ht plow yriented rrdE wre hesign of xEsed olynomil wultiplition for ri eelertion, IACR Transactions on Cryptographic Hardware and Embedded Systems, pp.69-88, 2018. ,
, en enlysis of p rmeters smpt owrds sts rrdwre eelertion. 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, vol.10323, pp.91-106, 2017.
giruit de génértion de fteurs de rottion pour proesseur x ,
, Presentation: ht plow yriented rrdwre hesign of xEsed olynomil wultiplition for ri eelertion, Communications Conference on Cryptographic Hardware and Embedded Systems (CHES 2018), 2018.
Poster: en enlysis of p rmeters smpt owrds sts rrdwre eelertion, 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography (WAHC 2017), 2017. ,
Presentation: en enlysis of p rmeters smpt owrds sts rrdwre eelertion, p.135, 2017. ,
, Poster: en enlysis of p rmeters smpt owrds sts rrdwre eelertion, Architectures des Systèmes Matériels et Logiciels Embarqués et Méthodes de Conception Associées, p.136, 2017.
, European Union Agency for Network and Information Security (ENISA), pp.2018-2028
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet, 1996. ,
La science du secret, Sciences. Editions Odile Jacob, 1998. ,
A Full RNS Variant of FV like Somewhat Homomorphic Encryption Schemes, Selected Areas in Cryptography-SAC, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01371941
An Improved RNS Variant of the BFV Homomorphic Encryption Scheme. Cryptology ePrint Archive, 2018. ,
TFHE: Fast Fully Homomorphic Encryption over the Torus. Cryptology ePrint Archive, 2018. ,
Somewhat Practical Fully Homomorphic Encryption, IACR Cryptology ePrint Archive, p.144, 2012. ,
SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classiers, IEEE Transactions on Computers, vol.65, issue.9, p.28482858, 2016. ,
A Journey Towards Practical Homomorphic Encryption, 2018. ,
URL : https://hal.archives-ouvertes.fr/tel-02011668
, Spiral-Software/Hardware Generation for Performance, pp.2018-2028
, International Telecommunication Union. ICT Facts and Figures, 2015.
, International Telecommunication Union. ICT Facts and Figures, 2017.
Le Big Data, l'IA et le Machine Learning transforment les soins de santé, pp.2018-2028 ,
Enfants et Big Data : la collecte de données, un danger selon l, pp.2018-2028 ,
, Loi 78-17 du 6 janvier 1978 modiée, Commission Nationale de l'Informatique et des Libertés (CNIL), pp.2018-2028
, Le contrôle de l'utilisation d'internet et de la messagerie électronique, Commission Nationale de l'Informatique et des Libertés (CNIL), pp.2018-2028
Probabilistic Encryption & How to Play Mental Poker Keeping Secret all Partial Information, Proceedings of the fourteenth annual ACM symposium on Theory of computing-STOC'82, 1982. ,
Probabilistic Encryption, Journal of Computer and System Sciences, vol.28, issue.2, p.270299, 1984. ,
On Data Banks and Privacy Homomorphisms. Foundations of secure computation, vol.4, p.169180, 1978. ,
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in Cryptology EUROCRYPT '99, p.223238 ,
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE Transactions on Information Theory, vol.31, issue.4, p.469472, 1985. ,
Evaluating 2-DNF Formulas on Ciphertexts, Theory of Cryptography, p.325341, 2005. ,
Additively Homomorphic Encryption with d-Operand Multiplications, Cryptology ePrint Archive, vol.378, 2008. ,
Additively Homomorphic Encryption with d-Operand Multiplications, Advances in Cryptology-CRYPTO 2010, 30th Annual Cryptology Conference, p.138154, 2010. ,
Fully Homomorphic Encryption using Ideal Lattices, STOC, vol.9, p.169178, 2009. ,
Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes, Public Key CryptographyPKC 2010, p.420443, 2010. ,
Implementing Gentry's Fully-Homomorphic Encryption Scheme, Advances in CryptologyEUROCRYPT, p.129148, 2011. ,
Ecient Fully Homomorphic Encryption from (Standard) LWE, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011. ,
Fully Homomorphic Encryption from RingLWE and Security for Key Dependent Messages, Advances in Cryptology CRYPTO 2011, p.505524, 2011. ,
Leveled) Fully Homomorphic Encryption Without Bootstrapping, Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, p.309325, 2012. ,
Fully Homomorphic Encryption Without Modulus Switching from Classical GapSVP, Advances in CryptologyCRYPTO 2012, p.868886, 2012. ,
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based, Advances in CryptologyCRYPTO, p.7592, 2013. ,
Faster Bootstrapping With Polynomial Error, Advances in CryptologyCRYPTO, p.297314, 2014. ,
FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second, Advances in Cryptology EUROCRYPT 2015, p.617640, 2015. ,
FHEW with Ecient Multibit Bootstrapping, Proceedings of the 4th International Conference on Progress in Cryptology LATINCRYPT 2015, vol.9230, p.119135, 2015. ,
On Lattices, Learning with Errors, Random Linear Codes, and Cryptography, Proceedings of the Thirty-seventh Annual ACM Symposium on Theory of Computing, STOC '05, p.8493, 2005. ,
The Learning with Errors Problem (Invited Survey), Proceedings of the 2010 IEEE 25th Annual Conference on Computational Complexity, CCC '10, p.191204, 2010. ,
On-the-y Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption, Proceedings of the forty-fourth annual ACM symposium on Theory of computing, p.12191234, 2012. ,
Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme, Cryptography and Coding, p.4564, 2013. ,
Flattening NTRU for Evaluation Key Free Homomorphic Encryption, Cryptology ePrint Archive, 2016. ,
NTRU: A Ring-Based Public Key Cryptosystem, Algorithmic Number Theory, vol.267, 1998. ,
Making NTRU as Secure as Worst-Case Problems over Ideal Lattices, Advances in Cryptology EUROCRYPT 2011, p.2747, 2011. ,
A Subeld Lattice Attack on Overstretched NTRU Assumptions, Advances in Cryptology CRYPTO 2016, p.153178, 2016. ,
Revisiting Lattice Attacks on Overstretched NTRU Parameters, Advances in Cryptology EUROCRYPT 2017, p.326, 2017. ,
Fully Homomorphic Encryption over the Integers, Advances in cryptologyEUROCRYPT 2010, p.2443, 2010. ,
Fully Homomorphic Encryption over the Integers with Shorter Public Keys, Advances in CryptologyCRYPTO, p.487504, 2011. ,
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers, Advances in CryptologyEUROCRYPT, p.446464, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-01111541
Scale-Invariant Fully Homomorphic Encryption over the Integers, Public-Key CryptographyPKC, p.311328, 2014. ,
Fully Homomophic Encryption over the Integers Revisited, Advances in Cryptology EUROCRYPT 2015, p.513536, 2015. ,
Public-key Cryptosystems from the Worst-case Shortest Vector Problem: Extended Abstract, Proceedings of the Forty-rst Annual ACM Symposium on Theory of Computing, STOC '09, p.333342, 2009. ,
Classical Hardness of Learning with Errors, Proceedings of the Forty-fth Annual ACM Symposium on Theory of Computing, STOC '13, p.575584, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00922194
Hardware Cybersecurity and Design of Dedicated Components for the Acceleration of Homomorphic Encryption Schemes, 2017. ,
lwe-estimator, Sage Module for Estimating the Concrete Security of LWE Instances ,
On Ideal Lattices and Learning with Errors over Rings, p.123, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00921792
How Not to Instantiate Ring-LWE, Proceedings of the 10th International Conference on Security and Cryptography for Networks, vol.9841, p.411430, 2016. ,
Pseudorandomness of RingLWE for Any Ring and Modulus, Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2017, p.461473, 2017. ,
Fully Homomorphic SIMD Operations. Cryptology ePrint Archive, 2011. ,
Fully Homomorphic Encryption with Polylog Overhead. Cryptology ePrint Archive, 2011. ,
Can homomorphic encryption be practical?, Proceedings of the 3rd ACM workshop on Cloud computing security workshop, p.113124, 2011. ,
Hybrid Fully Homomorphic Framework, 2017. ,
Stream Ciphers: A Practical Solution for Ecient Homomorphic-Ciphertext Compression, Fast Software Encryption, p.313333, 2016. ,
Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation. Cryptology ePrint Archive, 2017. ,
Practical Personalized Genomics in the Encrypted Domain, 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC), 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01760797
Simple Encrypted Arithmetic Library, pp.2018-2026 ,
PALISADE Lattice Cryptography Library, pp.2018-2026 ,
, , pp.2018-2026
Cingulata: Homomorphic Cryptography Compiler Toolchain and Runtime Environment, pp.2018-2026 ,
SecureMed: Secure Medical Computation Using GPU-Accelerated Homomorphic Encryption Scheme, vol.22, p.597606, 2018. ,
Multiplication of many-digital numbers by automatic computers, vol.145, p.293294, 1962. ,
On the Minimum Computation Time of Functions, 1966. ,
, The Fast Fourier Transform in a Finite Field. Mathematics of computation, vol.25, p.365374, 1971.
On Computation of Polynomial Modular Reduction, 2000. ,
Modular Multiplication without Trial Division, Mathematics of Computation, vol.44, issue.170, p.519519, 1985. ,
Implementing the Rivest, Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor, Advances in Cryptology CRYPTO' 86, p.311323 ,
A exible RNSbased large polynomial multiplier for Fully Homomorphic Encryption, 11th International Design & Test Symposium (IDT), 2016. ,
Hardware/Software Co-Design of an Accelerator for FV Homomorphic Encryption Scheme Using Karatsuba Algorithm, IEEE Transactions on Computers, vol.67, issue.3, p.335347, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01427639
Accelerating Homomorphic Evaluation on Recongurable Hardware, Lecture Notes in Computer Science, p.143163, 2015. ,
Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation, Lecture Notes in Computer Science, p.164184, 2015. ,
Accelerating Somewhat Homomorphic Evaluation using FPGAs, IACR Cryptology ePrint Archive, p.294, 2015. ,
A Custom Accelerator for Homomorphic Encryption Applications, IEEE Trans. Comput, vol.66, issue.1, p.316, 2017. ,
Designing an FPGAAccelerated Homomorphic Encryption Co-Processor, IEEE Transactions on Emerging Topics in Computing, vol.5, issue.2, p.193206, 2017. ,
Tile-Based Modular Architecture for Accelerating Homomorphic Function Evaluation on FPGA, 2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS), p.14, 2016. ,
High-Speed Polynomial Multiplication Architecture for Ring-LWE and SHE Cryptosystems, Cryptology ePrint Archive, vol.646, 2014. ,
A comparison of the homomorphic encryption schemes FV and YASHE, Progress in CryptologyAFRICACRYPT, pp.318-335, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01006484
Hardness of Decision (R)LWE for any Modulus, IACR Cryptology ePrint Archive, p.91, 2012. ,
Armadillo: A Compilation Chain for Privacy Preserving Applications, Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015. ,
URL : https://hal.archives-ouvertes.fr/cea-01839846
, Torbjörn Granlund and the GMP development team. GNU MP: The GNU Multiple Precision Arithmetic Library, 2012.
Fast Library for Number Theory: An Introduction, Proceedings of the Third International Congress on Mathematical Software, ICMS'10, p.8891, 2010. ,
Better Key Sizes (and Attacks) for LWE-Based Encryption. Cryptology ePrint Archive, 2010. ,
On the Concrete Hardness of Learning With Errors, Journal of Mathematical Cryptology, vol.9, issue.3, 2015. ,
On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL, Lecture Notes in Computer Science, p.103129, 2017. ,
TRIVIUM Specications. eSTREAM, ECRYPT Stream Cipher Project, 2006. ,
building workload characterization tools with valgrind, 2006 IEEE International Symposium on Workload Characterization, 2006. ,
RNS bases and conversions, Advanced Signal Processing Algorithms, Architectures, and Implementations XIV. SPIE, 2004. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00108875
NFLlib: NTT-Based Fast Lattice Library, Topics in Cryptology-CT-RSA 2016, p.341356, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01242273
Faster Arithmetic for Number-Theoretic Transforms, Journal of Symbolic Computation, vol.60, p.113119, 2014. ,
Computer Generation of Hardware for Linear Digital Signal Processing Transforms, ACM Transactions on Design Automation of Electronic Systems, vol.17, issue.2, p.133, 2012. ,
Automatic Library Generation and Performance Tuning for Modular Polynomial Multiplication, 2015. ,
Streaming Sorting Networks, ACM Trans. Des. Autom. Electron. Syst, vol.21, issue.4, 2016. ,
Discrete Fourier Transform Compiler: From Mathematical Representation to Ecient Hardware, 2007. ,
Permuting Streaming Data Using RAMs, Journal of the ACM, vol.56, issue.2, p.134, 2009. ,
CRYSTALS-Kyber: A CCASecure Module-Lattice-Based KEM, 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01934169
Etude théorique et implantation matérielle d'unités de calcul en représentation modulaire des nombres pour la cryptographie sur courbes elliptiques, 2014. ,