Mehdi Tibouchi
Orcid: 0000-0002-2736-2963
According to our database1,
Mehdi Tibouchi
authored at least 123 papers
between 2009 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2025
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Proceedings of the Information Security - 28th International Conference, 2025
Do Not Disturb a Sleeping Falcon - Floating-Point Error Sensitivity of the Falcon Sampler and Its Consequences.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable Ciphertexts.
Proceedings of the Computer Security - ESORICS 2025, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
2024
IACR Cryptol. ePrint Arch., 2024
Critical Round in Multi-Round Proofs: Compositions and Transformation to Trapdoor Commitments.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024
Proceedings of the Public-Key Cryptography - PKC 2024, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
2023
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post-quantum proposals.
IET Inf. Secur., March, 2023
Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
Faster Constant-time Evaluation of the Kronecker Symbol with Application to Elliptic Curve Hashing.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IACR Cryptol. ePrint Arch., 2022
Profiling Side-Channel Attacks on Dilithium - A Small Bit-Fiddling Leak Breaks It All.
Proceedings of the Selected Areas in Cryptography - 29th International Conference, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
SwiftEC: Shallue-van de Woestijne Indifferentiable Function to Elliptic Curves - Faster Indifferentiable Hashing to Elliptic Curves.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2021
IEEE Access, 2021
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021
Proceedings of the Public-Key Cryptography - PKC 2021, 2021
2020
J. Math. Cryptol., 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
On Black-Box Extension of a Non-Interactive Zero-Knowledge Proof System for Secret Equality.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020
Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
SHECS-PIR: Somewhat Homomorphic Encryption-Based Compact and Scalable Private Information Retrieval.
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
J. Cryptol., 2019
One Bit is All It Takes: A Devastating Timing Attack on BLISS's Non-Constant Time Sign Flips.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Provable Security, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
GALACTICS: Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
2018
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
IEEE Trans. Computers, 2018
SIAM J. Discret. Math., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Proceedings of the Advances in Information and Computer Security, 2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016
Degenerate Curve Attacks - Extending Invalid Curve Attacks to Edwards Curves and Other Models.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
Proceedings of the Advances in Information and Computer Security, 2015
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014
Proceedings of the Provable Security - 8th International Conference, 2014
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Proceedings of the Automata, Languages, and Programming - 41st International Colloquium, 2014
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings.
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
Math. Comput., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013
Proceedings of the Advances in Cryptology, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
Proceedings of the Fault Analysis in Cryptography, 2012
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Hashing to elliptic curves and cryptanalysis of RSA-based schemes. (Hachage vers les courbes elliptiques et cryptanalyse de schémas RSA).
PhD thesis, 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011
2010
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
Proceedings of the Progress in Cryptology, 2010
Proceedings of the Advances in Cryptology, 2010
Proceedings of the Algorithmic Number Theory, 9th International Symposium, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
Proceedings of the Information, Security and Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009