Search

Your search keyword '"Espitau, Thomas"' showing total 74 results

Search Constraints

Start Over You searched for: Author "Espitau, Thomas" Remove constraint Author: "Espitau, Thomas"
74 results on '"Espitau, Thomas"'

Search Results

3. : Masking-Friendly Hash-and-Sign Lattice Signatures

4. Cryptanalysis of the Peregrine Lattice-Based Signature Scheme

6. On Gaussian Sampling, Smoothing Parameter and Application to Signatures

7. Antrag: Annular NTRU Trapdoor Generation : Making Mitaka as Secure as Falcon

8. Finding Short Integer Solutions When the Modulus Is Small

9. The nearest-colattice algorithm

10. Algebraic and Euclidean Lattices: Optimal Lattice Reduction and Beyond

12. Certified lattice reduction

13. Shorter Hash-and-Sign Lattice-Based Signatures

14. Mitaka: A Simpler, Parallelizable, Maskable Variant of Falcon

15. An Assertion-Based Program Logic for Probabilistic Programs

16. Towards Faster Polynomial-Time Lattice Reduction

17. Proving Expected Sensitivity of Probabilistic Programs

18. Relational $\star$-Liftings for Differential Privacy

19. Proving uniformity and independence by self-composition and coupling

22. On a Dual/Hybrid Approach to Small Secret LWE : A Dual/Enumeration Technique for Learning with Errors and Application to Security Estimates of FHE Schemes

23. Fast Reduction of Algebraic Lattices over Cyclotomic Fields

24. Synthesizing Probabilistic Invariants via Doob's Decomposition

25. Relational reasoning via probabilistic coupling

28. Masking the GLP Lattice-Based Signature Scheme at Any Order

29. LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS

32. Loop-Abort Faults on Lattice-Based Fiat-Shamir and Hash-and-Sign Signatures

33. Computing Generator in Cyclotomic Integer Rings : A Subfield Algorithm for the Principal Ideal Problem in and Application to the Cryptanalysis of a FHE Scheme

34. Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE

43. Relational $\star$-Liftings for Differential Privacy

44. Relational ���-Liftings for Differential Privacy

45. GALACTICS

46. Side-Channel Attacks on BLISS Lattice-Based Signatures

47. Liftings for Differential Privacy

48. A Subfield Algorithm for the Principal Ideal Problem in $$L_{|\varDelta _\mathbb {K}|}\left( \frac{1}{2}\right) $$ and Application to the Cryptanalysis of a FHE Scheme

49. Certified lattice reduction.

Catalog

Books, media, physical & digital resources