default search action
Mehdi Tibouchi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j32]Jorge Chávez-Saab, Francisco Rodríguez-Henríquez, Mehdi Tibouchi:
SwiftEC: Shallue-van de Woestijne Indifferentiable Function To Elliptic Curves. J. Cryptol. 38(1): 3 (2025) - 2024
- [j31]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi:
Masking the GLP Lattice-Based Signature Scheme at Any Order. J. Cryptol. 37(1): 5 (2024) - [c76]Masayuki Abe, Masaya Nanri, Octavio Perez-Kempner, Mehdi Tibouchi:
Interactive Threshold Mercurial Signatures and Applications. ASIACRYPT (3) 2024: 69-103 - [c75]Masayuki Abe, Andrej Bogdanov, Miyako Ohkubo, Alon Rosen, Zehua Shang, Mehdi Tibouchi:
CDS Composition of Multi-round Protocols. CRYPTO (9) 2024: 391-423 - [c74]Xiuhan Lin, Moeto Suzuki, Shiduo Zhang, Thomas Espitau, Yang Yu, Mehdi Tibouchi, Masayuki Abe:
Cryptanalysis of the Peregrine Lattice-Based Signature Scheme. Public Key Cryptography (1) 2024: 387-412 - [c73]Ludo N. Pulles, Mehdi Tibouchi:
Cryptanalysis of EagleSign. SCN (2) 2024: 165-186 - [i76]Masaya Nanri, Octavio Perez-Kempner, Mehdi Tibouchi, Masayuki Abe:
Interactive Threshold Mercurial Signatures and Applications. IACR Cryptol. ePrint Arch. 2024: 625 (2024) - [i75]Cecilia Boschini, Darya Kaviani, Russell W. F. Lai, Giulio Malavolta, Akira Takahashi, Mehdi Tibouchi:
Ringtail: Practical Two-Round Threshold Signatures from Learning with Errors. IACR Cryptol. ePrint Arch. 2024: 1113 (2024) - [i74]Ludo N. Pulles, Mehdi Tibouchi:
Cryptanalysis of EagleSign. IACR Cryptol. ePrint Arch. 2024: 1137 (2024) - [i73]Masayuki Abe, Masaya Nanri, Miyako Ohkubo, Octavio Perez-Kempner, Daniel Slamanig, Mehdi Tibouchi:
Scalable Mixnets from Mercurial Signatures on Randomizable Ciphertexts. IACR Cryptol. ePrint Arch. 2024: 1503 (2024) - [i72]Xiuhan Lin, Mehdi Tibouchi, Yang Yu, Shiduo Zhang:
Do Not Disturb a Sleeping Falcon: Floating-Point Error Sensitivity of the Falcon Sampler and Its Consequences. IACR Cryptol. ePrint Arch. 2024: 1709 (2024) - [i71]Masayuki Abe, David Balbás, Dung Bui, Miyako Ohkubo, Zehua Shang, Mehdi Tibouchi:
Critical Round in Multi-Round Proofs: Compositions and Transformation to Trapdoor Commitments. IACR Cryptol. ePrint Arch. 2024: 1766 (2024) - 2023
- [j30]Ayoub Otmani, Christophe Petit, Mehdi Tibouchi:
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post-quantum proposals. IET Inf. Secur. 17(2): 159-160 (2023) - [j29]Ryusuke Koseki, Akira Ito, Rei Ueno, Mehdi Tibouchi, Naofumi Homma:
Homomorphic encryption for stochastic computing. J. Cryptogr. Eng. 13(2): 251-263 (2023) - [j28]Vincent Quentin Ulitzsch, Soundes Marzougui, Alexis Bagia, Mehdi Tibouchi, Jean-Pierre Seifert:
Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4): 367-392 (2023) - [c72]Quan Yuan, Mehdi Tibouchi, Masayuki Abe:
Quantum-Access Security of Hash-Based Signature Schemes. ACISP 2023: 343-380 - [c71]Thomas Espitau, Thi Thu Quyen Nguyen, Chao Sun, Mehdi Tibouchi, Alexandre Wallet:
Antrag: Annular NTRU Trapdoor Generation - Making Mitaka as Secure as Falcon. ASIACRYPT (7) 2023: 3-36 - [c70]Diego F. Aranha, Benjamin Salling Hvass, Bas Spitters, Mehdi Tibouchi:
Faster Constant-time Evaluation of the Kronecker Symbol with Application to Elliptic Curve Hashing. CCS 2023: 3228-3238 - [e7]Mehdi Tibouchi, Xiaofeng Wang:
Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part I. Lecture Notes in Computer Science 13905, Springer 2023, ISBN 978-3-031-33487-0 [contents] - [e6]Mehdi Tibouchi, Xiaofeng Wang:
Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II. Lecture Notes in Computer Science 13906, Springer 2023, ISBN 978-3-031-33490-0 [contents] - [e5]Abdelrahaman Aly, Mehdi Tibouchi:
Progress in Cryptology - LATINCRYPT 2023 - 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3-6, 2023, Proceedings. Lecture Notes in Computer Science 14168, Springer 2023, ISBN 978-3-031-44468-5 [contents] - [i70]Quan Yuan, Mehdi Tibouchi, Masayuki Abe:
Quantum-access Security of Hash-based Signature Schemes. IACR Cryptol. ePrint Arch. 2023: 556 (2023) - [i69]Diego F. Aranha, Benjamin Salling Hvass, Bas Spitters, Mehdi Tibouchi:
Faster constant-time evaluation of the Kronecker symbol with application to elliptic curve hashing. IACR Cryptol. ePrint Arch. 2023: 1261 (2023) - [i68]Thomas Espitau, Thi Thu Quyen Nguyen, Chao Sun, Mehdi Tibouchi, Alexandre Wallet:
Antrag: Annular NTRU Trapdoor Generation. IACR Cryptol. ePrint Arch. 2023: 1335 (2023) - [i67]Xiuhan Lin, Moeto Suzuki, Shiduo Zhang, Thomas Espitau, Yang Yu, Mehdi Tibouchi, Masayuki Abe:
Cryptanalysis of the Peregrine Lattice-Based Signature Scheme. IACR Cryptol. ePrint Arch. 2023: 1628 (2023) - 2022
- [j27]Quan Yuan, Mehdi Tibouchi, Masayuki Abe:
On subset-resilient hash function families. Des. Codes Cryptogr. 90(3): 719-758 (2022) - [j26]Quan Yuan, Mehdi Tibouchi, Masayuki Abe:
Security notions for stateful signature schemes. IET Inf. Secur. 16(1): 1-17 (2022) - [j25]Ivan Damgård, Claudio Orlandi, Akira Takahashi, Mehdi Tibouchi:
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices. J. Cryptol. 35(2): 14 (2022) - [j24]Chao Sun, Thomas Espitau, Mehdi Tibouchi, Masayuki Abe:
Guessing Bits: Improved Lattice Attacks on (EC)DSA with Nonce Leakage. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1): 391-413 (2022) - [c69]Jorge Chávez-Saab, Francisco Rodríguez-Henríquez, Mehdi Tibouchi:
SwiftEC: Shallue-van de Woestijne Indifferentiable Function to Elliptic Curves - Faster Indifferentiable Hashing to Elliptic Curves. ASIACRYPT (1) 2022: 63-92 - [c68]Thomas Espitau, Mehdi Tibouchi, Alexandre Wallet, Yang Yu:
Shorter Hash-and-Sign Lattice-Based Signatures. CRYPTO (2) 2022: 245-275 - [c67]Cecilia Boschini, Akira Takahashi, Mehdi Tibouchi:
MuSig-L: Lattice-Based Multi-signature with Single-Round Online Phase. CRYPTO (2) 2022: 276-305 - [c66]Thomas Espitau, Pierre-Alain Fouque, François Gérard, Mélissa Rossi, Akira Takahashi, Mehdi Tibouchi, Alexandre Wallet, Yang Yu:
Mitaka: A Simpler, Parallelizable, Maskable Variant of Falcon. EUROCRYPT (3) 2022: 222-253 - [c65]Vincent Quentin Ulitzsch, Soundes Marzougui, Mehdi Tibouchi, Jean-Pierre Seifert:
Profiling Side-Channel Attacks on Dilithium - A Small Bit-Fiddling Leak Breaks It All. SAC 2022: 3-32 - [i66]Soundes Marzougui, Vincent Ulitzsch, Mehdi Tibouchi, Jean-Pierre Seifert:
Profiling Side-Channel Attacks on Dilithium: A Small Bit-Fiddling Leak Breaks It All. IACR Cryptol. ePrint Arch. 2022: 106 (2022) - [i65]Jorge Chávez-Saab, Francisco Rodríguez-Henríquez, Mehdi Tibouchi:
SwiftEC: Shallue-van de Woestijne Indifferentiable Function To Elliptic Curves. IACR Cryptol. ePrint Arch. 2022: 759 (2022) - [i64]Thomas Espitau, Mehdi Tibouchi, Alexandre Wallet, Yang Yu:
Shorter Hash-and-Sign Lattice-Based Signatures. IACR Cryptol. ePrint Arch. 2022: 785 (2022) - [i63]Cecilia Boschini, Akira Takahashi, Mehdi Tibouchi:
MuSig-L: Lattice-Based Multi-Signature With Single-Round Online Phase. IACR Cryptol. ePrint Arch. 2022: 1036 (2022) - 2021
- [j23]Kyosuke Yamashita, Mehdi Tibouchi, Masayuki Abe:
On the Impossibility of NIZKs for Disjunctive Languages From Commit-and-Prove NIZKs. IEEE Access 9: 51368-51379 (2021) - [j22]Mehdi Tibouchi, Alexandre Wallet:
One Bit is All It Takes: A Devastating Timing Attack on BLISS's Non-Constant Time Sign Flips. J. Math. Cryptol. 15(1): 131-142 (2021) - [c64]Ivan Damgård, Claudio Orlandi, Akira Takahashi, Mehdi Tibouchi:
Two-Round n-out-of-n and Multi-signatures and Trapdoor Commitment from Lattices. Public Key Cryptography (1) 2021: 99-130 - [c63]Jorge Chávez-Saab, Francisco Rodríguez-Henríquez, Mehdi Tibouchi:
Verifiable Isogeny Walks: Towards an Isogeny-Based Postquantum VDF. SAC 2021: 441-460 - [e4]Mehdi Tibouchi, Huaxiong Wang:
Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part I. Lecture Notes in Computer Science 13090, Springer 2021, ISBN 978-3-030-92061-6 [contents] - [e3]Mehdi Tibouchi, Huaxiong Wang:
Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part II. Lecture Notes in Computer Science 13091, Springer 2021, ISBN 978-3-030-92074-6 [contents] - [e2]Mehdi Tibouchi, Huaxiong Wang:
Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part III. Lecture Notes in Computer Science 13092, Springer 2021, ISBN 978-3-030-92077-7 [contents] - [e1]Mehdi Tibouchi, Huaxiong Wang:
Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part IV. Lecture Notes in Computer Science 13093, Springer 2021, ISBN 978-3-030-92067-8 [contents] - [i62]Chao Sun, Thomas Espitau, Mehdi Tibouchi, Masayuki Abe:
Guessing Bits: Improved Lattice Attacks on (EC)DSA. IACR Cryptol. ePrint Arch. 2021: 455 (2021) - [i61]Jorge Chávez-Saab, Francisco Rodríguez-Henríquez, Mehdi Tibouchi:
Verifiable Isogeny Walks: Towards an Isogeny-based Postquantum VDF. IACR Cryptol. ePrint Arch. 2021: 1289 (2021) - [i60]Thomas Espitau, Pierre-Alain Fouque, François Gérard, Mélissa Rossi, Akira Takahashi, Mehdi Tibouchi, Alexandre Wallet, Yang Yu:
Mitaka: a simpler, parallelizable, maskable variant of Falcon. IACR Cryptol. ePrint Arch. 2021: 1486 (2021) - 2020
- [j21]Kyosuke Yamashita, Mehdi Tibouchi, Masayuki Abe:
A Coin-Free Oracle-Based Augmented Black Box Framework (Full Paper). IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(10): 1167-1173 (2020) - [j20]Dan Boneh, Darren B. Glass, Daniel Krashen, Kristin E. Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry:
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves. J. Math. Cryptol. 14(1): 5-14 (2020) - [j19]Houda Ferradi, Rémi Géraud, Sylvain Guilley, David Naccache, Mehdi Tibouchi:
Recovering Secrets From Prefix-Dependent Leakage. J. Math. Cryptol. 14(1): 15-24 (2020) - [j18]Taechan Kim, Mehdi Tibouchi:
Equidistribution Among Cosets of Elliptic Curve Points in Intervals. J. Math. Cryptol. 14(1): 339-345 (2020) - [c62]Chao Sun, Mehdi Tibouchi, Masayuki Abe:
Revisiting the Hardness of Binary Error LWE. ACISP 2020: 425-444 - [c61]Diego F. Aranha, Felipe Rodrigues Novaes, Akira Takahashi, Mehdi Tibouchi, Yuval Yarom:
LadderLeak: Breaking ECDSA with Less than One Bit of Nonce Leakage. CCS 2020: 225-242 - [c60]Jeongeun Park, Mehdi Tibouchi:
SHECS-PIR: Somewhat Homomorphic Encryption-Based Compact and Scalable Private Information Retrieval. ESORICS (2) 2020: 86-106 - [c59]Pierre-Alain Fouque, Paul Kirchner, Mehdi Tibouchi, Alexandre Wallet, Yang Yu:
Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices. EUROCRYPT (3) 2020: 34-63 - [c58]Kyosuke Yamashita, Mehdi Tibouchi, Masayuki Abe:
On Black-Box Extension of a Non-Interactive Zero-Knowledge Proof System for Secret Equality. INDOCRYPT 2020: 882-904 - [i59]Diego F. Aranha, Felipe Rodrigues Novaes, Akira Takahashi, Mehdi Tibouchi, Yuval Yarom:
LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage. IACR Cryptol. ePrint Arch. 2020: 615 (2020) - [i58]Chao Sun, Mehdi Tibouchi, Masayuki Abe:
Revisiting the Hardness of Binary Error LWE. IACR Cryptol. ePrint Arch. 2020: 666 (2020) - [i57]Ivan Damgård, Claudio Orlandi, Akira Takahashi, Mehdi Tibouchi:
Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices. IACR Cryptol. ePrint Arch. 2020: 1110 (2020)
2010 – 2019
- 2019
- [j17]Masayuki Abe, Jens Groth, Markulf Kohlweiss, Miyako Ohkubo, Mehdi Tibouchi:
Efficient Fully Structure-Preserving Signatures and Shrinking Commitments. J. Cryptol. 32(3): 973-1025 (2019) - [j16]Pierre-Alain Fouque, Mehdi Tibouchi:
Close to Uniform Prime Number Generation With Fewer Random Bits. IEEE Trans. Inf. Theory 65(2): 1307-1317 (2019) - [c57]Vincent Migliore, Benoît Gérard, Mehdi Tibouchi, Pierre-Alain Fouque:
Masking Dilithium - Efficient Implementation and Side-Channel Evaluation. ACNS 2019: 344-362 - [c56]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi:
GALACTICS: Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited. CCS 2019: 2147-2164 - [c55]Akira Takahashi, Mehdi Tibouchi:
Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL. EuroS&P 2019: 371-386 - [c54]Kyosuke Yamashita, Mehdi Tibouchi, Masayuki Abe:
A Coin-Free Oracle-Based Augmented Black Box Framework. ProvSec 2019: 265-272 - [i56]Vincent Migliore, Benoît Gérard, Mehdi Tibouchi, Pierre-Alain Fouque:
Masking Dilithium: Efficient Implementation and Side-Channel Evaluation. IACR Cryptol. ePrint Arch. 2019: 394 (2019) - [i55]Akira Takahashi, Mehdi Tibouchi:
Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL. IACR Cryptol. ePrint Arch. 2019: 400 (2019) - [i54]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi:
GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited. IACR Cryptol. ePrint Arch. 2019: 511 (2019) - [i53]Kyosuke Yamashita, Mehdi Tibouchi, Masayuki Abe:
A Coin-Free Oracle-Based Augmented Black Box Framework. IACR Cryptol. ePrint Arch. 2019: 859 (2019) - [i52]Mehdi Tibouchi, Alexandre Wallet:
One Bit is All It Takes: A Devastating Timing Attack on BLISS's Non-Constant Time Sign Flips. IACR Cryptol. ePrint Arch. 2019: 898 (2019) - [i51]Pierre-Alain Fouque, Paul Kirchner, Mehdi Tibouchi, Alexandre Wallet, Yang Yu:
Uprooting the Falcon Tree? IACR Cryptol. ePrint Arch. 2019: 1180 (2019) - 2018
- [j15]Samuel Neves, Mehdi Tibouchi:
Degenerate curve attacks: extending invalid curve attacks to Edwards curves and other models. IET Inf. Secur. 12(3): 217-225 (2018) - [j14]Eunkyung Kim, Mehdi Tibouchi:
FHE over the integers and modular arithmetic circuits. IET Inf. Secur. 12(4): 257-264 (2018) - [j13]Gaetan Bisson, Mehdi Tibouchi:
Constructing Permutation Rational Functions from Isogenies. SIAM J. Discret. Math. 32(3): 1741-1749 (2018) - [j12]Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi:
Loop-Abort Faults on Lattice-Based Signature Schemes and Key Exchange Protocols. IEEE Trans. Computers 67(11): 1535-1549 (2018) - [j11]Akira Takahashi, Mehdi Tibouchi, Masayuki Abe:
New Bleichenbacher Records: Fault Attacks on qDSA Signatures. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 331-371 (2018) - [c53]Jonathan Bootle, Claire Delaplace, Thomas Espitau, Pierre-Alain Fouque, Mehdi Tibouchi:
LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS. ASIACRYPT (1) 2018: 494-524 - [c52]Jonathan Bootle, Mehdi Tibouchi, Keita Xagawa:
Cryptanalysis of Compact-LWE. CT-RSA 2018: 80-97 - [c51]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi:
Masking the GLP Lattice-Based Signature Scheme at Any Order. EUROCRYPT (2) 2018: 354-384 - [c50]Chen Qian, Mehdi Tibouchi, Rémi Géraud:
Universal Witness Signatures. IWSEC 2018: 313-329 - [c49]Masayuki Abe, Miguel Ambrona, Miyako Ohkubo, Mehdi Tibouchi:
Lower Bounds on Structure-Preserving Signatures for Bilateral Messages. SCN 2018: 3-22 - [i50]Dan Boneh, Darren B. Glass, Daniel Krashen, Kristin E. Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry:
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves. CoRR abs/1807.03038 (2018) - [i49]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi:
Masking the GLP Lattice-Based Signature Scheme at Any Order. IACR Cryptol. ePrint Arch. 2018: 381 (2018) - [i48]Akira Takahashi, Mehdi Tibouchi, Masayuki Abe:
New Bleichenbacher Records: Practical Fault Attacks on qDSA Signatures. IACR Cryptol. ePrint Arch. 2018: 396 (2018) - [i47]Masayuki Abe, Miguel Ambrona, Miyako Ohkubo, Mehdi Tibouchi:
Lower Bounds on Structure-Preserving Signatures for Bilateral Messages. IACR Cryptol. ePrint Arch. 2018: 640 (2018) - [i46]Dan Boneh, Darren B. Glass, Daniel Krashen, Kristin E. Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry:
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves. IACR Cryptol. ePrint Arch. 2018: 665 (2018) - [i45]Houda Ferradi, Rémi Géraud, Sylvain Guilley, David Naccache, Mehdi Tibouchi:
Recovering Secrets From Prefix-Dependent Leakage. IACR Cryptol. ePrint Arch. 2018: 798 (2018) - [i44]Jonathan Bootle, Claire Delaplace, Thomas Espitau, Pierre-Alain Fouque, Mehdi Tibouchi:
LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS. IACR Cryptol. ePrint Arch. 2018: 822 (2018) - 2017
- [j10]Jeremy Maitin-Shepard, Mehdi Tibouchi, Diego F. Aranha:
Elliptic Curve Multiset Hash. Comput. J. 60(4): 476-490 (2017) - [j9]Mehdi Tibouchi, Taechan Kim:
Improved elliptic curve hashing and point representation. Des. Codes Cryptogr. 82(1-2): 161-177 (2017) - [c48]Eunkyung Kim, Mehdi Tibouchi:
Secure GLS Recomposition for Sum-of-Square Cofactors. ACISP (2) 2017: 349-365 - [c47]Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi:
Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers. CCS 2017: 1857-1874 - [c46]Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi:
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13. Public Key Cryptography (1) 2017: 41-58 - [i43]Gaetan Bisson, Mehdi Tibouchi:
Constructing Permutation Rational Functions From Isogenies. CoRR abs/1707.06134 (2017) - [i42]Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi:
Side-Channel Attacks on BLISS Lattice-Based Signatures - Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers. IACR Cryptol. ePrint Arch. 2017: 505 (2017) - [i41]Jonathan Bootle, Mehdi Tibouchi:
Cryptanalysis of Compact-LWE. IACR Cryptol. ePrint Arch. 2017: 742 (2017) - 2016
- [j8]Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi:
Strongly-optimal structure preserving signatures from Type II pairings: synthesis and lower bounds. IET Inf. Secur. 10(6): 358-371 (2016) - [j7]Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi:
Tightly Secure Signatures From Lossy Identification Schemes. J. Cryptol. 29(3): 597-631 (2016) - [j6]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann:
Practical Cryptanalysis of ISO 9796-2 and EMV Signatures. J. Cryptol. 29(3): 632-656 (2016) - [c45]Eunkyung Kim, Mehdi Tibouchi:
FHE Over the Integers and Modular Arithmetic Circuits. CANS 2016: 435-450 - [c44]Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi:
Cryptanalysis of GGH15 Multilinear Maps. CRYPTO (2) 2016: 607-628 - [c43]Pierre Belgarric, Pierre-Alain Fouque, Gilles Macario-Rat, Mehdi Tibouchi:
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones. CT-RSA 2016: 236-252 - [c42]Samuel Neves, Mehdi Tibouchi:
Degenerate Curve Attacks - Extending Invalid Curve Attacks to Edwards Curves and Other Models. Public Key Cryptography (2) 2016: 19-35 - [c41]Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi:
Loop-Abort Faults on Lattice-Based Fiat-Shamir and Hash-and-Sign Signatures. SAC 2016: 140-158 - [i40]Jeremy Maitin-Shepard, Mehdi Tibouchi, Diego F. Aranha:
Elliptic Curve Multiset Hash. CoRR abs/1601.06502 (2016) - [i39]Pierre Belgarric, Pierre-Alain Fouque, Gilles Macario-Rat, Mehdi Tibouchi:
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones. IACR Cryptol. ePrint Arch. 2016: 231 (2016) - [i38]Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi:
Loop abort Faults on Lattice-Based Fiat-Shamir & Hash'n Sign signatures. IACR Cryptol. ePrint Arch. 2016: 449 (2016) - [i37]Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi:
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13. IACR Cryptol. ePrint Arch. 2016: 1011 (2016) - 2015
- [c40]Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations. CRYPTO (1) 2015: 247-266 - [c39]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
New Multilinear Maps Over the Integers. CRYPTO (1) 2015: 267-286 - [c38]Pierre-Alain Fouque, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi:
Cryptanalysis of the Co-ACD Assumption. CRYPTO (1) 2015: 561-580 - [c37]Masayuki Abe, Markulf Kohlweiss, Miyako Ohkubo, Mehdi Tibouchi:
Fully Structure-Preserving Signatures and Shrinking Commitments. EUROCRYPT (2) 2015: 35-65 - [c36]Tancrède Lepoint, Mehdi Tibouchi:
Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR. Financial Cryptography Workshops 2015: 184-193 - [c35]Jean-Sébastien Coron, Johann Großschädl, Mehdi Tibouchi, Praveen Kumar Vadnala:
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity. FSE 2015: 130-149 - [c34]Taechan Kim, Mehdi Tibouchi:
Invalid Curve Attacks in a GLS Setting. IWSEC 2015: 41-55 - [c33]Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi:
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds. Public Key Cryptography 2015: 355-376 - [i36]Tancrède Lepoint, Mehdi Tibouchi:
Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR. IACR Cryptol. ePrint Arch. 2015: 12 (2015) - [i35]Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi:
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds. IACR Cryptol. ePrint Arch. 2015: 19 (2015) - [i34]Masayuki Abe, Markulf Kohlweiss, Miyako Ohkubo, Mehdi Tibouchi:
Fully Structure-Preserving Signatures and Shrinking Commitments. IACR Cryptol. ePrint Arch. 2015: 76 (2015) - [i33]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
New Multilinear Maps over the Integers. IACR Cryptol. ePrint Arch. 2015: 162 (2015) - [i32]Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations. IACR Cryptol. ePrint Arch. 2015: 596 (2015) - [i31]Zvika Brakerski, Craig Gentry, Shai Halevi, Tancrède Lepoint, Amit Sahai, Mehdi Tibouchi:
Cryptanalysis of the Quadratic Zero-Testing of GGH. IACR Cryptol. ePrint Arch. 2015: 845 (2015) - [i30]Samuel Neves, Mehdi Tibouchi:
Degenerate Curve Attacks. IACR Cryptol. ePrint Arch. 2015: 1233 (2015) - 2014
- [c32]Taechan Kim, Mehdi Tibouchi:
Bit-Flip Faults on Elliptic Curve Base Fields, Revisited. ACNS 2014: 163-180 - [c31]Diego F. Aranha, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias. ASIACRYPT (1) 2014: 262-281 - [c30]Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Making RSA-PSS Provably Secure against Non-random Faults. CHES 2014: 206-222 - [c29]Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi:
Structure-Preserving Signatures from Type II Pairings. CRYPTO (1) 2014: 390-407 - [c28]Mehdi Tibouchi:
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings. Financial Cryptography 2014: 139-156 - [c27]Pierre-Alain Fouque, Mehdi Tibouchi:
Close to Uniform Prime Number Generation with Fewer Random Bits. ICALP (1) 2014: 991-1002 - [c26]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Scale-Invariant Fully Homomorphic Encryption over the Integers. Public Key Cryptography 2014: 311-328 - [c25]Mehdi Tibouchi:
Impossibility of Surjective Icart-Like Encodings. ProvSec 2014: 29-39 - [c24]Diego F. Aranha, Pierre-Alain Fouque, Chen Qian, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Binary Elligator Squared. Selected Areas in Cryptography 2014: 20-37 - [c23]Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi:
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures. TCC 2014: 688-712 - [i29]Pierre-Alain Fouque, Mehdi Tibouchi:
Close to Uniform Prime Number Generation With Fewer Random Bits. CoRR abs/1406.7078 (2014) - [i28]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Scale-Invariant Fully Homomorphic Encryption over the Integers. IACR Cryptol. ePrint Arch. 2014: 32 (2014) - [i27]Mehdi Tibouchi:
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings. IACR Cryptol. ePrint Arch. 2014: 43 (2014) - [i26]Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi:
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures. IACR Cryptol. ePrint Arch. 2014: 95 (2014) - [i25]Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Making RSA-PSS Provably Secure Against Non-Random Faults. IACR Cryptol. ePrint Arch. 2014: 252 (2014) - [i24]Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi:
Structure-Preserving Signatures from Type II Pairings. IACR Cryptol. ePrint Arch. 2014: 312 (2014) - [i23]Diego F. Aranha, Pierre-Alain Fouque, Chen Qian, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Binary Elligator Squared. IACR Cryptol. ePrint Arch. 2014: 486 (2014) - [i22]Jean-Sébastien Coron, Johann Großschädl, Praveen Kumar Vadnala, Mehdi Tibouchi:
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity. IACR Cryptol. ePrint Arch. 2014: 891 (2014) - [i21]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers. IACR Cryptol. ePrint Arch. 2014: 975 (2014) - 2013
- [j5]Pierre-Alain Fouque, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Attacking RSA-CRT signatures with faults on montgomery multiplication. J. Cryptogr. Eng. 3(1): 59-72 (2013) - [j4]Jean-Sébastien Coron, Alexey Kirichenko, Mehdi Tibouchi:
A Note on the Bivariate Coppersmith Theorem. J. Cryptol. 26(2): 246-250 (2013) - [j3]Reza Rezaeian Farashahi, Pierre-Alain Fouque, Igor E. Shparlinski, Mehdi Tibouchi, José Felipe Voloch:
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves. Math. Comput. 82(281): 491-512 (2013) - [c22]Pierre-Alain Fouque, Antoine Joux, Mehdi Tibouchi:
Injective Encodings to Elliptic Curves. ACISP 2013: 203-218 - [c21]Diana Maimut, Cédric Murdica, David Naccache, Mehdi Tibouchi:
Fault Attacks on Projective-to-Affine Coordinates Conversion. COSADE 2013: 46-61 - [c20]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Practical Multilinear Maps over the Integers. CRYPTO (1) 2013: 476-493 - [c19]Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, Aaram Yun:
Batch Fully Homomorphic Encryption over the Integers. EUROCRYPT 2013: 315-335 - [c18]Pierre-Alain Fouque, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Recovering Private Keys Generated with Weak PRNGs. IMACC 2013: 158-172 - [i20]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Batch Fully Homomorphic Encryption over the Integers. IACR Cryptol. ePrint Arch. 2013: 36 (2013) - [i19]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Practical Multilinear Maps over the Integers. IACR Cryptol. ePrint Arch. 2013: 183 (2013) - [i18]Pierre-Alain Fouque, Antoine Joux, Mehdi Tibouchi:
Injective Encoding to Elliptic Curves. IACR Cryptol. ePrint Arch. 2013: 373 (2013) - [i17]Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi:
Tightly-Secure Signatures From Lossy Identification Schemes. IACR Cryptol. ePrint Arch. 2013: 856 (2013) - 2012
- [c17]Mehdi Tibouchi:
A Nagell Algorithm in Any Characteristic. Cryptography and Security 2012: 474-479 - [c16]Pierre-Alain Fouque, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication. CHES 2012: 447-462 - [c15]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers. EUROCRYPT 2012: 446-464 - [c14]Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi:
Tightly-Secure Signatures from Lossy Identification Schemes. EUROCRYPT 2012: 572-590 - [c13]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Another Look at Affine-Padding RSA Signatures. ICISC 2012: 22-32 - [c12]Pierre-Alain Fouque, Mehdi Tibouchi:
Indifferentiable Hashing to Barreto-Naehrig Curves. LATINCRYPT 2012: 1-17 - [p1]Phong Q. Nguyen, Mehdi Tibouchi:
Lattice-Based Fault Attacks on Signatures. Fault Analysis in Cryptography 2012: 201-220 - [i16]Pierre-Alain Fouque, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication. IACR Cryptol. ePrint Arch. 2012: 172 (2012) - 2011
- [b1]Mehdi Tibouchi:
Hashing to elliptic curves and cryptanalysis of RSA-based schemes. (Hachage vers les courbes elliptiques et cryptanalyse de schémas RSA). Paris Diderot University, France, 2011 - [j2]Hervé Chabanne, Mehdi Tibouchi:
Securing E-passports with Elliptic Curves. IEEE Secur. Priv. 9(2): 75-78 (2011) - [j1]Eric Brier, David Naccache, Phong Q. Nguyen, Mehdi Tibouchi:
Modulus fault attacks against RSA-CRT signatures. J. Cryptogr. Eng. 1(3): 243-253 (2011) - [c11]Eric Brier, David Naccache, Phong Q. Nguyen, Mehdi Tibouchi:
Modulus Fault Attacks against RSA-CRT Signatures. CHES 2011: 192-206 - [c10]Jean-Sébastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi:
Fully Homomorphic Encryption over the Integers with Shorter Public Keys. CRYPTO 2011: 487-504 - [c9]Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi:
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005. Public Key Cryptography 2011: 147-155 - [r2]Mehdi Tibouchi:
ISO-9796 Signature Standards. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 649-650 - [r1]Mehdi Tibouchi:
Security Reduction. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1167-1168 - [i15]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Another Look at RSA Signatures With Affine Padding. IACR Cryptol. ePrint Arch. 2011: 57 (2011) - [i14]Eric Brier, David Naccache, Phong Q. Nguyen, Mehdi Tibouchi:
Modulus Fault Attacks Against RSA-CRT Signatures. IACR Cryptol. ePrint Arch. 2011: 388 (2011) - [i13]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Optimization of Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2011: 440 (2011) - [i12]Jean-Sébastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi:
Fully Homomorphic Encryption over the Integers with Shorter Public Keys. IACR Cryptol. ePrint Arch. 2011: 441 (2011) - [i11]Pierre-Alain Fouque, Mehdi Tibouchi:
Close to Uniform Prime Number Generation With Fewer Random Bits. IACR Cryptol. ePrint Arch. 2011: 481 (2011) - 2010
- [c8]Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud:
On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption. ACNS 2010: 1-18 - [c7]Marc Joye, Mehdi Tibouchi, Damien Vergnaud:
Huff's Model for Elliptic Curves. ANTS 2010: 234-250 - [c6]Eric Brier, Jean-Sébastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi:
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves. CRYPTO 2010: 237-254 - [c5]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Fault Attacks Against emv Signatures. CT-RSA 2010: 208-220 - [c4]Pierre-Alain Fouque, Mehdi Tibouchi:
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves. LATINCRYPT 2010: 81-91 - [c3]Pierre-Alain Fouque, Mehdi Tibouchi:
Deterministic Encoding and Hashing to Odd Hyperelliptic Curves. Pairing 2010: 265-277 - [i10]Pierre-Alain Fouque, Mehdi Tibouchi:
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves. IACR Cryptol. ePrint Arch. 2010: 37 (2010) - [i9]Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud:
On The Broadcast and Validity-Checking Security of PKCS \#1 v1.5 Encryption. IACR Cryptol. ePrint Arch. 2010: 135 (2010) - [i8]Pierre-Alain Fouque, Mehdi Tibouchi:
Deterministic Encoding and Hashing to Odd Hyperelliptic Curves. IACR Cryptol. ePrint Arch. 2010: 382 (2010) - [i7]Marc Joye, Mehdi Tibouchi, Damien Vergnaud:
Huff's Model for Elliptic Curves. IACR Cryptol. ePrint Arch. 2010: 383 (2010) - [i6]Reza Rezaeian Farashahi, Pierre-Alain Fouque, Igor E. Shparlinski, Mehdi Tibouchi, José Felipe Voloch:
Indifferentiable Deterministic Hashing to Elliptic and Hyperelliptic Curves. IACR Cryptol. ePrint Arch. 2010: 539 (2010) - [i5]Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi:
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005. IACR Cryptol. ePrint Arch. 2010: 650 (2010)
2000 – 2009
- 2009
- [c2]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann:
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures. CRYPTO 2009: 428-444 - [c1]Eric Brier, David Naccache, Mehdi Tibouchi:
Factoring Unbalanced Moduli with Known Bits. ICISC 2009: 65-72 - [i4]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann:
Practical Cryptanalysis of ISO/IEC 9796-2 and EMV Signatures. IACR Cryptol. ePrint Arch. 2009: 203 (2009) - [i3]Eric Brier, David Naccache, Mehdi Tibouchi:
Factoring Unbalanced Moduli with Known Bits. IACR Cryptol. ePrint Arch. 2009: 323 (2009) - [i2]Eric Brier, Jean-Sébastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi:
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves. IACR Cryptol. ePrint Arch. 2009: 340 (2009) - [i1]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Fault Attacks Against EMV Signatures. IACR Cryptol. ePrint Arch. 2009: 503 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-28 23:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint