Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Tidjani Négadi
Balder Von Hohenbalken
Jhonathan Pinzon
Liangliang Shang
Giovanni Venturelli
Chen Ma
Jing-Sheng Wong
Radu Timofte
Maria Laura Mele
Satoru Kogure
Home
/
Author
/
CARLOS AGUILAR MELCHOR
Author Info
Open Visualization
Name
Affiliation
Papers
CARLOS AGUILAR MELCHOR
Univ Limoges, XLIM DMI, 123 Av Albert Thomas, F-87000 Limoges, France
32
Collaborators
Citations
PageRank
49
266
20.27
Referers
Referees
References
615
473
365
Search Limit
100
615
Publications (32 rows)
Collaborators (49 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Fast And Secure Key Generation For Low Rank Parity Check Codes Cryptosystems
0
0.34
2021
CDT-Based Gaussian Sampling: From Multi to Double Precision.
0
0.34
2018
Delegating Elliptic-Curve Operations with Homomorphic Encryption.
0
0.34
2018
A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib.
0
0.34
2018
Efficient and Secure Outsourcing of Genomic Data Storage.
5
0.42
2017
Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography.
1
0.42
2017
Efficient Encryption from Random Quasi-Cyclic Codes.
4
0.42
2016
NFLlib: NTT-Based Fast Lattice Library.
23
0.80
2016
XPIRe: Private Information Retrieval for Everyone.
0
0.34
2016
Sealing The Leak On Classical Ntru Signatures
12
0.63
2014
A Code-Based Undeniable Signature Scheme.
6
0.45
2013
Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting.
9
0.56
2013
Classification of Extremal and s-Extremal Binary Self-Dual Codes of Length 38.
0
0.34
2012
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
40
1.26
2011
Classification of Extremal and $s$ -Extremal Binary Self-Dual Codes of Length 38
8
0.79
2011
Improving Additive and Multiplicative Homomorphic Encryption Schemes Based on Worst-Case Hardness Assumptions}.
0
0.34
2011
A new zero-knowledge code based identification scheme with reduced communication
10
0.50
2011
Trustable Relays for Anonymous Communication
6
0.63
2009
A Collusion-Resistant Distributed Scalar Product Protocol with Application to Privacy-Preserving Computation of Trust
5
0.47
2009
AntTrust: A Novel Ant Routing Protocol for Wireless Ad-hoc Network Based on Trust between Nodes
2
0.40
2008
Lattice-based homomorphic encryption of vector spaces.
8
1.87
2008
High-Speed Private Information Retrieval Computation on GPU
9
0.63
2008
A New Efficient Threshold Ring Signature Scheme Based On Coding Theory
0
0.34
2008
On the Classification of Extremal [36, 18, 8] Binary Self-Dual Codes
15
0.99
2008
Additively homomorphic encryption with d-operand multiplications
31
1.82
2008
Closed-Circuit Unobservable Voice over IP
7
0.46
2007
A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol.
40
1.61
2007
Current and future privacy enhancing technologies for the Internet
12
0.73
2006
From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications
6
0.46
2006
Single-Database private information retrieval schemes: overview, performance study, and usage with statistical databases
3
0.46
2006
Modeling user perceived unavailability due to long response times
1
0.39
2006
pMIX: Untraceability for Small Hiding Groups.
3
0.39
2005
1