Pascal Véron

Orcid: 0000-0001-7610-6870

According to our database1, Pascal Véron authored at least 26 papers between 1995 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Montgomery Multiplication Scalable Systolic Designs Optimized for DSP48E2.
ACM Trans. Reconfigurable Technol. Syst., March, 2024

2023
Faster multiplication over ${\mathbb {F}}_2[X]$ using AVX512 instruction set and VPCLMULQDQ instruction.
J. Cryptogr. Eng., April, 2023

2022
PMNS for Efficient Arithmetic and Small Memory Cost.
IEEE Trans. Emerg. Top. Comput., 2022

Faster multiplication over F<sub>2</sub>[X] using AVX512 instruction set and VPCLMULQDQ instruction.
CoRR, 2022

2021
A Hole in the Ladder: Interleaved Variables in Iterative Conditional Branching (Extended Version).
CoRR, 2021

Compact Variable-base ECC Scalar Multiplication using Euclidean Addition Chains.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

2020
Efficient modular operations using the adapted modular number system.
J. Cryptogr. Eng., 2020

On Polynomial Modular Number Systems over $\mathbb{Z}/p\mathbb{Z}$.
CoRR, 2020

2019
Efficient and secure modular operations using the Adapted Modular Number System.
CoRR, 2019

Randomization of Arithmetic Over Polynomial Modular Number System.
Proceedings of the 26th IEEE Symposium on Computer Arithmetic, 2019

2018
Euclidean addition chains scalar multiplication on curves with efficient endomorphism.
J. Cryptogr. Eng., 2018

2017
Cache timing attacks countermeasures and error detection in Euclidean addition chains based scalar multiplication algorithm for elliptic curves.
Proceedings of the 23rd IEEE International Symposium on On-Line Testing and Robust System Design, 2017

2016
Extended security arguments for signature schemes.
Des. Codes Cryptogr., 2016

2013
Code Based Cryptography and Steganography.
Proceedings of the Algebraic Informatics - 5th International Conference, 2013

2012
An Improved Threshold Ring Signature Scheme Based on Error Correcting Codes.
Proceedings of the Arithmetic of Finite Fields - 4th International Workshop, 2012

2011
Guest editorial for the special issue for Jacques Wolfmann.
Cryptogr. Commun., 2011

2010
Improved code-based identification scheme
CoRR, 2010

A Public Key Cryptosystem Based upon Euclidean Addition Chains.
Proceedings of the Sequences and Their Applications - SETA 2010, 2010

A Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding Problem.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Random Euclidean Addition Chain Generation and Its Application to Point Multiplication.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

2005
Proof of Conjectures on the True Dimension of Some Binary Goppa Codes.
Des. Codes Cryptogr., 2005

On the Non-linearity of Power Functions.
Des. Codes Cryptogr., 2005

2001
True Dimension of Some Binary Quadratic Trace Goppa Codes.
Des. Codes Cryptogr., 2001

1998
Goppa Codes and Trace Operator.
IEEE Trans. Inf. Theory, 1998

1996
Improved identification schemes based on error-correcting codes.
Appl. Algebra Eng. Commun. Comput., 1996

1995
Cryptanalysis of Harari's Identification Scheme.
Proceedings of the Cryptography and Coding, 1995


  Loading...