default search action
Rémi Géraud
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Claudia Negri-Ribalta, Rémi Géraud-Stewart, Anastasia Sergeeva, Gabriele Lenzini:
A systematic literature review on the impact of AI models on the security of code generation. Frontiers Big Data 7 (2024) - 2023
- [i48]Rémi Géraud-Stewart, David Naccache:
New Public-Key Cryptosystem Blueprints Using Matrix Products in 픽p. IACR Cryptol. ePrint Arch. 2023: 1745 (2023) - [i47]Rémi Géraud-Stewart, David Naccache, Ofer Yifrach-Stav:
Fiat-Shamir Goes Tropical. IACR Cryptol. ePrint Arch. 2023: 1954 (2023) - 2022
- [j10]Hadrien Barral, Georges-Axel Jaloyan, Fabien Thomas-Brans, Matthieu Regnery, Rémi Géraud-Stewart, Thibaut Heckmann, Thomas R. Souvignet, David Naccache:
A forensic analysis of the Google Home: repairing compressed data without error correction. Digit. Investig. 42-43: 301437 (2022) - [c27]Fatima-Ezzahra El Orche, Rémi Géraud-Stewart, Peter B. Rønne, Gergei Bana, David Naccache, Peter Y. A. Ryan, Marco Biroli, Megi Dervishi, Hugo Waltsburger:
Time, Privacy, Robustness, Accuracy: Trade-Offs for the Open Vote Network Protocol. E-Vote-ID 2022: 19-35 - [i46]Hadrien Barral, Georges-Axel Jaloyan, Fabien Thomas-Brans, Matthieu Regnery, Rémi Géraud-Stewart, Thibaut Heckmann, Thomas R. Souvignet, David Naccache:
A forensic analysis of the Google Home: repairing compressed data without error correction. CoRR abs/2210.00856 (2022) - 2021
- [j9]Rémi Géraud-Stewart, David Naccache:
A French cipher from the late 19th century. Cryptologia 45(4): 342-370 (2021) - [i45]Éric Brier, Megi Dervishi, Rémi Géraud-Stewart, David Naccache, Ofer Yifrach-Stav:
Near-Optimal Pool Testing under Urgency Constraints. CoRR abs/2106.10971 (2021) - [i44]Rémi Géraud-Stewart, David Naccache:
Elementary Attestation of Cryptographically Useful Composite Moduli. IACR Cryptol. ePrint Arch. 2021: 52 (2021) - [i43]Rémi Géraud-Stewart, David Naccache:
Magnetic RSA. IACR Cryptol. ePrint Arch. 2021: 77 (2021) - [i42]Hadrien Barral, Éric Brier, Rémi Géraud-Stewart, Arthur Léonard, David Naccache, Quentin Vermande, Samuel Vivien:
Discovering New L-Function Relations Using Algebraic Sieving. IACR Cryptol. ePrint Arch. 2021: 1060 (2021) - [i41]Gergei Bana, Marco Biroli, Megi Dervishi, Fatima-Ezzahra El Orche, Rémi Géraud-Stewart, David Naccache, Peter B. Rønne, Peter Y. A. Ryan, Hugo Waltsburger:
Time, Privacy, Robustness, Accuracy: Trade Offs for the Open Vote Network Protocol. IACR Cryptol. ePrint Arch. 2021: 1065 (2021) - [i40]Eric Brier, Rémi Géraud-Stewart, Marc Joye, David Naccache:
Primary Elements in Cyclotomic Fields with Applications to Power Residue Symbols, and More. IACR Cryptol. ePrint Arch. 2021: 1106 (2021) - [i39]Théodore Conrad-Frenkiel, Rémi Géraud-Stewart, David Naccache:
On Unpadded NTRU Quantum (In)Security. IACR Cryptol. ePrint Arch. 2021: 1426 (2021) - [i38]Clémence Chevignard, Rémi Géraud-Stewart, Antoine Houssais, David Naccache, Edmond de Roffignac:
How to Claim a Computational Feat. IACR Cryptol. ePrint Arch. 2021: 1554 (2021) - 2020
- [j8]Houda Ferradi, Rémi Géraud, Sylvain Guilley, David Naccache, Mehdi Tibouchi:
Recovering Secrets From Prefix-Dependent Leakage. J. Math. Cryptol. 14(1): 15-24 (2020) - [c26]Rémi Géraud-Stewart, Marius Lombard-Platet, David Naccache:
Approaching Optimal Duplicate Detection in a Sliding Window. COCOON 2020: 64-84 - [c25]Rémi Géraud-Stewart, David Naccache:
Elementary Attestation of Cryptographically Useful Composite Moduli. SECITC 2020: 1-12 - [e1]Emil Simion, Rémi Géraud-Stewart:
Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers. Lecture Notes in Computer Science 12001, Springer 2020, ISBN 978-3-030-41024-7 [contents] - [i37]Marc Beunardeau, Éric Brier, Noémie Cartier, Aisling Connolly, Nathanaël Courant, Rémi Géraud-Stewart, David Naccache, Ofer Yifrach-Stav:
Optimal Covid-19 Pool Testing with a priori Information. CoRR abs/2005.02940 (2020) - [i36]Rémi Géraud-Stewart, Marius Lombard-Platet, David Naccache:
Approaching Optimal Duplicate Detection in a Sliding Window. CoRR abs/2005.04740 (2020) - [i35]Guillaume Bertholon, Rémi Géraud-Stewart, Axel Kugelmann, Théo Lenoir, David Naccache:
At Most 43 Moves, At Least 29: Optimal Strategies and Bounds for Ultimate Tic-Tac-Toe. CoRR abs/2006.02353 (2020) - [i34]Éric Brier, Rémi Géraud-Stewart, David Naccache, Alessandro Pacco, Emanuele Troiani:
Stuttering Conway Sequences Are Still Conway Sequences. CoRR abs/2006.06837 (2020) - [i33]Éric Brier, Rémi Géraud-Stewart, David Naccache, Alessandro Pacco, Emanuele Troiani:
The Look-and-Say The Biggest Sequence Eventually Cycles. CoRR abs/2006.07246 (2020) - [i32]Éric Brier, Rémi Géraud-Stewart, David Naccache:
A Fractional 3n+1 Conjecture. CoRR abs/2006.11634 (2020) - [i31]Rémi Géraud-Stewart, David Naccache:
A French cipher from the late 19th century. IACR Cryptol. ePrint Arch. 2020: 390 (2020) - [i30]Jean-Claude Caraco, Rémi Géraud-Stewart, David Naccache:
Kerckhoffs' Legacy. IACR Cryptol. ePrint Arch. 2020: 556 (2020)
2010 – 2019
- 2019
- [j7]Rémi Géraud, David Naccache:
Mixed-radix Naccache-Stern encryption. J. Cryptogr. Eng. 9(3): 277-282 (2019) - [c24]Rémi Géraud, David Naccache, Razvan Rosie:
Robust Encryption, Extended. CT-RSA 2019: 149-168 - [c23]Rémi Géraud, Marius Lombard-Platet, David Naccache:
Quotient hash tables: efficiently detecting duplicates in streaming data. SAC 2019: 582-589 - [c22]Gaëlle Candel, Rémi Géraud-Stewart, David Naccache:
How to Compartment Secrets. WISTP 2019: 3-11 - [c21]Hadrien Barral, Rémi Géraud-Stewart, Georges-Axel Jaloyan, David Naccache:
RISC-V: #AlphanumericShellcoding. WOOT @ USENIX Security Symposium 2019 - [i29]Rémi Géraud, Marius Lombard-Platet, David Naccache:
Quotient Hash Tables - Efficiently Detecting Duplicates in Streaming Data. CoRR abs/1901.04358 (2019) - [i28]Hadrien Barral, Rémi Géraud-Stewart, Georges-Axel Jaloyan, David Naccache:
RISC-V: #AlphanumericShellcoding. CoRR abs/1908.03819 (2019) - [i27]Rémi Géraud, David Naccache, Razvan Rosie:
Robust Encryption, Extended. IACR Cryptol. ePrint Arch. 2019: 238 (2019) - [i26]Gaëlle Candel, Rémi Géraud-Stewart, David Naccache:
How to compartment secrets. IACR Cryptol. ePrint Arch. 2019: 1397 (2019) - 2018
- [j6]Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Hang Zhou:
Backtracking-assisted multiplication. Cryptogr. Commun. 10(1): 17-26 (2018) - [j5]Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Amaury de Wargny:
Regulating the pace of von Neumann correctors. J. Cryptogr. Eng. 8(1): 85-91 (2018) - [c20]David Naccache, Rémi Géraud:
Invited Talk: A French Code from the Late 19th Century. HistoCrypt 2018: 149:003 - [c19]Chen Qian, Mehdi Tibouchi, Rémi Géraud:
Universal Witness Signatures. IWSEC 2018: 313-329 - [p1]Simon Cogliani, Feng Bao, Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Rodrigo Portella do Canto, Guilin Wang:
Public Key-Based Lightweight Swarm Authentication. Cyber-Physical Systems Security 2018: 255-267 - [i25]Arash Atashpendar, Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Mestel, A. W. Roscoe, Peter Y. A. Ryan:
From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions. CoRR abs/1802.00703 (2018) - [i24]Marc Beunardeau, Aisling Connolly, Houda Ferradi, Rémi Géraud, David Naccache, Damien Vergnaud:
Reusing Nonces in Schnorr Signatures. IACR Cryptol. ePrint Arch. 2018: 69 (2018) - [i23]Rémi Géraud, David Naccache:
Mixed-radix Naccache-Stern encryption. IACR Cryptol. ePrint Arch. 2018: 278 (2018) - [i22]Houda Ferradi, Rémi Géraud, Sylvain Guilley, David Naccache, Mehdi Tibouchi:
Recovering Secrets From Prefix-Dependent Leakage. IACR Cryptol. ePrint Arch. 2018: 798 (2018) - 2017
- [b1]Rémi Géraud:
Advances in public-key cryptology and computer exploitation. (Avancées en cryptologie à clé publique et exploitation informatique). PSL Research University, Paris, France, 2017 - [c18]Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache:
The Case for System Command Encryption. AsiaCCS 2017: 6 - [c17]Fabrice Benhamouda, Houda Ferradi, Rémi Géraud, David Naccache:
Non-interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms. ESORICS (1) 2017: 206-223 - [c16]Marc Beunardeau, Aisling Connolly, Houda Ferradi, Rémi Géraud, David Naccache, Damien Vergnaud:
Reusing Nonces in Schnorr Signatures - (and Keeping It Secure...). ESORICS (1) 2017: 224-241 - [c15]Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache:
On the Hardness of the Mersenne Low Hamming Ratio Assumption. LATINCRYPT 2017: 166-174 - [c14]Rémi Géraud, Mirko Koscina, Paul Lenczner, David Naccache, David Saulpic:
Generating Functionally Equivalent Programs Having Non-isomorphic Control-Flow Graphs. NordSec 2017: 265-279 - [c13]Éric Brier, Rémi Géraud, David Naccache:
Exploring Naccache-Stern Knapsack Encryption. SECITC 2017: 67-82 - [c12]Rémi Géraud, David Naccache, Razvan Rosie:
Twisting Lattice and Graph Techniques to Compress Transactional Ledgers. SecureComm 2017: 108-127 - [i21]Rémi Géraud, Mirko Koscina, Paul Lenczner, David Naccache, David Saulpic:
Generating Functionally Equivalent Programs Having Non-Isomorphic Control-Flow Graphs. CoRR abs/1709.08357 (2017) - [i20]Marc Beunardeau, Houda Ferradi, Rémi Géraud, David Naccache:
Honey Encryption for Language. IACR Cryptol. ePrint Arch. 2017: 31 (2017) - [i19]Eric Brier, Rémi Géraud, David Naccache:
Exploring Naccache-Stern Knapsack Encryption. IACR Cryptol. ePrint Arch. 2017: 421 (2017) - [i18]Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache:
On the Hardness of the Mersenne Low Hamming Ratio Assumption. IACR Cryptol. ePrint Arch. 2017: 522 (2017) - [i17]Fabrice Benhamouda, Houda Ferradi, Rémi Géraud, David Naccache:
Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms. IACR Cryptol. ePrint Arch. 2017: 640 (2017) - [i16]Rémi Géraud, David Naccache, Razvan Rosie:
Twisting Lattice and Graph Techniques to Compress Transactional Ledgers. IACR Cryptol. ePrint Arch. 2017: 751 (2017) - 2016
- [j4]Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache:
Fully Homomorphic Encryption: Computations with a Blindfold. IEEE Secur. Priv. 14(1): 63-67 (2016) - [j3]Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache:
Cdoe Obofsucaitn: Securing Software from Within. IEEE Secur. Priv. 14(3): 78-81 (2016) - [j2]Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache:
White-Box Cryptography: Security in an Insecure Environment. IEEE Secur. Priv. 14(5): 88-92 (2016) - [j1]Houda Ferradi, Rémi Géraud, David Naccache, Assia Tria:
When organized crime applies academic results: a forensic analysis of an in-card listening device. J. Cryptogr. Eng. 6(1): 49-59 (2016) - [c11]Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, David Pointcheval:
Legally Fair Contract Signing Without Keystones. ACNS 2016: 175-190 - [c10]Rémi Géraud, Diana Maimut, David Naccache:
Double-Speed Barrett Moduli. The New Codebreakers 2016: 148-158 - [c9]Antoine Amarilli, Marc Beunardeau, Rémi Géraud, David Naccache:
Failure is Also an Option. The New Codebreakers 2016: 161-165 - [c8]Ehsan Aerabi, A. Elhadi Amirouche, Houda Ferradi, Rémi Géraud, David Naccache, Jean Vuillemin:
The Conjoined Microprocessor. HOST 2016: 67-70 - [c7]Simon Cogliani, Houda Ferradi, Rémi Géraud, David Naccache:
Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography. ISPEC 2016: 344-353 - [c6]Hadrien Barral, Houda Ferradi, Rémi Géraud, Georges-Axel Jaloyan, David Naccache:
ARMv8 Shellcodes from 'A' to 'Z'. ISPEC 2016: 354-377 - [c5]Marc Beunardeau, Houda Ferradi, Rémi Géraud, David Naccache:
Honey Encryption for Language - Robbing Shannon to Pay Turing? Mycrypt 2016: 127-144 - [c4]Houda Ferradi, Rémi Géraud, David Naccache:
Human Public-Key Encryption. Mycrypt 2016: 494-505 - [i15]Hadrien Barral, Houda Ferradi, Rémi Géraud, Georges-Axel Jaloyan, David Naccache:
ARMv8 Shellcodes from 'A' to 'Z'. CoRR abs/1608.03415 (2016) - [i14]Jean-Michel Cioranesco, Houda Ferradi, Rémi Géraud, David Naccache:
Process Table Covert Channels: Exploitation and Countermeasures. IACR Cryptol. ePrint Arch. 2016: 227 (2016) - [i13]Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, David Pointcheval:
Legally Fair Contract Signing Without Keystones. IACR Cryptol. ePrint Arch. 2016: 363 (2016) - [i12]Houda Ferradi, Rémi Géraud, David Naccache:
Slow Motion Zero Knowledge Identifying With Colliding Commitments. IACR Cryptol. ePrint Arch. 2016: 399 (2016) - [i11]Simon Cogliani, Houda Ferradi, Rémi Géraud, David Naccache:
Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography. IACR Cryptol. ePrint Arch. 2016: 443 (2016) - [i10]Simon Cogliani, Feng Bao, Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Rodrigo Portella do Canto, Guilin Wang:
Public-Key Based Lightweight Swarm Authentication. IACR Cryptol. ePrint Arch. 2016: 750 (2016) - [i9]Houda Ferradi, Rémi Géraud, David Naccache:
Human Public-Key Encryption. IACR Cryptol. ePrint Arch. 2016: 763 (2016) - [i8]Simon Cogliani, Rémi Géraud, David Naccache:
A Fiat-Shamir Implementation Note. IACR Cryptol. ePrint Arch. 2016: 1039 (2016) - 2015
- [c3]Houda Ferradi, Rémi Géraud, David Naccache:
Slow Motion Zero Knowledge Identifying with Colliding Commitments. Inscrypt 2015: 381-396 - [c2]Eric Brier, Jean-Sébastien Coron, Rémi Géraud, Diana Maimut, David Naccache:
A Number-Theoretic Error-Correcting Code. SECITC 2015: 25-35 - [c1]Rémi Géraud, Diana-Stefania Maimut, David Naccache, Rodrigo Portella do Canto, Emil Simion:
Applying Cryptographic Acceleration Techniques to Error Correction. SECITC 2015: 150-168 - [i7]Eric Brier, Jean-Sébastien Coron, Rémi Géraud, Diana Maimut, David Naccache:
A Number-Theoretic Error-Correcting Code. CoRR abs/1509.00378 (2015) - [i6]Rémi Géraud, Diana Maimut, David Naccache:
Double-Speed Barrett Moduli. IACR Cryptol. ePrint Arch. 2015: 785 (2015) - [i5]Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Hang Zhou:
Backtracking-Assisted Multiplication. IACR Cryptol. ePrint Arch. 2015: 787 (2015) - [i4]Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Amaury de Wargny:
Regulating the Pace of von Neumann Correctors. IACR Cryptol. ePrint Arch. 2015: 849 (2015) - [i3]Rémi Géraud, Diana-Stefania Maimut, David Naccache, Rodrigo Portella do Canto, Emil Simion:
Applying Cryptographic Acceleration Techniques to Error Correction. IACR Cryptol. ePrint Arch. 2015: 886 (2015) - [i2]Houda Ferradi, Rémi Géraud, David Naccache, Assia Tria:
When Organized Crime Applies Academic Results - A Forensic Analysis of an In-Card Listening Device. IACR Cryptol. ePrint Arch. 2015: 963 (2015) - [i1]Ehsan Aerabi, A. Elhadi Amirouche, Houda Ferradi, Rémi Géraud, David Naccache, Jean Vuillemin:
The Conjoined Microprocessor. IACR Cryptol. ePrint Arch. 2015: 974 (2015)
Coauthor Index
aka: Diana-Stefania Maimut
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-08 02:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint