François Gérard

According to our database1, François Gérard authored at least 17 papers between 1994 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

TooLIP: How to Find New Instances of FiLIP Cipher with Smaller Key Size and New Filters.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2024, 2024

2023
Improved Gadgets for the High-Order Masking of Dilithium.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

High-order masking of NTRU.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

High-order Polynomial Comparison and Masking Lattice-based Encryption.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

2022
High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Rivain-Prouff on Steroids: Faster and Stronger Masking of the AES.
Proceedings of the Smart Card Research and Advanced Applications, 2022

2021
Mitaka: a simpler, parallelizable, maskable variant of Falcon.
IACR Cryptol. ePrint Arch., 2021

2020
Cortex-M4 optimizations for {R, M} LWE schemes.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

2019
An Efficient and Provable Masked Implementation of qTESLA.
IACR Cryptol. ePrint Arch., 2019

2018
Post-Quantum Signcryption From Lattice-Based Signatures.
IACR Cryptol. ePrint Arch., 2018

Module-lattice KEM Over a Ring of Dimension 128 for Embedded Systems.
IACR Cryptol. ePrint Arch., 2018

Fully Homomorphic Distributed Identity-based Encryption Resilient to Continual Auxiliary Input Leakage.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

SETLA: Signature and Encryption from Lattices.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

2016
Breaking Kalyna 128/128 with Power Attacks.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016

2011
Streaming and synchronization of multi-user worlds through HTTP/1.1.
Proceedings of the 3D Technologies for the World Wide Web, 2011

1994
Retargetable code generation: key issues for successful introduction.
Proceedings of the Code Generation for Embedded Processors [Dagstuhl Workshop, Dagstuhl, Germany, August 31, 1994


  Loading...