Follow
Guilhem Castagnos
Guilhem Castagnos
Verified email at math.u-bordeaux.fr - Homepage
Title
Cited by
Cited by
Year
Linearly homomorphic encryption from
G Castagnos, F Laguillaumie
Cryptographers’ Track at the RSA Conference, 487-505, 2015
1302015
Bandwidth-efficient threshold EC-DSA
G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker
IACR International Conference on Public-Key Cryptography, 266-296, 2020
1052020
Two-party ECDSA from hash proof systems and efficient instantiations
G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
942019
Lattice-based homomorphic encryption of vector spaces
CA Melchor, G Castagnos, P Gaborit
2008 IEEE international symposium on information theory, 1858-1862, 2008
812008
Practical Fully Secure Unrestricted Inner Product Functional Encryption Modulo p
G Castagnos, F Laguillaumie, I Tucker
International Conference on the Theory and Application of Cryptology and …, 2018
712018
Fault analysis of GRAIN-128
A Berzati, C Canovas, G Castagnos, B Debraize, L Goubin, A Gouget, ...
2009 IEEE International Workshop on Hardware-Oriented Security and Trust, 7-14, 2009
572009
An efficient probabilistic public-key cryptosystem over quadratic fields quotients
G Castagnos
Finite Fields and Their Applications 13 (3), 563-576, 2007
522007
Efficient CCA timed commitments in class groups
SAK Thyagarajan, G Castagnos, F Laguillaumie, G Malavolta
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
362021
What do DES S-boxes Say to Each Other?
NT Courtois, G Castagnos, L Goubin
Cryptology ePrint Archive, 2003
352003
Encryption Switching Protocols Revisited: Switching Modulo p
G Castagnos, L Imbert, F Laguillaumie
Annual International Cryptology Conference, 255-287, 2017
292017
Bandwidth-efficient threshold EC-DSA revisited: Online/offline extensions, identifiable aborts proactive and adaptive security
G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker
Theoretical Computer Science 939, 78-104, 2023
262023
On the security of cryptosystems with quadratic decryption: the nicest cryptanalysis
G Castagnos, F Laguillaumie
Annual International Conference on the Theory and Applications of …, 2009
252009
Factoring pq2 with Quadratic Forms: Nice Cryptanalyses
G Castagnos, A Joux, F Laguillaumie, PQ Nguyen
International Conference on the Theory and Application of Cryptology and …, 2009
212009
High-order masking by using coding theory and its application to AES
G Castagnos, S Renner, G Zémor
Cryptography and Coding: 14th IMA International Conference, IMACC 2013 …, 2013
172013
Threshold Linearly Homomorphic Encryption on 
G Castagnos, F Laguillaumie, I Tucker
International Conference on the Theory and Application of Cryptology and …, 2022
152022
Towards a DL-based additively homomorphic encryption scheme
G Castagnos, B Chevallier-Mames
International Conference on Information Security, 362-375, 2007
142007
I Want to Ride My BICYCL : BICYCL Implements CryptographY in CLass Groups
C Bouvier, G Castagnos, L Imbert, F Laguillaumie
Journal of Cryptology 36 (3), 17, 2023
102023
Fault Analysis of Grain-128.
G Castagnos, A Berzati, C Canovas, B Debraize, L Goubin, A Gouget, ...
HOST, 7-14, 2009
102009
Public key encryption with flexible pattern matching
E Bouscatié, G Castagnos, O Sanders
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
92021
Trapdoor Permutation Polynomials of ℤ/nℤ and Public Key Cryptosystems:
G Castagnos, D Vergnaud
Information Security: 10th International Conference, ISC 2007, Valparaíso …, 2007
82007
The system can't perform the operation now. Try again later.
Articles 1–20