Name
Affiliation
Papers
CARLOS AGUILAR MELCHOR
Univ Limoges, XLIM DMI, 123 Av Albert Thomas, F-87000 Limoges, France
32
Collaborators
Citations 
PageRank 
49
266
20.27
Referers 
Referees 
References 
615
473
365
Search Limit
100615
Title
Citations
PageRank
Year
Fast And Secure Key Generation For Low Rank Parity Check Codes Cryptosystems00.342021
CDT-Based Gaussian Sampling: From Multi to Double Precision.00.342018
Delegating Elliptic-Curve Operations with Homomorphic Encryption.00.342018
A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib.00.342018
Efficient and Secure Outsourcing of Genomic Data Storage.50.422017
Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography.10.422017
Efficient Encryption from Random Quasi-Cyclic Codes.40.422016
NFLlib: NTT-Based Fast Lattice Library.230.802016
XPIRe: Private Information Retrieval for Everyone.00.342016
Sealing The Leak On Classical Ntru Signatures120.632014
A Code-Based Undeniable Signature Scheme.60.452013
Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting.90.562013
Classification of Extremal and s-Extremal Binary Self-Dual Codes of Length 38.00.342012
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory401.262011
Classification of Extremal and $s$ -Extremal Binary Self-Dual Codes of Length 3880.792011
Improving Additive and Multiplicative Homomorphic Encryption Schemes Based on Worst-Case Hardness Assumptions}.00.342011
A new zero-knowledge code based identification scheme with reduced communication100.502011
Trustable Relays for Anonymous Communication60.632009
A Collusion-Resistant Distributed Scalar Product Protocol with Application to Privacy-Preserving Computation of Trust50.472009
AntTrust: A Novel Ant Routing Protocol for Wireless Ad-hoc Network Based on Trust between Nodes20.402008
Lattice-based homomorphic encryption of vector spaces.81.872008
High-Speed Private Information Retrieval Computation on GPU90.632008
A New Efficient Threshold Ring Signature Scheme Based On Coding Theory00.342008
On the Classification of Extremal [36, 18, 8] Binary Self-Dual Codes150.992008
Additively homomorphic encryption with d-operand multiplications311.822008
Closed-Circuit Unobservable Voice over IP70.462007
A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol.401.612007
Current and future privacy enhancing technologies for the Internet120.732006
From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications60.462006
Single-Database private information retrieval schemes: overview, performance study, and usage with statistical databases30.462006
Modeling user perceived unavailability due to long response times10.392006
pMIX: Untraceability for Small Hiding Groups.30.392005