2027275) (← links)
- Key recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU lattices (Q2055645) (← links)
- On subset-resilient hash function families (Q2115743) (← links)
- On black-box extension of a non-interactive zero-knowledge proof system for secret equality (Q2152072) (← links)
- \textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon} (Q2170090) (← links)
- Multiparty non-interactive key exchange and more from isogenies on elliptic curves (Q2191198) (← links)
- Recovering secrets from prefix-dependent leakage (Q2191199) (← links)
- A coin-free oracle-based augmented black box framework (Q2283613) (← links)
- Cryptanalysis of compact-LWE (Q2287506) (← links)
- Masking Dilithium. Efficient implementation and side-channel evaluation (Q2291397) (← links)
- Efficient fully structure-preserving signatures and shrinking commitments (Q2318093) (← links)
- A note on the bivariate Coppersmith theorem (Q2377067) (← links)
- Binary Elligator Squared (Q2798602) (← links)
- Degenerate Curve Attacks (Q2798792) (← links)
- Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones (Q2799017) (← links)
- Cryptanalysis of GGH15 Multilinear Maps (Q2829232) (← links)
- Lattice-Based Fault Attacks on Signatures (Q2838308) (← links)
- Practical Multilinear Maps over the Integers (Q2845689) (← links)
- Recovering Private Keys Generated with Weak PRNGs (Q2870092) (← links)
- Structure-Preserving Signatures from Type II Pairings (Q2874516) (← links)
- A Nagell Algorithm in Any Characteristic (Q2889796) (← links)
- Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers (Q2894423) (← links)
- Tightly-Secure Signatures from Lossy Identification Schemes (Q2894432) (← links)
- Indifferentiable Hashing to Barreto–Naehrig Curves (Q2915112) (← links)
- GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias (Q2938849) (← links)
- Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds (Q2941200) (← links)
- Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity (Q2946940) (← links)
- Impossibility of Surjective Icart-Like Encodings (Q2948136) (← links)
- Fully Structure-Preserving Signatures and Shrinking Commitments (Q2948378) (← links)
- Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings (Q2949239) (← links)
- Deterministic Encoding and Hashing to Odd Hyperelliptic Curves (Q3059656) (← links)
- Cryptanalysis of the RSA Subgroup Assumption from TCC 2005 (Q3084345) (← links)
- Constructing Permutation Rational Functions from Isogenies (Q3176494) (← links)
- Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures (Q3183578) (← links)
- Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations (Q3457113) (← links)
- New Multilinear Maps Over the Integers (Q3457114) (← links)
- Cryptanalysis of the Co-ACD Assumption (Q3457128) (← links)
- On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption (Q3575032) (← links)