default search action
Carlos Aguilar Melchor
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c30]Carlos Aguilar Melchor, Martin R. Albrecht, Thomas Bailleux, Nina Bindel, James Howe, Andreas Hülsing, David Joseph, Marc Manzano:
Batch Signatures, Revisited. CT-RSA 2024: 163-186 - [c29]Carlos Aguilar Melchor, Thomas Bailleux, Jason Goertzen, Adrien Guinet, David Joseph, Douglas Stebila:
TurboTLS: TLS Connection Establishment with 1 Less Round Trip. ESORICS (2) 2024: 24-44 - 2023
- [c28]Carlos Aguilar Melchor, Andreas Hülsing, David Joseph, Christian Majenz, Eyal Ronen, Dongze Yue:
SDitH in the QROM. ASIACRYPT (7) 2023: 317-350 - [c27]Carlos Aguilar Melchor, Nicolas Gama, James Howe, Andreas Hülsing, David Joseph, Dongze Yue:
The Return of the SDitH. EUROCRYPT (5) 2023: 564-596 - [i22]Carlos Aguilar Melchor, Thomas Bailleux, Jason Goertzen, David Joseph, Douglas Stebila:
TurboTLS: TLS connection establishment with 1 less round trip. CoRR abs/2302.05311 (2023) - [i21]Carlos Aguilar Melchor, Martin R. Albrecht, Thomas Bailleux, Nina Bindel, James Howe, Andreas Hülsing, David Joseph, Marc Manzano:
Batch Signatures, Revisited. IACR Cryptol. ePrint Arch. 2023: 492 (2023) - [i20]Carlos Aguilar Melchor, Andreas Hülsing, David Joseph, Christian Majenz, Eyal Ronen, Dongze Yue:
SDitH in the QROM. IACR Cryptol. ePrint Arch. 2023: 756 (2023) - [i19]Carlos Aguilar Melchor, Victor Dyseryn, Philippe Gaborit:
Somewhat Homomorphic Encryption based on Random Codes. IACR Cryptol. ePrint Arch. 2023: 1798 (2023) - 2022
- [j12]Ali Rasteh, Florian Delpech, Carlos Aguilar Melchor, Romain Zimmer, Saeed Bagheri Shouraki, Timothée Masquelier:
Encrypted internet traffic classification using a supervised spiking neural network. Neurocomputing 503: 272-282 (2022) - [c26]Carlos Aguilar Melchor, Jean-Christophe Deneuville, Arnaud Dion, James Howe, Romain Malmain, Vincent Migliore, Mamuri Nawan, Kashif Nawaz:
Towards Automating Cryptographic Hardware Implementations: A Case Study of HQC. CBCrypto 2022: 62-76 - [c25]Carlos Aguilar Melchor, Nicolas Aragon, Victor Dyseryn, Philippe Gaborit, Gilles Zémor:
LRPC Codes with Multiple Syndromes: Near Ideal-Size KEMs Without Ideals. PQCrypto 2022: 45-68 - [c24]Valentin Guillet, Dennis Wilson, Carlos Aguilar Melchor, Emmanuel Rachelson:
On Neural Consolidation for Transfer in Reinforcement Learning. SSCI 2022: 867-874 - [i18]Carlos Aguilar Melchor, Nicolas Aragon, Victor Dyseryn, Philippe Gaborit, Gilles Zémor:
LRPC codes with multiple syndromes: near ideal-size KEMs without ideals. CoRR abs/2206.11961 (2022) - [i17]Valentin Guillet, Dennis G. Wilson, Carlos Aguilar Melchor, Emmanuel Rachelson:
Neural Distillation as a State Representation Bottleneck in Reinforcement Learning. CoRR abs/2210.02224 (2022) - [i16]Valentin Guillet, Dennis G. Wilson, Carlos Aguilar Melchor, Emmanuel Rachelson:
On Neural Consolidation for Transfer in Reinforcement Learning. CoRR abs/2210.02240 (2022) - [i15]Carlos Aguilar Melchor, Jean-Christophe Deneuville, Arnaud Dion, James Howe, Romain Malmain, Vincent Migliore, Mamuri Nawan, Kashif Nawaz:
Towards Automating Cryptographic Hardware Implementations: a Case Study of HQC. IACR Cryptol. ePrint Arch. 2022: 1425 (2022) - [i14]Carlos Aguilar Melchor, Nicolas Gama, James Howe, Andreas Hülsing, David Joseph, Dongze Yue:
The Return of the SDitH. IACR Cryptol. ePrint Arch. 2022: 1645 (2022) - 2021
- [j11]Carlos Aguilar Melchor, Nicolas Aragon, Emanuele Bellini, Florian Caullery, Rusydi H. Makarim, Chiara Marcolla:
Constant Time Algorithms for ROLLO-I-128. SN Comput. Sci. 2(5): 382 (2021) - [c23]Carlos Aguilar Melchor, Nicolas Aragon, Victor Dyseryn, Philippe Gaborit:
Fast and Secure Key Generation for Low Rank Parity Check Codes Cryptosystems. ISIT 2021: 1260-1265 - [i13]Ali Rasteh, Florian Delpech, Carlos Aguilar Melchor, Romain Zimmer, Saeed Bagheri Shouraki, Timothée Masquelier:
Encrypted Internet traffic classification using a supervised Spiking Neural Network. CoRR abs/2101.09818 (2021) - 2020
- [i12]Carlos Aguilar Melchor, Nicolas Aragon, Emanuele Bellini, Florian Caullery, Rusydi H. Makarim, Chiara Marcolla:
Constant time algorithms for ROLLO-I-128. IACR Cryptol. ePrint Arch. 2020: 1066 (2020)
2010 – 2019
- 2018
- [j10]Carlos Aguilar Melchor, Thomas Ricosset:
CDT-Based Gaussian Sampling: From Multi to Double Precision. IEEE Trans. Computers 67(11): 1610-1621 (2018) - [j9]Carlos Aguilar Melchor, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Gilles Zémor:
Efficient Encryption From Random Quasi-Cyclic Codes. IEEE Trans. Inf. Theory 64(5): 3927-3943 (2018) - [c22]Carlos Aguilar Melchor, Jean-Christophe Deneuville, Philippe Gaborit, Tancrède Lepoint, Thomas Ricosset:
Delegating Elliptic-Curve Operations with Homomorphic Encryption. CNS 2018: 1-9 - [c21]Carlos Aguilar Melchor, Marc-Olivier Killijian, Cédric Lefebvre, Thomas Ricosset:
A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib. SecITC 2018: 425-442 - 2017
- [c20]Carlos Aguilar Melchor, Martin R. Albrecht, Thomas Ricosset:
Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography. ACNS 2017: 3-19 - [i11]João Sá Sousa, Cédric Lefebvre, Zhicong Huang, Jean Louis Raisaro, Carlos Aguilar Melchor, Marc-Olivier Killijian, Jean-Pierre Hubaux:
Efficient and Secure Outsourcing of Genomic Data Storage. IACR Cryptol. ePrint Arch. 2017: 228 (2017) - 2016
- [j8]Carlos Aguilar Melchor, Joris Barrier, Laurent Fousse, Marc-Olivier Killijian:
XPIR : Private Information Retrieval for Everyone. Proc. Priv. Enhancing Technol. 2016(2): 155-174 (2016) - [c19]Eric Asselin, Carlos Aguilar Melchor, Gentian Jakllari:
Anomaly detection for web server log reduction: A simple yet efficient crawling based approach. CNS 2016: 586-590 - [c18]Carlos Aguilar Melchor, Joris Barrier, Serge Guelton, Adrien Guinet, Marc-Olivier Killijian, Tancrède Lepoint:
NFLlib: NTT-Based Fast Lattice Library. CT-RSA 2016: 341-356 - [i10]Carlos Aguilar Melchor, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Gilles Zémor:
Efficient Encryption from Random Quasi-Cyclic Codes. CoRR abs/1612.05572 (2016) - [i9]Carlos Aguilar Melchor, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Gilles Zémor:
Efficient Encryption from Random Quasi-Cyclic Codes. IACR Cryptol. ePrint Arch. 2016: 1194 (2016) - 2014
- [c17]Carlos Aguilar Melchor, Xavier Boyen, Jean-Christophe Deneuville, Philippe Gaborit:
Sealing the Leak on Classical NTRU Signatures. PQCrypto 2014: 1-21 - [i8]Carlos Aguilar Melchor, Xavier Boyen, Jean-Christophe Deneuville, Philippe Gaborit:
Sealing the Leak on Classical NTRU signatures. IACR Cryptol. ePrint Arch. 2014: 484 (2014) - [i7]Carlos Aguilar Melchor, Joris Barrier, Laurent Fousse, Marc-Olivier Killijian:
XPIRe: Private Information Retrieval for Everyone. IACR Cryptol. ePrint Arch. 2014: 1025 (2014) - 2013
- [j7]Carlos Aguilar Melchor, Simon Fau, Caroline Fontaine, Guy Gogniat, Renaud Sirdey:
Recent Advances in Homomorphic Encryption: A Possible Future for Signal Processing in the Encrypted Domain. IEEE Signal Process. Mag. 30(2): 108-117 (2013) - [c16]Simon Fau, Renaud Sirdey, Caroline Fontaine, Carlos Aguilar Melchor, Guy Gogniat:
Towards Practical Program Execution over Fully Homomorphic Encryption Schemes. 3PGCIC 2013: 284-290 - [c15]Carlos Aguilar Melchor, Slim Bettaieb, Xavier Boyen, Laurent Fousse, Philippe Gaborit:
Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting. AFRICACRYPT 2013: 1-25 - [c14]Carlos Aguilar Melchor, Slim Bettaieb, Philippe Gaborit, Julien Schrek:
A Code-Based Undeniable Signature Scheme. IMACC 2013: 99-119 - [i6]Carlos Aguilar Melchor, Slim Bettaieb, Xavier Boyen, Laurent Fousse, Philippe Gaborit:
Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting. IACR Cryptol. ePrint Arch. 2013: 281 (2013) - 2012
- [j6]Carlos Aguilar Melchor, Philippe Gaborit, Jon-Lark Kim, Lin Sok, Patrick Solé:
Classification of Extremal and s-Extremal Binary Self-Dual Codes of Length 38. IEEE Trans. Inf. Theory 58(4): 2253-2262 (2012) - 2011
- [j5]Carlos Aguilar Melchor, Pierre-Louis Cayrel, Philippe Gaborit, Fabien Laguillaumie:
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory. IEEE Trans. Inf. Theory 57(7): 4833-4842 (2011) - [c13]Carlos Aguilar Melchor, Philippe Gaborit, Julien Schrek:
A new zero-knowledge code based identification scheme with reduced communication. ITW 2011: 648-652 - [p1]Anas Abou El Kalam, Carlos Aguilar Melchor, Stefan Berthold, Jan Camenisch, Sebastian Clauß, Yves Deswarte, Markulf Kohlweiss, Andriy Panchenko, Lexi Pimenidis, Matthieu Roy:
Further Privacy Mechanisms. Digital Privacy - PRIME 2011: 485-555 - [i5]Carlos Aguilar Melchor, Philippe Gaborit, Jon-Lark Kim, Lin Sok, Patrick Solé:
Classification of extremal and $s$-extremal binary self-dual codes of length 38. CoRR abs/1111.0228 (2011) - [i4]Carlos Aguilar Melchor, Philippe Gaborit, Julien Schrek:
A new zero-knowledge code based identification scheme with reduced communication. CoRR abs/1111.1644 (2011) - [i3]Carlos Aguilar Melchor, Slim Bettaieb, Philippe Gaborit, Javier Herranz:
Improving Additive and Multiplicative Homomorphic Encryption Schemes Based on Worst-Case Hardness Assumptions}. IACR Cryptol. ePrint Arch. 2011: 607 (2011) - 2010
- [j4]Carlos Aguilar Melchor, Christophe Chabot, Philippe Gaborit:
There is no Euclidean self-dual quaternary [18, 9, 7] code. Int. J. Inf. Coding Theory 1(2): 200-207 (2010) - [c12]Carlos Aguilar Melchor, Philippe Gaborit, Javier Herranz:
Additively Homomorphic Encryption with d-Operand Multiplications. CRYPTO 2010: 138-154
2000 – 2009
- 2009
- [j3]Carlos Aguilar Melchor, Yves Deswarte:
Trustable Relays for Anonymous Communication. Trans. Data Priv. 2(2): 101-130 (2009) - [c11]Carlos Aguilar Melchor, Boussad Ait Salem, Philippe Gaborit:
A Collusion-Resistant Distributed Scalar Product Protocol with Application to Privacy-Preserving Computation of Trust. NCA 2009: 140-147 - 2008
- [j2]Carlos Aguilar Melchor, Philippe Gaborit:
On the Classification of Extremal [36, 18, 8] Binary Self-Dual Codes. IEEE Trans. Inf. Theory 54(10): 4743-4750 (2008) - [c10]Carlos Aguilar Melchor, Boussad Ait Salem, Philippe Gaborit, Karim Tamine:
AntTrust: A Novel Ant Routing Protocol for Wireless Ad-hoc Network Based on Trust between Nodes. ARES 2008: 1052-1059 - [c9]Carlos Aguilar Melchor, Philippe Gaborit:
A fast private information retrieval protocol. ISIT 2008: 1848-1852 - [c8]Carlos Aguilar Melchor, Guilhem Castagnos, Philippe Gaborit:
Lattice-based homomorphic encryption of vector spaces. ISIT 2008: 1858-1862 - [c7]Carlos Aguilar Melchor, Pierre-Louis Cayrel, Philippe Gaborit:
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory. PQCrypto 2008: 1-16 - [c6]Carlos Aguilar Melchor, Benoît Crespin, Philippe Gaborit, Vincent Jolivet, Pierre Rousseau:
High-Speed Private Information Retrieval Computation on GPU. SECURWARE 2008: 263-272 - [i2]Carlos Aguilar Melchor, Philippe Gaborit, Javier Herranz:
Additively Homomorphic Encryption with d-Operand Multiplications. IACR Cryptol. ePrint Arch. 2008: 378 (2008) - 2007
- [c5]Carlos Aguilar Melchor, Yves Deswarte, Julien Iguchi-Cartigny:
Closed-Circuit Unobservable Voice over IP. ACSAC 2007: 119-128 - [i1]Carlos Aguilar Melchor, Philippe Gaborit:
A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol. IACR Cryptol. ePrint Arch. 2007: 446 (2007) - 2006
- [b1]Carlos Aguilar Melchor:
Les communications anonymes à faible latence. INSA Toulouse, France, 2006 - [j1]Yves Deswarte, Carlos Aguilar Melchor:
Current and future privacy enhancing technologies for the Internet. Ann. des Télécommunications 61(3-4): 399-417 (2006) - [c4]Magnos Martinello, Mohamed Kaâniche, Karama Kanoun, Carlos Aguilar Melchor:
Modeling user perceived unavailability due to long response times. IPDPS 2006 - [c3]Carlos Aguilar Melchor, Yves Deswarte:
From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications. NCA 2006: 163-172 - [c2]Carlos Aguilar Melchor, Yves Deswarte:
Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical Databases. Privacy in Statistical Databases 2006: 257-265 - 2005
- [c1]Carlos Aguilar Melchor, Yves Deswarte:
pMIX: Untraceability for Small Hiding Groups. NCA 2005: 29-40
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-11 18:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint