Damien Stehlé

Orcid: 0000-0003-3435-2453

Affiliations:
  • ENS Lyon, France


According to our database1, Damien Stehlé authored at least 117 papers between 2003 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Fast Homomorphic Linear Algebra with BLAS.
CoRR, March, 2025

SHIP: A Shallow and Highly Parallelizable CKKS Bootstrapping Algorithm.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Leveraging Discrete CKKS to Bootstrap in High Precision.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2024
Attacks Against the INDCPA-D Security of Exact FHE Schemes.
IACR Cryptol. ePrint Arch., 2024

Quantum Oblivious LWE Sampling and Insecurity of Standard Model Lattice-Based SNARKs.
Proceedings of the 56th Annual ACM Symposium on Theory of Computing, 2024

Bootstrapping Bits with CKKS.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Plaintext-Ciphertext Matrix Multiplication and FHE Bootstrapping: Fast and Fused.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Attacks Against the IND-CPA<sup>D</sup> Security of Exact FHE Schemes.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Fast and Accurate Homomorphic Softmax Evaluation.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Low Communication Threshold Fully Homomorphic Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

Bootstrapping Small Integers With CKKS.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
HAETAE: Shorter Lattice-Based Fiat-Shamir Signatures.
IACR Cryptol. ePrint Arch., 2023

Ideal-SVP is Hard for Small-Norm Uniform Prime Ideals.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

A Detailed Analysis of Fiat-Shamir with Aborts.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

HERMES: Efficient Ring Packing Using MLWE Ciphertexts and Application to Transciphering.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Homomorphic Multiple Precision Multiplication for CKKS and Reduced Modulus Consumption.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Efficient Updatable Public-Key Encryption from Lattices.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

G+G: A Fiat-Shamir Lattice Signature Based on Convolved Gaussians.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Round-Optimal Lattice-Based Threshold Signatures, Revisited.
Proceedings of the 49th International Colloquium on Automata, Languages, and Programming, 2022

Practical, Round-Optimal Lattice-Based Blind Signatures.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

On Module Unique-SVP and NTRU.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

On Rejection Sampling in Lyubashevsky's Signature Scheme.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Adaptively Secure Distributed PRFs from sf LWE.
J. Cryptol., 2021

Non-applicability of the Gaborit&Aguilar-Melchor patent to Kyber and Saber.
IACR Cryptol. ePrint Arch., 2021

Can Round-Optimal Lattice-Based Blind Signatures be Practical?
IACR Cryptol. ePrint Arch., 2021

On the Integer Polynomial Learning with Errors Problem.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

On the Hardness of the NTRU Problem.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

An Anonymous Trace-and-Revoke Broadcast Encryption Scheme.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
On the smoothing parameter and last minimum of random orthogonal lattices.
IACR Cryptol. ePrint Arch., 2020

Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k)).
IACR Cryptol. ePrint Arch., 2020

MPSign: A Signature from Small-Secret Middle-Product Learning with Errors.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Faster Enumeration-Based Lattice Reduction: Root Hermite Factor k<sup>1/(2k)</sup> Time k<sup>k/8+o(k)</sup>.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

ModFalcon: Compact Signatures Based On Module-NTRU Lattices.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Cryptanalysis of the CLT13 Multilinear Map.
J. Cryptol., 2019

Towards Practical GGM-Based PRF from (Module-)Learning-with-Rounding.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019

Approx-SVP in Ideal Lattices with Pre-processing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

An LLL Algorithm for Module Lattices.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance.
J. Cryptol., 2018

Adaptively Secure Distributed PRFs from LWE.
IACR Cryptol. ePrint Arch., 2018

Computing an LLL-reduced basis of the orthogonal lattice.
CoRR, 2018

Adaptively Secure Distributed PRFs from \mathsf LWE.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Learning with Errors and Extrapolated Dihedral Cosets.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Computing an LLL-reduced Basis of the Orthogonal Latice.
Proceedings of the 2018 ACM on International Symposium on Symbolic and Algebraic Computation, 2018

CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

On the Ring-LWE and Polynomial-LWE Problems.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Measuring, Simulating and Exploiting the Head Concavity Phenomenon in BKZ.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
CRYSTALS - Dilithium: Digital Signatures from Module Lattices.
IACR Cryptol. ePrint Arch., 2017

CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM.
IACR Cryptol. ePrint Arch., 2017

Efficient Public Trace and Revoke from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2017

Lattice Reduction Algorithms.
Proceedings of the 2017 ACM on International Symposium on Symbolic and Algebraic Computation, 2017

Middle-Product Learning with Errors.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Efficient Public Trace and Revoke from Standard Assumptions: Extended Abstract.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Tuple lattice sieving.
LMS J. Comput. Math., 2016

Fully Homomorphic Encryption over the Integers Revisited.
IACR Cryptol. ePrint Arch., 2016

Faster LLL-type Reduction of Lattice Bases.
Proceedings of the ACM on International Symposium on Symbolic and Algebraic Computation, 2016

Improved Reduction from the Bounded Distance Decoding Problem to the Unique Shortest Vector Problem in Lattices.
Proceedings of the 43rd International Colloquium on Automata, Languages, and Programming, 2016

Sanitization of FHE Ciphertexts.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Fully Secure Functional Encryption for Inner Products, from Standard Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Cryptanalysis of Gu's ideal multilinear map.
IACR Cryptol. ePrint Arch., 2015

Fully Secure Functional Encryption for Inner Products, from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2015

Fully Homomophic Encryption over the Integers Revisited.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Cryptanalysis of the Multilinear Map over the Integers.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather Than the Statistical Distance.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Semantically Secure Lattice Codes for the Gaussian Wiretap Channel.
IEEE Trans. Inf. Theory, 2014

LLL reducing with the most significant bits.
Proceedings of the International Symposium on Symbolic and Algebraic Computation, 2014

GGHLite: More Efficient Multilinear Maps from Ideal Lattices.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Hardness of k-LWE and Applications in Traitor Tracing.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
Decoding by Embedding: Correct Decoding Radius and DMT Optimality.
IEEE Trans. Inf. Theory, 2013

Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices.
IACR Cryptol. ePrint Arch., 2013

Classical hardness of learning with errors.
Proceedings of the Symposium on Theory of Computing Conference, 2013

Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

A new view on HJLS and PSLQ: sums and projections of lattices.
Proceedings of the International Symposium on Symbolic and Algebraic Computation, 2013

Lattice-Based Group Signatures with Logarithmic Signature Size.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Perturbation Analysis of the QR factor R in the context of LLL lattice basis reduction.
Math. Comput., 2012

Worst-Case to Average-Case Reductions for Module Lattices.
IACR Cryptol. ePrint Arch., 2012

2011
Decoding by Sampling: A Randomized Lattice Algorithm for Bounded Distance Decoding.
IEEE Trans. Inf. Theory, 2011

Terminating BKZ.
IACR Cryptol. ePrint Arch., 2011

An LLL-reduction algorithm with quasi-linear time complexity: extended abstract.
Proceedings of the 43rd ACM Symposium on Theory of Computing, 2011

Decoding by embedding: Correct decoding radius and DMT optimality.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Making NTRU as Secure as Worst-Case Problems over Ideal Lattices.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

Analyzing Blockwise Lattice Algorithms Using Dynamical Systems.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Algorithms for the Shortest and Closest Lattice Vector Problems.
Proceedings of the Coding and Cryptology - Third International Workshop, 2011

Euclidean lattices: algorithms and cryptography. (Réseaux Euclidiens : Algorithmes et Cryptographie).
, 2011

2010
Floating-Point LLL: Theoretical and Practical Aspects.
Proceedings of the LLL Algorithm - Survey and Applications, 2010

Analyse numérique et réduction de réseaux.
Tech. Sci. Informatiques, 2010

Rigorous Perturbation Bounds of Some Matrix Factorizations.
SIAM J. Matrix Anal. Appl., 2010

Randomized Lattice Decoding
CoRR, 2010

Accelerating Lattice Reduction with FPGAs.
Proceedings of the Progress in Cryptology, 2010

Randomized lattice decoding: Bridging the gap between lattice reduction and sphere decoding.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Faster Fully Homomorphic Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

On the Extremality of an 80-Dimensional Lattice.
Proceedings of the Algorithmic Number Theory, 9th International Symposium, 2010

Short Bases of Lattices over Number Fields.
Proceedings of the Algorithmic Number Theory, 9th International Symposium, 2010


2009
An LLL Algorithm with Quadratic Complexity.
SIAM J. Comput., 2009

Solving the Shortest Lattice Vector Problem in Time 2<sup>2.465n</sup>.
IACR Cryptol. ePrint Arch., 2009

H-LLL: using householder inside LLL.
Proceedings of the Symbolic and Algebraic Computation, International Symposium, 2009

Efficient Public Key Encryption Based on Ideal Lattices.
Proceedings of the Advances in Cryptology, 2009

2008
Worst-Case Hermite-Korkine-Zolotarev Reduced Lattice Bases
CoRR, 2008

From an LLL-reduced basis to another.
ACM Commun. Comput. Algebra, 2008

Speeding-Up Lattice Reduction with Random Projections (Extended Abstract).
Proceedings of the LATIN 2008: Theoretical Informatics, 2008

Rigorous and Efficient Short Lattice Vectors Enumeration.
Proceedings of the Advances in Cryptology, 2008

2007
Improved Analysis of Kannan's Shortest Lattice Vector Algorithm.
Proceedings of the Advances in Cryptology, 2007

Worst Cases of a Periodic Function for Large Arguments.
Proceedings of the 18th IEEE Symposium on Computer Arithmetic (ARITH-18 2007), 2007

2006
Worst Cases for the Exponential Function in the IEEE 754r decimal64 Format.
Proceedings of the Reliable Implementation of Real Number Algorithms: Theory and Practice, 08.01., 2006

On the Randomness of Bits Generated by Sufficiently Smooth Functions.
Proceedings of the Algorithmic Number Theory, 7th International Symposium, 2006

LLL on the Average.
Proceedings of the Algorithmic Number Theory, 7th International Symposium, 2006

2005
Algorithmique de la réduction de réseaux et application à la recherche de pires cas pour l'arrondi defonctions mathématiques.
PhD thesis, 2005

Searching Worst Cases of a One-Variable Function Using Lattice Reduction.
IEEE Trans. Computers, 2005

Floating-Point LLL Revisited.
Proceedings of the Advances in Cryptology, 2005

Gal's Accurate Tables Method Revisited.
Proceedings of the 17th IEEE Symposium on Computer Arithmetic (ARITH-17 2005), 2005

2004
Breaking Littlewood's Cipher.
Cryptologia, 2004

A Binary Recursive Gcd Algorithm.
Proceedings of the Algorithmic Number Theory, 6th International Symposium, 2004

Low-Dimensional Lattice Basis Reduction Revisited.
Proceedings of the Algorithmic Number Theory, 6th International Symposium, 2004

2003
Worst Cases and Lattice Reduction.
Proceedings of the 16th IEEE Symposium on Computer Arithmetic (Arith-16 2003), 2003


  Loading...