BibTeX records: Adeline Roux-Langlois

download as .bib file

@article{DBLP:journals/cj/BoudgoustR24,
  author       = {Katharina Boudgoust and
                  Adeline Roux{-}Langlois},
  title        = {Overfull: Too Large Aggregate Signatures Based on Lattices},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {2},
  pages        = {719--727},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxad013},
  doi          = {10.1093/COMJNL/BXAD013},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/BoudgoustR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArgoGJLRS24,
  author       = {Sven Argo and
                  Tim G{\"{u}}neysu and
                  Corentin Jeudy and
                  Georg Land and
                  Adeline Roux{-}Langlois and
                  Olivier Sanders},
  title        = {Practical Post-Quantum Signatures for Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {131},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/131},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ArgoGJLRS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BoudgoustJRW23,
  author       = {Katharina Boudgoust and
                  Corentin Jeudy and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen},
  title        = {On the Hardness of Module Learning with Errors with Short Distributions},
  journal      = {J. Cryptol.},
  volume       = {36},
  number       = {1},
  pages        = {1},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00145-022-09441-3},
  doi          = {10.1007/S00145-022-09441-3},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BoudgoustJRW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/IzabachenePR23,
  author       = {Malika Izabach{\`{e}}ne and
                  Lucas Prabel and
                  Adeline Roux{-}Langlois},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Identity-Based Encryption from Lattices Using Approximate Trapdoors},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {270--290},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_13},
  doi          = {10.1007/978-3-031-35486-1\_13},
  timestamp    = {Wed, 21 Jun 2023 16:37:47 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/IzabachenePR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JeudyRS23,
  author       = {Corentin Jeudy and
                  Adeline Roux{-}Langlois and
                  Olivier Sanders},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Lattice Signature with Efficient Protocols, Application to Anonymous
                  Credentials},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {351--383},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_12},
  doi          = {10.1007/978-3-031-38545-2\_12},
  timestamp    = {Mon, 14 Aug 2023 16:16:25 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JeudyRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FouqueGQRW23,
  author       = {Pierre{-}Alain Fouque and
                  Adela Georgescu and
                  Chen Qian and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {A Generic Transform from Multi-round Interactive Proof to {NIZK}},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {461--481},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_16},
  doi          = {10.1007/978-3-031-31371-4\_16},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FouqueGQRW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FouqueGQRW23,
  author       = {Pierre{-}Alain Fouque and
                  Adela Georgescu and
                  Chen Qian and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen},
  title        = {A Generic Transform from Multi-Round Interactive Proof to {NIZK}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {334},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/334},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FouqueGQRW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeudyRS23a,
  author       = {Corentin Jeudy and
                  Adeline Roux{-}Langlois and
                  Olivier Sanders},
  title        = {Revisiting Preimage Sampling for Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {446},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/446},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeudyRS23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BergeratCLORT23,
  author       = {Loris Bergerat and
                  Ilaria Chillotti and
                  Damien Ligier and
                  Jean{-}Baptiste Orfila and
                  Adeline Roux{-}Langlois and
                  Samuel Tap},
  title        = {Faster Secret Keys for {(T)FHE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {979},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/979},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BergeratCLORT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BernardLNR22,
  author       = {Olivier Bernard and
                  Andrea Lesavourey and
                  Tuong{-}Huy Nguyen and
                  Adeline Roux{-}Langlois},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Log-\emph{S}-unit Lattices Using Explicit Stickelberger Generators
                  to Solve Approx Ideal-SVP},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13793},
  pages        = {677--708},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22969-5\_23},
  doi          = {10.1007/978-3-031-22969-5\_23},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BernardLNR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BoudgoustJRW22,
  author       = {Katharina Boudgoust and
                  Corentin Jeudy and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen},
  editor       = {Takanori Isobe and
                  Santanu Sarkar},
  title        = {Entropic Hardness of Module-LWE from Module-NTRU},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2022 - 23rd International Conference
                  on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13774},
  pages        = {78--99},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22912-1\_4},
  doi          = {10.1007/978-3-031-22912-1\_4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BoudgoustJRW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoudgoustJRW22,
  author       = {Katharina Boudgoust and
                  Corentin Jeudy and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen},
  title        = {Entropic Hardness of Module-LWE from Module-NTRU},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {245},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/245},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BoudgoustJRW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoudgoustJRW22a,
  author       = {Katharina Boudgoust and
                  Corentin Jeudy and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen},
  title        = {On the Hardness of Module Learning With Errors with Short Distributions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {472},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/472},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoudgoustJRW22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeudyRS22,
  author       = {Corentin Jeudy and
                  Adeline Roux{-}Langlois and
                  Olivier Sanders},
  title        = {Lattice-Based Signature with Efficient Protocols, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {509},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/509},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeudyRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BoudgoustJRW21,
  author       = {Katharina Boudgoust and
                  Corentin Jeudy and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen},
  editor       = {Kenneth G. Paterson},
  title        = {On the Hardness of Module-LWE with Binary Secret},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the
                  {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12704},
  pages        = {503--526},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75539-3\_21},
  doi          = {10.1007/978-3-030-75539-3\_21},
  timestamp    = {Mon, 28 Aug 2023 21:17:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BoudgoustJRW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KaimCRT21,
  author       = {Guillaume Kaim and
                  S{\'{e}}bastien Canard and
                  Adeline Roux{-}Langlois and
                  Jacques Traor{\'{e}}},
  editor       = {Matthew Bernhard and
                  Andrea Bracciali and
                  Lewis Gudgeon and
                  Thomas Haines and
                  Ariah Klages{-}Mundt and
                  Shin'ichiro Matsuo and
                  Daniel Perez and
                  Massimiliano Sala and
                  Sam Werner},
  title        = {Post-quantum Online Voting Scheme},
  booktitle    = {Financial Cryptography and Data Security. {FC} 2021 International
                  Workshops - CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March
                  5, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12676},
  pages        = {290--305},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-662-63958-0\_25},
  doi          = {10.1007/978-3-662-63958-0\_25},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KaimCRT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BertEPRS21,
  author       = {Pauline Bert and
                  Gautier Eberhart and
                  Lucas Prabel and
                  Adeline Roux{-}Langlois and
                  Mohamed Sabt},
  editor       = {Jung Hee Cheon and
                  Jean{-}Pierre Tillich},
  title        = {Implementation of Lattice Trapdoors on Modules and Applications},
  booktitle    = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto
                  2021, Daejeon, South Korea, July 20-22, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12841},
  pages        = {195--214},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-81293-5\_11},
  doi          = {10.1007/978-3-030-81293-5\_11},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/BertEPRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoudgoustR21,
  author       = {Katharina Boudgoust and
                  Adeline Roux{-}Langlois},
  title        = {Compressed Linear Aggregate Signatures Based on Module Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {263},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/263},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoudgoustR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoudgoustJRW21,
  author       = {Katharina Boudgoust and
                  Corentin Jeudy and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen},
  title        = {On the Hardness of Module-LWE with Binary Secret},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {265},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/265},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoudgoustJRW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernardLNR21,
  author       = {Olivier Bernard and
                  Andrea Lesavourey and
                  Tuong{-}Huy Nguyen and
                  Adeline Roux{-}Langlois},
  title        = {Log-S-unit lattices using Explicit Stickelberger Generators to solve
                  Approx Ideal-SVP},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1384},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1384},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BernardLNR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BoudgoustJRW20,
  author       = {Katharina Boudgoust and
                  Corentin Jeudy and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Towards Classical Hardness of Module-LWE: The Linear Rank Case},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12492},
  pages        = {289--317},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64834-3\_10},
  doi          = {10.1007/978-3-030-64834-3\_10},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BoudgoustJRW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/0002R20,
  author       = {Olivier Bernard and
                  Adeline Roux{-}Langlois},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal
                  Lattices},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12492},
  pages        = {349--380},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64834-3\_12},
  doi          = {10.1007/978-3-030-64834-3\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/0002R20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/CanardGKRT20,
  author       = {S{\'{e}}bastien Canard and
                  Adela Georgescu and
                  Guillaume Kaim and
                  Adeline Roux{-}Langlois and
                  Jacques Traor{\'{e}}},
  editor       = {Khoa Nguyen and
                  Wenling Wu and
                  Kwok{-}Yan Lam and
                  Huaxiong Wang},
  title        = {Constant-Size Lattice-Based Group Signature with Forward Security
                  in the Standard Model},
  booktitle    = {Provable and Practical Security - 14th International Conference, ProvSec
                  2020, Singapore, November 29 - December 1, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12505},
  pages        = {24--44},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62576-4\_2},
  doi          = {10.1007/978-3-030-62576-4\_2},
  timestamp    = {Sat, 17 Dec 2022 21:30:21 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/CanardGKRT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bouaziz-ErmannC20,
  author       = {Samuel Bouaziz{-}Ermann and
                  S{\'{e}}bastien Canard and
                  Gautier Eberhart and
                  Guillaume Kaim and
                  Adeline Roux{-}Langlois and
                  Jacques Traor{\'{e}}},
  title        = {Lattice-based (Partially) Blind Signature without Restart},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {260},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/260},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bouaziz-ErmannC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoudgoustJRW20,
  author       = {Katharina Boudgoust and
                  Corentin Jeudy and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen},
  title        = {Towards Classical Hardness of Module-LWE: The Linear Rank Case},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1020},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1020},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoudgoustJRW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernardR20,
  author       = {Olivier Bernard and
                  Adeline Roux{-}Langlois},
  title        = {Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal
                  Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1081},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1081},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernardR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BaiBDRWZ19,
  author       = {Shi Bai and
                  Katharina Boudgoust and
                  Dipayan Das and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen and
                  Zhenfei Zhang},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Middle-Product Learning with Rounding Problem and Its Applications},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11921},
  pages        = {55--81},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34578-5\_3},
  doi          = {10.1007/978-3-030-34578-5\_3},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BaiBDRWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiBDRWZ19,
  author       = {Shi Bai and
                  Katharina Boudgoust and
                  Dipayan Das and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen and
                  Zhenfei Zhang},
  title        = {Middle-Product Learning with Rounding Problem and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1001},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1001},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiBDRWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BaiLRSSS18,
  author       = {Shi Bai and
                  Tancr{\`{e}}de Lepoint and
                  Adeline Roux{-}Langlois and
                  Amin Sakzad and
                  Damien Stehl{\'{e}} and
                  Ron Steinfeld},
  title        = {Improved Security Proofs in Lattice-Based Cryptography: Using the
                  R{\'{e}}nyi Divergence Rather than the Statistical Distance},
  journal      = {J. Cryptol.},
  volume       = {31},
  number       = {2},
  pages        = {610--640},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00145-017-9265-9},
  doi          = {10.1007/S00145-017-9265-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BaiLRSSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/LingNRW18,
  author       = {San Ling and
                  Khoa Nguyen and
                  Adeline Roux{-}Langlois and
                  Huaxiong Wang},
  title        = {A lattice-based group signature scheme with verifier-local revocation},
  journal      = {Theor. Comput. Sci.},
  volume       = {730},
  pages        = {1--20},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.tcs.2018.03.027},
  doi          = {10.1016/J.TCS.2018.03.027},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/LingNRW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BertR18,
  author       = {Pauline Bert and
                  Adeline Roux{-}Langlois},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {From Identification Using Rejection Sampling to Signatures via the
                  Fiat-Shamir Transform: Application to the {BLISS} Signature},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {297--312},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_19},
  doi          = {10.1007/978-3-319-97916-8\_19},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BertR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BertFRS18,
  author       = {Pauline Bert and
                  Pierre{-}Alain Fouque and
                  Adeline Roux{-}Langlois and
                  Mohamed Sabt},
  editor       = {Tanja Lange and
                  Rainer Steinwandt},
  title        = {Practical Implementation of Ring-SIS/LWE Based Signature and {IBE}},
  booktitle    = {Post-Quantum Cryptography - 9th International Conference, PQCrypto
                  2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10786},
  pages        = {271--291},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-79063-3\_13},
  doi          = {10.1007/978-3-319-79063-3\_13},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/BertFRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c2si/BonnoronFGHLMR17,
  author       = {Guillaume Bonnoron and
                  Caroline Fontaine and
                  Guy Gogniat and
                  Vincent Herbert and
                  Vianney Lap{\^{o}}tre and
                  Vincent Migliore and
                  Adeline Roux{-}Langlois},
  editor       = {Said El Hajji and
                  Abderrahmane Nitaj and
                  El Mamoun Souidi},
  title        = {Somewhat/Fully Homomorphic Encryption: Implementation Progresses and
                  Challenges},
  booktitle    = {Codes, Cryptology and Information Security - Second International
                  Conference, {C2SI} 2017, Rabat, Morocco, April 10-12, 2017, Proceedings
                  - In Honor of Claude Carlet},
  series       = {Lecture Notes in Computer Science},
  volume       = {10194},
  pages        = {68--82},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-55589-8\_5},
  doi          = {10.1007/978-3-319-55589-8\_5},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/c2si/BonnoronFGHLMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LangloisS15,
  author       = {Adeline Langlois and
                  Damien Stehl{\'{e}}},
  title        = {Worst-case to average-case reductions for module lattices},
  journal      = {Des. Codes Cryptogr.},
  volume       = {75},
  number       = {3},
  pages        = {565--599},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-014-9938-4},
  doi          = {10.1007/S10623-014-9938-4},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LangloisS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BaiLLSS15,
  author       = {Shi Bai and
                  Adeline Langlois and
                  Tancr{\`{e}}de Lepoint and
                  Damien Stehl{\'{e}} and
                  Ron Steinfeld},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Improved Security Proofs in Lattice-Based Cryptography: Using the
                  R{\'{e}}nyi Divergence Rather Than the Statistical Distance},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9452},
  pages        = {3--24},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48797-6\_1},
  doi          = {10.1007/978-3-662-48797-6\_1},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BaiLLSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AlbrechtCLL15,
  author       = {Martin R. Albrecht and
                  Catalin Cocis and
                  Fabien Laguillaumie and
                  Adeline Langlois},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Implementing Candidate Graded Encoding Schemes from Ideal Lattices},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9453},
  pages        = {752--775},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48800-3\_31},
  doi          = {10.1007/978-3-662-48800-3\_31},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AlbrechtCLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiLLSS15,
  author       = {Shi Bai and
                  Adeline Langlois and
                  Tancr{\`{e}}de Lepoint and
                  Damien Stehl{\'{e}} and
                  Ron Steinfeld},
  title        = {Improved security proofs in lattice-based cryptography: using the
                  R{\'{e}}nyi divergence rather than the statistical distance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {483},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/483},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiLLSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Langlois14,
  author       = {Adeline Langlois},
  title        = {Lattice - Based Cryptography - Security Foundations and Constructions.
                  (Cryptographie reposant sur les r{\'{e}}seaux Euclidiens - Fondations
                  de s{\'{e}}curit{\'{e}} et Constructions)},
  school       = {{\'{E}}cole normale sup{\'{e}}rieure de Lyon, France},
  year         = {2014},
  url          = {https://tel.archives-ouvertes.fr/tel-01126931},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Langlois14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LangloisSS14,
  author       = {Adeline Langlois and
                  Damien Stehl{\'{e}} and
                  Ron Steinfeld},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {GGHLite: More Efficient Multilinear Maps from Ideal Lattices},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {239--256},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_14},
  doi          = {10.1007/978-3-642-55220-5\_14},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LangloisSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LangloisLNW14,
  author       = {Adeline Langlois and
                  San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang},
  editor       = {Hugo Krawczyk},
  title        = {Lattice-Based Group Signature Scheme with Verifier-Local Revocation},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {345--361},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_20},
  doi          = {10.1007/978-3-642-54631-0\_20},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/LangloisLNW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LangloisLNW14,
  author       = {Adeline Langlois and
                  San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Lattice-based Group Signature Scheme with Verifier-local Revocation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/033},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LangloisLNW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LangloisSS14,
  author       = {Adeline Langlois and
                  Damien Stehl{\'{e}} and
                  Ron Steinfeld},
  title        = {GGHLite: More Efficient Multilinear Maps from Ideal Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {487},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/487},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LangloisSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtCLL14,
  author       = {Martin R. Albrecht and
                  Catalin Cocis and
                  Fabien Laguillaumie and
                  Adeline Langlois},
  title        = {Improved Parameters and an Implementation of Graded Encoding Schemes
                  from Ideal Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {928},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/928},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtCLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LaguillaumieLLS13,
  author       = {Fabien Laguillaumie and
                  Adeline Langlois and
                  Beno{\^{\i}}t Libert and
                  Damien Stehl{\'{e}}},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Lattice-Based Group Signatures with Logarithmic Signature Size},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8270},
  pages        = {41--61},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42045-0\_3},
  doi          = {10.1007/978-3-642-42045-0\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LaguillaumieLLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BrakerskiLPRS13,
  author       = {Zvika Brakerski and
                  Adeline Langlois and
                  Chris Peikert and
                  Oded Regev and
                  Damien Stehl{\'{e}}},
  editor       = {Dan Boneh and
                  Tim Roughgarden and
                  Joan Feigenbaum},
  title        = {Classical hardness of learning with errors},
  booktitle    = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA,
                  USA, June 1-4, 2013},
  pages        = {575--584},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2488608.2488680},
  doi          = {10.1145/2488608.2488680},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/BrakerskiLPRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BrakerskiLPRS13,
  author       = {Zvika Brakerski and
                  Adeline Langlois and
                  Chris Peikert and
                  Oded Regev and
                  Damien Stehl{\'{e}}},
  title        = {Classical Hardness of Learning with Errors},
  journal      = {CoRR},
  volume       = {abs/1306.0281},
  year         = {2013},
  url          = {http://arxiv.org/abs/1306.0281},
  eprinttype    = {arXiv},
  eprint       = {1306.0281},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BrakerskiLPRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaguillaumieLLS13,
  author       = {Fabien Laguillaumie and
                  Adeline Langlois and
                  Beno{\^{\i}}t Libert and
                  Damien Stehl{\'{e}}},
  title        = {Lattice-Based Group Signatures with Logarithmic Signature Size},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {308},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/308},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaguillaumieLLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LangloisS12,
  author       = {Adeline Langlois and
                  Damien Stehl{\'{e}}},
  title        = {Worst-Case to Average-Case Reductions for Module Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {90},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/090},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LangloisS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics