Guilhem Castagnos

According to our database1, Guilhem Castagnos authored at least 27 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
I Want to Ride My BICYCL : BICYCL Implements CryptographY in CLass Groups.
J. Cryptol., July, 2023

Bandwidth-efficient threshold EC-DSA revisited: Online/offline extensions, identifiable aborts proactive and adaptive security.
Theor. Comput. Sci., 2023

2022
A tighter proof for CCA secure inner product functional encryption: Genericity meets efficiency.
Theor. Comput. Sci., 2022

Threshold Linearly Homomorphic Encryption on $\mathbf{Z}/2^k\mathbf{Z}$.
IACR Cryptol. ePrint Arch., 2022

Pattern Matching in Encrypted Stream from Inner Product Encryption.
IACR Cryptol. ePrint Arch., 2022

Threshold Linearly Homomorphic Encryption on bfZ/2<sup>kbfZ</sup>.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Efficient CCA Timed Commitments in Class Groups.
IACR Cryptol. ePrint Arch., 2021

Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts, Proactivity and Adaptive Security.
IACR Cryptol. ePrint Arch., 2021

Public Key Encryption with Flexible Pattern Matching.
IACR Cryptol. ePrint Arch., 2021

2020
Bandwidth-efficient threshold EC-DSA.
IACR Cryptol. ePrint Arch., 2020

2019
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations.
IACR Cryptol. ePrint Arch., 2019

Cryptography based on quadratic fields: cryptanalyses, primitives and protocols. (Cryptographie basée sur les corps quadratiques : cryptanalyses, primitives et protocoles).
, 2019

2018
Practical Fully Secure Unrestricted Inner Product Functional Encryption modulo p.
IACR Cryptol. ePrint Arch., 2018

2017
Encryption Switching Protocols Revisited: Switching modulo p.
IACR Cryptol. ePrint Arch., 2017

2015
Linearly Homomorphic Encryption from DDH.
IACR Cryptol. ePrint Arch., 2015

Linearly Homomorphic Encryption from $$\mathsf {DDH}$$.
Proceedings of the Topics in Cryptology, 2015

2013
High-order Masking by Using Coding Theory and Its Application to AES.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

2012
Homomorphic Encryption for Multiplications and Pairing Evaluation.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

2009
Fault Analysis of Grain-128.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2009

On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis.
Proceedings of the Advances in Cryptology, 2009

Factoring <i>pq</i><sup>2</sup> with Quadratic Forms: Nice Cryptanalyses.
Proceedings of the Advances in Cryptology, 2009

2008
Two Generic Constructions of Probabilistic Cryptosystems and Their Applications.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Lattice-based homomorphic encryption of vector spaces.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

2007
An efficient probabilistic public-key cryptosystem over quadratic fields quotients.
Finite Fields Their Appl., 2007

Trapdoor Permutation Polynomials of Z/ <i>n</i> Z and Public Key Cryptosystems.
Proceedings of the Information Security, 10th International Conference, 2007

Towards a DL-Based Additively Homomorphic Encryption Scheme.
Proceedings of the Information Security, 10th International Conference, 2007

2003
What do DES S-boxes Say to Each Other ?
IACR Cryptol. ePrint Arch., 2003


  Loading...