Publications

Filter by type:
. Signature Renewal for Low Entropy Data. In International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2018), New York, USA, 2018.

PDF

. ID-Blockchain. In Atelier sur la Protection de la Vie Privée, 2018, 2018.

PDF Project

. Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3. In Transactions on Symmetric Cryptology, IACR, 2017.

Preprint

. Optimization of Tree Modes for Parallel Hash Functions: A Case Study. In Transactions on Computers, IEEE, 2017.

PDF

. Arithmetic in Finite Fields Based on the Chudnovsky Multiplication Algorithm. In Mathematics of Computation, AMS, 2017.

Preprint

. Effective Arithmetic in Finite Fields Based on Chudnovsky Multiplication Algorithm. In YACC 2016, 2016.

Slides

. Effective Arithmetic in Finite Fields Based on Chudnovsky’s Multiplication Algorithm. In Comptes Rendus de l’Académie des Sciences, Elsevier, 2016.

PDF

. New Models for Efficient Authenticated Dictionaries. In Computers & Security, Elsevier, 2015.

Preprint

. Towards Fully Incremental Cryptographic Schemes. In Symposium on Information, Computer and Communications Security (ASIACCS 2013), ACM, 2014.

PDF

. Authenticated Dictionary Based on Frequency. In IFIP International Information Security and Privacy Conference (IFIP SEC 2014), Springer, 2014.

PDF

. Generic Parallel Cryptography for Hashing Schemes. In International Symposium on Parallel and Distributed Computing (ISPDC 2013), Bucharest, Romania, 2013.

PDF

. A Cryptographic Keys Transfer Protocol for Secure Communicating Systems. In International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC 2010), Timisoara, Romania, 2010.

PDF