Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Guillaume Bonnoron"'
Publikováno v:
Progress in Cryptology – AFRICACRYPT 2018 ISBN: 9783319893389
AFRICACRYPT
AFRICACRYPT
The main bottleneck of all known Fully Homomorphic Encryption schemes lies in the bootstrapping procedure invented by Gentry (STOC’09). The cost of this procedure can be mitigated either using Homomorphic SIMD techniques, or by performing larger co
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::90bf4c369638e542f2df4d5332616d99
https://doi.org/10.1007/978-3-319-89339-6_13
https://doi.org/10.1007/978-3-319-89339-6_13
Publikováno v:
IEEE Transactions on Computers
IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2018, ⟨10.1109/TC.2018.2808962⟩
IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2018, ⟨10.1109/TC.2018.2808962⟩
International audience; Post-quantum cryptography gets increasing attention lately, as we have to prepare alternative cryptographic solutions that will resist attacks from quantum computers. A very large effort is being done to replace the usual prim
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f8d592cd1c4d6fd4c898b1fbc773f2ed
https://hal.archives-ouvertes.fr/hal-02128623
https://hal.archives-ouvertes.fr/hal-02128623
Autor:
Caroline Fontaine, Guillaume Bonnoron, Vianney Lapotre, Adeline Roux-Langlois, Vincent Herbert, Vincent Migliore, Guy Gogniat
Publikováno v:
Proceedings C2SI 2017 : 2nd International Conference on Codes, Cryptology and Information Security
C2SI 2017 : 2nd International Conference on Codes, Cryptology and Information Security
C2SI 2017 : 2nd International Conference on Codes, Cryptology and Information Security, Apr 2017, Rabat, Morocco. pp.68-82, ⟨10.1007/978-3-319-55589-8_5⟩
Codes, Cryptology and Information Security ISBN: 9783319555881
C2SI
Guillaume Bonnoron, Caroline Fontaine, Guy Gogniat, Vincent Herbert, Vianney, Lapotre, Vincent Migliore, Adeline Roux-Langlois
C2SI 2017 : 2nd International Conference on Codes, Cryptology and Information Security
C2SI 2017 : 2nd International Conference on Codes, Cryptology and Information Security, Apr 2017, Rabat, Morocco. pp.68-82, ⟨10.1007/978-3-319-55589-8_5⟩
Codes, Cryptology and Information Security ISBN: 9783319555881
C2SI
Guillaume Bonnoron, Caroline Fontaine, Guy Gogniat, Vincent Herbert, Vianney, Lapotre, Vincent Migliore, Adeline Roux-Langlois
International audience; The proposed article aims, for readers, to learn about the existing efforts to secure and implement Somewhat/Fully Homomorphic Encryption (\,(S/F)HE\,) schemes and the problems to be tackled in order to progress toward their a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ba4295cb25c11fb70971d77abcbc4663
https://hal.archives-ouvertes.fr/hal-01596540
https://hal.archives-ouvertes.fr/hal-01596540
Autor:
Caroline Fontaine, Guillaume Bonnoron
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319716664
INDOCRYPT
Proceedings Progress in Cryptology – INDOCRYPT 2017
Progress in Cryptology – INDOCRYPT 2017
Progress in Cryptology – INDOCRYPT 2017, Dec 2017, Chennai, India. pp.27-43, ⟨10.1007/978-3-319-71667-1_2⟩
INDOCRYPT
Proceedings Progress in Cryptology – INDOCRYPT 2017
Progress in Cryptology – INDOCRYPT 2017
Progress in Cryptology – INDOCRYPT 2017, Dec 2017, Chennai, India. pp.27-43, ⟨10.1007/978-3-319-71667-1_2⟩
International audience; Evaluating the practical security of Ring-LWE based cryptography has attracted lots of efforts recently. Indeed, some differences from the standard LWE problem enable new attacks. In this paper we discuss the security of Ring-
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a04b1796a0f253140a809ad0868b5bfe
https://doi.org/10.1007/978-3-319-71667-1_2
https://doi.org/10.1007/978-3-319-71667-1_2