| Randomness complexity of private circuits for multiplication S Belaïd, F Benhamouda, A Passelègue, E Prouff, A Thillard, D Vergnaud Annual International Conference on the Theory and Applications of …, 2016 | 137 | 2016 |
| Exploring crypto dark matter: New simple PRF candidates and their applications D Boneh, Y Ishai, A Passelègue, A Sahai, DJ Wu Theory of Cryptography Conference, 699-729, 2018 | 93 | 2018 |
| Attacks Against the IND-CPAD Security of Exact FHE Schemes JH Cheon, H Choe, A Passelègue, D Stehlé, E Suvanto Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024 | 86 | 2024 |
| From cryptomania to obfustopia through secret-key functional encryption N Bitansky, R Nishimaki, A Passelegue, D Wichs Theory of Cryptography Conference, 391-418, 2016 | 71 | 2016 |
| Private multiplication over finite fields S Belaïd, F Benhamouda, A Passelègue, E Prouff, A Thillard, D Vergnaud Annual International Cryptology Conference, 397-426, 2017 | 59 | 2017 |
| A detailed analysis of Fiat-Shamir with aborts J Devevey, P Fallahpour, A Passelègue, D Stehlé Annual International Cryptology Conference, 327-357, 2023 | 57 | 2023 |
| Unifying leakage models on a Rényi day T Prest, D Goudarzi, A Martinelli, A Passelègue Annual International Cryptology Conference, 683-712, 2019 | 51 | 2019 |
| Related-key security for pseudorandom functions beyond the linear barrier M Abdalla, F Benhamouda, A Passelègue, KG Paterson Annual Cryptology Conference, 77-94, 2014 | 48 | 2014 |
| Fast public-key silent OT and more from constrained Naor-Reingold D Bui, G Couteau, P Meyer, A Passelègue, M Riahinia Annual International Conference on the Theory and Applications of …, 2024 | 35 | 2024 |
| On rejection sampling in lyubashevsky’s signature scheme J Devevey, O Fawzi, A Passelègue, D Stehlé International Conference on the Theory and Application of Cryptology and …, 2022 | 32 | 2022 |
| Constrained pseudorandom functions from homomorphic secret sharing G Couteau, P Meyer, A Passelègue, M Riahinia Annual International Conference on the Theory and Applications of …, 2023 | 28 | 2023 |
| An algebraic framework for pseudorandom functions and applications to related-key security M Abdalla, F Benhamouda, A Passelègue Annual Cryptology Conference, 388-409, 2015 | 27 | 2015 |
| G+ G: a Fiat-Shamir lattice signature based on convolved Gaussians J Devevey, A Passelègue, D Stehlé International Conference on the Theory and Application of Cryptology and …, 2023 | 25 | 2023 |
| Non-trivial witness encryption and null-iO from standard assumptions Z Brakerski, A Jain, I Komargodski, A Passelègue, D Wichs International Conference on Security and Cryptography for Networks, 425-441, 2018 | 22 | 2018 |
| Efficient updatable public-key encryption from lattices C Abou Haidar, A Passelègue, D Stehlé International Conference on the Theory and Application of Cryptology and …, 2023 | 20 | 2023 |
| Simulation-sound arguments for LWE and applications to KDM-CCA2 security B Libert, K Nguyen, A Passelègue, R Titiu International Conference on the Theory and Application of Cryptology and …, 2020 | 20 | 2020 |
| New constructions of statistical NIZKs: Dual-mode DV-NIZKs and more B Libert, A Passelègue, H Wee, DJ Wu Annual International Conference on the Theory and Applications of …, 2020 | 20 | 2020 |
| Low communication threshold fully homomorphic encryption A Passelègue, D Stehlé International Conference on the Theory and Application of Cryptology and …, 2024 | 19 | 2024 |
| Updatable public key encryption from DCR: efficient constructions with stronger security C Abou Haidar, B Libert, A Passelègue Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 15 | 2022 |
| Exploring crypto dark matter D Boneh, Y Ishai, A Passelegue, A Sahai, DJ Wu Theory of Cryptography Conference, 699-729, 0 | 12 | |