Thomas Prest
Thomas Prest
Verified email at - Homepage
Cited by
Cited by
Efficient identity-based encryption over NTRU lattices
L Ducas, V Lyubashevsky, T Prest
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
Falcon: Fast-Fourier lattice-based compact signatures over NTRU
PA Fouque, J Hoffstein, P Kirchner, V Lyubashevsky, T Pornin, T Prest, ...
Submission to the NIST’s post-quantum cryptography standardization process …, 2018
T Prest, PA Fouque, J Hoffstein, P Kirchner, V Lyubashevsky, T Pornin, ...
Post-Quantum Cryptography Project of NIST, 2020
Fast fourier orthogonalization
L Ducas, T Prest
Proceedings of the ACM on International Symposium on Symbolic and Algebraic …, 2016
Sharper bounds in lattice-based cryptography using the Rényi divergence
T Prest
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
Quadratic time, linear space algorithms for Gram-Schmidt orthogonalization and Gaussian sampling in structured lattices
V Lyubashevsky, T Prest
Advances in Cryptology--EUROCRYPT 2015: 34th Annual International Conference …, 2015
Grafting trees: a fault attack against the SPHINCS framework
L Castelnovi, A Martinelli, T Prest
Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort …, 2018
Isochronous Gaussian Sampling: From Inception to Implementation: With Applications to the Falcon Signature Scheme
J Howe, T Prest, T Ricosset, M Rossi
Post-Quantum Cryptography: 11th International Conference, PQCrypto 2020 …, 2020
ModFalcon: compact signatures based on module-NTRU lattices
C Chuengsatiansup, T Prest, D Stehlé, A Wallet, K Xagawa
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
Gaussian sampling in lattice-based cryptography
T Prest
Ecole normale supérieure-ENS PARIS, 2015
More efficient algorithms for the NTRU key generation using the field norm
T Pornin, T Prest
Public-Key Cryptography–PKC 2019: 22nd IACR International Conference on …, 2019
An efficient and generic construction for signal’s handshake (X3DH): post-quantum, state leakage secure, and deniable
K Hashimoto, S Katsumata, K Kwiatkowski, T Prest
Journal of Cryptology 35 (3), 17, 2022
Non-linear polynomial selection for the number field sieve
T Prest, P Zimmermann
Journal of Symbolic Computation 47 (4), 401-409, 2012
Unifying leakage models on a Rényi day
T Prest, D Goudarzi, A Martinelli, A Passelègue
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
Scalable ciphertext compression techniques for post-quantum KEMs and their applications
S Katsumata, K Kwiatkowski, F Pintore, T Prest
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
Falcon: Fast-Fourier Lattice-Based Compact Signatures over NTRU, Specification v1. 2
PA Fouque, J Hoffstein, P Kirchner, V Lyubashevsky, T Pornin, T Prest, ...
NIST Post-Quantum Cryptography Standardization Round 3, 2020
Sok: How (not) to design and implement post-quantum cryptography
J Howe, T Prest, D Apon
Topics in Cryptology–CT-RSA 2021: Cryptographers’ Track at the RSA …, 2021
Integral matrix gram root and lattice Gaussian sampling without floats
L Ducas, S Galbraith, T Prest, Y Yu
Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020
A hybrid Gaussian sampler for lattices over rings
L Ducas, T Prest
IACR Cryptology ePrint Archive, 660, 2015
A concrete treatment of efficient continuous group key agreement via multi-recipient PKEs
K Hashimoto, S Katsumata, E Postlethwaite, T Prest, B Westerbaan
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
The system can't perform the operation now. Try again later.
Articles 1–20