Volgen
Frederik Vercauteren
Frederik Vercauteren
Geverifieerd e-mailadres voor esat.kuleuven.be
Titel
Geciteerd door
Geciteerd door
Jaar
Somewhat practical fully homomorphic encryption
J Fan, F Vercauteren
Cryptology ePrint Archive, 2012
23402012
Handbook of elliptic and hyperelliptic curve cryptography
H Cohen, G Frey, R Avanzi, C Doche, T Lange, K Nguyen, F Vercauteren
CRC press, 2006
18152006
Fully homomorphic encryption with relatively small key and ciphertext sizes
NP Smart, F Vercauteren
International Workshop on Public Key Cryptography, 420-443, 2010
12332010
Fully homomorphic SIMD operations
NP Smart, F Vercauteren
Designs, codes and cryptography 71, 57-81, 2014
9872014
The eta pairing revisited
F Hess, NP Smart, F Vercauteren
IEEE transactions on information theory 52 (10), 4595-4602, 2006
6252006
Optimal pairings
F Vercauteren
IEEE transactions on information theory 56 (1), 455-461, 2009
4552009
Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
JP D’Anvers, A Karmakar, S Sinha Roy, F Vercauteren
Progress in Cryptology–AFRICACRYPT 2018: 10th International Conference on …, 2018
3732018
Compact ring-LWE cryptoprocessor
SS Roy, F Vercauteren, N Mentens, DD Chen, I Verbauwhede
Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014
3662014
CSI-FiSh: efficient isogeny based signatures through class group computations
W Beullens, T Kleinjung, F Vercauteren
International conference on the theory and application of cryptology and …, 2019
3152019
FPGA-based high-performance parallel architecture for homomorphic computing on encrypted data
SS Roy, F Turan, K Jarvinen, F Vercauteren, I Verbauwhede
2019 IEEE International symposium on high performance computer architecture …, 2019
2182019
High-speed polynomial multiplication architecture for ring-LWE and SHE cryptosystems
DD Chen, N Mentens, F Vercauteren, SS Roy, RCC Cheung, D Pao, ...
IEEE Transactions on Circuits and Systems I: Regular Papers 62 (1), 157-166, 2014
1742014
The number field sieve in the medium prime case
A Joux, R Lercier, N Smart, F Vercauteren
Annual International Cryptology Conference, 326-344, 2006
1682006
A new RFID privacy model
J Hermans, A Pashalidis, F Vercauteren, B Preneel
European symposium on research in computer security, 568-587, 2011
1582011
Efficient software implementation of ring-LWE encryption
R De Clercq, SS Roy, F Vercauteren, I Verbauwhede
2015 design, automation & test in europe conference & exhibition (DATE), 339-344, 2015
1422015
A fault attack on pairing-based cryptography
D Page, F Vercauteren
IEEE Transactions on Computers 55 (9), 1075-1080, 2006
129*2006
Privacy-preserving logistic regression training
C Bonte, F Vercauteren
BMC medical genomics 11, 13-21, 2018
1262018
A masked ring-LWE implementation
O Reparaz, S Sinha Roy, F Vercauteren, I Verbauwhede
International Workshop on Cryptographic Hardware and Embedded Systems, 683-702, 2015
1242015
Speed records for NTRU
J Hermans, F Vercauteren, B Preneel
Cryptographers’ track at the RSA conference, 73-88, 2010
1162010
High precision discrete Gaussian sampling on FPGAs
S Sinha Roy, F Vercauteren, I Verbauwhede
International Conference on Selected Areas in Cryptography, 383-401, 2013
1112013
A cross-protocol attack on the TLS protocol
N Mavrogiannopoulos, F Vercauteren, V Velichkov, B Preneel
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1112012
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20