Carlos Aguilar Melchor

Orcid: 0000-0003-2745-884X

According to our database1, Carlos Aguilar Melchor authored at least 51 papers between 2005 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
SDitH in the QROM.
IACR Cryptol. ePrint Arch., 2023

Somewhat Homomorphic Encryption based on Random Codes.
IACR Cryptol. ePrint Arch., 2023

Batch Signatures, Revisited.
IACR Cryptol. ePrint Arch., 2023

TurboTLS: TLS connection establishment with 1 less round trip.
CoRR, 2023

2022
Encrypted internet traffic classification using a supervised spiking neural network.
Neurocomputing, 2022

The Return of the SDitH.
IACR Cryptol. ePrint Arch., 2022

Towards Automating Cryptographic Hardware Implementations: a Case Study of HQC.
IACR Cryptol. ePrint Arch., 2022

Neural Distillation as a State Representation Bottleneck in Reinforcement Learning.
CoRR, 2022

On Neural Consolidation for Transfer in Reinforcement Learning.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2022

LRPC Codes with Multiple Syndromes: Near Ideal-Size KEMs Without Ideals.
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022

2021
Constant Time Algorithms for ROLLO-I-128.
SN Comput. Sci., 2021

Fast and Secure Key Generation for Low Rank Parity Check Codes Cryptosystems.
Proceedings of the IEEE International Symposium on Information Theory, 2021

2018
Efficient Encryption From Random Quasi-Cyclic Codes.
IEEE Trans. Inf. Theory, 2018

CDT-Based Gaussian Sampling: From Multi to Double Precision.
IEEE Trans. Computers, 2018

A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Delegating Elliptic-Curve Operations with Homomorphic Encryption.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Efficient and Secure Outsourcing of Genomic Data Storage.
IACR Cryptol. ePrint Arch., 2017

Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
XPIR : Private Information Retrieval for Everyone.
Proc. Priv. Enhancing Technol., 2016

NFLlib: NTT-Based Fast Lattice Library.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

Anomaly detection for web server log reduction: A simple yet efficient crawling based approach.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2014
XPIRe: Private Information Retrieval for Everyone.
IACR Cryptol. ePrint Arch., 2014

Sealing the Leak on Classical NTRU signatures.
IACR Cryptol. ePrint Arch., 2014

2013
Recent Advances in Homomorphic Encryption: A Possible Future for Signal Processing in the Encrypted Domain.
IEEE Signal Process. Mag., 2013

Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting.
IACR Cryptol. ePrint Arch., 2013

A Code-Based Undeniable Signature Scheme.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

Towards Practical Program Execution over Fully Homomorphic Encryption Schemes.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Classification of Extremal and s-Extremal Binary Self-Dual Codes of Length 38.
IEEE Trans. Inf. Theory, 2012

2011
Further Privacy Mechanisms.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

A New Efficient Threshold Ring Signature Scheme Based on Coding Theory.
IEEE Trans. Inf. Theory, 2011

Improving Additive and Multiplicative Homomorphic Encryption Schemes Based on Worst-Case Hardness Assumptions}.
IACR Cryptol. ePrint Arch., 2011

A new zero-knowledge code based identification scheme with reduced communication.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

2010
There is no Euclidean self-dual quaternary [18, 9, 7] code.
Int. J. Inf. Coding Theory, 2010

Additively Homomorphic Encryption with <i>d</i>-Operand Multiplications.
Proceedings of the Advances in Cryptology, 2010

2009
Trustable Relays for Anonymous Communication.
Trans. Data Priv., 2009

A Collusion-Resistant Distributed Scalar Product Protocol with Application to Privacy-Preserving Computation of Trust.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

2008
On the Classification of Extremal [36, 18, 8] Binary Self-Dual Codes.
IEEE Trans. Inf. Theory, 2008

Additively Homomorphic Encryption with d-Operand Multiplications.
IACR Cryptol. ePrint Arch., 2008

High-Speed Private Information Retrieval Computation on GPU.
Proceedings of the Second International Conference on Emerging Security Information, 2008

A New Efficient Threshold Ring Signature Scheme Based on Coding Theory.
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008

A fast private information retrieval protocol.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Lattice-based homomorphic encryption of vector spaces.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

AntTrust: A Novel Ant Routing Protocol for Wireless Ad-hoc Network Based on Trust between Nodes.
Proceedings of the The Third International Conference on Availability, 2008

2007
A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol.
IACR Cryptol. ePrint Arch., 2007

Closed-Circuit Unobservable Voice over IP.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Les communications anonymes à faible latence.
PhD thesis, 2006

Current and future privacy enhancing technologies for the Internet.
Ann. des Télécommunications, 2006

Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical Databases.
Proceedings of the Privacy in Statistical Databases, 2006

From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications.
Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications, 2006

Modeling user perceived unavailability due to long response times.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

2005
pMIX: Untraceability for Small Hiding Groups.
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005


  Loading...