Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Formal Verification of a Post-quantum Signal Protocol with Tamarin

    The Signal protocol is used by billions of people for instant messaging in applications such as Facebook Messenger, Google Messages, Signal, Skype, and WhatsApp. However, advances in quantum computing threaten...

    Hugo Beguinet, Céline Chevalier in Verification and Evaluation of Computer an… (2024)

  2. No Access

    Chapter and Conference Paper

    GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges

    Password Authenticated Key Exchange (PAKE) have become a key building block in many security products as they provide interesting efficiency/security trade-offs. Indeed, a PAKE allows to dispense with the heavy p...

    Hugo Beguinet, Céline Chevalier in Applied Cryptography and Network Security (2023)

  3. No Access

    Chapter and Conference Paper

    Isochronous Gaussian Sampling: From Inception to Implementation

    Gaussian sampling over the integers is a crucial tool in lattice-based cryptography, but has proven over the recent years to be surprisingly challenging to perform in a generic, efficient and provable secure m...

    James Howe, Thomas Prest, Thomas Ricosset, Mélissa Rossi in Post-Quantum Cryptography (2020)

  4. No Access

    Chapter and Conference Paper

    Transciphering, Using FiLIP and TFHE for an Efficient Delegation of Computation

    Improved filter permutators are designed to build stream ciphers that can be efficiently evaluated homomorphically. So far the transciphering with such ciphers has been implemented with homomorphic schemes fro...

    Clément Hoffmann, Pierrick Méaux in Progress in Cryptology – INDOCRYPT 2020 (2020)

  5. No Access

    Chapter and Conference Paper

    A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib

    Fully homomorphic encryption has considerably evolved during the past 10 years. In particular, the discovery of more efficient schemes has brought the computational complexity down to acceptable levels for som...

    Carlos Aguilar Melchor in Innovative Security Solutions for Informat… (2019)

  6. Chapter and Conference Paper

    Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography

    Non-Centered Discrete Gaussian sampling is a fundamental building block in many lattice-based constructions in cryptography, such as signature and identity-based encryption schemes. On the one hand, the center...

    Carlos Aguilar-Melchor, Martin R. Albrecht in Applied Cryptography and Network Security (2017)