Follow
Thomas Prest
Thomas Prest
PQShield
Verified email at pqshield.com - Homepage
Title
Cited by
Cited by
Year
Falcon: Fast-Fourier lattice-based compact signatures over NTRU
PA Fouque, J Hoffstein, P Kirchner, V Lyubashevsky, T Pornin, T Prest, ...
Submission to the NIST’s post-quantum cryptography standardization process …, 2018
360*2018
Efficient identity-based encryption over NTRU lattices
L Ducas, V Lyubashevsky, T Prest
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
2952014
Falcon
T Prest, PA Fouque, J Hoffstein, P Kirchner, V Lyubashevsky, T Pornin, ...
Post-Quantum Cryptography Project of NIST, 2020
1382020
Fast fourier orthogonalization
L Ducas, T Prest
Proceedings of the ACM on International Symposium on Symbolic and Algebraic …, 2016
882016
Sharper bounds in lattice-based cryptography using the Rényi divergence
T Prest
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
722017
Grafting trees: a fault attack against the SPHINCS framework
L Castelnovi, A Martinelli, T Prest
International Conference on Post-Quantum Cryptography, 165-184, 2018
412018
ModFalcon: Compact signatures based on module-NTRU lattices
C Chuengsatiansup, T Prest, D Stehlé, A Wallet, K Xagawa
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
402020
Isochronous Gaussian Sampling: From Inception to Implementation: With Applications to the Falcon Signature Scheme
J Howe, T Prest, T Ricosset, M Rossi
Post-Quantum Cryptography: 11th International Conference, PQCrypto 2020 …, 2020
392020
More efficient algorithms for the NTRU key generation using the field norm
T Pornin, T Prest
IACR International Workshop on Public Key Cryptography, 504-533, 2019
382019
Gaussian sampling in lattice-based cryptography
T Prest
Ecole normale supérieure-ENS PARIS, 2015
362015
Quadratic time, linear space algorithms for Gram-Schmidt orthogonalization and Gaussian sampling in structured lattices
V Lyubashevsky, T Prest
Annual International Conference on the Theory and Applications of …, 2015
352015
An efficient and generic construction for signal’s handshake (X3DH): post-quantum, state leakage secure, and deniable
K Hashimoto, S Katsumata, K Kwiatkowski, T Prest
Journal of Cryptology 35 (3), 17, 2022
342022
Unifying leakage models on a rényi day
T Prest, D Goudarzi, A Martinelli, A Passelègue
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
302019
SoK: How (not) to design and implement post-quantum cryptography
J Howe, T Prest, D Apon
Cryptographers’ Track at the RSA Conference, 444-477, 2021
252021
Falcon: Fast-Fourier Lattice-Based Compact Signatures over NTRU, Specification v1. 2
PA Fouque, J Hoffstein, P Kirchner, V Lyubashevsky, T Pornin, T Prest, ...
NIST Post-Quantum Cryptography Standardization Round 3, 2020
222020
Non-linear polynomial selection for the number field sieve
T Prest, P Zimmermann
Journal of Symbolic Computation 47 (4), 401-409, 2012
202012
Integral matrix gram root and lattice gaussian sampling without floats
L Ducas, S Galbraith, T Prest, Y Yu
Annual International Conference on the Theory and Applications of …, 2020
182020
Scalable ciphertext compression techniques for post-quantum KEMs and their applications
S Katsumata, K Kwiatkowski, F Pintore, T Prest
International Conference on the Theory and Application of Cryptology and …, 2020
172020
A concrete treatment of efficient continuous group key agreement via multi-recipient PKEs
K Hashimoto, S Katsumata, E Postlethwaite, T Prest, B Westerbaan
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
162021
Probing security through input-output separation and revisited quasilinear masking
D Goudarzi, T Prest, M Rivain, D Vergnaud
IACR Transactions on Cryptographic Hardware and Embedded Systems, 599-640, 2021
152021
The system can't perform the operation now. Try again later.
Articles 1–20