Follow
Mehdi Tibouchi
Mehdi Tibouchi
Distinguished Researcher, NTT Corporation
Verified email at normalesup.org - Homepage
Title
Cited by
Cited by
Year
Fully homomorphic encryption over the integers with shorter public keys
JS Coron, A Mandal, D Naccache, M Tibouchi
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
6202011
Practical multilinear maps over the integers
JS Coron, T Lepoint, M Tibouchi
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
4812013
Batch fully homomorphic encryption over the integers
JH Cheon, JS Coron, J Kim, MS Lee, T Lepoint, M Tibouchi, A Yun
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
4442013
Public key compression and modulus switching for fully homomorphic encryption over the integers
JS Coron, D Naccache, M Tibouchi
Advances in Cryptology–EUROCRYPT 2012: 31st Annual International Conference …, 2012
3942012
Scale-invariant fully homomorphic encryption over the integers
JS Coron, T Lepoint, M Tibouchi
Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014
2162014
Zeroizing without low-level zeroes: New MMAP attacks and their limitations
JS Coron, C Gentry, S Halevi, T Lepoint, HK Maji, E Miles, M Raykova, ...
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
1822015
New multilinear maps over the integers
JS Coron, T Lepoint, M Tibouchi
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
1822015
Efficient indifferentiable hashing into ordinary elliptic curves
E Brier, JS Coron, T Icart, D Madore, H Randriam, M Tibouchi
Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010
1532010
Side-channel attacks on BLISS lattice-based signatures: Exploiting branch tracing against strongswan and electromagnetic emanations in microcontrollers
T Espitau, PA Fouque, B Gérard, M Tibouchi
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1372017
Huff’s model for elliptic curves
M Joye, M Tibouchi, D Vergnaud
Algorithmic Number Theory: 9th International Symposium, ANTS-IX, Nancy …, 2010
1142010
Cryptanalysis of GGH15 multilinear maps
JS Coron, MS Lee, T Lepoint, M Tibouchi
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
1112016
Tightly secure signatures from lossy identification schemes
M Abdalla, PA Fouque, V Lyubashevsky, M Tibouchi
Journal of Cryptology 29, 597-631, 2016
105*2016
Conversion from arithmetic to boolean masking with logarithmic complexity
JS Coron, J Großschädl, M Tibouchi, PK Vadnala
Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015
732015
Zeroizing attacks on indistinguishability obfuscation over CLT13
JS Coron, MS Lee, T Lepoint, M Tibouchi
Public-Key Cryptography–PKC 2017: 20th IACR International Conference on …, 2017
692017
Cryptanalysis of two candidate fixes of multilinear maps over the integers
JS Coron, T Lepoint, M Tibouchi
Cryptology ePrint Archive, 2014
682014
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves
RR Farashahi, PA Fouque, I Shparlinski, M Tibouchi, J Voloch
Mathematics of Computation 82 (281), 491-512, 2013
622013
GLV/GLS decomposition, power analysis, and attacks on ECDSA signatures with single-bit nonce bias
DF Aranha, PA Fouque, B Gérard, JG Kammerer, M Tibouchi, ...
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
562014
Injective encodings to elliptic curves
PA Fouque, A Joux, M Tibouchi
Information Security and Privacy: 18th Australasian Conference, ACISP 2013 …, 2013
562013
Masking the GLP lattice-based signature scheme at any order
G Barthe, S Belaïd, T Espitau, PA Fouque, B Grégoire, M Rossi, ...
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
552018
Side-channel analysis of Weierstrass and Koblitz curve ECDSA on Android smartphones
P Belgarric, PA Fouque, G Macario-Rat, M Tibouchi
Topics in Cryptology-CT-RSA 2016: The Cryptographers' Track at the RSA …, 2016
542016
The system can't perform the operation now. Try again later.
Articles 1–20