Publications
Here is a hopefully mostly up-to-date list of my academic publications. Most of them can also be found on Google Scholar and DBLP.
Journals
Articles published in international peer-reviewed journals.
-
[BBEFGRT24]
Masking the GLP lattice-based signature scheme at any order.
[eprint]
Journal of Cryptology, vol. 37(1), Springer, 2024.
Full version of [BBEFGRT18]. -
[UMBTS23]
Loop aborts strike back: defeating fault countermeasures in lattice signatures with ILP.
IACR TCHES, vol. 2023(4), IACR, 2023, pp. 367–392. -
[KIUTH23]
Homomorphic encryption for stochastic computing.
Journal of Cryptographic Engineering, vol. 13(2), Springer, 2023, pp. 251–263. -
[OtmPetTib23]
Guest editorial on Cryptanalysis of (NIST PQC) post-quantum proposals.
IET Information Security, vol. 17(2), Wiley, 2023, pp. 159–160. -
[DOTT22]
Two-round n-out-of-n and multi-signatures and trapdoor commitment from lattices.
[eprint]
Journal of Cryptology, vol. 35(2), Springer, 2022.
Full version of [DOTT21]. -
[YuaTibAbe22b]
On subset-resilient hash function families.
Designs, Codes and Cryptography, vol. 90(3), Springer, 2022, pp. 719–758. -
[YuaTibAbe22a]
Security notions for stateful signature schemes.
IET Information Security, vol. 16(1), IET, 2022, pp. 1–17. -
[TibWal21]
One bit is all it takes: a devastating timing attack on BLISS’s non-constant time sign flips.
[eprint]
[github]
J. Math. Cryptology, vol. 15(1), De Gryuter, 2021, pp. 131–142. -
[SETA21]
Guessing bits: improved lattice attacks on (EC)DSA with nonce leakage.
[eprint]
IACR TCHES, vol. 2022(1), IACR, 2021, pp. 391–413. -
[YamTibAbe21]
On the impossibility of NIZKs for disjunctive languages from commit-and-prove NIZKs.
IEEE Access, vol. 9, IEEE, 2021, pp. 51368–51379. -
[YamTibAbe20a]
A coin-free oracle-based augmented black box framework.
[eprint]
IEICE Trans. A, vol. 103-A(10), IEICE, 2020, pp. 1167–1173.
Full version of [YamTibAbe19]. -
[KimTib20]
Equidistribution among cosets of elliptic curve points in intervals.
J. Math. Cryptology, vol. 14(1), De Gryuter, 2020, pp. 339–345.
Full version of [NutMiC:KimTib19]. -
[FGGNT20]
Recovering secrets from prefix-dependent leakage.
[eprint]
J. Math. Cryptology, vol. 14(1), De Gryuter, 2020, pp. 15–24. -
[BGKLSSTZ20]
Multiparty non-interactive key exchange and more from isogenies on elliptic curves.
[eprint]
J. Math. Cryptology, vol. 14(1), De Gryuter, 2020, pp. 5–14. -
[AGKOT19]
Efficient fully structure-preserving signatures and shrinking commitments.
Journal of Cryptology, vol. 32(3), Springer, 2019, pp. 973–1025.
Full version of [AKOT15]. -
[FouTib19]
Close to uniform prime number generation with fewer random bits.
[arXiv]
IEEE Trans. Inf. Theory, vol. 65(2), IEEE, 2019, pp. 1307–1317.
Full version of [FouTib14]. -
[TakTibAbe18]
New Bleichenbacher records: fault attacks on qDSA signatures.
[eprint]
[github]
IACR TCHES, vol. 2018(3), IACR, 2018, pp. 331–371. -
[KimTib18]
FHE over the integers and modular arithmetic circuits.
IET Information Security, vol. 12(4), IET, 2018, pp. 257–264.
Full version of [KimTib16]. -
[BisTib18]
Constructing permutation rational functions from isogenies.
[arXiv]
SIAM J. Discrete Math., vol. 32(3), SIAM, 2018, pp. 1741–1749.
Full version of [YACC:BisTib16]. -
[NevTib18]
Degenerate curve attacks: extending invalid curve attacks to Edwards curves and other models.
[eprint]
IET Information Security, vol. 12(3), IET, 2018, pp. 217–225.
Full version of [NevTib16]. -
[EFGT18]
Loop-abort faults on lattice-based signature schemes and key exchange protocols.
[eprint]
IEEE Trans. Computers, vol. 67(11), IEEE, 2018, pp. 1535–1549.
Full version of [EFGT16]. -
[MaiTibAra17]
Elliptic curve multiset hash.
[arXiv]
The Computer Journal, vol. 60(4), Oxford University Press, 2017, pp. 476–490. -
[TibKim17]
Improved elliptic curve hashing and point representation.
[hal]
Designs, Codes and Cryptography, vol. 82(1–2), Springer, 2017, pp. 161–177.
Full version of [WCC:KimTib15]. -
[BFFSST16]
Strongly-optimal structure preserving signatures from type II pairings: synthesis and lower bounds.
[eprint]
IET Information Security, vol. 10(6), IET, 2016, pp. 358–371.
Full version of [BFFSST15]. -
[CNTW16]
Practical cryptanalysis of ISO 9796-2 and EMV signatures.
[eprint]
Journal of Cryptology, vol. 29(3), Springer, 2016, pp. 632–656.
Full version of [CNTW09]. -
[AFLT16]
Tightly-secure signatures from lossy identification schemes.
[eprint]
Journal of Cryptology, vol. 29(3), Springer, 2016, pp. 597–631.
Full version of [AFLT12]. -
[CorKirTib13]
A note on the bivariate Coppersmith theorem.
Journal of Cryptology, vol. 26(2), Springer, 2013, pp. 246–250. -
[FGLTZ13]
Attacking RSA-CRT signatures with faults on Montgomery multiplication.
[eprint]
Journal of Cryptographic Engineering, vol. 3(1), Springer, 2013, pp. 59–72.
Full version of [FGLTZ12]. -
[FFSTV13]
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves.
[eprint]
Math. Comp., vol. 82, AMS, 2013, pp. 491–512. -
[BNNT11b]
Modulus fault attacks against RSA-CRT signatures.
[eprint]
Journal of Cryptographic Engineering, vol. 1(3), Springer, 2011, pp. 243-253.
Full version of [BNNT11a]. -
[ChaTib11]
Securing e-passports with elliptic curves.
IEEE Security & Privacy Magazine, vol. 9(2), IEEE, 2011, pp. 75–78.
Conferences
Papers published in international peer-reviewed conference proceedings.
-
[PulTib24]
Cryptanalysis of EagleSign.
[eprint]
In D. Catalano, R. De Prisco (Eds.), SCN 2024, LNCS vol. 14xxx, Springer, 2024, pp. xx–xx, to appear. -
[ABORST24]
CDS composition of multi-round protocols.
In L. Reyzin, D. Stebila (Eds.), CRYPTO 2024, Part IX, LNCS vol. 14928, Springer, 2024, pp. 391–423. -
[LSZEYTA24]
Cryptanalysis of the Peregrine lattice-based signature scheme.
[eprint]
In Q. Tang, V. Teague (Eds.), PKC 2024, Part I, LNCS vol. 14601, Springer, 2024, pp. 387–412. -
[ENSTW23]
Antrag: annular NTRU trapdoor generation.
[eprint]
In J. Guo, R. Steinfeld (Eds.), ASIACRYPT 2023, Part VII, LNCS vol. 14444, Springer, 2023, pp. 3–36. -
[AHST23]
Faster constant-time evaluation of the Kronecker symbol with application to elliptic curve hashing.
[eprint]
In W. Meng, C.D. Jensen, C. Cremers, E. Kirda (Eds.), ACM CCS 2023, ACM, 2023, pp. 3228–3238. -
[YuaTibAbe20]
Quantum-access security of hash-based signature schemes.
[eprint]
In M.A.R. Baee, L. Simpson (Eds.), ACISP 2023, LNCS vol. 13915, Springer, 2023, pp. 343–380. -
[ChaRodTib22]
SwiftEC: Shallue-van de Woestijne indifferentiable function to elliptic curves.
[eprint]
In S. Agrawal, D. Lin (Eds.), ASIACRYPT 2022, Part I, LNCS vol. 13791, Springer, 2022, pp. 63–92. -
[UMTS22]
Profiling side-channel attacks on Dilithium: a small bit-fiddling leak breaks it all.
[eprint]
In B. Smith, H. Wu (Eds.), SAC 2022, LNCS vol. 13742, Springer, 2022, pp. 3–32. -
[ETWY22]
Shorter hash-and-sign lattice-based signatures.
[eprint]
In Y. Dodis, T. Shrimpton (Eds.), CRYPTO 2022, Part II, LNCS vol. 13508, Springer, 2022, pp. 245–275. -
[BosTakTib22]
MuSig-L: lattice-based multi-signature with single-round online phase.
[eprint]
In Y. Dodis, T. Shrimpton (Eds.), CRYPTO 2022, Part II, LNCS vol. 13508, Springer, 2022, pp. 276–305. -
[EFGRTTWY22]
Mitaka: a simpler, parallelizable, maskable variant of Falcon.
[eprint]
In O. Dunkelman, S. Dziembowski (Eds.), EUROCRYPT 2022, Part III, LNCS vol. 13277, Springer, 2022, pp. 222–253. -
[ChaRodTib21]
Verifiable isogeny walks: towards an isogeny-based postquantum VDF.
[eprint]
In R. AlTawy, A. Hülsing (Eds.), SAC 2021, LNCS vol. 13203, Springer, 2021, pp. 441–460. -
[DOTT21]
Two-round n-out-of-n and multi-signatures and trapdoor commitment from lattices.
[eprint]
In J.A. Garay (Ed.), PKC 2021, Part I, LNCS vol. 12710, Springer, 2021, pp. 99–130.
Full version published as [DOTT22]. -
[YamTibAbe20b]
On black-box extension of a non-interactive zero-knowledge proof system for secret equality.
In K. Bhargavan, E. Oswald, M. Prabhakaran (Eds.), INDOCRYPT 2020, LNCS vol. 12578, Springer, 2020, pp. 882–904. -
[ANTTY20]
LadderLeak: breaking ECDSA with less than one bit of nonce leakage.
[eprint]
[github]
In J. Ligatti, X. Ou, J. Katz, G. Vigna (Eds.), ACM CCS 2020, ACM, 2020, pp. 225–242. -
[ParTib20]
SHECS-PIR: somewhat homomorphic encryption-based compact and scalable private information retrieval.
In L. Chen, N. Li, K. Liang, S.A. Schneider (Eds.), ESORICS 2020, Part II, LNCS vol. 12309, Springer, 2020, pp. 86–106. -
[SunTibAbe20]
Revisiting the hardness of Binary Error LWE.
[eprint]
In J.K. Liu, H. Cui (Eds.), ACISP 2020, LNCS vol. 12248, Springer, 2020, pp. 425–444. -
[FKTWY20]
Key recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU lattices.
[eprint]
In A. Canteaut, Y. Ishai (Eds.), EUROCRYPT 2020, Part III, LNCS vol. 12107, Springer, 2020, pp. 34–63. -
[BBEFRT19]
GALACTICS: gaussian sampling for lattice-based constant-time implementation of cryptographic signatures, revisited.
[eprint]
In L. Cavallaro, J. Kinder, X. Wang, J. Katz (Eds.), ACM CCS 2019, ACM, 2019, pp. 2147–2164. -
[YamTibAbe19]
A coin-free oracle-based augmented black box framework.
[eprint]
In R. Steinfeld, T.H. Yuen (Eds.), ProvSec 2019, LNCS vol. 11821, Springer, 2019, pp. 265–272.
Full version published as [YamTibAbe20a]. -
[TakTib18]
Degenerate fault attacks on elliptic curve parameters in OpenSSL.
[eprint]
In F. Piessens, F. Stajano (Eds.), EuroS&P 2019, IEEE, 2019. -
[MGTF16]
Masking Dilithium: efficient implementation and side-channel evaluation.
[eprint]
In R.H. Deng, V. Gauthier-Umaña, M. Ochoa, M. Yung (Eds.), ACNS 2019, LNCS vol. 11464, Springer, 2019, pp. 344–362. -
[BDEFT18]
LWE without modular reduction and improved side-channel attacks against BLISS.
[eprint]
In T. Peyrin, S. Galbraith (Eds.), ASIACRYPT 2018, Part I, LNCS vol. 11272, Springer, 2018, pp. 494–524. -
[AAOT18]
Lower bounds on structure-preserving signatures for bilateral messages.
[eprint]
In D. Catalano, R. De Prisco (Eds.), SCN 2018, LNCS vol. 11035, Springer, 2018, pp. 3–22. -
[QiaTibGer18]
Universal witness signatures.
[hal]
In A. Inomata, K. Yasuda (Eds.), IWSEC 2018, LNCS vol. 11049, Springer, 2018, pp. 313–329. -
[BooTibXag18]
Cryptanalysis of Compact-LWE.
[eprint]
In N.P. Smart (Ed.), CT-RSA 2018, LNCS vol. 10808, Springer, 2018, pp. 80–97. -
[BBEFGRT18]
Masking the GLP lattice-based signature scheme at any order.
[eprint]
In J.B. Nielsen, V. Rijmen (Eds.), EUROCRYPT 2018, Part II, LNCS vol. 10821, Springer, 2018, pp. 354–384.
Full version published as [BBEFGRT24]. -
[EFGT17]
Side-channel attacks on BLISS lattice-based signatures.
[eprint]
In D. Evans, T. Malkin, D. Xu (Eds.), ACM CCS 2017, ACM, 2017, pp. 1857–1874. -
[KimTib17]
Secure GLS recomposition for sum-of-square cofactors.
In J. Pieprzyk, S. Suriadi (Eds.), ACISP 2017, Part II, LNCS vol. 10343, Springer, 2017, pp. 349–365. -
[CLLT17]
Zeroizing attacks on indistinguishability obfuscation over CLT13.
[eprint]
In S. Fehr (Ed.), PKC 2017, Part I, LNCS vol. 10174, Springer, 2017, pp. 41–58. -
[KimTib16]
FHE over the integers and modular arithmetic circuits.
In S. Foresti, G. Persiano (Eds.), CANS 2016, LNCS vol. 10052, Springer, 2016, pp. 435–450.
Full version published as [KimTib18]. -
[EFGT16]
Loop-abort faults against lattice-based Fiat–Shamir and hash-and-sign signatures.
[eprint]
In R. Avanzi, H. Heys (Eds.), SAC 2016, LNCS vol. 10532, Springer, 2016, pp. 140–158.
Full version published as [EFGT18]. -
[CLLT16]
Cryptanalysis of GGH15 multilinear maps.
[eprint]
In J. Katz, M. Robshaw (Eds.), CRYPTO 2016, Part II, LNCS vol. 9815, Springer, 2016, pp. 607–628. -
[NevTib16]
Degenerate curve attacks.
[eprint]
In G. Persiano, B.Y. Yang (Eds.), PKC 2016, Part II, LNCS vol. 9615, Springer, 2016, pp. 19–35.
Full version published as [NevTib18]. -
[BFMT16]
Side-channel analysis of Weierstrass and Koblitz curve ECDSA on Android smartphones.
[eprint]
In K. Sako (Ed.), CT-RSA 2016, LNCS vol. 9610, Springer, 2016, pp. 236–252. -
[KimTib15b]
Invalid curve attacks in a GLS setting.
In K. Tanaka, Y. Suga (Eds.), IWSEC 2015, LNCS vol. 9241, Springer, 2015, pp. 41–55. -
[FLLT15]
Cryptanalysis of the Co-ACD assumption.
[eprint]
In R. Gennaro, M. Robshaw (Eds.), CRYPTO 2015, Part I, LNCS vol. 9215, Springer, 2015, pp. 561–580. -
[CorLepTib15]
New multilinear maps over the integers.
[eprint]
In R. Gennaro, M. Robshaw (Eds.), CRYPTO 2015, Part I, LNCS vol. 9215, Springer, 2015, pp. 267–286. -
[CGHLMMRST15]
Zeroizing without low-level zeroes: new attacks on multilinear maps and their limitations.
[eprint]
In R. Gennaro, M. Robshaw (Eds.), CRYPTO 2015, Part I, LNCS vol. 9215, Springer, 2015, pp. 247–266. -
[AKOT15]
Fully structure-preserving signatures and shrinking commitments.
[eprint]
In M. Fischlin, E. Oswald (Eds.), EUROCRYPT 2015, Part II, LNCS vol. 9057, Springer, 2015, pp. 35–65.
Full version published as [AGKOT19]. -
[CGTV15]
Conversion from arithmetic to boolean masking with logarithmic complexity.
[eprint]
In G. Leander (Ed.), FSE 2015, LNCS vol. 9054, Springer, 2015, pp. 130–149. -
[BFFSST15]
Strongly-optimal structure preserving signatures from type II pairings: synthesis and lower bounds.
[eprint]
In J. Katz (Ed.), PKC 2015, LNCS vol. 9020, Springer, 2015, pp. 355–376.
Full version published as [BFFSST16]. -
[LepTib15]
Cryptanalysis of a (somewhat) additively homomorphic encryption scheme used in PIR.
[eprint]
In M. Brenner, K. Rohloff (Eds.), WAHC 2015, LNCS vol. 8976, Springer, 2015, pp. 184–193. -
[AFGKTZ14]
GLV/GLS decomposition, power analysis, and attacks on ECDSA signatures with single-bit nonce bias.
[hal]
In T. Iwata, P. Sarkar (Eds.), ASIACRYPT 2014, Part I, LNCS vol. 8873, Springer, 2014, pp. 262–281. -
[Tibouchi14b]
Impossibility of surjective Icart-like encodings.
In S.S.M. Chow, J.K. Liu, L.C.K. Hui, S.M. Yiu (Eds.), ProvSec 2014, LNCS vol. 8782, Springer, 2014, pp. 29–39. -
[BDFGTZ14]
Making RSA-PSS provably secure against non-random faults.
[eprint]
In L. Batina, M. Robshaw (Eds.), CHES 2014, LNCS vol. 8731, Springer, 2014, pp. 206–222. -
[AGOT14b]
Structure-preserving signatures from type II pairings.
[eprint]
In J. Garay, R. Gennaro (Eds.), CRYPTO 2014, Part I, LNCS vol. 8616, Springer, 2014, pp. 390–407. -
[AFQTZ14]
Binary Elligator squared.
[eprint]
In A. Youssef, A. Joux (Eds.), SAC 2014, LNCS vol. 8781, Springer, 2014, pp. 20–37. -
[FouTib14]
Close to uniform prime number generation with fewer random bits.
[arXiv]
In J. Esparza, P. Fraigniaud, T. Husfeldt, E. Koutsoupias (Eds.), ICALP 2014, Part I, LNCS vol. 8572, Springer, 2014, pp. 991–1002.
Full version published as [FouTib19]. -
[KimTib14]
Bit-flip faults on elliptic curve base fields, revisited.
In I. Boureanu, P. Owezarski, S. Vaudenay (Eds.), ACNS 2014, LNCS vol. 8479, Springer, 2014, pp. 163–180. -
[Tibouchi14a]
Elligator Squared: uniform points on elliptic curves of prime order as uniform random strings.
[eprint]
In N. Christin, R. Safavi-Naini (Eds.), FC 2014, LNCS vol. 8437, Springer, 2014, pp. 139–156. -
[CorLepTib14]
Scale-invariant fully homomorphic encryption over the integers.
[eprint]
In H. Krawczyk (Ed.), PKC 2014, LNCS vol. 8383, Springer, 2014, pp. 311–328. -
[AGOT14a]
Unified, minimal and selectively randomizable structure-preserving signatures.
[eprint]
In Y. Lindell (Ed.), TCC 2014, LNCS vol. 8349, Springer, 2014, pp. 688–712. -
[FouTibZap13]
Recovering private keys generated with weak PRNGs.
[hal]
In M. Stam (Ed.), IMACC 2013, LNCS vol. 8308, Springer, 2013, pp. 158–172. -
[CorLepTib13]
Practical multilinear maps over the integers.
[eprint]
In R. Canetti, J. Garay (Eds.), CRYPTO 2013, LNCS vol. 8042, Springer, 2013, pp. 476–493. -
[FouJouTib13]
Injective encodings to elliptic curves.
[eprint]
In C. Boyd, L. Simpson (Eds.), ACISP 2013, LNCS vol. 7959, Springer, 2013, pp. 203–218. -
[CCKLLTY13]
Batch fully homomorphic encryption over the integers.
[eprint]
In T. Johansson, P.Q. Nguyen (Eds.), EUROCRYPT 2013, LNCS vol. 7881, Springer, 2013, pp. 315–335. -
[MMNT13]
Fault attacks on projective-to-affine coordinate conversion.
In E. Prouff (Ed.), COSADE 2013, LNCS vol. 7864, Springer, 2013, pp. 46–61. -
[CorNacTib12b]
Another look at affine-padding RSA signatures.
[eprint]
In T. Kwon, M.-K. Lee, D. Kwon (Eds.), ICISC 2012, LNCS vol. 7839, Springer, 2012, pp. 22–32. -
[FouTib12]
Indifferentiable hashing to Barreto-Naehrig curves.
[di-ens]
In A. Hevia, G. Neven (Eds.), LATINCRYPT 2012, LNCS vol. 7533, Springer, 2012, pp. 1–17. -
[FGLTZ12]
Attacking RSA-CRT signatures with faults on Montgomery multiplication.
[eprint]
In E. Prouff, P. Schaumont (Eds.), CHES 2012, LNCS vol. 7428, Springer, 2012, pp. 447–462.
Full version published as [FGLTZ13]. -
[CorNacTib12a]
Public key compression and modulus switching for fully homomorphic encryption over the integers.
[eprint]
In D. Poincheval, T. Johansson (Eds.), EUROCRYPT 2012, LNCS vol. 7237, Springer, 2012, pp. 446–464. -
[AFLT12]
Tightly-secure signatures from lossy identification schemes.
[eprint]
In D. Poincheval, T. Johansson (Eds.), EUROCRYPT 2012, LNCS vol. 7237, Springer, 2012, pp. 572–590.
Full version published as [AFLT16]. -
[BNNT11a]
Modulus fault attacks against RSA-CRT signatures.
[eprint]
In B. Preneel, T. Takagi (Eds.), CHES 2011, LNCS vol. 6917, Springer, 2011, pp. 192–206.
Full version published as [BNNT11b]. -
[CMNT11]
Fully homomorphic encryption over the integers with shorter public keys.
[eprint]
In P. Rogaway (Ed.), CRYPTO 2011, LNCS vol. 6841, Springer, 2011, pp. 487–504. -
[CJMNT11]
Cryptanalysis of the RSA subgroup assumption from TCC 2005.
[eprint]
In D. Catalano, N. Fazio, R. Gennaro, A. Nicolosi (Eds.), PKC 2011, LNCS vol. 6571, Springer, 2011, pp. 147–155. -
[FouTib10b]
Deterministic encoding and hashing to odd hyperelliptic curves.
[eprint]
In M. Joye, A. Miyaji, A. Otsuka (Eds.), Pairing 2010, LNCS vol. 6487, Springer, 2010, pp. 265–277. -
[FouTib10a]
Estimating the size of the image of deterministic hash functions to elliptic curves.
[eprint]
In M. Abdalla, P.S.L.M. Barreto (Eds.), LATINCRYPT 2010, LNCS vol. 6212, Springer, 2010, pp. 81–91. -
[BCIMRT10]
Efficient indifferentiable hashing to ordinary elliptic curves.
[eprint]
In T. Rabin (Ed.), CRYPTO 2010, LNCS vol. 6223, Springer, 2010, pp. 237–254. -
[JoyTibVer10]
Huff’s model for elliptic curves.
[eprint]
In G. Hanrot, F. Morain, E. Thomé (Eds.), ANTS-IX, LNCS vol. 6197, Springer, 2010, pp. 234–250. -
[BCNTV10]
On the broadcast and validity-checking security of PKCS#1 v1.5 encryption.
[eprint]
In J. Zhou, M. Yung (Eds.), ACNS 2010, LNCS vol. 6123, Springer, 2010, pp. 1–18. -
[CorNacTib10]
Fault attacks against EMV signatures.
[eprint]
In J. Pieprzyk (Ed.), CT-RSA 2010, LNCS vol. 5985, Springer, 2010, pp. 208–220. -
[BriNacTib09]
Factoring unbalanced moduli with known bits.
[eprint]
In D. Lee, S. Hong (Eds.), ICISC 2009, LNCS vol. 5984, Springer, 2009, pp. 65–72. -
[CNTW09]
Practical cryptanalysis of ISO 9796-2 and EMV signatures.
[eprint]
In S. Halevi (Ed.), CRYPTO 2009, LNCS vol. 5677, Springer, 2009, pp. 428–444.
Full version published as [CNTW16].
Surveys & tech reports
Book chapters, surveys, technical reports.
-
[NIST:ENST23]
Squirrels: square unstructured integer Euclidean lattice signature.
[nist]
[www]
In NIST PQC Additional Signatures (Round 1), 2023. -
[NTT:ATTNX20e]
Cutting-edge research on cryptography theory in response to changes in computing environments.
In NTT Technical Review, vol. 18(4), NTT Corporation, 2020, pp. 22–26.
English translation of [NTT:ATTNX20j]. -
[NTT:ATTNX20j]
計算環境の変化に対応する暗号理論研究の最前線.
[html]
[pdf]
In NTT技術ジャーナル, vol. 32(2), NTT Corporation, 2020, pp. 23–26, in Japanese. -
[CRYPTREC:Tib17]
Cryptographic multilinear maps: a status report.
[pdf]
In CRYPTREC Technical Report, 2017. -
[PBC:OchRodTib16]
Hashing into elliptic curves.
In N. El Mrabet, M. Joye (Eds.), Guide to pairing-based cryptography, CRC Press, 2016. -
[NTT:Tib14e]
Fully homomorphic encryption over the integers: from theory to practice.
In NTT Technical Review, vol. 12(7), NTT Corporation, 2014, pp. 26–31.
English translation of [NTT:Tib14j]. -
[NTT:Tib14j]
整数上完全準同型暗号の研究.
[pdf]
In NTT技術ジャーナル, vol. 26(3), NTT Corporation, 2014, pp. 71–75, in Japanese. -
[FAC:NguTib12]
Lattice-based fault attacks on signatures.
In M. Joye, M. Tunstall (Eds.), Fault Analysis in Cryptography, Springer, 2012, pp. 201–220. -
[JJQ:Tib12]
A Nagell algorithm in any characteristic.
In D. Naccache (Ed.), Cryptography and Security: From Theory to Applications, LNCS vol. 6805, Springer, 2012, pp. 474–479, Jean-Jacques Quisquater Festschrift. -
[ECS:Tib11b]
Security reduction.
In H.C.A. van Tilborg, S. Jajodia (Eds.), Encyclopedia of Cryptography and Security, 2nd Ed., Springer, 2011, pp. 1167–1168. -
[ECS:Tib11a]
ISO-9796 signature standards.
In H.C.A. van Tilborg, S. Jajodia (Eds.), Encyclopedia of Cryptography and Security, 2nd Ed., Springer, 2011, pp. 649–650.
Workshops
Contributions to international workshops without proceedings.
-
[NIST:EGNSTW24]
Antrag: simplifying and improving Falcon without compromising security.
[github]
[nist]
In 5th NIST PQC Standardization Conference, 2024. -
[NIST:ETTW21]
Mitaka: a simpler, parallelizable, maskable variant of Falcon.
[nist]
In 3rd NIST PQC Standardization Conference, 2021. -
[NutMiC:KimTib19]
Equidistribution among cosets of elliptic curve points in intervals.
In A. Joux, J. Pomykała (Eds.), NutMiC, 2019.
Full version published as [KimTib20]. -
[AGC2T:Tib17]
Generalized Howgrave-Graham-Szydlo and side-channel attacks against BLISS.
In Y. Aubry, E. Howe, C. Ritzenthaler (Eds.), AGC2T 2017, 2017. -
[YACC:BisTib16]
Constructing permutation rational functions from isogenies.
In Y. Aubry et al. (Eds.), YACC 2016, 2016.
Full version published as [BisTib18]. -
[Fq:KimTib15]
Pseudo-randomness of elliptic curve encoding functions.
In G. Effinger (Ed.), Fq12, 2015. -
[WCC:KimTib15]
Improved elliptic curve hashing and point representation.
In P. Charpin, N. Sendrier, J.-P. Tillich (Eds.), WCC 2015, 2015.
Full version published as [TibKim17].
Domestic symposia
Contributions to Japanese symposia and research meetings.
-
[SCIS:TanTibAbe24]
Fair exchange with smart contract revisited: combine ZKCP and FairSwap.
In SCIS 2024, 2024. -
[SCIS:SuzTibAbe24]
Peregrine格子ベース署名方式に対する暗号解析の改良.
In SCIS 2024, 2024. -
[SCIS:SOTA24]
Expanding challenge space on composing generalized sigma-protocols.
In SCIS 2024, 2024. -
[SCIS:NPTA24]
分散Mercurial署名による複数権限者でのUnlinkability.
In SCIS 2024, 2024, in Japanese. -
[SCIS:KatTibAbe24]
MLWEとMSIS仮定ベースのTwo-round n-out-of-n署名プロトコルの実装.
In SCIS 2024, 2024, in Japanese. -
[ISEC:SLZEYTA23]
Peregrine格子ベース署名方式に対する暗号解析の改良.
In ISEC研究会, 2023, in Japanese. -
[SCIS:ZATA23]
Optimistic signed exchange revisited.
In SCIS 2023, 2023. -
[SCIS:SuzTibAbe23]
Cryptanalysis of the randomized version of DRS scheme.
In SCIS 2023, 2023. -
[SCIS:SOTA23]
Non-interactive proof of knowledge from Fiat-Shamir and correlation intractable hash.
In SCIS 2023, 2023. -
[SCIS:SETA23]
Generating Falcon trapdoors via Gibbs sampler.
In SCIS 2023, 2023. -
[SCIS:POTA23]
Composition of zero-knowledge proof protocols from MPC-in-the-head with pre-processing.
In SCIS 2023, 2023. -
[SCIS:AOSTA23]
通貨選択アルゴリズムを最適化したトークン型電子現金方式のCBDCへの適用可能性検討.
In SCIS 2023, 2023, in Japanese. -
[SCIS:ZATA23]
Comparison of transaction costs of different fair exchange protocols.
In SCIS 2022, 2022. -
[SCIS:YuaTibAbe22]
Quantum-accessible security of stateless hash-based signature schemes.
In SCIS 2022, 2022. -
[SCIS:ShaTibAbe22]
A study of non-malleability definitions on timed commitments.
In SCIS 2022, 2022. -
[SCIS:SETA22]
Optimal lattice trapdoor for the Klein-GPV and Peikert samplers.
In SCIS 2022, 2022. -
[SCIS:AOSTA22]
トークン型電子現金方式のCentral Bank Digital Currency(CBDC)への適用可能性に関する初期検討.
In SCIS 2022, 2022, in Japanese. -
[SCIS:YuaTibAbe21]
Security notions of stateful signature schemes.
In SCIS 2021, 2021. -
[SCIS:YamTibAbe21]
コミットアンドプルーブ非対話ゼロ知識証明を用いたブラックボックス構成に関する考察.
In SCIS 2021, 2021, in Japanese. -
[SCIS:ShaTibAbe21]
Variants of time-lock puzzles from randomized encodings.
In SCIS 2021, 2021. -
[SCIS:SETA21]
Towards improving lattice attacks on (EC)DSA.
In SCIS 2021, 2021. -
[SCIS:YamTibAbe20]
二つの暗号文の等価性証明をブラックボックス方式で行うことに関する考察.
In SCIS 2020, 2020, in Japanese. -
[SCIS:SunTibAbe20]
On the hardness of LWE with non-uniform binary-error.
In SCIS 2020, 2020. -
[SCIS:KKTAC20]
プライバシ保護深層学習のためのSGX分散処理の提案.
In SCIS 2020, 2020, in Japanese. -
[SCIS:YamTibAbe19]
証拠識別不可能性を持たないオラクルに基づく拡張ブラックボックス構成に関する考察.
In SCIS 2019, 2019, in Japanese. -
[SCIS:SunTibAbe19]
Sample-time trade-off for the Arora-Ge attack on binary-error LWE.
In SCIS 2019, 2019. -
[SCIS:KatTibAbe19]
IntelSGXを用いた関数型タイムリリース暗号.
In SCIS 2019, 2019, in Japanese. -
[ISEC:TakTibAbe18]
特異曲線圧縮点展開攻撃のビットコイン用楕円曲線への応用.
In ISEC研究会, 2018, in Japanese. -
[SCIS:TTAO18]
Curve25519のKummer商上署名方式qDSAに対するフォールト攻撃.
In SCIS 2018, 2018, in Japanese. -
[SCIS:BooTib18]
BLISS格子ベース署名に対しるサイドチャネル攻撃および整数上LWE問題について.
In SCIS 2018, 2018, in Japanese. -
[SCIS:AITTTHF18]
秘密計算の実用可能性.
In SCIS 2018, 2018, in Japanese. -
[ISEC:TTAO17]
ノンスに偏りのあるSchnorr型署名に対するBleichenbacher攻撃の最適化.
In ISEC研究会, 2017, in Japanese. -
[SCIS:KimTib17]
Extension of the GLV/GLS recomposition method of Aranha et al..
In SCIS 2017, 2017. -
[SCIS:BisTib17]
同種写像を用いた置換有理関数の生成手法.
In SCIS 2017, 2017, in Japanese. -
[SCIS:KimTib16]
楕円曲線符号化関数の擬似ランダム性について.
In SCIS 2016, 2016, in Japanese. -
[SCIS:KimTib15b]
Optimizing obfuscation: towards smaller matrix branching programs.
In SCIS 2015, 2015. -
[SCIS:KimTib15a]
Differential fault attacks on GLS curves.
In SCIS 2015, 2015. -
[SCIS:FouLepTib15]
Co-ACD仮定とそれを基にした準同型暗号方式の安全性評価.
In SCIS 2015, 2015, in Japanese. -
[SCIS:Tibouchi14]
素数位数楕円曲線上の点を一様に近いビットストリングとして表す手法.
In SCIS 2014, 2014, in Japanese. -
[SCIS:Tibouchi13]
Impossibility of symmetric structure-preserving signatures with single verification equation.
In SCIS 2013, 2013. -
[SCIS:Tibouchi12]
A note on hashing to BN curves.
In SCIS 2012, 2012.
Preprints
Manuscripts available on preprint servers and not formally published yet.
-
[EPRINT:BKLMTT24]
Ringtail: practical two-round threshold signatures from learning with errors.
[eprint]
[github]
In IACR ePrint Archive, 2024. -
[EPRINT:NPTA24]
Interactive threshold mercurial signatures and applications.
[eprint]
In IACR ePrint Archive, 2024.
Theses
For now, just my Ph.D. thesis.
-
[PhD:Tibouchi11]
Hachage vers les courbes elliptiques et cryptanalyse de schémas RSA (Hashing to elliptic curves and cryptanalysis of RSA-based schemes).
[tel]
Ph.D. thesis from University Paris Diderot and University of Luxembourg, September 2011.
Supervised by D. Naccache and J.-S. Coron.
Introduction in French, main matter in English.