Benoît Chevallier-Mames

According to our database1, Benoît Chevallier-Mames authored at least 22 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Deep Neural Networks for Encrypted Inference with TFHE.
IACR Cryptol. ePrint Arch., 2023

Privacy-Preserving Tree-Based Inference with Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023

Privacy-Preserving Tree-Based Inference with TFHE.
Proceedings of the Mobile, Secure, and Programmable Networking, 2023

2022
A Pairing-Free Signature Scheme from Correlation Intractable Hash Function and Strong Diffie-Hellman Assumption.
IACR Cryptol. ePrint Arch., 2022

2010
On Some Incompatible Properties of Voting Schemes.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

2009
Chosen-Ciphertext Secure RSA-type Cryptosystems.
IACR Cryptol. ePrint Arch., 2009

Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers.
IACR Cryptol. ePrint Arch., 2009

2008
Linear Bandwidth Naccache-Stern Encryption.
IACR Cryptol. ePrint Arch., 2008

How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions.
Proceedings of the Provable Security, Second International Conference, 2008

2007
Towards a DL-Based Additively Homomorphic Encryption Scheme.
Proceedings of the Information Security, 10th International Conference, 2007

A Practical and Tightly Secure Signature Scheme Without Hash Function.
Proceedings of the Topics in Cryptology, 2007

2006
Encoding-Free ElGamal Encryption Without Random Oracles.
Proceedings of the Public Key Cryptography, 2006

Why One Should Also Secure RSA Public Key Elements.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

2005
Secure Delegation of Elliptic-Curve Pairing.
IACR Cryptol. ePrint Arch., 2005

An Efficient CDH-based Signature Scheme With a Tight Security Reduction.
IACR Cryptol. ePrint Arch., 2005

Efficient Identity-Based Encryption with Tight Security Reduction.
IACR Cryptol. ePrint Arch., 2005

Optimal Asymmetric Encryption and Signature Paddings.
Proceedings of the Applied Cryptography and Network Security, 2005

New Signature Schemes with Coupons and Tight Reduction.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity.
IEEE Trans. Computers, 2004

How to Disembed a Program?
IACR Cryptol. ePrint Arch., 2004

Self-Randomized Exponentiation Algorithms.
Proceedings of the Topics in Cryptology, 2004

2003
Faster Double-Size Modular Multiplication from Euclidean Multipliers.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003


  Loading...