Frederik Vercauteren
Frederik Vercauteren
Geverifieerd e-mailadres voor
Geciteerd door
Geciteerd door
Handbook of elliptic and hyperelliptic curve cryptography
H Cohen, G Frey, R Avanzi, C Doche, T Lange, K Nguyen, F Vercauteren
CRC press, 2006
Fully homomorphic encryption with relatively small key and ciphertext sizes
NP Smart, F Vercauteren
International Workshop on Public Key Cryptography, 420-443, 2010
Somewhat practical fully homomorphic encryption.
J Fan, F Vercauteren
IACR Cryptol. ePrint Arch. 2012, 144, 2012
Fully homomorphic SIMD operations
NP Smart, F Vercauteren
Designs, codes and cryptography 71 (1), 57-81, 2014
The eta pairing revisited
F Hess, NP Smart, F Vercauteren
IEEE transactions on information theory 52 (10), 4595-4602, 2006
Optimal pairings
F Vercauteren
IEEE Transactions on Information Theory 56 (1), 455-461, 2009
Compact ring-LWE cryptoprocessor
SS Roy, F Vercauteren, N Mentens, DD Chen, I Verbauwhede
International workshop on cryptographic hardware and embedded systems, 371-391, 2014
The number field sieve in the medium prime case
A Joux, R Lercier, N Smart, F Vercauteren
Annual International Cryptology Conference, 326-344, 2006
Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
JP D’Anvers, A Karmakar, SS Roy, F Vercauteren
International Conference on Cryptology in Africa, 282-305, 2018
A new RFID privacy model
J Hermans, A Pashalidis, F Vercauteren, B Preneel
European symposium on research in computer security, 568-587, 2011
Efficient software implementation of ring-LWE encryption
R De Clercq, SS Roy, F Vercauteren, I Verbauwhede
2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), 339-344, 2015
A fault attack on pairing-based cryptography
D Page, F Vercauteren
IEEE Transactions on Computers 55 (9), 1075-1080, 2006
High-speed polynomial multiplication architecture for ring-LWE and SHE cryptosystems
DD Chen, N Mentens, F Vercauteren, SS Roy, RCC Cheung, D Pao, ...
IEEE Transactions on Circuits and Systems I: Regular Papers 62 (1), 157-166, 2014
A comparison of MNT curves and supersingular curves
D Page, NP Smart, F Vercauteren
Applicable Algebra in Engineering, Communication and Computing 17 (5), 379-392, 2006
Speed records for NTRU
J Hermans, F Vercauteren, B Preneel
Cryptographers’ Track at the RSA Conference, 73-88, 2010
A cross-protocol attack on the TLS protocol
N Mavrogiannopoulos, F Vercauteren, V Velichkov, B Preneel
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Aspects of pairing inversion
S Galbraith, F Hess, F Vercauteren
IEEE Transactions on Information Theory 54 (12), 5719-5728, 2008
On CCA-secure somewhat homomorphic encryption
J Loftus, A May, NP Smart, F Vercauteren
International Workshop on Selected Areas in Cryptography, 55-72, 2011
High precision discrete Gaussian sampling on FPGAs
SS Roy, F Vercauteren, I Verbauwhede
International Conference on Selected Areas in Cryptography, 383-401, 2013
CSI-FiSh: Efficient isogeny based signatures through class group computations
W Beullens, T Kleinjung, F Vercauteren
International Conference on the Theory and Application of Cryptology and …, 2019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20