Simple functional encryption schemes for inner products M Abdalla, F Bourse, A De Caro, D Pointcheval IACR International Workshop on Public Key Cryptography, 733-751, 2015 | 386 | 2015 |
Fast homomorphic evaluation of deep discretized neural networks F Bourse, M Minelli, M Minihold, P Paillier Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 377 | 2018 |
Balanced graph edge partition F Bourse, M Lelarge, M Vojnovic Proceedings of the 20th ACM SIGKDD international conference on Knowledge …, 2014 | 175 | 2014 |
FHE circuit privacy almost for free F Bourse, R Del Pino, M Minelli, H Wee Annual International Cryptology Conference, 62-89, 2016 | 76 | 2016 |
CCA-secure inner-product functional encryption from projective hash functions F Benhamouda, F Bourse, H Lipmaa Public-Key Cryptography–PKC 2017: 20th IACR International Conference on …, 2017 | 58 | 2017 |
Better security for functional encryption for inner product evaluations M Abdalla, F Bourse, A De Caro, D Pointcheval Cryptology ePrint Archive, 2016 | 57 | 2016 |
Improved secure integer comparison via homomorphic encryption F Bourse, O Sanders, J Traoré Cryptographers’ Track at the RSA Conference, 391-416, 2020 | 49 | 2020 |
Multi-client inner-product functional encryption in the random-oracle model M Abdalla, F Bourse, H Marival, D Pointcheval, A Soleimanian, H Waldner Security and Cryptography for Networks: 12th International Conference, SCN …, 2020 | 28 | 2020 |
Divisible e-cash from constrained pseudo-random functions F Bourse, D Pointcheval, O Sanders Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019 | 20 | 2019 |
Functional encryption for inner-product evaluations F Bourse Université Paris sciences et lettres, 2017 | 8 | 2017 |
Plug-and-play sanitization for TFHE F Bourse, M Izabachène Cryptology ePrint Archive, 2022 | 2 | 2022 |
From Rational Number Reconstruction to Set Reconciliation and File Synchronization A Amarilli, F Benhamouda, F Bourse, R Morisset, D Naccache, P Rauzy Trustworthy Global Computing, 1-18, 2013 | 1 | 2013 |
Cryptographic method of secure comparison of two secret data x and y F Bourse, O Sanders, J Traore US Patent App. 17/278,861, 2022 | | 2022 |