Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon., , , and . IACR Cryptol. ePrint Arch., (2022)LWE with Side Information: Attacks and Concrete Security Estimation., , , and . CRYPTO (2), volume 12171 of Lecture Notes in Computer Science, page 329-358. Springer, (2020)Mitaka: A Simpler, Parallelizable, Maskable Variant of Falcon., , , , , , , and . EUROCRYPT (3), volume 13277 of Lecture Notes in Computer Science, page 222-253. Springer, (2022)High-Order Masking of Lattice Signatures in Quasilinear Time., , , and . SP, page 1168-1185. IEEE, (2023)Extended Security of Lattice-Based Cryptography. (Sécurité étendue de la cryptographie fondée sur les réseaux euclidiens).. Paris Sciences et Lettres University, France, (2020)(One) Failure Is Not an Option: Bootstrapping the Search for Failures in Lattice-Based Encryption Schemes., , and . EUROCRYPT (3), volume 12107 of Lecture Notes in Computer Science, page 3-33. Springer, (2020)Mitaka: a simpler, parallelizable, maskable variant of Falcon., , , , , , , and . IACR Cryptol. ePrint Arch., (2021)A provably masked implementation of BIKE Key Encapsulation Mechanism., and . IACR Cryptol. ePrint Arch., (2024)On the Algebraic Immunity - Resiliency trade-off, implications for Goldreich's Pseudorandom Generator., , and . IACR Cryptol. ePrint Arch., (2021)Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor LWE., , , and . CRYPTO (4), volume 14084 of Lecture Notes in Computer Science, page 532-564. Springer, (2023)