Fully homomorphic encryption over the integers with shorter public keys JS Coron, A Mandal, D Naccache, M Tibouchi Annual Cryptology Conference, 487-504, 2011 | 670 | 2011 |
Practical multilinear maps over the integers JS Coron, T Lepoint, M Tibouchi Annual Cryptology Conference, 476-493, 2013 | 510 | 2013 |
Batch fully homomorphic encryption over the integers JH Cheon, JS Coron, J Kim, MS Lee, T Lepoint, M Tibouchi, A Yun Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013 | 501 | 2013 |
Public key compression and modulus switching for fully homomorphic encryption over the integers JS Coron, D Naccache, M Tibouchi Annual International Conference on the Theory and Applications of …, 2012 | 425 | 2012 |
Scale-invariant fully homomorphic encryption over the integers JS Coron, T Lepoint, M Tibouchi Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014 | 255 | 2014 |
Zeroizing without low-level zeroes: New MMAP attacks and their limitations JS Coron, C Gentry, S Halevi, T Lepoint, HK Maji, E Miles, M Raykova, ... Annual Cryptology Conference, 247-266, 2015 | 192 | 2015 |
New multilinear maps over the integers JS Coron, T Lepoint, M Tibouchi Annual Cryptology Conference, 267-286, 2015 | 190 | 2015 |
Efficient indifferentiable hashing into ordinary elliptic curves E Brier, JS Coron, T Icart, D Madore, H Randriam, M Tibouchi Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010 | 176 | 2010 |
Side-channel attacks on BLISS lattice-based signatures: Exploiting branch tracing against strongswan and electromagnetic emanations in microcontrollers T Espitau, PA Fouque, B Gérard, M Tibouchi Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 165 | 2017 |
Tightly secure signatures from lossy identification schemes M Abdalla, PA Fouque, V Lyubashevsky, M Tibouchi Journal of Cryptology 29, 597-631, 2016 | 143* | 2016 |
Huff’s model for elliptic curves M Joye, M Tibouchi, D Vergnaud Algorithmic Number Theory: 9th International Symposium, ANTS-IX, Nancy …, 2010 | 124 | 2010 |
Cryptanalysis of GGH15 multilinear maps JS Coron, MS Lee, T Lepoint, M Tibouchi Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016 | 118 | 2016 |
Masking dilithium: Efficient implementation and side-channel evaluation V Migliore, B Gérard, M Tibouchi, PA Fouque Applied Cryptography and Network Security: 17th International Conference …, 2019 | 96 | 2019 |
LadderLeak: Breaking ECDSA with less than one bit of nonce leakage DF Aranha, FR Novaes, A Takahashi, M Tibouchi, Y Yarom Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 94 | 2020 |
Conversion from arithmetic to boolean masking with logarithmic complexity JS Coron, J Großschädl, M Tibouchi, PK Vadnala Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015 | 94 | 2015 |
Masking the GLP lattice-based signature scheme at any order G Barthe, S Belaïd, T Espitau, PA Fouque, B Grégoire, M Rossi, ... Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018 | 88 | 2018 |
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices I Damgård, C Orlandi, A Takahashi, M Tibouchi Journal of Cryptology 35 (2), 14, 2022 | 78 | 2022 |
Zeroizing attacks on indistinguishability obfuscation over CLT13 JS Coron, MS Lee, T Lepoint, M Tibouchi Public-Key Cryptography–PKC 2017: 20th IACR International Conference on …, 2017 | 75 | 2017 |
Cryptanalysis of two candidate fixes of multilinear maps over the integers JS Coron, T Lepoint, M Tibouchi Cryptology ePrint Archive, 2014 | 72 | 2014 |
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves RR Farashahi, PA Fouque, I Shparlinski, M Tibouchi, J Voloch Mathematics of Computation 82 (281), 491-512, 2013 | 72 | 2013 |