Rémi Géraud

Orcid: 0000-0001-8719-1724

According to our database1, Rémi Géraud authored at least 60 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A systematic literature review on the impact of AI models on the security of code generation.
Frontiers Big Data, 2024

2023
Fiat-Shamir Goes Tropical.
IACR Cryptol. ePrint Arch., 2023

New Public-Key Cryptosystem Blueprints Using Matrix Products in 픽<sub>p</sub>.
IACR Cryptol. ePrint Arch., 2023

2022
A forensic analysis of the Google Home: repairing compressed data without error correction.
Digit. Investig., 2022

Time, Privacy, Robustness, Accuracy: Trade-Offs for the Open Vote Network Protocol.
Proceedings of the Electronic Voting - 7th International Joint Conference, 2022

2021
Magnetic RSA.
IACR Cryptol. ePrint Arch., 2021

On Unpadded NTRU Quantum (In)Security.
IACR Cryptol. ePrint Arch., 2021

How to Claim a Computational Feat.
IACR Cryptol. ePrint Arch., 2021

Primary Elements in Cyclotomic Fields with Applications to Power Residue Symbols, and More.
IACR Cryptol. ePrint Arch., 2021

Discovering New L-Function Relations Using Algebraic Sieving.
IACR Cryptol. ePrint Arch., 2021

A French cipher from the late 19th century.
Cryptologia, 2021

Near-Optimal Pool Testing under Urgency Constraints.
CoRR, 2021

2020
Kerckhoffs' Legacy.
IACR Cryptol. ePrint Arch., 2020

A Fractional 3n+1 Conjecture.
CoRR, 2020

The Look-and-Say The Biggest Sequence Eventually Cycles.
CoRR, 2020

Stuttering Conway Sequences Are Still Conway Sequences.
CoRR, 2020

At Most 43 Moves, At Least 29: Optimal Strategies and Bounds for Ultimate Tic-Tac-Toe.
CoRR, 2020

Optimal Covid-19 Pool Testing with a priori Information.
CoRR, 2020

Elementary Attestation of Cryptographically Useful Composite Moduli.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020

Approaching Optimal Duplicate Detection in a Sliding Window.
Proceedings of the Computing and Combinatorics - 26th International Conference, 2020

2019
Mixed-radix Naccache-Stern encryption.
J. Cryptogr. Eng., 2019

RISC-V: #AlphanumericShellcoding.
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019

How to Compartment Secrets.
Proceedings of the Information Security Theory and Practice, 2019

Quotient hash tables: efficiently detecting duplicates in streaming data.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Robust Encryption, Extended.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019

2018
Regulating the pace of von Neumann correctors.
J. Cryptogr. Eng., 2018

Recovering Secrets From Prefix-Dependent Leakage.
IACR Cryptol. ePrint Arch., 2018

Reusing Nonces in Schnorr Signatures.
IACR Cryptol. ePrint Arch., 2018

From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions.
CoRR, 2018

Universal Witness Signatures.
Proceedings of the Advances in Information and Computer Security, 2018

Invited Talk: A French Code from the Late 19th Century.
Proceedings of the 1st International Conference on Historical Cryptology, 2018

Public Key-Based Lightweight Swarm Authentication.
Proceedings of the Cyber-Physical Systems Security., 2018

2017
Advances in public-key cryptology and computer exploitation. (Avancées en cryptologie à clé publique et exploitation informatique).
PhD thesis, 2017

Honey Encryption for Language.
IACR Cryptol. ePrint Arch., 2017

Twisting Lattice and Graph Techniques to Compress Transactional Ledgers.
Proceedings of the Security and Privacy in Communication Networks, 2017

Exploring Naccache-Stern Knapsack Encryption.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017

Generating Functionally Equivalent Programs Having Non-isomorphic Control-Flow Graphs.
Proceedings of the Secure IT Systems, 2017

On the Hardness of the Mersenne Low Hamming Ratio Assumption.
Proceedings of the Progress in Cryptology - LATINCRYPT 2017, 2017

Reusing Nonces in Schnorr Signatures - (and Keeping It Secure...).
Proceedings of the Computer Security - ESORICS 2017, 2017

Non-interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms.
Proceedings of the Computer Security - ESORICS 2017, 2017

The Case for System Command Encryption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
When organized crime applies academic results: a forensic analysis of an in-card listening device.
J. Cryptogr. Eng., 2016

White-Box Cryptography: Security in an Insecure Environment.
IEEE Secur. Priv., 2016

Cdoe Obofsucaitn: Securing Software from Within.
IEEE Secur. Priv., 2016

Fully Homomorphic Encryption: Computations with a Blindfold.
IEEE Secur. Priv., 2016

A Fiat-Shamir Implementation Note.
IACR Cryptol. ePrint Arch., 2016

Public-Key Based Lightweight Swarm Authentication.
IACR Cryptol. ePrint Arch., 2016

Process Table Covert Channels: Exploitation and Countermeasures.
IACR Cryptol. ePrint Arch., 2016

Human Public-Key Encryption.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Honey Encryption for Language - Robbing Shannon to Pay Turing?
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography.
Proceedings of the Information Security Practice and Experience, 2016

ARMv8 Shellcodes from 'A' to 'Z'.
Proceedings of the Information Security Practice and Experience, 2016

The Conjoined Microprocessor.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

Double-Speed Barrett Moduli.
Proceedings of the New Codebreakers, 2016

Failure is Also an Option.
Proceedings of the New Codebreakers, 2016

Legally Fair Contract Signing Without Keystones.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Backtracking-Assisted Multiplication.
IACR Cryptol. ePrint Arch., 2015

Applying Cryptographic Acceleration Techniques to Error Correction.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015

A Number-Theoretic Error-Correcting Code.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015

Slow Motion Zero Knowledge Identifying with Colliding Commitments.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015


  Loading...