Advances and open problems in federated learning P Kairouz, HB McMahan, B Avent, A Bellet, M Bennis, AN Bhagoji, ... Foundations and trends® in machine learning 14 (1–2), 1-210, 2021 | 5468 | 2021 |
CRYSTALS--Kyber: a CCA-secure module-lattice-based KEM J Bos, L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, JM Schanck, ... | 902 | 2017 |
Lattice Signatures and Bimodal Gaussians L Ducas, A Durmus, T Lepoint, V Lyubashevsky CRYPTO 2013, 40-56, 2013 | 729 | 2013 |
Crystals-dilithium: A lattice-based digital signature scheme L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, P Schwabe, G Seiler, ... IACR Transactions on Cryptographic Hardware and Embedded Systems, 238-268, 2018 | 705* | 2018 |
Practical Multilinear Maps over the Integers JS Coron, T Lepoint, M Tibouchi CRYPTO 2013, 476-493, 2013 | 506 | 2013 |
Batch fully homomorphic encryption over the integers JH Cheon, JS Coron, J Kim, MS Lee, T Lepoint, M Tibouchi, A Yun EUROCRYPT 2013, 315-335, 2013 | 496 | 2013 |
Secure single-server aggregation with (poly) logarithmic overhead JH Bell, KA Bonawitz, A Gascón, T Lepoint, M Raykova Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 374 | 2020 |
CRYSTALS-Kyber algorithm specifications and supporting documentation R Avanzi, J Bos, L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, JM Schanck, ... NIST PQC Round 2 (4), 1-43, 2019 | 327 | 2019 |
Scale-invariant fully homomorphic encryption over the integers JS Coron, T Lepoint, M Tibouchi Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014 | 253 | 2014 |
A Comparison of the Homomorphic Encryption Schemes FV and YASHE T Lepoint, M Naehrig AFRICACRYPT 2014, 318-335, 2014 | 250 | 2014 |
Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression A Canteaut, S Carpov, C Fontaine, T Lepoint, M Naya-Plasencia, ... FSE 2016, 2015 | 235 | 2015 |
Crystals-dilithium V Lyubashevsky, L Ducas, E Kiltz, T Lepoint, P Schwabe, G Seiler, ... Algorithm Specifications and Supporting Documentation, 2020 | 217 | 2020 |
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance S Bai, A Langlois, T Lepoint, D Stehlé, R Steinfeld ASIACRYPT 2015, 3-24, 2015 | 217 | 2015 |
Zeroizing without low-level zeroes: New MMAP attacks and their limitations JS Coron, C Gentry, S Halevi, T Lepoint, HK Maji, E Miles, M Raykova, ... CRYPTO 2015, 247-266, 2015 | 191 | 2015 |
New multilinear maps over the integers JS Coron, T Lepoint, M Tibouchi CRYPTO 2015, 267-286, 2015 | 189 | 2015 |
NFLlib: NTT-Based Fast Lattice Library C Aguilar-Melchor, J Barrier, S Guelton, A Guinet, MO Killijian, T Lepoint Cryptographers’ Track at the RSA Conference, 341-356, 2016 | 175 | 2016 |
Mariana Raykova, Dawn Song, Weikang Song, Sebastian U P Kairouz, HB McMahan, B Avent, A Bellet, M Bennis, AN Bhagoji, ... Stich, Ziteng Sun, Ananda Theertha Suresh, Florian Tramèr, Praneeth …, 2021 | 165 | 2021 |
Crystals-kyber P Schwabe, R Avanzi, J Bos, L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, ... National Institute of Standards and Technology, Tech. Rep, 2020 | 162 | 2020 |
Two Attacks on a White-Box AES Implementation T Lepoint, M Rivain, Y De Mulder, P Roelse, B Preneel SAC 2013, 265-285, 2013 | 135 | 2013 |
CRYSTALS-Dilithium: Algorithm specifications and supporting documentation (version 3.1) S Bai, L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, P Schwabe, G Seiler, ... NIST Post-Quantum Cryptography Standardization Round 3, 2021 | 124 | 2021 |