Laurent Imbert

Orcid: 0000-0001-9362-2869

According to our database1, Laurent Imbert authored at least 45 papers between 2000 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
I Want to Ride My BICYCL : BICYCL Implements CryptographY in CLass Groups.
J. Cryptol., July, 2023

2021
A Side Journey To Titan.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
An Alternative Approach for SIDH Arithmetic.
IACR Cryptol. ePrint Arch., 2020

Improved divisor arithmetic on generic hyperelliptic curves.
ACM Commun. Comput. Algebra, 2020

Balanced NUCOMP.
Proceedings of the Computer Algebra in Scientific Computing - 22nd International Workshop, 2020

2019
Side-channel Attacks on Blinded Scalar Multiplications Revisited.
IACR Cryptol. ePrint Arch., 2019

Breaking Randomized Mixed-Radix Scalar Multiplication Algorithms.
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019

2018
Randomized Mixed-Radix Scalar Multiplication.
IEEE Trans. Computers, 2018

Faster cofactorization with ECM using mixed representations.
IACR Cryptol. ePrint Arch., 2018

2017
Encryption Switching Protocols Revisited: Switching modulo p.
IACR Cryptol. ePrint Arch., 2017

2015
Vertical and horizontal correlation attacks on RNS-based exponentiations.
J. Cryptogr. Eng., 2015

Randomizing Scalar Multiplication Using Exact Covering Systems of Congruences.
IACR Cryptol. ePrint Arch., 2015

2014
On the Maximal Weight of (P, Q)-ary Chain Partitions With Bounded Parts.
Integers, 2014

Attacking Randomized Exponentiations Using Unsupervised Learning.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

2013
Empirical optimization of divisor arithmetic on hyperelliptic curves over F<sub>2<sup>m</sup></sub>.
Adv. Math. Commun., 2013

Electromagnetic Analysis on RSA Algorithm Based on RNS.
Proceedings of the 2013 Euromicro Conference on Digital System Design, 2013

Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks.
Proceedings of the Smart Card Research and Advanced Applications, 2013

Parallel Modular Multiplication on Multi-core Processors.
Proceedings of the 21st IEEE Symposium on Computer Arithmetic, 2013

2011
Hybrid Binary-Ternary Number System for Elliptic Curve Cryptosystems.
IEEE Trans. Computers, 2011

2010
Strictly chained (p, q)-ary partitions.
Contributions Discret. Math., 2010

Fast ideal cubing in imaginary quadratic number and function fields.
Adv. Math. Commun., 2010

2009
Diophantine Approximation, Ostrowski Numeration and the Double-Base Number System.
Discret. Math. Theor. Comput. Sci., 2009

Accelerating Query-by-Humming on GPU.
Proceedings of the 10th International Society for Music Information Retrieval Conference, 2009

Hybrid Binary-Ternary Joint Form and Its Application in Elliptic Curve Cryptography.
Proceedings of the 19th IEEE Symposium on Computer Arithmetic, 2009

2008
The double-base number system and its application to elliptic curve cryptography.
Math. Comput., 2008

Hybrid Binary-Ternary Joint Sparse Form and its Application in Elliptic Curve Cryptography.
IACR Cryptol. ePrint Arch., 2008

The double-base number system in elliptic curve cryptography.
Proceedings of the 42nd Asilomar Conference on Signals, Systems and Computers, 2008

Arithmexotiques.
, 2008

2007
Multi-mode operator for SHA-2 hash functions.
J. Syst. Archit., 2007

Multiplication by a Constant is Sublinear.
Proceedings of the 18th IEEE Symposium on Computer Arithmetic (ARITH-18 2007), 2007

2006
Arithmetic Operations in Finite Fields of Medium Prime Characteristic Using the Lagrange Representation.
IEEE Trans. Computers, 2006

Extended Double-Base Number System with applications to Elliptic Curve Cryptography.
IACR Cryptol. ePrint Arch., 2006

2005
Fast Elliptic Curve Point Multiplication using Double-Base Chains.
IACR Cryptol. ePrint Arch., 2005

Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains.
Proceedings of the Advances in Cryptology, 2005

A Fault-Tolerant Modulus Replication Complex FIR Filter.
Proceedings of the 16th IEEE International Conference on Application-Specific Systems, 2005

Arithmetic Operations in the Polynomial Modular Number System.
Proceedings of the 17th IEEE Symposium on Computer Arithmetic (ARITH-17 2005), 2005

2004
A Full RNS Implementation of RSA.
IEEE Trans. Computers, 2004

Parallel Montgomery Multiplication in GF(2<sup>k</sup>) using Trinomial Residue Arithmetic.
IACR Cryptol. ePrint Arch., 2004

Modular Number Systems: Beyond the Mersenne Family.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

Leak Resistant Arithmetic.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

2003
Efficient Multiplication in GF(pk) for Elliptic Curve Cryptography.
Proceedings of the 16th IEEE Symposium on Computer Arithmetic (Arith-16 2003), 2003

2002
Modular Multiplication in GF(p<sup>k</sup>) Using Lagrange Representation.
Proceedings of the Progress in Cryptology, 2002

2001
The Use of the Multi-Dimensional Logarithmic Number System in DSP Applications.
Proceedings of the 15th IEEE Symposium on Computer Arithmetic (Arith-15 2001), 2001

2000
A Radix-10 BKM Algorithm for Computing Transcendentals on Pocket Computers.
J. VLSI Signal Process., 2000

Improving Goldschmidt Division, Square Root, and Square Root Reciprocal.
IEEE Trans. Computers, 2000


  Loading...