BIKE: bit flipping key encapsulation N Aragon, P Barreto, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ... | 353* | 2022 |
Hamming quasi-cyclic (HQC) CA Melchor, N Aragon, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ... NIST PQC Round 2 (4), 13, 2018 | 251* | 2018 |
ROLLO (merger of Rank-Ouroboros, LAKE and LOCKER) N Aragon, O Blazy, JC Deneuville, P Gaborit, A Hauteville, O Ruatta, ... Second round submission to the NIST post-quantum cryptography call, 2019 | 116* | 2019 |
Rank quasi-cyclic (RQC) CA Melchor, N Aragon, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ... | 98* | 2017 |
Adapting Lyubashevsky’s signature schemes to the ring signature setting C Aguilar Melchor, S Bettaieb, X Boyen, L Fousse, P Gaborit Progress in Cryptology–AFRICACRYPT 2013: 6th International Conference on …, 2013 | 54 | 2013 |
A practicable timing attack against HQC and its countermeasure G Wafo-Tapa, S Bettaieb, L Bidoux, P Gaborit, E Marcatel Cryptology ePrint Archive, 2019 | 39 | 2019 |
Improved lattice-based threshold ring signature scheme S Bettaieb, J Schrek Post-Quantum Cryptography: 5th International Workshop, PQCrypto 2013 …, 2013 | 36 | 2013 |
A code-based undeniable signature scheme C Aguilar-Melchor, S Bettaieb, P Gaborit, J Schrek Cryptography and Coding: 14th IMA International Conference, IMACC 2013 …, 2013 | 25 | 2013 |
Ouroboros-r CA Melchor, N Aragon, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ... NIST Submission, 2017 | 21* | 2017 |
PERK N Aaraj, S Bettaieb, L Bidoux, A Budroni, V Dyseryn, A Esser, P Gaborit, ... | 15 | 2023 |
Preventing timing attacks against RQC using constant time decoding of Gabidulin codes S Bettaieb, L Bidoux, P Gaborit, E Marcatel Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019 …, 2019 | 14 | 2019 |
Zero-knowledge reparation of the Véron and AGS code-based identification schemes S Bettaieb, L Bidoux, O Blazy, P Gaborit 2021 IEEE International Symposium on Information Theory (ISIT), 55-60, 2021 | 11 | 2021 |
Improving additive and multiplicative homomorphic encryption schemes based on worst-case hardness assumptions CA Melchor, S Bettaieb, P Gaborit, J Herranz Cryptology ePrint Archive, 2011 | 8 | 2011 |
A gapless code-based hash proof system based on RQC and its applications S Bettaieb, L Bidoux, O Blazy, Y Connan, P Gaborit Designs, Codes and Cryptography 90 (12), 3011-3044, 2022 | 7 | 2022 |
The rank-based cryptography library N Aragon, S Bettaieb, L Bidoux, Y Connan, J Coulaud, P Gaborit, ... Code-Based Cryptography Workshop, 22-41, 2021 | 6 | 2021 |
The Learning with Rank Errors problem and an application to symmetric authentication S Bettaieb, L Bidoux, Y Connan, P Gaborit, A Hauteville 2018 IEEE International Symposium on Information Theory (ISIT), 2629-2633, 2018 | 5 | 2018 |
Post-Quantum and UC-secure Oblivious Transfer from SPHF with Grey Zone S Bettaieb, L Bidoux, O Blazy, B Cottier, D Pointcheval International Symposium on Foundations and Practice of Security, 54-70, 2022 | 4* | 2022 |
PERK: compact signature scheme based on a new variant of the permuted kernel problem S Bettaieb, L Bidoux, V Dyseryn, A Esser, P Gaborit, M Kulkarni, ... Designs, Codes and Cryptography, 1-27, 2024 | 3 | 2024 |
Enabling PERK and other MPC-in-the-Head Signatures on Resource-Constrained Devices S Bettaieb, L Bidoux, A Budroni, M Palumbi, LP Perin IACR Transactions on Cryptographic Hardware and Embedded Systems 2024 (4 …, 2024 | 1 | 2024 |
Enabling perk on resource-constrained devices S Bettaieb, L Bidoux, A Budroni, M Palumbi, LP Perin Cryptology ePrint Archive, 2024 | 1 | 2024 |