Nicolas Gama

Orcid: 0000-0001-7308-9171

According to our database1, Nicolas Gama authored at least 42 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic.
J. Cryptol., July, 2023

Falkor: Federated Learning Secure Aggregation Powered by AES-CTR GPU Implementation.
IACR Cryptol. ePrint Arch., 2023

Revisiting Key Decomposition Techniques for FHE: Simpler, Faster and More Generic.
IACR Cryptol. ePrint Arch., 2023

An erf Analog for Discrete Gaussian Sampling.
IACR Cryptol. ePrint Arch., 2023

To attest or not to attest, this is the question - Provable attestation in FIDO2.
IACR Cryptol. ePrint Arch., 2023

On finding dense sub-lattices as low energy states of a quantum Hamiltonian.
CoRR, 2023

Falkor: Federated Learning Secure Aggregation Powered by AESCTR GPU Implementation.
Proceedings of the 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2023

2022
XORBoost: Tree Boosting in the Multiparty Computation Setting.
Proc. Priv. Enhancing Technol., 2022

The Return of the SDitH.
IACR Cryptol. ePrint Arch., 2022

2021
GenoPPML - a framework for genomic privacy-preserving machine learning.
IACR Cryptol. ePrint Arch., 2021

Manticore: Efficient Framework for Scalable Secure Multiparty Computation Protocols.
IACR Cryptol. ePrint Arch., 2021

2020
TFHE: Fast Fully Homomorphic Encryption Over the Torus.
J. Cryptol., 2020

CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes.
J. Math. Cryptol., 2020

Multiquadratic Rings and Walsh-Hadamard Transforms for Oblivious Linear Function Evaluation.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

2019
Revisiting Multivariate Ring Learning with Errors and its Applications on Lattice-based Cryptography.
IACR Cryptol. ePrint Arch., 2019

Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2019

Simulating Homomorphic Evaluation of Deep Learning Predictions.
IACR Cryptol. ePrint Arch., 2019

2018
Chimera: a unified framework for B/FV, TFHE and HEAAN fully homomorphic encryption and predictions for deep learning.
IACR Cryptol. ePrint Arch., 2018

Building Applications with Homomorphic Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Improving TFHE: faster packed homomorphic operations and efficient circuit bootstrapping.
IACR Cryptol. ePrint Arch., 2017

High-Precision Privacy-Preserving Real-Valued Function Evaluation.
IACR Cryptol. ePrint Arch., 2017

Faster Packed Homomorphic Operations and Efficient Circuit Bootstrapping for TFHE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Faster Fully Homomorphic Encryption: Bootstrapping in less than 0.1 Seconds.
IACR Cryptol. ePrint Arch., 2016

Attacking FHE-based applications by software fault injections.
IACR Cryptol. ePrint Arch., 2016

A Homomorphic LWE Based E-voting Scheme.
Proceedings of the Post-Quantum Cryptography - 7th International Workshop, 2016

Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

2015
Speeding-up lattice sieving without increasing the memory, using sub-quadratic nearest neighbor search.
IACR Cryptol. ePrint Arch., 2015

New directions in nearest neighbor searching with applications to lattice sieving.
IACR Cryptol. ePrint Arch., 2015

2014
A sieve algorithm based on overlattices.
LMS J. Comput. Math., 2014

Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions.
IACR Cryptol. ePrint Arch., 2014

2013
Solving shortest and closest vector problems: The decomposition approach.
IACR Cryptol. ePrint Arch., 2013

2012
Efficient Multiplication over Extension Fields.
Proceedings of the Arithmetic of Finite Fields - 4th International Workshop, 2012

2010
Lattice Enumeration Using Extreme Pruning.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

The Degree of Regularity of HFE Systems.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

Smallest Reduction Matrix of Binary Quadratic Forms.
Proceedings of the Algorithmic Number Theory, 9th International Symposium, 2010

2009
Compact Normal Form for Regular Languages as Xor Automata.
Proceedings of the Implementation and Application of Automata, 2009

2008
Finding short lattice vectors within mordell's inequality.
Proceedings of the 40th Annual ACM Symposium on Theory of Computing, 2008

Predicting Lattice Reduction.
Proceedings of the Advances in Cryptology, 2008

2007
New Chosen-Ciphertext Attacks on NTRU.
Proceedings of the Public Key Cryptography, 2007

2006
Symplectic Lattice Reduction and NTRU.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

Rankin's Constant and Blockwise Lattice Reduction.
Proceedings of the Advances in Cryptology, 2006

2004
A Parallel Object-Oriented Application for 3D Electromagnetism.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004


  Loading...