New techniques for SPHFs and efficient one-round PAKE protocols F Benhamouda, O Blazy, C Chevalier, D Pointcheval, D Vergnaud Annual Cryptology Conference, 449-475, 2013 | 111 | 2013 |
Better zero-knowledge proofs for lattice encryption and their application to group signatures F Benhamouda, J Camenisch, S Krenn, V Lyubashevsky, G Neven International Conference on the Theory and Application of Cryptology and …, 2014 | 91 | 2014 |
Supporting private data on hyperledger fabric with secure multiparty computation F Benhamouda, S Halevi, T Halevi IBM Journal of Research and Development 63 (2/3), 3: 1-3: 8, 2019 | 68 | 2019 |
Efficient zero-knowledge proofs for commitments from learning with errors over rings F Benhamouda, S Krenn, V Lyubashevsky, K Pietrzak European symposium on research in computer security, 305-325, 2015 | 66 | 2015 |
Disjunctions for hash proof systems: New constructions and applications M Abdalla, F Benhamouda, D Pointcheval Annual International Conference on the Theory and Applications of …, 2015 | 64 | 2015 |
Randomness complexity of private circuits for multiplication S Belaïd, F Benhamouda, A Passelègue, E Prouff, A Thillard, D Vergnaud Annual International Conference on the Theory and Applications of …, 2016 | 62 | 2016 |
Security of the J-PAKE password-authenticated key exchange protocol M Abdalla, F Benhamouda, P MacKenzie 2015 IEEE Symposium on Security and Privacy, 571-587, 2015 | 59 | 2015 |
SPHF-friendly non-interactive commitments M Abdalla, F Benhamouda, O Blazy, C Chevalier, D Pointcheval International Conference on the Theory and Application of Cryptology and …, 2013 | 59 | 2013 |
Public-key encryption indistinguishable under plaintext-checkable attacks M Abdalla, F Benhamouda, D Pointcheval IET Information Security 10 (6), 288-303, 2016 | 58 | 2016 |
A new framework for privacy-preserving aggregation of time-series data F Benhamouda, M Joye, B Libert ACM Transactions on Information and System Security (TISSEC) 18 (3), 1-21, 2016 | 41 | 2016 |
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages F Ben Hamouda, O Blazy, C Chevalier, D Pointcheval, D Vergnaud Public-Key Cryptography–PKC 2013, 272-291, 2013 | 38 | 2013 |
Related-key security for pseudorandom functions beyond the linear barrier M Abdalla, F Benhamouda, A Passelègue, KG Paterson Annual Cryptology Conference, 77-94, 2014 | 35 | 2014 |
Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions. F Benhamouda, D Pointcheval IACR Cryptol. ePrint Arch. 2013, 833, 2013 | 35 | 2013 |
On the local leakage resilience of linear secret sharing schemes F Benhamouda, A Degwekar, Y Ishai, T Rabin Annual International Cryptology Conference, 531-561, 2018 | 25 | 2018 |
Tighter Reductions for Forward-Secure Signature Schemes M Abdalla, F Ben Hamouda, D Pointcheval Public-Key Cryptography–PKC 2013, 292-311, 2013 | 25 | 2013 |
Decentralizing inner-product functional encryption M Abdalla, F Benhamouda, M Kohlweiss, H Waldner IACR International Workshop on Public Key Cryptography, 128-157, 2019 | 24 | 2019 |
Private multiplication over finite fields S Belaïd, F Benhamouda, A Passelègue, E Prouff, A Thillard, D Vergnaud Annual International Cryptology Conference, 397-426, 2017 | 21 | 2017 |
Implicit zero-knowledge arguments and applications to the malicious setting F Benhamouda, G Couteau, D Pointcheval, H Wee Annual Cryptology Conference, 107-129, 2015 | 21 | 2015 |
CCA-secure inner-product functional encryption from projective hash functions F Benhamouda, F Bourse, H Lipmaa IACR International Workshop on Public Key Cryptography, 36-66, 2017 | 20 | 2017 |
Hash proof systems over lattices revisited F Benhamouda, O Blazy, L Ducas, W Quach IACR International Workshop on Public Key Cryptography, 644-674, 2018 | 19 | 2018 |