BIKE: bit flipping key encapsulation N Aragon, P Barreto, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ... | 296* | 2022 |
XPIR: Private information retrieval for everyone CA Melchor, J Barrier, L Fousse, MO Killijian Proceedings on Privacy Enhancing Technologies, 155-174, 2016 | 283 | 2016 |
Hamming quasi-cyclic (HQC) CA Melchor, N Aragon, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ... NIST PQC Round 2 (4), 13, 2018 | 229* | 2018 |
A fast private information retrieval protocol CA Melchor, P Gaborit 2008 IEEE international symposium on information theory, 1848-1852, 2008 | 193* | 2008 |
Recent advances in homomorphic encryption: A possible future for signal processing in the encrypted domain C Aguilar-Melchor, S Fau, C Fontaine, G Gogniat, R Sirdey IEEE Signal Processing Magazine 30 (2), 108-117, 2013 | 189 | 2013 |
NFLlib: NTT-Based Fast Lattice Library C Aguilar-Melchor, J Barrier, S Guelton, A Guinet, MO Killijian, T Lepoint Cryptographers’ Track at the RSA Conference, 341-356, 2016 | 181 | 2016 |
Efficient encryption from random quasi-cyclic codes C Aguilar-Melchor, O Blazy, JC Deneuville, P Gaborit, G Zémor IEEE Transactions on Information Theory 64 (5), 3927-3943, 2018 | 164* | 2018 |
Additively Homomorphic Encryption with d-Operand Multiplications CA Melchor, P Gaborit, J Herranz Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010 | 158 | 2010 |
A new efficient threshold ring signature scheme based on coding theory CA Melchor, PL Cayrel, P Gaborit, F Laguillaumie IEEE Transactions on Information Theory 57 (7), 4833-4842, 2011 | 152 | 2011 |
A new zero-knowledge code based identification scheme with reduced communication C Aguilar, P Gaborit, J Schrek 2011 IEEE Information Theory Workshop, 648-652, 2011 | 100 | 2011 |
Lattice-based homomorphic encryption of vector spaces CA Melchor, G Castagnos, P Gaborit 2008 IEEE international symposium on information theory, 1858-1862, 2008 | 81 | 2008 |
Rank quasi-cyclic (RQC) CA Melchor, N Aragon, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ... | 63 | 2017 |
Efficient and secure outsourcing of genomic data storage JS Sousa, C Lefebvre, Z Huang, JL Raisaro, C Aguilar-Melchor, ... BMC medical genomics 10, 15-28, 2017 | 57 | 2017 |
The return of the SDitH C Aguilar-Melchor, N Gama, J Howe, A Hülsing, D Joseph, D Yue Annual International Conference on the Theory and Applications of …, 2023 | 55 | 2023 |
Adapting Lyubashevsky’s signature schemes to the ring signature setting C Aguilar Melchor, S Bettaieb, X Boyen, L Fousse, P Gaborit Progress in Cryptology–AFRICACRYPT 2013: 6th International Conference on …, 2013 | 54 | 2013 |
Towards practical program execution over fully homomorphic encryption schemes S Fau, R Sirdey, C Fontaine, C Aguilar-Melchor, G Gogniat 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and …, 2013 | 52 | 2013 |
High-speed private information retrieval computation on gpu CA Melchor, B Crespin, P Gaborit, V Jolivet, P Rousseau 2008 Second International Conference on Emerging Security Information …, 2008 | 47 | 2008 |
Rollo-rank-ouroboros, lake & locker CA Melchor, N Aragon, M Bardet, S Bettaieb, L Bidoux, O Blazy, ... Round-2 submission to the NIST PQC project, 2019 | 43 | 2019 |
On the Classification of Extremal Binary Self-Dual Codes CA Melchor, P Gaborit IEEE Transactions on Information Theory 54 (10), 4743-4750, 2008 | 42 | 2008 |
ROLLO (merger of Rank-Ouroboros, LAKE and LOCKER) N Aragon, O Blazy, JC Deneuville, P Gaborit, A Hauteville, O Ruatta, ... Second round submission to the NIST post-quantum cryptography call, 2019 | 40 | 2019 |