

{"id":65,"date":"2019-06-19T15:21:13","date_gmt":"2019-06-19T13:21:13","guid":{"rendered":"https:\/\/project.inria.fr\/poseidon\/?page_id=65"},"modified":"2020-05-28T14:39:55","modified_gmt":"2020-05-28T12:39:55","slug":"publications","status":"publish","type":"page","link":"https:\/\/project.inria.fr\/poseidon\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<p><\/p>\n<h4>TYREX<\/h4>\n<ul>\n<li>Pierre-Alain Fouque,\u00a0 Paul Kirchner, Mehdi Tibouchi, Alexandre Wallet, Yang Yu: <a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-45727-3_2\">Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices<\/a> Eurocrypt 2020.<\/li>\n<li>Sergiu Carpov, Caroline Fontaine, Damien Ligier, Renaud Sirdey: <a href=\"https:\/\/content.sciendo.com\/view\/journals\/popets\/2020\/2\/article-p5.xml\">Illuminating the Dark or how to recover what should not be seen in FE-based classifiers<\/a> PoPETS 2020(2):5-23.<\/li>\n<li>Shi Bai, Katharina Boudgoust, Dipayan Das, Adeline Roux-Langlois, Weiqiang Wen, Zhenfei Zhang: <a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-34578-5_3\">Middle-Product Learning with Rounding Problem and Its Applications<\/a> ASIACRYPT\u00a0 2019: 55-81.<\/li>\n<li>Pauline Bert, Pierre-Alain Fouque, Adeline Roux-Langlois, Mohamed Sabt: <a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-79063-3_13\">Practical Implementation of Ring-SIS\/LWE Based Signature and IBE<\/a> PQCrypto 2018: 271- 291.<\/li>\n<\/ul>\n<h4>POSEIDON<\/h4>\n<ul>\n<li id=\"aui_3_4_0_1_383\"><label id=\"aui_3_4_0_1_382\"> Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancr\u00e8de Lepoint, Mar\u00eda Naya-Plasencia, Pascal Paillier, Renaud Sirdey: <\/label> <a href=\"https:\/\/link.springer.com\/article\/10.1007\/s00145-017-9273-9\"> Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression<\/a> Journal of Cryptology, <span class=\"ArticleCitation_Volume\">Volume 31, <\/span><span class=\"ArticleCitation_Issue\">Issue\u00a03<\/span>, <span class=\"ArticleCitation_Pages\"> pp 885\u2013916<\/span>, July 2018.<\/li>\n<li><label id=\"aui_3_4_0_1_382\"> Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancr\u00e8de Lepoint, Mar\u00eda Naya-Plasencia, Pascal Paillier, Renaud Sirdey: <\/label> <a href=\"http:\/\/link.springer.com\/chapter\/10.1007\/978-3-662-52993-5_16\"> Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression <\/a> <label> Fast Software Encryption 2016, Volume 9783 of the series Lecture Notes in Computer Science <\/label> <label> : 2016 <\/label><\/li>\n<li><label> Julien Lolive: <\/label> <a href=\"https:\/\/tel.archives-ouvertes.fr\/tel-01355495v1\"> Interleaving identification mechanisms and respect of privacy for the protection of outsourced content <\/a> <label> PhD Thesis <\/label> <label> : 2016 <\/label><\/li>\n<li><label> Maryline Boizard, S\u00e9bastien Gambs: <\/label> <a href=\"https:\/\/halshs.archives-ouvertes.fr\/halshs-01203770\"> Retour d&#8217;exp\u00e9rience d&#8217;un projet de recherche pluridisciplinaire droit &#8211; informatique &#8211; sociologie : le droit \u00e0 l&#8217;oubli <\/a> <label> Journ\u00e9e SHS et num\u00e9rique <\/label> <label> : 2015 <\/label><\/li>\n<li><label> Anis Bkakria, Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard: <\/label> <a href=\"http:\/\/link.springer.com\/chapter\/10.1007%2F978-3-319-30303-1_6\"> Security Mechanisms Planning to Enforce Security Policies <\/a> <label> 8th International Symposium, FPS 2015 <\/label> <label> : 2015 <\/label><\/li>\n<li><label> Wei PAN, Gouenou COATRIEUX, , Dalel BOUSLIMI and Nicolas PRIGENT: <\/label> <strong>Secure Public Cloud Platform for Medical Images Sharing<\/strong> <label> Studies in health technology and informatics, 2015, vol. 210 <\/label> <label> : 2015 <\/label><\/li>\n<li><label> Anis Bkakria: <\/label> <a href=\"https:\/\/hal.archives-ouvertes.fr\/tel-01272737\/\"> Specification and deployment of integrated Security Policy for Outsourced Data <\/a> <label> PhD Thesis <\/label> <label> : 2015 <\/label><\/li>\n<li><label> S. Oulmakhzoune, N. Cuppens-Boulahia, F. Cuppens, S. Morucci, M. Barhamgi, D. Benslimane: <\/label> <a href=\"http:\/\/link.springer.com\/article\/10.1007%2Fs12243-013-0365-8\"> Privacy query rewriting algorithm instrumented by a privacy-aware access control model. <\/a> <label> Annals of telecommunications, February 2014, Volume 69, Issue 1-2 <\/label> <label> : 2014 <\/label><\/li>\n<li><label> J. Franco-Contreras, G. Coatrieux, F. Cuppens, N. Cuppens-Boulahia, C. Roux: <\/label> <a href=\"http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=6678817\"> Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation. <\/a> <label> Information Forensics and Security, IEEE Transactions on ; Volume:9 , Issue: 3 <\/label> <label> : 2014 <\/label><\/li>\n<li><label> Anis Bkakria, Fr\u00e9d\u00e9ric Cuppens, Nora CUPPENS-BOULAHIA, David Gross-Amblard: <\/label> <a href=\"http:\/\/link.springer.com\/chapter\/10.1007%2F978-3-662-43936-4_2\"> Specification and Deployment of Integrated Security Policies for Outsourced Data <\/a> <label> 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec &#8217;14) <\/label> <label> : 2014 <\/label><\/li>\n<li><label> Caroline Fontaine, S\u00e9bastien Gambs, Julien Lolive, Cristina Onete: <\/label> <a href=\"http:\/\/link.springer.com\/chapter\/10.1007%2F978-3-319-16295-9_11\"> Private asymmetric fingerprinting : a protocol with optimal traitor tracing using Tardos codes <\/a> <label> Third International Conference on Cryptology and Information Security in Latin America (Latincrypt&#8217;14), Volume 8895 of the series Lecture Notes in Computer Science <\/label> <label> : 2014 <\/label><\/li>\n<li><label> Anis BKAKRIA , Andreas SCHAAD, Florian KERSCHBAUM, Fr\u00e9d\u00e9ric CUPPENS, Nora CUPPENS-BOULAHIA, David GROSS-AMBLARD: <\/label> <a href=\"http:\/\/dl.acm.org\/citation.cfm?id=2613100\"> Optimized and controlled provisioning of encrypted outsourced data <\/a> <label> SACMAT 2014 : proceedings of the 19th ACM symposium on Access control models and technologies <\/label> <label> : 2014 <\/label><\/li>\n<li><label> S. Fau, R. Sirdey, C. Fontaine, C. Aguilar-Melchor, G. Gogniat: <\/label> <a href=\"http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=6681241&amp;tag=1\"> Towards Practical Program Execution over Fully Homomorphic Encryption Schemes. <\/a> <label> P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2013 Eighth International Conference on <\/label> <label> : 2013 <\/label><\/li>\n<li><label> G. Coatrieux, W. Pan, N. Cuppens-Boulahia, F. Cuppens, C. Roux: <\/label> <a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=06329433\"> Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting. <\/a> <label> IEEE Transcations on Information Forensics and Security, Vol. 8, No. 1, Jan 2013 <\/label> <label> : 2013 <\/label><\/li>\n<li><label> M. Barhamgi, D. Benslimane, S. Oulmakhzoune, N. Cuppens-Boulahia, F. Cuppens, H. Mrissa, H. Taktak: <\/label> <a href=\"http:\/\/link.springer.com\/chapter\/10.1007%2F978-3-642-38709-8_3\"> Secure and Privacy-Preserving Execution Model for Data Services. <\/a> <label> Advanced Information Systems Engineering &#8212; Caise&#8217;13, Lecture Notes in Computer Science Volume 7908, 2013 <\/label> <label> : 2013 <\/label><\/li>\n<li><label> A. Bkakria, F. Cuppens, N. Cuppens-Boulahia, J.M. Fernandez, D. Gross-Amblard: <\/label> <a href=\"http:\/\/isyou.info\/jowua\/papers\/jowua-v4n2-3.pdf\"> Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption. <\/a> <label> Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications , volume: 4, number: 2. <\/label> <label> : 2013 <\/label><\/li>\n<li><label> A. Bkakria, F. Cuppens, N. Cuppens-Boulahia, J.M. Fernandez: <\/label> <a href=\"http:\/\/link.springer.com\/chapter\/10.1007%2F978-3-642-36818-9_47\"> Confidentiality-Preserving Query Execution of Fragmented Outsourced Data. <\/a> <label> Information and Communication Technology, Lecture Notes in Computer Science Volume 7804 <\/label> <label> : 2013 <\/label><\/li>\n<li><label> J. Franco-Contreras, G. Coatrieux, N. Cuppens-Boulahia, F. Cuppens, C. Roux: <\/label> <a href=\"http:\/\/link.springer.com\/chapter\/10.1007%2F978-3-642-41098-7_14\"> Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation. <\/a> <label> Security and Trust Management. Lecture Notes in Computer Science Volume 8203 <\/label> <label> : 2013 <\/label><\/li>\n<li><label> C. Aguilar-Melchor, S. Fau, C. Fontaine, G. Gogniat, S. Sirdey: <\/label> <a href=\"http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?tp=&amp;arnumber=6461628\"> Recent advances in homomorphic encryption: a possible future for signal processing in the encrypted domain. <\/a> <label> IEEE Signal Processing Magazine, Volume:30 , Issue: 2 <\/label> <label> : 2013 <\/label><\/li>\n<li><label> S. Ayed, M. Sabir Idrees, N. Cuppens-Boulahia, F. Cuppens, M. Pinto, L. Fuentes: <\/label> <a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=06727206\"> Security Aspects: A Framework for Enforcement of Security Policies Using AOP. <\/a> <label> 2013 International Conference on Signal-Image Technology &amp; Internet-Based Systems. <\/label> <label> : 2013 <\/label><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>TYREX Pierre-Alain Fouque,\u00a0 Paul Kirchner, Mehdi Tibouchi, Alexandre Wallet, Yang Yu: Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices Eurocrypt 2020.\u2026<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/project.inria.fr\/poseidon\/publications\/\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":1611,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-65","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/project.inria.fr\/poseidon\/wp-json\/wp\/v2\/pages\/65","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/project.inria.fr\/poseidon\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/project.inria.fr\/poseidon\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/poseidon\/wp-json\/wp\/v2\/users\/1611"}],"replies":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/poseidon\/wp-json\/wp\/v2\/comments?post=65"}],"version-history":[{"count":7,"href":"https:\/\/project.inria.fr\/poseidon\/wp-json\/wp\/v2\/pages\/65\/revisions"}],"predecessor-version":[{"id":105,"href":"https:\/\/project.inria.fr\/poseidon\/wp-json\/wp\/v2\/pages\/65\/revisions\/105"}],"wp:attachment":[{"href":"https:\/\/project.inria.fr\/poseidon\/wp-json\/wp\/v2\/media?parent=65"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}