Linearly homomorphic encryption from G Castagnos, F Laguillaumie Cryptographers’ Track at the RSA Conference, 487-505, 2015 | 120 | 2015 |
Two-party ECDSA from hash proof systems and efficient instantiations G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 86 | 2019 |
Bandwidth-efficient threshold EC-DSA G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker IACR International Conference on Public-Key Cryptography, 266-296, 2020 | 85 | 2020 |
Lattice-based homomorphic encryption of vector spaces CA Melchor, G Castagnos, P Gaborit 2008 IEEE international symposium on information theory, 1858-1862, 2008 | 81 | 2008 |
Practical Fully Secure Unrestricted Inner Product Functional Encryption Modulo p G Castagnos, F Laguillaumie, I Tucker International Conference on the Theory and Application of Cryptology and …, 2018 | 60 | 2018 |
Fault analysis of GRAIN-128 A Berzati, C Canovas, G Castagnos, B Debraize, L Goubin, A Gouget, ... 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, 7-14, 2009 | 57 | 2009 |
An efficient probabilistic public-key cryptosystem over quadratic fields quotients G Castagnos Finite Fields and Their Applications 13 (3), 563-576, 2007 | 51 | 2007 |
What do DES S-boxes Say to Each Other? NT Courtois, G Castagnos, L Goubin Cryptology ePrint Archive, 2003 | 35 | 2003 |
Encryption Switching Protocols Revisited: Switching Modulo p G Castagnos, L Imbert, F Laguillaumie Annual International Cryptology Conference, 255-287, 2017 | 28 | 2017 |
Efficient CCA timed commitments in class groups SAK Thyagarajan, G Castagnos, F Laguillaumie, G Malavolta Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 26 | 2021 |
On the security of cryptosystems with quadratic decryption: the nicest cryptanalysis G Castagnos, F Laguillaumie Annual International Conference on the Theory and Applications of …, 2009 | 23 | 2009 |
Factoring pq2 with Quadratic Forms: Nice Cryptanalyses G Castagnos, A Joux, F Laguillaumie, PQ Nguyen International Conference on the Theory and Application of Cryptology and …, 2009 | 21 | 2009 |
Bandwidth-efficient threshold EC-DSA revisited: Online/offline extensions, identifiable aborts proactive and adaptive security G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker Theoretical Computer Science 939, 78-104, 2023 | 19 | 2023 |
High-order masking by using coding theory and its application to AES G Castagnos, S Renner, G Zémor Cryptography and Coding: 14th IMA International Conference, IMACC 2013 …, 2013 | 14 | 2013 |
Towards a DL-based additively homomorphic encryption scheme G Castagnos, B Chevallier-Mames International Conference on Information Security, 362-375, 2007 | 14 | 2007 |
Threshold Linearly Homomorphic Encryption on G Castagnos, F Laguillaumie, I Tucker International Conference on the Theory and Application of Cryptology and …, 2022 | 12 | 2022 |
I Want to Ride My BICYCL : BICYCL Implements CryptographY in CLass Groups C Bouvier, G Castagnos, L Imbert, F Laguillaumie Journal of Cryptology 36 (3), 17, 2023 | 10 | 2023 |
Fault Analysis of Grain-128. G Castagnos, A Berzati, C Canovas, B Debraize, L Goubin, A Gouget, ... HOST, 7-14, 2009 | 10 | 2009 |
Trapdoor Permutation Polynomials of ℤ/nℤ and Public Key Cryptosystems: G Castagnos, D Vergnaud Information Security: 10th International Conference, ISC 2007, Valparaíso …, 2007 | 8 | 2007 |
Public key encryption with flexible pattern matching E Bouscatié, G Castagnos, O Sanders Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 6 | 2021 |