Mehdi Tibouchi
Mehdi Tibouchi
Distinguished Researcher, NTT Corporation
Verified email at normalesup.org - Homepage
Title
Cited by
Cited by
Year
Fully homomorphic encryption over the integers with shorter public keys
JS Coron, A Mandal, D Naccache, M Tibouchi
Annual Cryptology Conference, 487-504, 2011
5492011
Practical multilinear maps over the integers
JS Coron, T Lepoint, M Tibouchi
Annual Cryptology Conference, 476-493, 2013
4262013
Batch fully homomorphic encryption over the integers
JH Cheon, JS Coron, J Kim, MS Lee, T Lepoint, M Tibouchi, A Yun
Annual International Conference on the Theory and Applications of …, 2013
3702013
Public key compression and modulus switching for fully homomorphic encryption over the integers
JS Coron, D Naccache, M Tibouchi
Annual International Conference on the Theory and Applications of …, 2012
3412012
Scale-invariant fully homomorphic encryption over the integers
JS Coron, T Lepoint, M Tibouchi
International Workshop on Public Key Cryptography, 311-328, 2014
1732014
New multilinear maps over the integers
JS Coron, T Lepoint, M Tibouchi
Annual Cryptology Conference, 267-286, 2015
1632015
Zeroizing without low-level zeroes: New MMAP attacks and their limitations
JS Coron, C Gentry, S Halevi, T Lepoint, HK Maji, E Miles, M Raykova, ...
Annual Cryptology Conference, 247-266, 2015
1582015
Efficient indifferentiable hashing into ordinary elliptic curves
E Brier, JS Coron, T Icart, D Madore, H Randriam, M Tibouchi
Annual Cryptology Conference, 237-254, 2010
1202010
Cryptanalysis of GGH15 multilinear maps
JS Coron, MS Lee, T Lepoint, M Tibouchi
Annual International Cryptology Conference, 607-628, 2016
922016
Huff’s model for elliptic curves
M Joye, M Tibouchi, D Vergnaud
International Algorithmic Number Theory Symposium, 234-250, 2010
842010
Side-channel attacks on BLISS lattice-based signatures: Exploiting branch tracing against strongswan and electromagnetic emanations in microcontrollers
T Espitau, PA Fouque, B Gérard, M Tibouchi
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
812017
Tightly secure signatures from lossy identification schemes
M Abdalla, PA Fouque, V Lyubashevsky, M Tibouchi
Journal of Cryptology 29 (3), 597-631, 2016
76*2016
Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers.
JS Coron, T Lepoint, M Tibouchi
IACR Cryptol. ePrint Arch. 2014, 975, 2014
642014
Conversion from arithmetic to boolean masking with logarithmic complexity
JS Coron, J Großschädl, M Tibouchi, PK Vadnala
International Workshop on Fast Software Encryption, 130-149, 2015
562015
Zeroizing attacks on indistinguishability obfuscation over CLT13
JS Coron, MS Lee, T Lepoint, M Tibouchi
IACR International Workshop on Public Key Cryptography, 41-58, 2017
552017
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves
RR Farashahi, PA Fouque, I Shparlinski, M Tibouchi, J Voloch
Mathematics of Computation 82 (281), 491-512, 2013
492013
Unified, minimal and selectively randomizable structure-preserving signatures
M Abe, J Groth, M Ohkubo, M Tibouchi
Theory of Cryptography Conference, 688-712, 2014
462014
Side-channel analysis of Weierstrass and Koblitz curve ECDSA on Android smartphones
P Belgarric, PA Fouque, G Macario-Rat, M Tibouchi
Cryptographers’ Track at the RSA Conference, 236-252, 2016
412016
Cryptanalysis of the Quadratic Zero-Testing of GGH.
Z Brakerski, C Gentry, S Halevi, T Lepoint, A Sahai, M Tibouchi
IACR Cryptol. ePrint Arch. 2015, 845, 2015
402015
GLV/GLS decomposition, power analysis, and attacks on ECDSA signatures with single-bit nonce bias
DF Aranha, PA Fouque, B Gérard, JG Kammerer, M Tibouchi, ...
International Conference on the Theory and Application of Cryptology and …, 2014
402014
The system can't perform the operation now. Try again later.
Articles 1–20