Guilhem Castagnos
According to our database1,
Guilhem Castagnos
authored at least 29 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
2025
0
1
2
3
4
5
1
1
2
3
3
1
1
1
1
1
1
1
1
1
1
1
3
2
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
J. Cryptol., March, 2025
2024
IACR Cryptol. ePrint Arch., 2024
2023
J. Cryptol., July, 2023
Bandwidth-efficient threshold EC-DSA revisited: Online/offline extensions, identifiable aborts proactive and adaptive security.
Theor. Comput. Sci., 2023
2022
A tighter proof for CCA secure inner product functional encryption: Genericity meets efficiency.
Theor. Comput. Sci., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2021
Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts, Proactivity and Adaptive Security.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
2020
2019
IACR Cryptol. ePrint Arch., 2019
Cryptography based on quadratic fields: cryptanalyses, primitives and protocols. (Cryptographie basée sur les corps quadratiques : cryptanalyses, primitives et protocoles).
, 2019
2018
IACR Cryptol. ePrint Arch., 2018
2017
IACR Cryptol. ePrint Arch., 2017
2015
Proceedings of the Topics in Cryptology, 2015
2013
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013
2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
2009
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2009
On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis.
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
2008
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
2007
Finite Fields Their Appl., 2007
Proceedings of the Information Security, 10th International Conference, 2007
Proceedings of the Information Security, 10th International Conference, 2007
2003