Остановите войну!
for scientists:
default search action
Mehdi Tibouchi
- > Home > Persons > Mehdi Tibouchi
Publications
- 2024
- [j31]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi:
Masking the GLP Lattice-Based Signature Scheme at Any Order. J. Cryptol. 37(1): 5 (2024) - 2022
- [c65]Thomas Espitau, Pierre-Alain Fouque, François Gérard, Mélissa Rossi, Akira Takahashi, Mehdi Tibouchi, Alexandre Wallet, Yang Yu:
Mitaka: A Simpler, Parallelizable, Maskable Variant of Falcon. EUROCRYPT (3) 2022: 222-253 - 2021
- [i60]Thomas Espitau, Pierre-Alain Fouque, François Gérard, Mélissa Rossi, Akira Takahashi, Mehdi Tibouchi, Alexandre Wallet, Yang Yu:
Mitaka: a simpler, parallelizable, maskable variant of Falcon. IACR Cryptol. ePrint Arch. 2021: 1486 (2021) - 2020
- [c59]Pierre-Alain Fouque, Paul Kirchner, Mehdi Tibouchi, Alexandre Wallet, Yang Yu:
Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices. EUROCRYPT (3) 2020: 34-63 - 2019
- [j16]Pierre-Alain Fouque, Mehdi Tibouchi:
Close to Uniform Prime Number Generation With Fewer Random Bits. IEEE Trans. Inf. Theory 65(2): 1307-1317 (2019) - [c57]Vincent Migliore, Benoît Gérard, Mehdi Tibouchi, Pierre-Alain Fouque:
Masking Dilithium - Efficient Implementation and Side-Channel Evaluation. ACNS 2019: 344-362 - [c56]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi:
GALACTICS: Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited. CCS 2019: 2147-2164 - [i56]Vincent Migliore, Benoît Gérard, Mehdi Tibouchi, Pierre-Alain Fouque:
Masking Dilithium: Efficient Implementation and Side-Channel Evaluation. IACR Cryptol. ePrint Arch. 2019: 394 (2019) - [i54]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi:
GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited. IACR Cryptol. ePrint Arch. 2019: 511 (2019) - [i51]Pierre-Alain Fouque, Paul Kirchner, Mehdi Tibouchi, Alexandre Wallet, Yang Yu:
Uprooting the Falcon Tree? IACR Cryptol. ePrint Arch. 2019: 1180 (2019) - 2018
- [j12]Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi:
Loop-Abort Faults on Lattice-Based Signature Schemes and Key Exchange Protocols. IEEE Trans. Computers 67(11): 1535-1549 (2018) - [c53]Jonathan Bootle, Claire Delaplace, Thomas Espitau, Pierre-Alain Fouque, Mehdi Tibouchi:
LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS. ASIACRYPT (1) 2018: 494-524 - [c51]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi:
Masking the GLP Lattice-Based Signature Scheme at Any Order. EUROCRYPT (2) 2018: 354-384 - [i49]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi:
Masking the GLP Lattice-Based Signature Scheme at Any Order. IACR Cryptol. ePrint Arch. 2018: 381 (2018) - [i44]Jonathan Bootle, Claire Delaplace, Thomas Espitau, Pierre-Alain Fouque, Mehdi Tibouchi:
LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS. IACR Cryptol. ePrint Arch. 2018: 822 (2018) - 2017
- [c47]Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi:
Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers. CCS 2017: 1857-1874 - [i42]Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi:
Side-Channel Attacks on BLISS Lattice-Based Signatures - Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers. IACR Cryptol. ePrint Arch. 2017: 505 (2017) - 2016
- [j7]Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi:
Tightly Secure Signatures From Lossy Identification Schemes. J. Cryptol. 29(3): 597-631 (2016) - [c43]Pierre Belgarric, Pierre-Alain Fouque, Gilles Macario-Rat, Mehdi Tibouchi:
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones. CT-RSA 2016: 236-252 - [c41]Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi:
Loop-Abort Faults on Lattice-Based Fiat-Shamir and Hash-and-Sign Signatures. SAC 2016: 140-158 - [i39]Pierre Belgarric, Pierre-Alain Fouque, Gilles Macario-Rat, Mehdi Tibouchi:
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones. IACR Cryptol. ePrint Arch. 2016: 231 (2016) - [i38]Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi:
Loop abort Faults on Lattice-Based Fiat-Shamir & Hash'n Sign signatures. IACR Cryptol. ePrint Arch. 2016: 449 (2016) - 2015
- [c38]Pierre-Alain Fouque, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi:
Cryptanalysis of the Co-ACD Assumption. CRYPTO (1) 2015: 561-580 - 2014
- [c31]Diego F. Aranha, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias. ASIACRYPT (1) 2014: 262-281 - [c30]Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Making RSA-PSS Provably Secure against Non-random Faults. CHES 2014: 206-222 - [c27]Pierre-Alain Fouque, Mehdi Tibouchi:
Close to Uniform Prime Number Generation with Fewer Random Bits. ICALP (1) 2014: 991-1002 - [c24]Diego F. Aranha, Pierre-Alain Fouque, Chen Qian, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Binary Elligator Squared. Selected Areas in Cryptography 2014: 20-37 - [i29]Pierre-Alain Fouque, Mehdi Tibouchi:
Close to Uniform Prime Number Generation With Fewer Random Bits. CoRR abs/1406.7078 (2014) - [i25]Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Making RSA-PSS Provably Secure Against Non-Random Faults. IACR Cryptol. ePrint Arch. 2014: 252 (2014) - [i23]Diego F. Aranha, Pierre-Alain Fouque, Chen Qian, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Binary Elligator Squared. IACR Cryptol. ePrint Arch. 2014: 486 (2014) - 2013
- [j5]Pierre-Alain Fouque, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Attacking RSA-CRT signatures with faults on montgomery multiplication. J. Cryptogr. Eng. 3(1): 59-72 (2013) - [j3]Reza Rezaeian Farashahi, Pierre-Alain Fouque, Igor E. Shparlinski, Mehdi Tibouchi, José Felipe Voloch:
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves. Math. Comput. 82(281): 491-512 (2013) - [c22]Pierre-Alain Fouque, Antoine Joux, Mehdi Tibouchi:
Injective Encodings to Elliptic Curves. ACISP 2013: 203-218 - [c18]Pierre-Alain Fouque, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Recovering Private Keys Generated with Weak PRNGs. IMACC 2013: 158-172 - [i18]Pierre-Alain Fouque, Antoine Joux, Mehdi Tibouchi:
Injective Encoding to Elliptic Curves. IACR Cryptol. ePrint Arch. 2013: 373 (2013) - [i17]Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi:
Tightly-Secure Signatures From Lossy Identification Schemes. IACR Cryptol. ePrint Arch. 2013: 856 (2013) - 2012
- [c16]Pierre-Alain Fouque, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication. CHES 2012: 447-462 - [c14]Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi:
Tightly-Secure Signatures from Lossy Identification Schemes. EUROCRYPT 2012: 572-590 - [c12]Pierre-Alain Fouque, Mehdi Tibouchi:
Indifferentiable Hashing to Barreto-Naehrig Curves. LATINCRYPT 2012: 1-17 - [i16]Pierre-Alain Fouque, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication. IACR Cryptol. ePrint Arch. 2012: 172 (2012) - 2011
- [i11]Pierre-Alain Fouque, Mehdi Tibouchi:
Close to Uniform Prime Number Generation With Fewer Random Bits. IACR Cryptol. ePrint Arch. 2011: 481 (2011) - 2010
- [c4]Pierre-Alain Fouque, Mehdi Tibouchi:
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves. LATINCRYPT 2010: 81-91 - [c3]Pierre-Alain Fouque, Mehdi Tibouchi:
Deterministic Encoding and Hashing to Odd Hyperelliptic Curves. Pairing 2010: 265-277 - [i10]Pierre-Alain Fouque, Mehdi Tibouchi:
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves. IACR Cryptol. ePrint Arch. 2010: 37 (2010) - [i8]Pierre-Alain Fouque, Mehdi Tibouchi:
Deterministic Encoding and Hashing to Odd Hyperelliptic Curves. IACR Cryptol. ePrint Arch. 2010: 382 (2010) - [i6]Reza Rezaeian Farashahi, Pierre-Alain Fouque, Igor E. Shparlinski, Mehdi Tibouchi, José Felipe Voloch:
Indifferentiable Deterministic Hashing to Elliptic and Hyperelliptic Curves. IACR Cryptol. ePrint Arch. 2010: 539 (2010)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-26 20:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint