Aymen Boudguiga

Orcid: 0000-0001-6717-8848

According to our database1, Aymen Boudguiga authored at least 47 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Secure Attack Detection Framework for Hierarchical 6G-Enabled Internet of Vehicles.
IEEE Trans. Veh. Technol., 2024

Designing a General-Purpose 8-bit (T)FHE Processor Abstraction.
IACR Cryptol. ePrint Arch., 2024

Chocobo: Creating Homomorphic Circuit Operating with Functional Bootstrapping in basis B.
IACR Cryptol. ePrint Arch., 2024

On the practical CPAD security of "exact" and threshold FHE schemes and libraries.
IACR Cryptol. ePrint Arch., 2024

A Decentralized Federated Learning using Reputation.
IACR Cryptol. ePrint Arch., 2024

chiku: Efficient Probabilistic Polynomial Approximations Library.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

FairCognizer: A Model for Accurate Predictions with Inherent Fairness Evaluation.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024

On the Practical CPA<sup>D</sup> Security of "exact" and Threshold FHE Schemes and Libraries.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation.
Cryptogr., September, 2023

At Last! A Homomorphic AES Evaluation in Less than 30 Seconds by Means of TFHE.
IACR Cryptol. ePrint Arch., 2023

Optimized stream-cipher-based transciphering by means of functional-bootstrapping.
IACR Cryptol. ePrint Arch., 2023

A Homomorphic AES Evaluation in Less than 30 Seconds by Means of TFHE.
Proceedings of the 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2023

Lightweight FHE-based Protocols Achieving Results Consistency for Data Encrypted Under Different Keys.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Average Aggregation.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

SigML: Supervised Log Anomaly with Fully Homomorphic Encryption.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

Building Blocks for LSTM Homomorphic Evaluation with TFHE.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

ComBo: A Novel Functional Bootstrapping Method for Efficient Evaluation of Nonlinear Functions in the Encrypted Domain.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2023, 2023

2022
Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Aggregation (preliminary work).
IACR Cryptol. ePrint Arch., 2022

Putting up the swiss army knife of homomorphic calculations by means of TFHE functional bootstrapping.
IACR Cryptol. ePrint Arch., 2022

A Secure Federated Learning: Analysis of Different Cryptographic Tools.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Efficient Hybrid Model for Intrusion Detection Systems.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Cooperative and smart attacks detection systems in 6G-enabled Internet of Things.
Proceedings of the IEEE International Conference on Communications, 2022

2021
Privacy Preserving Services for Intelligent Transportation Systems with Homomorphic Encryption.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Revisiting Stream-Cipher-Based Homomorphic Transciphering in the TFHE Era.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021

2020
Homomorphic Encryption at Work for Private Analysis of Security Logs.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Secure Data Processing for Industrial Remote Diagnosis and Maintenance.
Proceedings of the Risks and Security of Internet and Systems, 2020

2019
An efficient cyber defense framework for UAV-Edge computing network.
Ad Hoc Networks, 2019

Enhancing CAN Security by Means of Lightweight Stream-Ciphers and Protocols.
Proceedings of the Computer Safety, Reliability, and Security, 2019

Privacy-Preserving k-means Clustering: an Application to Driving Style Recognition.
Proceedings of the Network and System Security - 13th International Conference, 2019

2018
Cooperative Security Framework for CBTC Network.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

SARA: Security Automotive Risk Analysis Method.
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018

A generic cyber defense scheme based on stackelberg game for vehicular network.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2017
Towards Better Availability and Accountability for IoT Updates by Means of a Blockchain.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

2016
A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks.
IEEE Trans. Veh. Technol., 2016

A simple intrusion detection method for controller area network.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Light Blind: Why Encrypt If You Can Share?.
Proceedings of the SECRYPT 2015, 2015

RACE: Risk analysis for cooperative engines.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

On the performance of freescale i.MX6 cryptographic acceleration and assurance module.
Proceedings of the 2015 Workshop on Rapid Simulation and Performance Evaluation: Methods and Tools, 2015

2013
Server Assisted Key Establishment for WSN: A MIKEY-Ticket Approach.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Pseudonymous communications in secure industrial wireless sensor networks.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks.
Proceedings of the Self-Organizing Systems - 7th IFIP TC 6 International Workshop, 2013

ID Based Cryptography for Cloud Data Storage.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
An authentication scheme for IEEE 802.11s mesh networks relying on Sakai-Kasahara ID-Based Cryptographic algorithms.
Proceedings of the Third International Conference on Communications and Networking, 2012

2011
Key-escrow resistant ID-based authentication scheme for IEEE 802.11s mesh networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

An EAP ID-based authentication method for wireless networks.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

2010
Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU.
Comput. Secur., 2010

An ID-based authentication scheme for the IEEE 802.11s Mesh Network.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010


  Loading...