Lattice Signatures and Bimodal Gaussians L Ducas, A Durmus, T Lepoint, V Lyubashevsky CRYPTO 2013, 40-56, 2013 | 486 | 2013 |
Practical Multilinear Maps over the Integers JS Coron, T Lepoint, M Tibouchi CRYPTO 2013, 476-493, 2013 | 429 | 2013 |
Advances and open problems in federated learning P Kairouz, HB McMahan, B Avent, A Bellet, M Bennis, AN Bhagoji, ... arXiv preprint arXiv:1912.04977, 2019 | 378 | 2019 |
Batch fully homomorphic encryption over the integers JH Cheon, JS Coron, J Kim, MS Lee, T Lepoint, M Tibouchi, A Yun EUROCRYPT 2013, 315-335, 2013 | 373 | 2013 |
CRYSTALS--Kyber: a CCA-secure module-lattice-based KEM J Bos, L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, JM Schanck, ... | 268 | 2017 |
A Comparison of the Homomorphic Encryption Schemes FV and YASHE T Lepoint, M Naehrig AFRICACRYPT 2014, 318-335, 2014 | 205 | 2014 |
Scale-invariant fully homomorphic encryption over the integers JS Coron, T Lepoint, M Tibouchi International Workshop on Public Key Cryptography, 311-328, 2014 | 178 | 2014 |
Crystals-dilithium: A lattice-based digital signature scheme L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, P Schwabe, G Seiler, ... IACR Transactions on Cryptographic Hardware and Embedded Systems, 238-268, 2018 | 174* | 2018 |
New multilinear maps over the integers JS Coron, T Lepoint, M Tibouchi CRYPTO 2015, 267-286, 2015 | 164 | 2015 |
Zeroizing without low-level zeroes: New MMAP attacks and their limitations JS Coron, C Gentry, S Halevi, T Lepoint, HK Maji, E Miles, M Raykova, ... CRYPTO 2015, 247-266, 2015 | 160 | 2015 |
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance S Bai, A Langlois, T Lepoint, D Stehlé, R Steinfeld ASIACRYPT 2015, 3-24, 2015 | 125 | 2015 |
Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression A Canteaut, S Carpov, C Fontaine, T Lepoint, M Naya-Plasencia, ... FSE 2016, 2015 | 115* | 2015 |
NFLlib: NTT-based fast lattice library C Aguilar-Melchor, J Barrier, S Guelton, A Guinet, MO Killijian, T Lepoint Cryptographers’ Track at the RSA Conference, 341-356, 2016 | 110 | 2016 |
Cryptanalysis of GGH15 multilinear maps JS Coron, MS Lee, T Lepoint, M Tibouchi PKC 2016, 607-628, 2016 | 94 | 2016 |
Two Attacks on a White-Box AES Implementation T Lepoint, M Rivain, Y De Mulder, P Roelse, B Preneel SAC 2013, 265-285, 2013 | 81 | 2013 |
Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers. JS Coron, T Lepoint, M Tibouchi IACR Cryptol. ePrint Arch. 2014, 975, 2014 | 64 | 2014 |
Zeroizing attacks on indistinguishability obfuscation over CLT13 JS Coron, MS Lee, T Lepoint, M Tibouchi IACR International Workshop on Public Key Cryptography, 41-58, 2017 | 55 | 2017 |
White-Box Security Notions for Symmetric Encryption Schemes C Delerablée, T Lepoint, P Paillier, M Rivain SAC 2013, 247-264, 2013 | 53 | 2013 |
Crystals-dilithium V Lyubashevsky, L Ducas, E Kiltz, T Lepoint, P Schwabe, G Seiler, ... Technical report, National Institute of Standards and Technology, 2017 | 41 | 2017 |
Cryptanalysis of the Quadratic Zero-Testing of GGH. Z Brakerski, C Gentry, S Halevi, T Lepoint, A Sahai, M Tibouchi IACR Cryptol. ePrint Arch. 2015, 845, 2015 | 41 | 2015 |