XPIR: Private information retrieval for everyone C Aguilar-Melchor, J Barrier, L Fousse, MO Killijian
Proceedings on Privacy Enhancing Technologies 2 (2016), 155-174, 2016
177 2016 A fast private information retrieval protocol CA Melchor, P Gaborit
2008 IEEE international symposium on information theory, 1848-1852, 2008
176 * 2008 Recent advances in homomorphic encryption: A possible future for signal processing in the encrypted domain C Aguilar-Melchor, S Fau, C Fontaine, G Gogniat, R Sirdey
IEEE Signal Processing Magazine 30 (2), 108-117, 2013
167 2013 NFLlib: NTT-based fast lattice library C Aguilar-Melchor, J Barrier, S Guelton, A Guinet, MO Killijian, T Lepoint
Cryptographers’ Track at the RSA Conference, 341-356, 2016
142 2016 Additively Homomorphic Encryption with d -Operand Multiplications CA Melchor, P Gaborit, J Herranz
Annual Cryptology Conference, 138-154, 2010
138 2010 BIKE: bit flipping key encapsulation N Aragon, P Barreto, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ...
128 * 2017 A new efficient threshold ring signature scheme based on coding theory CA Melchor, PL Cayrel, P Gaborit, F Laguillaumie
IEEE Transactions on Information Theory 57 (7), 4833-4842, 2011
127 2011 Efficient encryption from random quasi-cyclic codes C Aguilar-Melchor, O Blazy, JC Deneuville, P Gaborit, G Zémor
IEEE Transactions on Information Theory 64 (5), 3927-3943, 2018
101 * 2018 A new zero-knowledge code based identification scheme with reduced communication C Aguilar, P Gaborit, J Schrek
2011 IEEE Information Theory Workshop, 648-652, 2011
69 2011 Lattice-based homomorphic encryption of vector spaces CA Melchor, G Castagnos, P Gaborit
2008 IEEE International Symposium on Information Theory, 1858-1862, 2008
67 2008 Hamming quasi-cyclic (HQC) CA Melchor, N Aragon, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ...
NIST PQC Round 2, 4-13, 2018
65 * 2018 Towards practical program execution over fully homomorphic encryption schemes S Fau, R Sirdey, C Fontaine, C Aguilar-Melchor, G Gogniat
2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and …, 2013
47 2013 High-speed private information retrieval computation on gpu CA Melchor, B Crespin, P Gaborit, V Jolivet, P Rousseau
2008 Second International Conference on Emerging Security Information …, 2008
40 2008 Rank quasi-cyclic (RQC) CA Melchor, N Aragon, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ...
38 2017 Adapting Lyubashevsky’s signature schemes to the ring signature setting C Aguilar Melchor, S Bettaieb, X Boyen, L Fousse, P Gaborit
International Conference on Cryptology in Africa, 1-25, 2013
38 2013 On the Classification of Extremal Binary Self-Dual Codes CA Melchor, P Gaborit
IEEE Transactions on Information Theory 54 (10), 4743-4750, 2008
38 2008 Efficient and secure outsourcing of genomic data storage JS Sousa, C Lefebvre, Z Huang, JL Raisaro, C Aguilar-Melchor, ...
BMC medical genomics 10 (2), 15-28, 2017
37 2017 Current and future privacy enhancing technologies for the internet Y Deswarte, C Aguilar Melchor
Annales des télécommunications 61 (3), 399-417, 2006
31 2006 Sealing the leak on classical NTRU signatures CA Melchor, X Boyen, JC Deneuville, P Gaborit
International Workshop on Post-Quantum Cryptography, 1-21, 2014
25 2014 Rollo–rank-ouroboros, lake & locker CA Melchor, N Aragon, M Bardet, S Bettaieb, L Bidoux, O Blazy, ...
NIST PQC Round 2, 4, 2019
23 2019