Follow
Slim Bettaieb
Slim Bettaieb
Technology Innovation Institute (TII)
Verified email at tii.ae
Title
Cited by
Cited by
Year
BIKE: bit flipping key encapsulation
N Aragon, P Barreto, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ...
353*2022
Hamming quasi-cyclic (HQC)
CA Melchor, N Aragon, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ...
NIST PQC Round 2 (4), 13, 2018
251*2018
ROLLO (merger of Rank-Ouroboros, LAKE and LOCKER)
N Aragon, O Blazy, JC Deneuville, P Gaborit, A Hauteville, O Ruatta, ...
Second round submission to the NIST post-quantum cryptography call, 2019
116*2019
Rank quasi-cyclic (RQC)
CA Melchor, N Aragon, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ...
98*2017
Adapting Lyubashevsky’s signature schemes to the ring signature setting
C Aguilar Melchor, S Bettaieb, X Boyen, L Fousse, P Gaborit
Progress in Cryptology–AFRICACRYPT 2013: 6th International Conference on …, 2013
542013
A practicable timing attack against HQC and its countermeasure
G Wafo-Tapa, S Bettaieb, L Bidoux, P Gaborit, E Marcatel
Cryptology ePrint Archive, 2019
392019
Improved lattice-based threshold ring signature scheme
S Bettaieb, J Schrek
Post-Quantum Cryptography: 5th International Workshop, PQCrypto 2013 …, 2013
362013
A code-based undeniable signature scheme
C Aguilar-Melchor, S Bettaieb, P Gaborit, J Schrek
Cryptography and Coding: 14th IMA International Conference, IMACC 2013 …, 2013
252013
Ouroboros-r
CA Melchor, N Aragon, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ...
NIST Submission, 2017
21*2017
PERK
N Aaraj, S Bettaieb, L Bidoux, A Budroni, V Dyseryn, A Esser, P Gaborit, ...
152023
Preventing timing attacks against RQC using constant time decoding of Gabidulin codes
S Bettaieb, L Bidoux, P Gaborit, E Marcatel
Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019 …, 2019
142019
Zero-knowledge reparation of the Véron and AGS code-based identification schemes
S Bettaieb, L Bidoux, O Blazy, P Gaborit
2021 IEEE International Symposium on Information Theory (ISIT), 55-60, 2021
112021
Improving additive and multiplicative homomorphic encryption schemes based on worst-case hardness assumptions
CA Melchor, S Bettaieb, P Gaborit, J Herranz
Cryptology ePrint Archive, 2011
82011
A gapless code-based hash proof system based on RQC and its applications
S Bettaieb, L Bidoux, O Blazy, Y Connan, P Gaborit
Designs, Codes and Cryptography 90 (12), 3011-3044, 2022
72022
The rank-based cryptography library
N Aragon, S Bettaieb, L Bidoux, Y Connan, J Coulaud, P Gaborit, ...
Code-Based Cryptography Workshop, 22-41, 2021
62021
The Learning with Rank Errors problem and an application to symmetric authentication
S Bettaieb, L Bidoux, Y Connan, P Gaborit, A Hauteville
2018 IEEE International Symposium on Information Theory (ISIT), 2629-2633, 2018
52018
Post-Quantum and UC-secure Oblivious Transfer from SPHF with Grey Zone
S Bettaieb, L Bidoux, O Blazy, B Cottier, D Pointcheval
International Symposium on Foundations and Practice of Security, 54-70, 2022
4*2022
PERK: compact signature scheme based on a new variant of the permuted kernel problem
S Bettaieb, L Bidoux, V Dyseryn, A Esser, P Gaborit, M Kulkarni, ...
Designs, Codes and Cryptography, 1-27, 2024
32024
Enabling PERK and other MPC-in-the-Head Signatures on Resource-Constrained Devices
S Bettaieb, L Bidoux, A Budroni, M Palumbi, LP Perin
IACR Transactions on Cryptographic Hardware and Embedded Systems 2024 (4 …, 2024
12024
Enabling perk on resource-constrained devices
S Bettaieb, L Bidoux, A Budroni, M Palumbi, LP Perin
Cryptology ePrint Archive, 2024
12024
The system can't perform the operation now. Try again later.
Articles 1–20