Name
Papers
Collaborators
JEAN-GUILLAUME DUMAS
91
77
Citations 
PageRank 
Referers 
428
68.48
412
Referees 
References 
735
771
Search Limit
100735
Title
Citations
PageRank
Year
Some fast algorithms multiplying a matrix by its adjoint00.342023
Optimal threshold padlock systems.00.342022
Dynamic proofs of retrievability with low server storage00.342021
On fast multiplication of a matrix by its transpose00.342020
A Faster Cryptographer's Conspiracy Santa00.342020
Elimination-based certificates for triangular equivalence and rank profiles.00.342020
Poster: Proofs of Retrievability with Low Server Storage10.362019
Interactive Physical Zero-Knowledge Proof for Norinori.00.342019
LU factorization with errors.00.342019
A Cryptographer's Conspiracy Santa.00.342018
Physical Zero-Knowledge Proof For Makaro00.342018
Proof-of-work certificates that can be efficiently computed in the cloud.00.342018
Symmetric Indefinite Triangular Factorization Revealing The Rank Profile Matrix00.342018
Dual protocols for private multi-party matrix multiplication and trust computations.00.342017
LocalPKI - An Interoperable and IoT Friendly PKI.00.342017
Certificates for triangular equivalence and rank profiles.10.352017
LOCALPKI: A User-Centric Formally Proven Alternative to PKIX.10.362017
Polynomial Time Interactive Proofs for Linear Algebra with Exponential Matrix Dimensions and Scalars Given by Polynomial Time Circuits.00.342017
Linear Time Interactive Certificates for the Minimal Polynomial and the Determinant of a Sparse Matrix.60.542016
Fast computation of the rank profile matrix and the generalized Bruhat decomposition.40.472016
Physical Zero-Knowledge Proofs for Akari, Takuzu, Kakuro and KenKen.10.352016
Recursive Double-Size Fixed Precision Arithmetic.00.342016
Recursion based parallelization of exact dense linear algebra routines for Gaussian elimination20.392016
Matrix Multiplication Over Word-Size Modular Rings Using Approximate Formulas.20.362016
Fast Matrix Multiplication and Symbolic Computation.00.342016
Private Multi-party Matrix Multiplication and Trust Computations.30.462016
Relative Hilbert-Post Completeness for Exceptions.00.342015
Brandt’s fully private auction protocol revisited20.372015
Computing the Rank Profile Matrix.70.522015
Hilbert-Post completeness for the state and the exception effects.00.342015
Interactive certificate for the verification of Wiedemann's Krylov sequence: application to the certification of the determinant, the minimal and the characteristic polynomials of sparse matrices00.342015
Elements of Design for Containers and Solutions in the LinBox Library.20.432014
Essentially optimal interactive certificates in linear algebra70.662014
Certified Proofs in Programs Involving Exceptions.20.392014
Generating S-Boxes from Semi-fields Pseudo-extensions.00.342014
Elements of Design for Containers and Solutions in the LinBox Library - Extended Abstract.00.342014
Matrix Multiplication over Word-size Modular Fields Using Bini's Approximate Formula00.342014
Program certification with computational effects.00.342014
Parallel Computation of Echelon Forms.90.672014
Breaking a monad-comonad symmetry between computational effects.00.342014
Patterns for computational effects arising from a monad or a comonad.20.402013
Formal verification in Coq of program properties involving the global state effect.20.382013
A decorated proof system for exceptions.10.382013
Simultaneous computation of the row and column rank profiles110.752013
Adjunctions for exceptions00.342012
Decorated proofs for computational effects: Exceptions00.342012
Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures.10.372012
Attacking Privacy in a Fully Private Auction Protocol00.342012
A duality between exceptions and states80.652012
Decorated Proofs For Computational Effects: States60.562012
  • 1
  • 2