What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Aurore Guillevic
Google Scholar
ORCID:
0000-0002-0824-7273
13
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/cic
A short-list of pairing-friendly curves resistant to the Special TNFS algorithm at the 192-bit security level.
Diego F. Aranha
Georgios Fotiadis
Aurore Guillevic
2022
conf/eurocrypt
Families of SNARK-Friendly 2-Chains of Elliptic Curves.
Youssef El Housni
Aurore Guillevic
2022
conf/africacrypt
Co-factor Clearing and Subgroup Membership Testing on Pairing-Friendly Curves.
Youssef El Housni
Aurore Guillevic
Thomas Piellard
2020
conf/crypto
Comparing the Difficulty of Factorization and Discrete Logarithm: A 240-Digit Experiment.
Fabrice Boudot
Pierrick Gaudry
Aurore Guillevic
Nadia Heninger
Emmanuel Thomé
Paul Zimmermann
2020
conf/pkc
A Short-List of Pairing-Friendly Curves Resistant to Special TNFS at the 128-Bit Security Level.
Aurore Guillevic
2020
conf/cans
Optimized and Secure Pairing-Friendly Elliptic Curves Suitable for One Layer Proof Composition.
Youssef El Housni
Aurore Guillevic
2017
conf/sacrypt
Computing Discrete Logarithms in 𝔽<sub>p<sup>6</sup></sub>.
Laurent Grémy
Aurore Guillevic
François Morain
Emmanuel Thomé
2016
conf/sacrypt
Solving Discrete Logarithms on a 170-Bit MNT Curve by Pairing Reduction.
Aurore Guillevic
François Morain
Emmanuel Thomé
2015
conf/eurocrypt
Improving NFS for the Discrete Logarithm Problem in Non-prime Finite Fields.
Razvan Barbulescu
Pierrick Gaudry
Aurore Guillevic
François Morain
2015
conf/asiacrypt
Computing Individual Discrete Logarithms Faster in GF(p n ) with the NFS-DL Algorithm.
Aurore Guillevic
2013
conf/acns
Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves.
Aurore Guillevic
2013
conf/asiacrypt
Four-Dimensional GLV via the Weil Restriction.
Aurore Guillevic
Sorina Ionica
2011
conf/africacrypt
Efficient Multiplication in Finite Field Extensions of Degree 5.
Nadia El Mrabet
Aurore Guillevic
Sorina Ionica
Coauthors
Aurore Guillevic
(13)
Diego F. Aranha
(1)
Emmanuel Thomé
(3)
Fabrice Boudot
(1)
François Morain
(3)
Georgios Fotiadis
(1)
Laurent Grémy
(1)
Nadia El Mrabet
(1)
Nadia Heninger
(1)
Paul Zimmermann
(1)
Pierrick Gaudry
(2)
Razvan Barbulescu
(1)
Sorina Ionica
(2)
Thomas Piellard
(1)
Youssef El Housni
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to