Frederik Vercauteren
Frederik Vercauteren
Verified email at
Cited by
Cited by
Handbook of elliptic and hyperelliptic curve cryptography
H Cohen, G Frey, R Avanzi, C Doche, T Lange, K Nguyen, F Vercauteren
CRC press, 2006
Somewhat practical fully homomorphic encryption
J Fan, F Vercauteren
Cryptology ePrint Archive, 2012
Fully homomorphic encryption with relatively small key and ciphertext sizes
NP Smart, F Vercauteren
Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010
Fully homomorphic SIMD operations
NP Smart, F Vercauteren
Designs, codes and cryptography 71, 57-81, 2014
The eta pairing revisited
F Hess, NP Smart, F Vercauteren
IEEE transactions on information theory 52 (10), 4595-4602, 2006
Optimal pairings
F Vercauteren
IEEE transactions on information theory 56 (1), 455-461, 2009
Compact ring-LWE cryptoprocessor
SS Roy, F Vercauteren, N Mentens, DD Chen, I Verbauwhede
Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014
Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
JP D’Anvers, A Karmakar, S Sinha Roy, F Vercauteren
Progress in Cryptology–AFRICACRYPT 2018: 10th International Conference on …, 2018
CSI-FiSh: efficient isogeny based signatures through class group computations
W Beullens, T Kleinjung, F Vercauteren
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
The number field sieve in the medium prime case
A Joux, R Lercier, N Smart, F Vercauteren
Advances in Cryptology-CRYPTO 2006: 26th Annual International Cryptology …, 2006
A new RFID privacy model
J Hermans, A Pashalidis, F Vercauteren, B Preneel
Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011
High-speed polynomial multiplication architecture for ring-LWE and SHE cryptosystems
DD Chen, N Mentens, F Vercauteren, SS Roy, RCC Cheung, D Pao, ...
IEEE Transactions on Circuits and Systems I: Regular Papers 62 (1), 157-166, 2014
Efficient software implementation of ring-LWE encryption
R De Clercq, SS Roy, F Vercauteren, I Verbauwhede
2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), 339-344, 2015
A fault attack on pairing-based cryptography
D Page, F Vercauteren
IEEE Transactions on Computers 55 (9), 1075-1080, 2006
FPGA-based high-performance parallel architecture for homomorphic computing on encrypted data
SS Roy, F Turan, K Jarvinen, F Vercauteren, I Verbauwhede
2019 IEEE International symposium on high performance computer architecture …, 2019
A comparison of MNT curves and supersingular curves
D Page, NP Smart, F Vercauteren
Applicable Algebra in Engineering, Communication and Computing 17 (5), 379-392, 2006
A masked ring-LWE implementation
O Reparaz, S Sinha Roy, F Vercauteren, I Verbauwhede
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
A cross-protocol attack on the TLS protocol
N Mavrogiannopoulos, F Vercauteren, V Velichkov, B Preneel
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Aspects of pairing inversion
S Galbraith, F Hess, F Vercauteren
IEEE Transactions on Information Theory 54 (12), 5719-5728, 2008
Speed records for NTRU
J Hermans, F Vercauteren, B Preneel
Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA …, 2010
The system can't perform the operation now. Try again later.
Articles 1–20