Houda Ferradi

According to our database1, Houda Ferradi authored at least 38 papers between 2013 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Post-Quantum Provably-Secure Authentication and MAC from Mersenne Primes.
IACR Cryptology ePrint Archive, 2019

2018
Efficient subtree-based encryption for fuzzy-entity data sharing.
Soft Comput., 2018

Regulating the pace of von Neumann correctors.
J. Cryptographic Engineering, 2018

Recovering Secrets From Prefix-Dependent Leakage.
IACR Cryptology ePrint Archive, 2018

Reusing Nonces in Schnorr Signatures.
IACR Cryptology ePrint Archive, 2018

Backtracking-assisted multiplication.
Cryptography and Communications, 2018

Public Key-Based Lightweight Swarm Authentication.
Proceedings of the Cyber-Physical Systems Security., 2018

2017
Integer Reconstruction Public-Key Encryption.
IACR Cryptology ePrint Archive, 2017

Honey Encryption for Language.
IACR Cryptology ePrint Archive, 2017

Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms.
IACR Cryptology ePrint Archive, 2017

Reusing Nonces in Schnorr Signatures - (and Keeping It Secure...).
Proceedings of the Computer Security - ESORICS 2017, 2017

Non-interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Integrity, authentication and confidentiality in public-key cryptography. (Intégrité, authentification et confidentialité en cryptographie à clé publique).
PhD thesis, 2016

When organized crime applies academic results: a forensic analysis of an in-card listening device.
J. Cryptographic Engineering, 2016

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing.
IACR Cryptology ePrint Archive, 2016

Human Public-Key Encryption.
IACR Cryptology ePrint Archive, 2016

Slow Motion Zero Knowledge Identifying With Colliding Commitments.
IACR Cryptology ePrint Archive, 2016

Legally Fair Contract Signing Without Keystones.
IACR Cryptology ePrint Archive, 2016

Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography.
IACR Cryptology ePrint Archive, 2016

Public-Key Based Lightweight Swarm Authentication.
IACR Cryptology ePrint Archive, 2016

Process Table Covert Channels: Exploitation and Countermeasures.
IACR Cryptology ePrint Archive, 2016

ARMv8 Shellcodes from 'A' to 'Z'.
CoRR, 2016

Human Public-Key Encryption.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Honey Encryption for Language - Robbing Shannon to Pay Turing?
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography.
Proceedings of the Information Security Practice and Experience, 2016

ARMv8 Shellcodes from 'A' to 'Z'.
Proceedings of the Information Security Practice and Experience, 2016

The Conjoined Microprocessor.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

Secure Application Execution in Mobile Devices.
Proceedings of the New Codebreakers, 2016

Legally Fair Contract Signing Without Keystones.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
When Organized Crime Applies Academic Results - A Forensic Analysis of an In-Card Listening Device.
IACR Cryptology ePrint Archive, 2015

Backtracking-Assisted Multiplication.
IACR Cryptology ePrint Archive, 2015

Regulating the Pace of von Neumann Correctors.
IACR Cryptology ePrint Archive, 2015

The Conjoined Microprocessor.
IACR Cryptology ePrint Archive, 2015

Slow Motion Zero Knowledge Identifying with Colliding Commitments.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
New Algorithmic Approaches to Point Constellation Recognition.
CoRR, 2014

New Algorithmic Approaches to Point Constellation Recognition.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools.
Proceedings of the Information Security Practice and Experience, 2014

2013
Communicating Covertly through CPU Monitoring.
IEEE Security & Privacy, 2013


  Loading...