Carlos Aguilar Melchor
Carlos Aguilar Melchor
Professor, ISAE SUPAERO, University of Toulouse
Verified email at isae-supaero.fr
Title
Cited by
Cited by
Year
A fast private information retrieval protocol
CA Melchor, P Gaborit
2008 IEEE International Symposium on Information Theory, 1848-1852, 2008
163*2008
Recent advances in homomorphic encryption: A possible future for signal processing in the encrypted domain
C Aguilar-Melchor, S Fau, C Fontaine, G Gogniat, R Sirdey
IEEE Signal Processing Magazine 30 (2), 108-117, 2013
1502013
XPIR: Private information retrieval for everyone
CA Melchor, J Barrier, L Fousse, MO Killijian
Proceedings on Privacy Enhancing Technologies 2016, 155-174, 2016
1382016
Additively Homomorphic Encryption with d-Operand Multiplications
CA Melchor, P Gaborit, J Herranz
Annual Cryptology Conference, 138-154, 2010
1302010
NFLlib: NTT-based fast lattice library
C Aguilar-Melchor, J Barrier, S Guelton, A Guinet, MO Killijian, T Lepoint
Cryptographers’ Track at the RSA Conference, 341-356, 2016
1152016
A new efficient threshold ring signature scheme based on coding theory
CA Melchor, PL Cayrel, P Gaborit, F Laguillaumie
IEEE Transactions on Information Theory 57 (7), 4833-4842, 2011
1132011
Lattice-based homomorphic encryption of vector spaces
CA Melchor, G Castagnos, P Gaborit
2008 IEEE International Symposium on Information Theory, 1858-1862, 2008
572008
Falcon: Fast-Fourier lattice-based compact signatures over NTRU
PA Fouque, J Hoffstein, P Kirchner, V Lyubashevsky, T Pornin, T Prest, ...
Submission to the NIST’s post-quantum cryptography standardization process 36, 2018
502018
Efficient encryption from random quasi-cyclic codes
C Aguilar-Melchor, O Blazy, JC Deneuville, P Gaborit, G Zémor
IEEE Transactions on Information Theory 64 (5), 3927-3943, 2018
482018
Towards practical program execution over fully homomorphic encryption schemes
S Fau, R Sirdey, C Fontaine, C Aguilar-Melchor, G Gogniat
2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and …, 2013
452013
BIKE: bit flipping key encapsulation
N Aragon, P Barreto, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ...
402017
High-speed private information retrieval computation on gpu
CA Melchor, B Crespin, P Gaborit, V Jolivet, P Rousseau
2008 Second International Conference on Emerging Security Information …, 2008
392008
On the Classification of Extremal Binary Self-Dual Codes
CA Melchor, P Gaborit
IEEE transactions on information theory 54 (10), 4743-4750, 2008
362008
Adapting Lyubashevsky’s signature schemes to the ring signature setting
CA Melchor, S Bettaieb, X Boyen, L Fousse, P Gaborit
International Conference on Cryptology in Africa, 1-25, 2013
322013
Current and future privacy enhancing technologies for the internet
Y Deswarte, CA Melchor
Annales des télécommunications 61 (3), 399-417, 2006
312006
Efficient and secure outsourcing of genomic data storage
JS Sousa, C Lefebvre, Z Huang, JL Raisaro, C Aguilar-Melchor, ...
BMC medical genomics 10 (2), 15-28, 2017
272017
Sealing the leak on classical NTRU signatures
CA Melchor, X Boyen, JC Deneuville, P Gaborit
International Workshop on Post-Quantum Cryptography, 1-21, 2014
242014
Active detection of node replication attacks
CA Melchor, B Ait-Salem, K Tamine
International Journal of Computer Science and Network Security (IJCSNS), 9 …, 2009
232009
Rank quasi-cyclic (RQC)
CA Melchor, N Aragon, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ...
222017
BIKE: bit flipping key encapsulation (2017)
N Aragon, P Barreto, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ...
NIST Post-Quantum Cryptography Project: First Round Candidate Algorithms …, 2019
212019
The system can't perform the operation now. Try again later.
Articles 1–20