Thomas Ricosset

Orcid: 0000-0002-8841-1087

According to our database1, Thomas Ricosset authored at least 14 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
DAKE: Bandwidth-Efficient (U)AKE from Double-KEM.
IACR Cryptol. ePrint Arch., 2025

Breaking HuFu with 0 Leakage - A Side-Channel Analysis.
Proceedings of the Constructive Approaches for Security Analysis and Design of Embedded Systems, 2025

2024
Polytopes in the Fiat-Shamir with Aborts Paradigm.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Formal Verification of a Post-quantum Signal Protocol with Tamarin.
Proceedings of the Verification and Evaluation of Computer and Communication Systems, 2023

GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges.
Proceedings of the Applied Cryptography and Network Security, 2023

Efficient Implementation of a Post-Quantum Anonymous Credential Protocol.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon.
IACR Cryptol. ePrint Arch., 2022

2020
Isochronous Gaussian Sampling: From Inception to Implementation.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020

Transciphering, Using FiLIP and TFHE for an Efficient Delegation of Computation.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

2018
Lattice-based digital signature and discrete gaussian sampling. (Signature électronique basée sur les réseaux euclidiens et échantillonnage selon une loi normale discrète).
PhD thesis, 2018

CDT-Based Gaussian Sampling: From Multi to Double Precision.
IEEE Trans. Computers, 2018

A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Delegating Elliptic-Curve Operations with Homomorphic Encryption.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography.
Proceedings of the Applied Cryptography and Network Security, 2017


  Loading...