Rémi Géraud

Orcid: 0000-0001-8719-1724

According to our database1, Rémi Géraud authored at least 59 papers between 2015 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Fiat-Shamir Goes Tropical.
IACR Cryptol. ePrint Arch., 2023

New Public-Key Cryptosystem Blueprints Using Matrix Products in 픽<sub>p</sub>.
IACR Cryptol. ePrint Arch., 2023

2022
A forensic analysis of the Google Home: repairing compressed data without error correction.
CoRR, 2022

2021
Magnetic RSA.
IACR Cryptol. ePrint Arch., 2021

Elementary Attestation of Cryptographically Useful Composite Moduli.
IACR Cryptol. ePrint Arch., 2021

On Unpadded NTRU Quantum (In)Security.
IACR Cryptol. ePrint Arch., 2021

How to Claim a Computational Feat.
IACR Cryptol. ePrint Arch., 2021

Primary Elements in Cyclotomic Fields with Applications to Power Residue Symbols, and More.
IACR Cryptol. ePrint Arch., 2021

Discovering New L-Function Relations Using Algebraic Sieving.
IACR Cryptol. ePrint Arch., 2021

Time, Privacy, Robustness, Accuracy: Trade Offs for the Open Vote Network Protocol.
IACR Cryptol. ePrint Arch., 2021

A French cipher from the late 19th century.
Cryptologia, 2021

Near-Optimal Pool Testing under Urgency Constraints.
CoRR, 2021

2020
Kerckhoffs' Legacy.
IACR Cryptol. ePrint Arch., 2020

A Fractional 3n+1 Conjecture.
CoRR, 2020

The Look-and-Say The Biggest Sequence Eventually Cycles.
CoRR, 2020

Stuttering Conway Sequences Are Still Conway Sequences.
CoRR, 2020

At Most 43 Moves, At Least 29: Optimal Strategies and Bounds for Ultimate Tic-Tac-Toe.
CoRR, 2020

Optimal Covid-19 Pool Testing with a priori Information.
CoRR, 2020

Approaching Optimal Duplicate Detection in a Sliding Window.
Proceedings of the Computing and Combinatorics - 26th International Conference, 2020

2019
Mixed-radix Naccache-Stern encryption.
J. Cryptogr. Eng., 2019

Robust Encryption, Extended.
IACR Cryptol. ePrint Arch., 2019

How to compartment secrets.
IACR Cryptol. ePrint Arch., 2019

RISC-V: #AlphanumericShellcoding.
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019

Quotient hash tables: efficiently detecting duplicates in streaming data.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

2018
Regulating the pace of von Neumann correctors.
J. Cryptogr. Eng., 2018

Recovering Secrets From Prefix-Dependent Leakage.
IACR Cryptol. ePrint Arch., 2018

Reusing Nonces in Schnorr Signatures.
IACR Cryptol. ePrint Arch., 2018

From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions.
CoRR, 2018

Backtracking-assisted multiplication.
Cryptogr. Commun., 2018

Universal Witness Signatures.
Proceedings of the Advances in Information and Computer Security, 2018

Invited Talk: A French Code from the Late 19th Century.
Proceedings of the 1st International Conference on Historical Cryptology, 2018

Public Key-Based Lightweight Swarm Authentication.
Proceedings of the Cyber-Physical Systems Security., 2018

2017
Advances in public-key cryptology and computer exploitation. (Avancées en cryptologie à clé publique et exploitation informatique).
PhD thesis, 2017

Twisting Lattice and Graph Techniques to Compress Transactional Ledgers.
IACR Cryptol. ePrint Arch., 2017

Exploring Naccache-Stern Knapsack Encryption.
IACR Cryptol. ePrint Arch., 2017

Honey Encryption for Language.
IACR Cryptol. ePrint Arch., 2017

On the Hardness of the Mersenne Low Hamming Ratio Assumption.
IACR Cryptol. ePrint Arch., 2017

Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms.
IACR Cryptol. ePrint Arch., 2017

Generating Functionally Equivalent Programs Having Non-isomorphic Control-Flow Graphs.
Proceedings of the Secure IT Systems, 2017

Reusing Nonces in Schnorr Signatures - (and Keeping It Secure...).
Proceedings of the Computer Security - ESORICS 2017, 2017

The Case for System Command Encryption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
When organized crime applies academic results: a forensic analysis of an in-card listening device.
J. Cryptogr. Eng., 2016

White-Box Cryptography: Security in an Insecure Environment.
IEEE Secur. Priv., 2016

Cdoe Obofsucaitn: Securing Software from Within.
IEEE Secur. Priv., 2016

Fully Homomorphic Encryption: Computations with a Blindfold.
IEEE Secur. Priv., 2016

Human Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2016

Slow Motion Zero Knowledge Identifying With Colliding Commitments.
IACR Cryptol. ePrint Arch., 2016

Legally Fair Contract Signing Without Keystones.
IACR Cryptol. ePrint Arch., 2016

A Fiat-Shamir Implementation Note.
IACR Cryptol. ePrint Arch., 2016

Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography.
IACR Cryptol. ePrint Arch., 2016

Public-Key Based Lightweight Swarm Authentication.
IACR Cryptol. ePrint Arch., 2016

Process Table Covert Channels: Exploitation and Countermeasures.
IACR Cryptol. ePrint Arch., 2016

Honey Encryption for Language - Robbing Shannon to Pay Turing?
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

ARMv8 Shellcodes from 'A' to 'Z'.
Proceedings of the Information Security Practice and Experience, 2016

Failure is Also an Option.
Proceedings of the New Codebreakers, 2016

2015
Applying Cryptographic Acceleration Techniques to Error Correction.
IACR Cryptol. ePrint Arch., 2015

Double-Speed Barrett Moduli.
IACR Cryptol. ePrint Arch., 2015

The Conjoined Microprocessor.
IACR Cryptol. ePrint Arch., 2015

A Number-Theoretic Error-Correcting Code.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015


  Loading...