Fabrice Benhamouda
Fabrice Benhamouda
Algorand Foundation
Verified email at normalesup.org - Homepage
Title
Cited by
Cited by
Year
New techniques for SPHFs and efficient one-round PAKE protocols
F Benhamouda, O Blazy, C Chevalier, D Pointcheval, D Vergnaud
Annual Cryptology Conference, 449-475, 2013
1022013
Better zero-knowledge proofs for lattice encryption and their application to group signatures
F Benhamouda, J Camenisch, S Krenn, V Lyubashevsky, G Neven
International Conference on the Theory and Application of Cryptology and …, 2014
872014
Efficient zero-knowledge proofs for commitments from learning with errors over rings
F Benhamouda, S Krenn, V Lyubashevsky, K Pietrzak
European symposium on research in computer security, 305-325, 2015
632015
Randomness complexity of private circuits for multiplication
S Belaïd, F Benhamouda, A Passelègue, E Prouff, A Thillard, D Vergnaud
Annual International Conference on the Theory and Applications of …, 2016
592016
Disjunctions for hash proof systems: New constructions and applications
M Abdalla, F Benhamouda, D Pointcheval
Annual International Conference on the Theory and Applications of …, 2015
582015
SPHF-friendly non-interactive commitments
M Abdalla, F Benhamouda, O Blazy, C Chevalier, D Pointcheval
International Conference on the Theory and Application of Cryptology and …, 2013
582013
Security of the J-PAKE password-authenticated key exchange protocol
M Abdalla, F Benhamouda, P MacKenzie
2015 IEEE Symposium on Security and Privacy, 571-587, 2015
562015
Supporting private data on hyperledger fabric with secure multiparty computation
F Benhamouda, S Halevi, T Halevi
IBM Journal of Research and Development 63 (2/3), 3: 1-3: 8, 2019
512019
Public-key encryption indistinguishable under plaintext-checkable attacks
M Abdalla, F Benhamouda, D Pointcheval
IET Information Security 10 (6), 288-303, 2016
512016
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
F Ben Hamouda, O Blazy, C Chevalier, D Pointcheval, D Vergnaud
Public-Key Cryptography–PKC 2013, 272-291, 2013
362013
A new framework for privacy-preserving aggregation of time-series data
F Benhamouda, M Joye, B Libert
ACM Transactions on Information and System Security (TISSEC) 18 (3), 1-21, 2016
352016
Related-key security for pseudorandom functions beyond the linear barrier
M Abdalla, F Benhamouda, A Passelègue, KG Paterson
Annual Cryptology Conference, 77-94, 2014
352014
Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions.
F Benhamouda, D Pointcheval
IACR Cryptol. ePrint Arch. 2013, 833, 2013
312013
Tighter Reductions for Forward-Secure Signature Schemes
M Abdalla, F Ben Hamouda, D Pointcheval
Public-Key Cryptography–PKC 2013, 292-311, 2013
252013
On the local leakage resilience of linear secret sharing schemes
F Benhamouda, A Degwekar, Y Ishai, T Rabin
Annual International Cryptology Conference, 531-561, 2018
212018
Implicit zero-knowledge arguments and applications to the malicious setting
F Benhamouda, G Couteau, D Pointcheval, H Wee
Annual Cryptology Conference, 107-129, 2015
212015
Private multiplication over finite fields
S Belaïd, F Benhamouda, A Passelègue, E Prouff, A Thillard, D Vergnaud
Annual International Cryptology Conference, 397-426, 2017
202017
CCA-secure inner-product functional encryption from projective hash functions
F Benhamouda, F Bourse, H Lipmaa
IACR International Workshop on Public Key Cryptography, 36-66, 2017
192017
An algebraic framework for pseudorandom functions and applications to related-key security
M Abdalla, F Benhamouda, A Passelègue
Annual Cryptology Conference, 388-409, 2015
192015
Decentralizing inner-product functional encryption
M Abdalla, F Benhamouda, M Kohlweiss, H Waldner
IACR International Workshop on Public Key Cryptography, 128-157, 2019
162019
The system can't perform the operation now. Try again later.
Articles 1–20