Damien Stehlé

Orcid: 0000-0003-3435-2453

Affiliations:
  • ENS Lyon, France


According to our database1, Damien Stehlé authored at least 108 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Quantum Oblivious LWE Sampling and Insecurity of Standard Model Lattice-Based SNARKs.
IACR Cryptol. ePrint Arch., 2024

Attacks Against the INDCPA-D Security of Exact FHE Schemes.
IACR Cryptol. ePrint Arch., 2024

2023
Efficient Updatable Public-Key Encryption from Lattices.
IACR Cryptol. ePrint Arch., 2023

Ideal-SVP is Hard for Small-Norm Uniform Prime Ideals.
IACR Cryptol. ePrint Arch., 2023

G+G: A Fiat-Shamir Lattice Signature Based on Convolved Gaussians.
IACR Cryptol. ePrint Arch., 2023

A Detailed Analysis of Fiat-Shamir with Aborts.
IACR Cryptol. ePrint Arch., 2023

Homomorphic Multiple Precision Multiplication for CKKS and Reduced Modulus Consumption.
IACR Cryptol. ePrint Arch., 2023

HAETAE: Shorter Lattice-Based Fiat-Shamir Signatures.
IACR Cryptol. ePrint Arch., 2023

HERMES: Efficient Ring Packing using MLWE Ciphertexts and Application to Transciphering.
IACR Cryptol. ePrint Arch., 2023

2022
On Module Unique-SVP and NTRU.
IACR Cryptol. ePrint Arch., 2022

On Rejection Sampling in Lyubashevsky's Signature Scheme.
IACR Cryptol. ePrint Arch., 2022

An Anonymous Trace-and-Revoke Broadcast Encryption Scheme.
IACR Cryptol. ePrint Arch., 2022

Round-Optimal Lattice-Based Threshold Signatures, Revisited.
IACR Cryptol. ePrint Arch., 2022

Practical, Round-Optimal Lattice-Based Blind Signatures.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Adaptively Secure Distributed PRFs from sf LWE.
J. Cryptol., 2021

On the hardness of the NTRU problem.
IACR Cryptol. ePrint Arch., 2021

Non-applicability of the Gaborit&Aguilar-Melchor patent to Kyber and Saber.
IACR Cryptol. ePrint Arch., 2021

Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security.
IACR Cryptol. ePrint Arch., 2021

On the Integer Polynomial Learning with Errors Problem.
IACR Cryptol. ePrint Arch., 2021

Towards practical GGM-based PRF from (Module-)Learning-with-Rounding.
IACR Cryptol. ePrint Arch., 2021

Can Round-Optimal Lattice-Based Blind Signatures be Practical?
IACR Cryptol. ePrint Arch., 2021

2020
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors.
IACR Cryptol. ePrint Arch., 2020

Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k)).
IACR Cryptol. ePrint Arch., 2020

On the smoothing parameter and last minimum of random orthogonal lattices.
Des. Codes Cryptogr., 2020

Faster Enumeration-Based Lattice Reduction: Root Hermite Factor k<sup>1/(2k)</sup> Time k<sup>k/8+o(k)</sup>.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Cryptanalysis of the CLT13 Multilinear Map.
J. Cryptol., 2019

Approx-SVP in Ideal Lattices with Pre-processing.
IACR Cryptol. ePrint Arch., 2019

An LLL Algorithm for Module Lattices.
IACR Cryptol. ePrint Arch., 2019

ModFalcon: compact signatures based on module NTRU lattices.
IACR Cryptol. ePrint Arch., 2019

2018
CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance.
J. Cryptol., 2018

On the Ring-LWE and Polynomial-LWE problems.
IACR Cryptol. ePrint Arch., 2018

Adaptively Secure Distributed PRFs from LWE.
IACR Cryptol. ePrint Arch., 2018

Measuring, simulating and exploiting the head concavity phenomenon in BKZ.
IACR Cryptol. ePrint Arch., 2018

Computing an LLL-reduced basis of the orthogonal lattice.
CoRR, 2018

Adaptively Secure Distributed PRFs from \mathsf LWE.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Learning with Errors and Extrapolated Dihedral Cosets.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Computing an LLL-reduced Basis of the Orthogonal Latice.
Proceedings of the 2018 ACM on International Symposium on Symbolic and Algebraic Computation, 2018

CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2017
Middle-Product Learning With Errors.
IACR Cryptol. ePrint Arch., 2017

All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE.
IACR Cryptol. ePrint Arch., 2017

CRYSTALS - Dilithium: Digital Signatures from Module Lattices.
IACR Cryptol. ePrint Arch., 2017

CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM.
IACR Cryptol. ePrint Arch., 2017

Efficient Public Trace and Revoke from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2017

Hardness of k-LWE and Applications in Traitor Tracing.
Algorithmica, 2017

Lattice Reduction Algorithms.
Proceedings of the 2017 ACM on International Symposium on Symbolic and Algebraic Computation, 2017

Efficient Public Trace and Revoke from Standard Assumptions: Extended Abstract.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Tuple lattice sieving.
LMS J. Comput. Math., 2016

Faster LLL-type Reduction of Lattice Bases.
IACR Cryptol. ePrint Arch., 2016

Sanitization of FHE Ciphertexts.
IACR Cryptol. ePrint Arch., 2016

Fully Homomorphic Encryption over the Integers Revisited.
IACR Cryptol. ePrint Arch., 2016

Improved Reduction from the Bounded Distance Decoding Problem to the Unique Shortest Vector Problem in Lattices.
IACR Cryptol. ePrint Arch., 2016

Fully Secure Functional Encryption for Inner Products, from Standard Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Cryptanalysis of Gu's ideal multilinear map.
IACR Cryptol. ePrint Arch., 2015

Fully Secure Functional Encryption for Inner Products, from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2015

Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance.
IACR Cryptol. ePrint Arch., 2015

Worst-case to average-case reductions for module lattices.
Des. Codes Cryptogr., 2015

Fully Homomophic Encryption over the Integers Revisited.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

2014
Semantically Secure Lattice Codes for the Gaussian Wiretap Channel.
IEEE Trans. Inf. Theory, 2014

GGHLite: More Efficient Multilinear Maps from Ideal Lattices.
IACR Cryptol. ePrint Arch., 2014

Cryptanalysis of the Multilinear Map over the Integers.
IACR Cryptol. ePrint Arch., 2014

LLL reducing with the most significant bits.
Proceedings of the International Symposium on Symbolic and Algebraic Computation, 2014

2013
Decoding by Embedding: Correct Decoding Radius and DMT Optimality.
IEEE Trans. Inf. Theory, 2013

Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices.
IACR Cryptol. ePrint Arch., 2013

Lattice-Based Group Signatures with Logarithmic Signature Size.
IACR Cryptol. ePrint Arch., 2013

Classical hardness of learning with errors.
Proceedings of the Symposium on Theory of Computing Conference, 2013

A new view on HJLS and PSLQ: sums and projections of lattices.
Proceedings of the International Symposium on Symbolic and Algebraic Computation, 2013

2012
Perturbation Analysis of the QR factor R in the context of LLL lattice basis reduction.
Math. Comput., 2012

Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications.
IACR Cryptol. ePrint Arch., 2012

2011
Decoding by Sampling: A Randomized Lattice Algorithm for Bounded Distance Decoding.
IEEE Trans. Inf. Theory, 2011

Terminating BKZ.
IACR Cryptol. ePrint Arch., 2011

An LLL-reduction algorithm with quasi-linear time complexity: extended abstract.
Proceedings of the 43rd ACM Symposium on Theory of Computing, 2011

Decoding by embedding: Correct decoding radius and DMT optimality.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Making NTRU as Secure as Worst-Case Problems over Ideal Lattices.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

Analyzing Blockwise Lattice Algorithms Using Dynamical Systems.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Algorithms for the Shortest and Closest Lattice Vector Problems.
Proceedings of the Coding and Cryptology - Third International Workshop, 2011

Euclidean lattices: algorithms and cryptography. (Réseaux Euclidiens : Algorithmes et Cryptographie).
, 2011

2010
Floating-Point LLL: Theoretical and Practical Aspects.
Proceedings of the LLL Algorithm - Survey and Applications, 2010

Analyse numérique et réduction de réseaux.
Tech. Sci. Informatiques, 2010

Rigorous Perturbation Bounds of Some Matrix Factorizations.
SIAM J. Matrix Anal. Appl., 2010

Faster Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2010

Randomized Lattice Decoding
CoRR, 2010

Accelerating Lattice Reduction with FPGAs.
Proceedings of the Progress in Cryptology, 2010

Randomized lattice decoding: Bridging the gap between lattice reduction and sphere decoding.
Proceedings of the IEEE International Symposium on Information Theory, 2010

On the Extremality of an 80-Dimensional Lattice.
Proceedings of the Algorithmic Number Theory, 9th International Symposium, 2010

Short Bases of Lattices over Number Fields.
Proceedings of the Algorithmic Number Theory, 9th International Symposium, 2010


2009
Low-dimensional lattice basis reduction revisited.
ACM Trans. Algorithms, 2009

An LLL Algorithm with Quadratic Complexity.
SIAM J. Comput., 2009

Efficient Public Key Encryption Based on Ideal Lattices.
IACR Cryptol. ePrint Arch., 2009

Solving the Shortest Lattice Vector Problem in Time 2<sup>2.465n</sup>.
IACR Cryptol. ePrint Arch., 2009

H-LLL: using householder inside LLL.
Proceedings of the Symbolic and Algebraic Computation, International Symposium, 2009

2008
Worst-Case Hermite-Korkine-Zolotarev Reduced Lattice Bases
CoRR, 2008

From an LLL-reduced basis to another.
ACM Commun. Comput. Algebra, 2008

Speeding-Up Lattice Reduction with Random Projections (Extended Abstract).
Proceedings of the LATIN 2008: Theoretical Informatics, 2008

Worst Cases for the Exponential Function in the IEEE 754r decimal64 Format.
Proceedings of the Reliable Implementation of Real Number Algorithms: Theory and Practice, 2008

Rigorous and Efficient Short Lattice Vectors Enumeration.
Proceedings of the Advances in Cryptology, 2008

2007
Improved Analysis of Kannan's Shortest Lattice Vector Algorithm.
Proceedings of the Advances in Cryptology, 2007

Worst Cases of a Periodic Function for Large Arguments.
Proceedings of the 18th IEEE Symposium on Computer Arithmetic (ARITH-18 2007), 2007

2006
On the Randomness of Bits Generated by Sufficiently Smooth Functions.
Proceedings of the Algorithmic Number Theory, 7th International Symposium, 2006

LLL on the Average.
Proceedings of the Algorithmic Number Theory, 7th International Symposium, 2006

2005
Algorithmique de la réduction de réseaux et application à la recherche de pires cas pour l'arrondi defonctions mathématiques.
PhD thesis, 2005

Searching Worst Cases of a One-Variable Function Using Lattice Reduction.
IEEE Trans. Computers, 2005

Floating-Point LLL Revisited.
Proceedings of the Advances in Cryptology, 2005

Gal's Accurate Tables Method Revisited.
Proceedings of the 17th IEEE Symposium on Computer Arithmetic (ARITH-17 2005), 2005

2004
Breaking Littlewood's Cipher.
Cryptologia, 2004

A Binary Recursive Gcd Algorithm.
Proceedings of the Algorithmic Number Theory, 6th International Symposium, 2004

2003
Worst Cases and Lattice Reduction.
Proceedings of the 16th IEEE Symposium on Computer Arithmetic (Arith-16 2003), 2003


  Loading...