Folgen
Carlos Aguilar-Melchor
Carlos Aguilar-Melchor
Chief Scientist, Cybersecurity, SandboxAQ
Bestätigte E-Mail-Adresse bei sandboxquantum.com
Titel
Zitiert von
Zitiert von
Jahr
XPIR: Private information retrieval for everyone
CA Melchor, J Barrier, L Fousse, MO Killijian
Proceedings on Privacy Enhancing Technologies, 155-174, 2016
2152016
A fast private information retrieval protocol
CA Melchor, P Gaborit
2008 IEEE international symposium on information theory, 1848-1852, 2008
182*2008
BIKE: bit flipping key encapsulation
N Aragon, PSLM Barreto, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ...
179*2017
Recent advances in homomorphic encryption: A possible future for signal processing in the encrypted domain
C Aguilar-Melchor, S Fau, C Fontaine, G Gogniat, R Sirdey
IEEE Signal Processing Magazine 30 (2), 108-117, 2013
1742013
NFLlib: NTT-Based Fast Lattice Library
C Aguilar-Melchor, J Barrier, S Guelton, A Guinet, MO Killijian, T Lepoint
Topics in Cryptology-CT-RSA 2016: The Cryptographers' Track at the RSA …, 2016
1562016
Additively Homomorphic Encryption with d-Operand Multiplications
CA Melchor, P Gaborit, J Herranz
Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010
1442010
A new efficient threshold ring signature scheme based on coding theory
CA Melchor, PL Cayrel, P Gaborit, F Laguillaumie
IEEE Transactions on Information Theory 57 (7), 4833-4842, 2011
1342011
Efficient encryption from random quasi-cyclic codes
C Aguilar-Melchor, O Blazy, JC Deneuville, P Gaborit, G Zémor
IEEE Transactions on Information Theory 64 (5), 3927-3943, 2018
124*2018
Hamming quasi-cyclic (HQC)
CA Melchor, N Aragon, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ...
NIST PQC Round 2 (4), 13, 2018
122*2018
A new zero-knowledge code based identification scheme with reduced communication
C Aguilar, P Gaborit, J Schrek
2011 IEEE Information Theory Workshop, 648-652, 2011
862011
Lattice-based homomorphic encryption of vector spaces
CA Melchor, G Castagnos, P Gaborit
2008 IEEE international symposium on information theory, 1858-1862, 2008
752008
Adapting Lyubashevsky’s signature schemes to the ring signature setting
C Aguilar Melchor, S Bettaieb, X Boyen, L Fousse, P Gaborit
Progress in Cryptology–AFRICACRYPT 2013: 6th International Conference on …, 2013
492013
Towards practical program execution over fully homomorphic encryption schemes
S Fau, R Sirdey, C Fontaine, C Aguilar-Melchor, G Gogniat
2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and …, 2013
482013
Efficient and secure outsourcing of genomic data storage
JS Sousa, C Lefebvre, Z Huang, JL Raisaro, C Aguilar-Melchor, ...
BMC medical genomics 10 (2), 15-28, 2017
442017
High-speed private information retrieval computation on gpu
CA Melchor, B Crespin, P Gaborit, V Jolivet, P Rousseau
2008 Second International Conference on Emerging Security Information …, 2008
422008
Rank quasi-cyclic (RQC)
CA Melchor, N Aragon, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ...
382017
On the Classification of Extremal Binary Self-Dual Codes
CA Melchor, P Gaborit
IEEE Transactions on Information Theory 54 (10), 4743-4750, 2008
382008
Current and future privacy enhancing technologies for the internet
Y Deswarte, CA Melchor
Annals of Telecommunications 3 (61), 399-417, 2006
332006
Rollo–rank-ouroboros, lake & locker
CA Melchor, N Aragon, M Bardet, S Bettaieb, L Bidoux, O Blazy, ...
NIST PQC Round 2 (4), 2019
292019
Sealing the leak on classical NTRU signatures
CA Melchor, X Boyen, JC Deneuville, P Gaborit
Post-Quantum Cryptography: 6th International Workshop, PQCrypto 2014 …, 2014
262014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20