Mehdi Tibouchi

Orcid: 0000-0002-2736-2963

According to our database1, Mehdi Tibouchi authored at least 123 papers between 2009 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Ringtail: Practical Two-Round Threshold Signatures from Learning with Errors.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

LastRings: Lattice-Based Scalable Threshold Ring Signatures.
Proceedings of the Information Security - 28th International Conference, 2025

Do Not Disturb a Sleeping Falcon - Floating-Point Error Sensitivity of the Falcon Sampler and Its Consequences.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable Ciphertexts.
Proceedings of the Computer Security - ESORICS 2025, 2025

Crowhammer: Full Key Recovery Attack on Falcon with a Single Rowhammer Bit Flip.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Scalable Mixnets from Mercurial Signatures on Randomizable Ciphertexts.
IACR Cryptol. ePrint Arch., 2024

Critical Round in Multi-Round Proofs: Compositions and Transformation to Trapdoor Commitments.
IACR Cryptol. ePrint Arch., 2024

Cryptanalysis of EagleSign.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

Cryptanalysis of the Peregrine Lattice-Based Signature Scheme.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

CDS Composition of Multi-round Protocols.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Interactive Threshold Mercurial Signatures and Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Homomorphic encryption for stochastic computing.
J. Cryptogr. Eng., June, 2023

Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post-quantum proposals.
IET Inf. Secur., March, 2023

Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Antrag: Annular NTRU Trapdoor Generation.
IACR Cryptol. ePrint Arch., 2023

Faster Constant-time Evaluation of the Kronecker Symbol with Application to Elliptic Curve Hashing.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Antrag: Annular NTRU Trapdoor Generation - Making Mitaka as Secure as Falcon.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

Quantum-Access Security of Hash-Based Signature Schemes.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
Guessing Bits: Improved Lattice Attacks on (EC)DSA with Nonce Leakage.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Security notions for stateful signature schemes.
IET Inf. Secur., 2022

SwiftEC: Shallue-van de Woestijne Indifferentiable Function To Elliptic Curves.
IACR Cryptol. ePrint Arch., 2022

On subset-resilient hash function families.
Des. Codes Cryptogr., 2022

Profiling Side-Channel Attacks on Dilithium - A Small Bit-Fiddling Leak Breaks It All.
Proceedings of the Selected Areas in Cryptography - 29th International Conference, 2022

Mitaka: A Simpler, Parallelizable, Maskable Variant of Falcon.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Shorter Hash-and-Sign Lattice-Based Signatures.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

MuSig-L: Lattice-Based Multi-signature with Single-Round Online Phase.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

SwiftEC: Shallue-van de Woestijne Indifferentiable Function to Elliptic Curves - Faster Indifferentiable Hashing to Elliptic Curves.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Guessing Bits: Improved Lattice Attacks on (EC)DSA.
IACR Cryptol. ePrint Arch., 2021

On the Impossibility of NIZKs for Disjunctive Languages From Commit-and-Prove NIZKs.
IEEE Access, 2021

Verifiable Isogeny Walks: Towards an Isogeny-Based Postquantum VDF.
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021

Two-Round n-out-of-n and Multi-signatures and Trapdoor Commitment from Lattices.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

2020
Equidistribution Among Cosets of Elliptic Curve Points in Intervals.
J. Math. Cryptol., 2020

A Coin-Free Oracle-Based Augmented Black Box Framework (Full Paper).
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

On Black-Box Extension of a Non-Interactive Zero-Knowledge Proof System for Secret Equality.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

SHECS-PIR: Somewhat Homomorphic Encryption-Based Compact and Scalable Private Information Retrieval.
Proceedings of the Computer Security - ESORICS 2020, 2020

LadderLeak: Breaking ECDSA with Less than One Bit of Nonce Leakage.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Revisiting the Hardness of Binary Error LWE.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
Efficient Fully Structure-Preserving Signatures and Shrinking Commitments.
J. Cryptol., 2019

One Bit is All It Takes: A Devastating Timing Attack on BLISS's Non-Constant Time Sign Flips.
IACR Cryptol. ePrint Arch., 2019

Uprooting the Falcon Tree?
IACR Cryptol. ePrint Arch., 2019

A Coin-Free Oracle-Based Augmented Black Box Framework.
Proceedings of the Provable Security, 2019

Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

GALACTICS: Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Masking Dilithium - Efficient Implementation and Side-Channel Evaluation.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
New Bleichenbacher Records: Fault Attacks on qDSA Signatures.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Loop-Abort Faults on Lattice-Based Signature Schemes and Key Exchange Protocols.
IEEE Trans. Computers, 2018

Constructing Permutation Rational Functions from Isogenies.
SIAM J. Discret. Math., 2018

New Bleichenbacher Records: Practical Fault Attacks on qDSA Signatures.
IACR Cryptol. ePrint Arch., 2018

Recovering Secrets From Prefix-Dependent Leakage.
IACR Cryptol. ePrint Arch., 2018

Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves.
IACR Cryptol. ePrint Arch., 2018

Lower Bounds on Structure-Preserving Signatures for Bilateral Messages.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Universal Witness Signatures.
Proceedings of the Advances in Information and Computer Security, 2018

Masking the GLP Lattice-Based Signature Scheme at Any Order.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Cryptanalysis of Compact-LWE.
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018

LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Cryptanalysis of Compact-LWE.
IACR Cryptol. ePrint Arch., 2017

Improved elliptic curve hashing and point representation.
Des. Codes Cryptogr., 2017

Elliptic Curve Multiset Hash.
Comput. J., 2017

Zeroizing Attacks on Indistinguishability Obfuscation over CLT13.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Secure GLS Recomposition for Sum-of-Square Cofactors.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Practical Cryptanalysis of ISO 9796-2 and EMV Signatures.
J. Cryptol., 2016

Loop abort Faults on Lattice-Based Fiat-Shamir & Hash'n Sign signatures.
IACR Cryptol. ePrint Arch., 2016

Loop-Abort Faults on Lattice-Based Fiat-Shamir and Hash-and-Sign Signatures.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Degenerate Curve Attacks - Extending Invalid Curve Attacks to Edwards Curves and Other Models.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

Cryptanalysis of GGH15 Multilinear Maps.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

FHE Over the Integers and Modular Arithmetic Circuits.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Degenerate Curve Attacks.
IACR Cryptol. ePrint Arch., 2015

Cryptanalysis of the Quadratic Zero-Testing of GGH.
IACR Cryptol. ePrint Arch., 2015

Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Invalid Curve Attacks in a GLS Setting.
Proceedings of the Advances in Information and Computer Security, 2015

Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR.
Proceedings of the Financial Cryptography and Data Security, 2015

Fully Structure-Preserving Signatures and Shrinking Commitments.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Cryptanalysis of the Co-ACD Assumption.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

New Multilinear Maps Over the Integers.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers.
IACR Cryptol. ePrint Arch., 2014

Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Binary Elligator Squared.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

Impossibility of Surjective Icart-Like Encodings.
Proceedings of the Provable Security - 8th International Conference, 2014

Scale-Invariant Fully Homomorphic Encryption over the Integers.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Close to Uniform Prime Number Generation with Fewer Random Bits.
Proceedings of the Automata, Languages, and Programming - 41st International Colloquium, 2014

Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings.
Proceedings of the Financial Cryptography and Data Security, 2014

Structure-Preserving Signatures from Type II Pairings.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Making RSA-PSS Provably Secure against Non-random Faults.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

Bit-Flip Faults on Elliptic Curve Base Fields, Revisited.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves.
Math. Comput., 2013

A Note on the Bivariate Coppersmith Theorem.
J. Cryptol., 2013

Injective Encoding to Elliptic Curves.
IACR Cryptol. ePrint Arch., 2013

Batch Fully Homomorphic Encryption over the Integers.
IACR Cryptol. ePrint Arch., 2013

Recovering Private Keys Generated with Weak PRNGs.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

Batch Fully Homomorphic Encryption over the Integers.
Proceedings of the Advances in Cryptology, 2013

Practical Multilinear Maps over the Integers.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Fault Attacks on Projective-to-Affine Coordinates Conversion.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013

Injective Encodings to Elliptic Curves.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Lattice-Based Fault Attacks on Signatures.
Proceedings of the Fault Analysis in Cryptography, 2012

Indifferentiable Hashing to Barreto-Naehrig Curves.
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012

Another Look at Affine-Padding RSA Signatures.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Tightly-Secure Signatures from Lossy Identification Schemes.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

A Nagell Algorithm in Any Characteristic.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
Security Reduction.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

ISO-9796 Signature Standards.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Hashing to elliptic curves and cryptanalysis of RSA-based schemes. (Hachage vers les courbes elliptiques et cryptanalyse de schémas RSA).
PhD thesis, 2011

Securing E-passports with Elliptic Curves.
IEEE Secur. Priv., 2011

Optimization of Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2011

Another Look at RSA Signatures With Affine Padding.
IACR Cryptol. ePrint Arch., 2011

Cryptanalysis of the RSA Subgroup Assumption from TCC 2005.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Fully Homomorphic Encryption over the Integers with Shorter Public Keys.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Modulus Fault Attacks against RSA-CRT Signatures.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
Deterministic Encoding and Hashing to Odd Hyperelliptic Curves.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves.
Proceedings of the Progress in Cryptology, 2010

Fault Attacks Against emv Signatures.
Proceedings of the Topics in Cryptology, 2010

Efficient Indifferentiable Hashing into Ordinary Elliptic Curves.
Proceedings of the Advances in Cryptology, 2010

Huff's Model for Elliptic Curves.
Proceedings of the Algorithmic Number Theory, 9th International Symposium, 2010

On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Factoring Unbalanced Moduli with Known Bits.
Proceedings of the Information, Security and Cryptology, 2009

Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures.
Proceedings of the Advances in Cryptology, 2009


  Loading...