Slim Bettaieb

According to our database1, Slim Bettaieb authored at least 20 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PERK: compact signature scheme based on a new variant of the permuted kernel problem.
Des. Codes Cryptogr., August, 2024

Enabling PERK and other MPC-in-the-Head Signatures on Resource-Constrained Devices.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Quasi-Optimal Permutation Ranking and Applications to PERK.
IACR Cryptol. ePrint Arch., 2024

Modelings for generic PoK and Applications: Shorter SD and PKP based Signatures.
IACR Cryptol. ePrint Arch., 2024

Enabling PERK on Resource-Constrained Devices.
IACR Cryptol. ePrint Arch., 2024

2022
A gapless code-based hash proof system based on RQC and its applications.
Des. Codes Cryptogr., 2022

Post-Quantum Oblivious Transfer from Smooth Projective Hash Functions with Grey Zone.
CoRR, 2022

A practicable timing attack against HQC and its countermeasure.
Adv. Math. Commun., 2022

Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey Zone.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

2021
Zero-Knowledge Reparation of the Véron and AGS Code-based Identification Schemes.
Proceedings of the IEEE International Symposium on Information Theory, 2021

The Rank-Based Cryptography Library.
Proceedings of the Code-Based Cryptography - 9th International Workshop, 2021

Secure Decision Forest Evaluation.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2019
A Practicable Timing Attack Against HQC and its Countermeasure.
IACR Cryptol. ePrint Arch., 2019

Preventing Timing Attacks Against RQC Using Constant Time Decoding of Gabidulin Codes.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019

2018
The Learning with Rank Errors problem and an application to symmetric authentication.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

2014
Signature et identification pour l'anonymat basées sur les réseaux. (Lattice-based signature and identification schemes for anonymity).
PhD thesis, 2014

2013
Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting.
IACR Cryptol. ePrint Arch., 2013

Improved Lattice-Based Threshold Ring Signature Scheme.
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013

A Code-Based Undeniable Signature Scheme.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

2011
Improving Additive and Multiplicative Homomorphic Encryption Schemes Based on Worst-Case Hardness Assumptions}.
IACR Cryptol. ePrint Arch., 2011


  Loading...