TYREX
- Pierre-Alain Fouque, Paul Kirchner, Mehdi Tibouchi, Alexandre Wallet, Yang Yu: Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices Eurocrypt 2020.
- Sergiu Carpov, Caroline Fontaine, Damien Ligier, Renaud Sirdey: Illuminating the Dark or how to recover what should not be seen in FE-based classifiers PoPETS 2020(2):5-23.
- Shi Bai, Katharina Boudgoust, Dipayan Das, Adeline Roux-Langlois, Weiqiang Wen, Zhenfei Zhang: Middle-Product Learning with Rounding Problem and Its Applications ASIACRYPT 2019: 55-81.
- Pauline Bert, Pierre-Alain Fouque, Adeline Roux-Langlois, Mohamed Sabt: Practical Implementation of Ring-SIS/LWE Based Signature and IBE PQCrypto 2018: 271- 291.
POSEIDON
- Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression Journal of Cryptology, Volume 31, Issue 3, pp 885–916, July 2018.
- Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
- Interleaving identification mechanisms and respect of privacy for the protection of outsourced content
- Retour d’expérience d’un projet de recherche pluridisciplinaire droit – informatique – sociologie : le droit à l’oubli
- Security Mechanisms Planning to Enforce Security Policies
- Secure Public Cloud Platform for Medical Images Sharing
- Specification and deployment of integrated Security Policy for Outsourced Data
- Privacy query rewriting algorithm instrumented by a privacy-aware access control model.
- Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation.
- Specification and Deployment of Integrated Security Policies for Outsourced Data
- Private asymmetric fingerprinting : a protocol with optimal traitor tracing using Tardos codes
- Optimized and controlled provisioning of encrypted outsourced data
- Towards Practical Program Execution over Fully Homomorphic Encryption Schemes.
- Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting.
- Secure and Privacy-Preserving Execution Model for Data Services.
- Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption.
- Confidentiality-Preserving Query Execution of Fragmented Outsourced Data.
- Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation.
- Recent advances in homomorphic encryption: a possible future for signal processing in the encrypted domain.
- Security Aspects: A Framework for Enforcement of Security Policies Using AOP.