What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Mehdi Tibouchi
Google Scholar
80
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/joc
SwiftEC: Shallue-van de Woestijne Indifferentiable Function To Elliptic Curves.
Jorge Chávez-Saab
Francisco Rodríguez-Henríquez
Mehdi Tibouchi
2025
conf/sp
Ringtail: Practical Two-Round Threshold Signatures from Learning with Errors.
Cecilia Boschini
Darya Kaviani
Russell W. F. Lai
Giulio Malavolta
Akira Takahashi
Mehdi Tibouchi
2025
conf/eurocrypt
Do Not Disturb a Sleeping Falcon - Floating-Point Error Sensitivity of the Falcon Sampler and Its Consequences.
Xiuhan Lin
Mehdi Tibouchi
Yang Yu
Shiduo Zhang
2025
conf/crypto
Crowhammer: Full Key Recovery Attack on Falcon with a Single Rowhammer Bit Flip.
Calvin Abou Haidar
Quentin Payet
Mehdi Tibouchi
2024
journals/joc
Masking the GLP Lattice-Based Signature Scheme at Any Order.
Gilles Barthe
Sonia Belaïd
Thomas Espitau
Pierre-Alain Fouque
Benjamin Grégoire
Mélissa Rossi
Mehdi Tibouchi
2024
conf/crypto
CDS Composition of Multi-round Protocols.
Masayuki Abe
Andrej Bogdanov
Miyako Ohkubo
Alon Rosen
Zehua Shang
Mehdi Tibouchi
2024
conf/pkc
Cryptanalysis of the Peregrine Lattice-Based Signature Scheme.
Xiuhan Lin
Moeto Suzuki
Shiduo Zhang
Thomas Espitau
Yang Yu
Mehdi Tibouchi
Masayuki Abe
2024
conf/asiacrypt
Interactive Threshold Mercurial Signatures and Applications.
Masayuki Abe
Masaya Nanri
Octavio Perez-Kempner
Mehdi Tibouchi
2023
journals/tches
Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP.
Vincent Quentin Ulitzsch
Soundes Marzougui
Alexis Bagia
Mehdi Tibouchi
Jean-Pierre Seifert
2023
conf/ccs
Faster Constant-time Evaluation of the Kronecker Symbol with Application to Elliptic Curve Hashing.
Diego F. Aranha
Benjamin Salling Hvass
Bas Spitters
Mehdi Tibouchi
2023
conf/acisp
Quantum-Access Security of Hash-Based Signature Schemes.
Quan Yuan
Mehdi Tibouchi
Masayuki Abe
2023
conf/asiacrypt
Antrag: Annular NTRU Trapdoor Generation - Making Mitaka as Secure as Falcon.
Thomas Espitau
Thi Thu Quyen Nguyen
Chao Sun
Mehdi Tibouchi
Alexandre Wallet
2022
journals/tches
Guessing Bits: Improved Lattice Attacks on (EC)DSA with Nonce Leakage.
Chao Sun
Thomas Espitau
Mehdi Tibouchi
Masayuki Abe
2022
journals/joc
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices.
Ivan Damgård
Claudio Orlandi
Akira Takahashi
Mehdi Tibouchi
2022
conf/crypto
Shorter Hash-and-Sign Lattice-Based Signatures.
Thomas Espitau
Mehdi Tibouchi
Alexandre Wallet
Yang Yu
2022
conf/crypto
MuSig-L: Lattice-Based Multi-signature with Single-Round Online Phase.
Cecilia Boschini
Akira Takahashi
Mehdi Tibouchi
2022
conf/eurocrypt
Mitaka: A Simpler, Parallelizable, Maskable Variant of Falcon.
Thomas Espitau
Pierre-Alain Fouque
François Gérard
Mélissa Rossi
Akira Takahashi
Mehdi Tibouchi
Alexandre Wallet
Yang Yu
2022
conf/asiacrypt
SwiftEC: Shallue-van de Woestijne Indifferentiable Function to Elliptic Curves - Faster Indifferentiable Hashing to Elliptic Curves.
Jorge Chávez-Saab
Francisco Rodríguez-Henríquez
Mehdi Tibouchi
2022
conf/sacrypt
Profiling Side-Channel Attacks on Dilithium - A Small Bit-Fiddling Leak Breaks It All.
Vincent Quentin Ulitzsch
Soundes Marzougui
Mehdi Tibouchi
Jean-Pierre Seifert
2021
conf/pkc
Two-Round n-out-of-n and Multi-signatures and Trapdoor Commitment from Lattices.
Ivan Damgård
Claudio Orlandi
Akira Takahashi
Mehdi Tibouchi
2021
conf/sacrypt
Verifiable Isogeny Walks: Towards an Isogeny-Based Postquantum VDF.
Jorge Chávez-Saab
Francisco Rodríguez-Henríquez
Mehdi Tibouchi
2020
conf/ccs
LadderLeak: Breaking ECDSA with Less than One Bit of Nonce Leakage.
Diego F. Aranha
Felipe Rodrigues Novaes
Akira Takahashi
Mehdi Tibouchi
Yuval Yarom
2020
conf/acisp
Revisiting the Hardness of Binary Error LWE.
Chao Sun
Mehdi Tibouchi
Masayuki Abe
2020
conf/esorics
SHECS-PIR: Somewhat Homomorphic Encryption-Based Compact and Scalable Private Information Retrieval.
Jeongeun Park
Mehdi Tibouchi
2020
conf/eurocrypt
Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices.
Pierre-Alain Fouque
Paul Kirchner
Mehdi Tibouchi
Alexandre Wallet
Yang Yu
2019
journals/joc
Efficient Fully Structure-Preserving Signatures and Shrinking Commitments.
Masayuki Abe
Jens Groth
Markulf Kohlweiss
Miyako Ohkubo
Mehdi Tibouchi
2019
conf/ccs
GALACTICS: Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited.
Gilles Barthe
Sonia Belaïd
Thomas Espitau
Pierre-Alain Fouque
Mélissa Rossi
Mehdi Tibouchi
2019
conf/acns
Masking Dilithium - Efficient Implementation and Side-Channel Evaluation.
Vincent Migliore
Benoît Gérard
Mehdi Tibouchi
Pierre-Alain Fouque
2019
conf/eurosp
Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL.
Akira Takahashi
Mehdi Tibouchi
2019
conf/provsec
A Coin-Free Oracle-Based Augmented Black Box Framework.
Kyosuke Yamashita
Mehdi Tibouchi
Masayuki Abe
2018
journals/tches
New Bleichenbacher Records: Fault Attacks on qDSA Signatures.
Akira Takahashi
Mehdi Tibouchi
Masayuki Abe
2018
conf/ctrsa
Cryptanalysis of Compact-LWE.
Jonathan Bootle
Mehdi Tibouchi
Keita Xagawa
2018
conf/iwsec
Universal Witness Signatures.
Chen Qian
Mehdi Tibouchi
Rémi Géraud
2018
conf/eurocrypt
Masking the GLP Lattice-Based Signature Scheme at Any Order.
Gilles Barthe
Sonia Belaïd
Thomas Espitau
Pierre-Alain Fouque
Benjamin Grégoire
Mélissa Rossi
Mehdi Tibouchi
2018
conf/asiacrypt
LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS.
Jonathan Bootle
Claire Delaplace
Thomas Espitau
Pierre-Alain Fouque
Mehdi Tibouchi
2017
conf/ccs
Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers.
Thomas Espitau
Pierre-Alain Fouque
Benoît Gérard
Mehdi Tibouchi
2017
conf/acisp
Secure GLS Recomposition for Sum-of-Square Cofactors.
Eunkyung Kim
Mehdi Tibouchi
2017
conf/pkc
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13.
Jean-Sébastien Coron
Moon Sung Lee
Tancrède Lepoint
Mehdi Tibouchi
2016
journals/joc
Practical Cryptanalysis of ISO 9796-2 and EMV Signatures.
Jean-Sébastien Coron
David Naccache
Mehdi Tibouchi
Ralf-Philipp Weinmann
2016
journals/joc
Tightly Secure Signatures From Lossy Identification Schemes.
Michel Abdalla
Pierre-Alain Fouque
Vadim Lyubashevsky
Mehdi Tibouchi
2016
conf/crypto
Cryptanalysis of GGH15 Multilinear Maps.
Jean-Sébastien Coron
Moon Sung Lee
Tancrède Lepoint
Mehdi Tibouchi
2016
conf/pkc
Degenerate Curve Attacks - Extending Invalid Curve Attacks to Edwards Curves and Other Models.
Samuel Neves
Mehdi Tibouchi
2016
conf/ctrsa
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones.
Pierre Belgarric
Pierre-Alain Fouque
Gilles Macario-Rat
Mehdi Tibouchi
2016
conf/sacrypt
Loop-Abort Faults on Lattice-Based Fiat-Shamir and Hash-and-Sign Signatures.
Thomas Espitau
Pierre-Alain Fouque
Benoît Gérard
Mehdi Tibouchi
2016
conf/cans
FHE Over the Integers and Modular Arithmetic Circuits.
Eunkyung Kim
Mehdi Tibouchi
2015
conf/fse
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity.
Jean-Sébastien Coron
Johann Großschädl
Mehdi Tibouchi
Praveen Kumar Vadnala
2015
conf/crypto
New Multilinear Maps Over the Integers.
Jean-Sébastien Coron
Tancrède Lepoint
Mehdi Tibouchi
2015
conf/crypto
Cryptanalysis of the Co-ACD Assumption.
Pierre-Alain Fouque
Moon Sung Lee
Tancrède Lepoint
Mehdi Tibouchi
2015
conf/crypto
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations.
Jean-Sébastien Coron
Craig Gentry
Shai Halevi
Tancrède Lepoint
Hemanta K. Maji
Eric Miles
Mariana Raykova
Amit Sahai
Mehdi Tibouchi
2015
conf/fc
Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR.
Tancrède Lepoint
Mehdi Tibouchi
2015
conf/pkc
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds.
Gilles Barthe
Edvard Fagerholm
Dario Fiore
Andre Scedrov
Benedikt Schmidt
Mehdi Tibouchi
2015
conf/iwsec
Invalid Curve Attacks in a GLS Setting.
Taechan Kim
Mehdi Tibouchi
2015
conf/eurocrypt
Fully Structure-Preserving Signatures and Shrinking Commitments.
Masayuki Abe
Markulf Kohlweiss
Miyako Ohkubo
Mehdi Tibouchi
2014
conf/crypto
Structure-Preserving Signatures from Type II Pairings.
Masayuki Abe
Jens Groth
Miyako Ohkubo
Mehdi Tibouchi
2014
conf/fc
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings.
Mehdi Tibouchi
2014
conf/acns
Bit-Flip Faults on Elliptic Curve Base Fields, Revisited.
Taechan Kim
Mehdi Tibouchi
2014
conf/provsec
Impossibility of Surjective Icart-Like Encodings.
Mehdi Tibouchi
2014
conf/ches
Making RSA-PSS Provably Secure against Non-random Faults.
Gilles Barthe
François Dupressoir
Pierre-Alain Fouque
Benjamin Grégoire
Mehdi Tibouchi
Jean-Christophe Zapalowicz
2014
conf/pkc
Scale-Invariant Fully Homomorphic Encryption over the Integers.
Jean-Sébastien Coron
Tancrède Lepoint
Mehdi Tibouchi
2014
conf/asiacrypt
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias.
Diego F. Aranha
Pierre-Alain Fouque
Benoît Gérard
Jean-Gabriel Kammerer
Mehdi Tibouchi
Jean-Christophe Zapalowicz
2014
conf/sacrypt
Binary Elligator Squared.
Diego F. Aranha
Pierre-Alain Fouque
Chen Qian
Mehdi Tibouchi
Jean-Christophe Zapalowicz
2014
conf/tcc
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures.
Masayuki Abe
Jens Groth
Miyako Ohkubo
Mehdi Tibouchi
2013
journals/joc
A Note on the Bivariate Coppersmith Theorem.
Jean-Sébastien Coron
Alexey Kirichenko
Mehdi Tibouchi
2013
conf/acisp
Injective Encodings to Elliptic Curves.
Pierre-Alain Fouque
Antoine Joux
Mehdi Tibouchi
2013
conf/crypto
Practical Multilinear Maps over the Integers.
Jean-Sébastien Coron
Tancrède Lepoint
Mehdi Tibouchi
2013
conf/eurocrypt
Batch Fully Homomorphic Encryption over the Integers.
Jung Hee Cheon
Jean-Sébastien Coron
Jinsu Kim
Moon Sung Lee
Tancrède Lepoint
Mehdi Tibouchi
Aaram Yun
2012
conf/latincrypt
Indifferentiable Hashing to Barreto-Naehrig Curves.
Pierre-Alain Fouque
Mehdi Tibouchi
2012
conf/icisc
Another Look at Affine-Padding RSA Signatures.
Jean-Sébastien Coron
David Naccache
Mehdi Tibouchi
2012
conf/ches
Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication.
Pierre-Alain Fouque
Nicolas Guillermin
Delphine Leresteux
Mehdi Tibouchi
Jean-Christophe Zapalowicz
2012
conf/eurocrypt
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers.
Jean-Sébastien Coron
David Naccache
Mehdi Tibouchi
2012
conf/eurocrypt
Tightly-Secure Signatures from Lossy Identification Schemes.
Michel Abdalla
Pierre-Alain Fouque
Vadim Lyubashevsky
Mehdi Tibouchi
2011
conf/crypto
Fully Homomorphic Encryption over the Integers with Shorter Public Keys.
Jean-Sébastien Coron
Avradip Mandal
David Naccache
Mehdi Tibouchi
2011
conf/ches
Modulus Fault Attacks against RSA-CRT Signatures.
Eric Brier
David Naccache
Phong Q. Nguyen
Mehdi Tibouchi
2011
conf/pkc
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005.
Jean-Sébastien Coron
Antoine Joux
Avradip Mandal
David Naccache
Mehdi Tibouchi
2010
conf/latincrypt
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves.
Pierre-Alain Fouque
Mehdi Tibouchi
2010
conf/crypto
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves.
Eric Brier
Jean-Sébastien Coron
Thomas Icart
David Madore
Hugues Randriam
Mehdi Tibouchi
2010
conf/acns
On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption.
Aurélie Bauer
Jean-Sébastien Coron
David Naccache
Mehdi Tibouchi
Damien Vergnaud
2010
conf/ctrsa
Fault Attacks Against emv Signatures.
Jean-Sébastien Coron
David Naccache
Mehdi Tibouchi
2009
conf/crypto
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures.
Jean-Sébastien Coron
David Naccache
Mehdi Tibouchi
Ralf-Philipp Weinmann
2009
conf/icisc
Factoring Unbalanced Moduli with Known Bits.
Eric Brier
David Naccache
Mehdi Tibouchi
Coauthors
Aaram Yun
(1)
Akira Takahashi
(8)
Alexandre Wallet
(4)
Alexey Kirichenko
(1)
Alexis Bagia
(1)
Alon Rosen
(1)
Amit Sahai
(1)
Andre Scedrov
(1)
Andrej Bogdanov
(1)
Antoine Joux
(2)
Aurélie Bauer
(1)
Avradip Mandal
(2)
Bas Spitters
(1)
Benedikt Schmidt
(1)
Benjamin Grégoire
(3)
Benjamin Salling Hvass
(1)
Benoît Gérard
(4)
Calvin Abou Haidar
(1)
Cecilia Boschini
(2)
Chao Sun
(3)
Chen Qian
(2)
Claire Delaplace
(1)
Claudio Orlandi
(2)
Craig Gentry
(1)
Damien Vergnaud
(1)
Dario Fiore
(1)
Darya Kaviani
(1)
David Madore
(1)
David Naccache
(10)
Delphine Leresteux
(1)
Diego F. Aranha
(4)
Edvard Fagerholm
(1)
Eric Brier
(3)
Eric Miles
(1)
Eunkyung Kim
(2)
Felipe Rodrigues Novaes
(1)
Francisco Rodríguez-Henríquez
(3)
François Dupressoir
(1)
François Gérard
(1)
Gilles Barthe
(5)
Gilles Macario-Rat
(1)
Giulio Malavolta
(1)
Hemanta K. Maji
(1)
Hugues Randriam
(1)
Ivan Damgård
(2)
Jean-Christophe Zapalowicz
(4)
Jean-Gabriel Kammerer
(1)
Jean-Pierre Seifert
(2)
Jean-Sébastien Coron
(18)
Jens Groth
(3)
Jeongeun Park
(1)
Jinsu Kim
(1)
Johann Großschädl
(1)
Jonathan Bootle
(2)
Jorge Chávez-Saab
(3)
Jung Hee Cheon
(1)
Keita Xagawa
(1)
Kyosuke Yamashita
(1)
Mariana Raykova
(1)
Markulf Kohlweiss
(2)
Masaya Nanri
(1)
Masayuki Abe
(12)
Mehdi Tibouchi
(80)
Mélissa Rossi
(4)
Michel Abdalla
(2)
Miyako Ohkubo
(5)
Moeto Suzuki
(1)
Moon Sung Lee
(4)
Nicolas Guillermin
(1)
Octavio Perez-Kempner
(1)
Paul Kirchner
(1)
Phong Q. Nguyen
(1)
Pierre Belgarric
(1)
Pierre-Alain Fouque
(20)
Praveen Kumar Vadnala
(1)
Quan Yuan
(1)
Quentin Payet
(1)
Ralf-Philipp Weinmann
(2)
Rémi Géraud
(1)
Russell W. F. Lai
(1)
Samuel Neves
(1)
Shai Halevi
(1)
Shiduo Zhang
(2)
Sonia Belaïd
(3)
Soundes Marzougui
(2)
Taechan Kim
(2)
Tancrède Lepoint
(9)
Thi Thu Quyen Nguyen
(1)
Thomas Espitau
(11)
Thomas Icart
(1)
Vadim Lyubashevsky
(2)
Vincent Migliore
(1)
Vincent Quentin Ulitzsch
(2)
Xiuhan Lin
(2)
Yang Yu
(5)
Yuval Yarom
(1)
Zehua Shang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to