Houda Ferradi

Orcid: 0000-0002-7039-3298

According to our database1, Houda Ferradi authored at least 32 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
How to Validate a Verification?
IACR Cryptol. ePrint Arch., 2024

2023
Blockchain-empowered Federated Learning: Challenges, Solutions, and Future Directions.
ACM Comput. Surv., November, 2023

How to Physically Hold Your Bitcoins ?
IACR Cryptol. ePrint Arch., 2023

2022
Security and Privacy in Big Data Sharing: State-of-the-Art and Research Directions.
CoRR, 2022

2019
Post-Quantum Provably-Secure Authentication and MAC from Mersenne Primes.
IACR Cryptol. ePrint Arch., 2019

New Number-Theoretic Cryptographic Primitives.
IACR Cryptol. ePrint Arch., 2019

2018
Efficient subtree-based encryption for fuzzy-entity data sharing.
Soft Comput., 2018

Regulating the pace of von Neumann correctors.
J. Cryptogr. Eng., 2018

Recovering Secrets From Prefix-Dependent Leakage.
IACR Cryptol. ePrint Arch., 2018

Reusing Nonces in Schnorr Signatures.
IACR Cryptol. ePrint Arch., 2018

Backtracking-assisted multiplication.
Cryptogr. Commun., 2018

Public Key-Based Lightweight Swarm Authentication.
Proceedings of the Cyber-Physical Systems Security., 2018

2017
Integer Reconstruction Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2017

Honey Encryption for Language.
IACR Cryptol. ePrint Arch., 2017

Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms.
IACR Cryptol. ePrint Arch., 2017

Reusing Nonces in Schnorr Signatures - (and Keeping It Secure...).
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Integrity, authentication and confidentiality in public-key cryptography. (Intégrité, authentification et confidentialité en cryptographie à clé publique).
PhD thesis, 2016

When organized crime applies academic results: a forensic analysis of an in-card listening device.
J. Cryptogr. Eng., 2016

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing.
IACR Cryptol. ePrint Arch., 2016

Human Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2016

Slow Motion Zero Knowledge Identifying With Colliding Commitments.
IACR Cryptol. ePrint Arch., 2016

Legally Fair Contract Signing Without Keystones.
IACR Cryptol. ePrint Arch., 2016

Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography.
IACR Cryptol. ePrint Arch., 2016

Public-Key Based Lightweight Swarm Authentication.
IACR Cryptol. ePrint Arch., 2016

Process Table Covert Channels: Exploitation and Countermeasures.
IACR Cryptol. ePrint Arch., 2016

Honey Encryption for Language - Robbing Shannon to Pay Turing?
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

ARMv8 Shellcodes from 'A' to 'Z'.
Proceedings of the Information Security Practice and Experience, 2016

Secure Application Execution in Mobile Devices.
Proceedings of the New Codebreakers, 2016

2015
The Conjoined Microprocessor.
IACR Cryptol. ePrint Arch., 2015

2014
New Algorithmic Approaches to Point Constellation Recognition.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools.
Proceedings of the Information Security Practice and Experience, 2014

2013
Communicating Covertly through CPU Monitoring.
IEEE Secur. Priv., 2013


  Loading...