Slim Bettaieb

According to our database1, Slim Bettaieb authored at least 21 papers between 2011 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Sota Voce: Low-Noise Sampling of Sparse Fixed-Weight Vectors.
IACR Cryptol. ePrint Arch., 2025

2024
Enabling PERK and other MPC-in-the-Head Signatures on Resource-Constrained Devices.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Modelings for generic PoK and Applications: Shorter SD and PKP based Signatures.
IACR Cryptol. ePrint Arch., 2024

PERK: Compact Signature Scheme Based on a New Variant of the Permuted Kernel Problem.
IACR Cryptol. ePrint Arch., 2024

Enabling PERK on Resource-Constrained Devices.
IACR Cryptol. ePrint Arch., 2024

Quasi-optimal Permutation Ranking and Applications to PERK.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2024, 2024

2022
Post-Quantum Oblivious Transfer from Smooth Projective Hash Functions with Grey Zone.
CoRR, 2022

A practicable timing attack against HQC and its countermeasure.
Adv. Math. Commun., 2022

Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey Zone.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

2021
A Gapless Code-Based Hash Proof System based on RQC and its Applications.
IACR Cryptol. ePrint Arch., 2021

Zero-Knowledge Reparation of the Véron and AGS Code-based Identification Schemes.
Proceedings of the IEEE International Symposium on Information Theory, 2021

The Rank-Based Cryptography Library.
Proceedings of the Code-Based Cryptography - 9th International Workshop, 2021

Secure Decision Forest Evaluation.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2019
A Practicable Timing Attack Against HQC and its Countermeasure.
IACR Cryptol. ePrint Arch., 2019

Preventing Timing Attacks Against RQC Using Constant Time Decoding of Gabidulin Codes.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019

2018
The Learning with Rank Errors problem and an application to symmetric authentication.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

2014
Signature et identification pour l'anonymat basées sur les réseaux. (Lattice-based signature and identification schemes for anonymity).
PhD thesis, 2014

2013
Improved Lattice-Based Threshold Ring Signature Scheme.
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013

A Code-Based Undeniable Signature Scheme.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting.
Proceedings of the Progress in Cryptology, 2013

2011
Improving Additive and Multiplicative Homomorphic Encryption Schemes Based on Worst-Case Hardness Assumptions}.
IACR Cryptol. ePrint Arch., 2011


  Loading...