A fast private information retrieval protocol CA Melchor, P Gaborit 2008 IEEE International Symposium on Information Theory, 1848-1852, 2008 | 160* | 2008 |
Recent advances in homomorphic encryption: A possible future for signal processing in the encrypted domain C Aguilar-Melchor, S Fau, C Fontaine, G Gogniat, R Sirdey IEEE Signal Processing Magazine 30 (2), 108-117, 2013 | 145 | 2013 |
XPIR: Private information retrieval for everyone C Aguilar-Melchor, J Barrier, L Fousse, MO Killijian Proceedings on Privacy Enhancing Technologies 2016 (2), 155-174, 2016 | 131 | 2016 |
Additively Homomorphic Encryption with d-Operand Multiplications CA Melchor, P Gaborit, J Herranz Annual Cryptology Conference, 138-154, 2010 | 128 | 2010 |
A new efficient threshold ring signature scheme based on coding theory CA Melchor, PL Cayrel, P Gaborit, F Laguillaumie IEEE Transactions on Information Theory 57 (7), 4833-4842, 2011 | 112 | 2011 |
NFLlib: NTT-based fast lattice library C Aguilar-Melchor, J Barrier, S Guelton, A Guinet, MO Killijian, T Lepoint Cryptographers’ Track at the RSA Conference, 341-356, 2016 | 111 | 2016 |
Lattice-based homomorphic encryption of vector spaces CA Melchor, G Castagnos, P Gaborit 2008 IEEE International Symposium on Information Theory, 1858-1862, 2008 | 57 | 2008 |
Efficient encryption from random quasi-cyclic codes C Aguilar-Melchor, O Blazy, JC Deneuville, P Gaborit, G Zémor IEEE Transactions on Information Theory 64 (5), 3927-3943, 2018 | 46 | 2018 |
Towards practical program execution over fully homomorphic encryption schemes S Fau, R Sirdey, C Fontaine, C Aguilar-Melchor, G Gogniat 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and …, 2013 | 44 | 2013 |
Falcon: Fast-Fourier lattice-based compact signatures over NTRU PA Fouque, J Hoffstein, P Kirchner, V Lyubashevsky, T Pornin, T Prest, ... Submission to the NIST’s post-quantum cryptography standardization process 36, 2018 | 39 | 2018 |
High-speed private information retrieval computation on gpu CA Melchor, B Crespin, P Gaborit, V Jolivet, P Rousseau 2008 Second International Conference on Emerging Security Information …, 2008 | 38 | 2008 |
On the Classification of Extremal Binary Self-Dual Codes CA Melchor, P Gaborit IEEE transactions on information theory 54 (10), 4743-4750, 2008 | 36 | 2008 |
BIKE: bit flipping key encapsulation N Aragon, P Barreto, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ... | 35 | 2017 |
Current and future privacy enhancing technologies for the internet Y Deswarte, CA Melchor Annales des télécommunications 61 (3), 399-417, 2006 | 31 | 2006 |
Adapting Lyubashevsky’s signature schemes to the ring signature setting CA Melchor, S Bettaieb, X Boyen, L Fousse, P Gaborit International Conference on Cryptology in Africa, 1-25, 2013 | 29 | 2013 |
Efficient and secure outsourcing of genomic data storage JS Sousa, C Lefebvre, Z Huang, JL Raisaro, C Aguilar-Melchor, ... BMC medical genomics 10 (2), 15-28, 2017 | 26 | 2017 |
Sealing the leak on classical NTRU signatures CA Melchor, X Boyen, JC Deneuville, P Gaborit International Workshop on Post-Quantum Cryptography, 1-21, 2014 | 24 | 2014 |
Active detection of node replication attacks CA Melchor, B Ait-Salem, K Tamine International Journal of Computer Science and Network Security (IJCSNS), 9 …, 2009 | 23 | 2009 |
Rank quasi-cyclic (RQC) CA Melchor, N Aragon, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ... | 21 | 2017 |
A collusion-resistant distributed scalar product protocol with application to privacy-preserving computation of trust CA Melchor, B Ait-Salem, P Gaborit 2009 Eighth IEEE International Symposium on Network Computing and …, 2009 | 20 | 2009 |