default search action
Melissa Rossi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Loïc Demange, Mélissa Rossi:
A provably masked implementation of BIKE Key Encapsulation Mechanism. IACR Commun. Cryptol. 1(1): 23 (2024) - [j4]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi:
Masking the GLP Lattice-Based Signature Scheme at Any Order. J. Cryptol. 37(1): 5 (2024) - [j3]Morgane Guerreau, Mélissa Rossi:
A Not So Discrete Sampler: Power Analysis Attacks on HAWK signature scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 156-178 (2024) - [c15]Rafaël del Pino, Shuichi Katsumata, Thomas Prest, Mélissa Rossi:
Raccoon: A Masking-Friendly Signature Proven in the Probing Model. CRYPTO (1) 2024: 409-444 - [i18]Loïc Demange, Mélissa Rossi:
A provably masked implementation of BIKE Key Encapsulation Mechanism. IACR Cryptol. ePrint Arch. 2024: 76 (2024) - [i17]Morgane Guerreau, Mélissa Rossi:
A Not So Discrete Sampler: Power Analysis Attacks on HAWK signature scheme. IACR Cryptol. ePrint Arch. 2024: 1248 (2024) - [i16]Rafaël del Pino, Shuichi Katsumata, Thomas Prest, Mélissa Rossi:
Raccoon: A Masking-Friendly Signature Proven in the Probing Model. IACR Cryptol. ePrint Arch. 2024: 1291 (2024) - 2023
- [j2]Aurélien Dupin, Pierrick Méaux, Mélissa Rossi:
On the algebraic immunity - resiliency trade-off, implications for Goldreich's pseudorandom generator. Des. Codes Cryptogr. 91(9): 3035-3079 (2023) - [c14]Hugo Beguinet, Céline Chevalier, David Pointcheval, Thomas Ricosset, Mélissa Rossi:
GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges. ACNS 2023: 516-538 - [c13]Shweta Agrawal, Mélissa Rossi, Anshu Yadav, Shota Yamada:
Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor LWE. CRYPTO (4) 2023: 532-564 - [c12]Markku-Juhani O. Saarinen, Mélissa Rossi:
Mask Compression: High-Order Masking on Memory-Constrained Devices. SAC 2023: 65-81 - [c11]Rafaël del Pino, Thomas Prest, Mélissa Rossi, Markku-Juhani O. Saarinen:
High-Order Masking of Lattice Signatures in Quasilinear Time. SP 2023: 1168-1185 - [i15]Hugo Beguinet, Céline Chevalier, David Pointcheval, Thomas Ricosset, Mélissa Rossi:
GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges. IACR Cryptol. ePrint Arch. 2023: 470 (2023) - [i14]Shweta Agrawal, Melissa Rossi, Anshu Yadav, Shota Yamada:
Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor LWE. IACR Cryptol. ePrint Arch. 2023: 941 (2023) - [i13]Markku-Juhani O. Saarinen, Mélissa Rossi:
Mask Compression: High-Order Masking on Memory-Constrained Devices. IACR Cryptol. ePrint Arch. 2023: 1117 (2023) - 2022
- [j1]Morgane Guerreau, Ange Martinelli, Thomas Ricosset, Mélissa Rossi:
The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 141-164 (2022) - [c10]Thomas Espitau, Pierre-Alain Fouque, François Gérard, Mélissa Rossi, Akira Takahashi, Mehdi Tibouchi, Alexandre Wallet, Yang Yu:
Mitaka: A Simpler, Parallelizable, Maskable Variant of Falcon. EUROCRYPT (3) 2022: 222-253 - [i12]Morgane Guerreau, Ange Martinelli, Thomas Ricosset, Mélissa Rossi:
The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon. IACR Cryptol. ePrint Arch. 2022: 57 (2022) - 2021
- [i11]Aurélien Dupin, Pierrick Méaux, Mélissa Rossi:
On the Algebraic Immunity - Resiliency trade-off, implications for Goldreich's Pseudorandom Generator. IACR Cryptol. ePrint Arch. 2021: 649 (2021) - [i10]Thomas Espitau, Pierre-Alain Fouque, François Gérard, Mélissa Rossi, Akira Takahashi, Mehdi Tibouchi, Alexandre Wallet, Yang Yu:
Mitaka: a simpler, parallelizable, maskable variant of Falcon. IACR Cryptol. ePrint Arch. 2021: 1486 (2021) - 2020
- [b1]Mélissa Rossi:
Extended Security of Lattice-Based Cryptography. (Sécurité étendue de la cryptographie fondée sur les réseaux euclidiens). Paris Sciences et Lettres University, France, 2020 - [c9]Dana Dachman-Soled, Léo Ducas, Huijing Gong, Mélissa Rossi:
LWE with Side Information: Attacks and Concrete Security Estimation. CRYPTO (2) 2020: 329-358 - [c8]Jan-Pieter D'Anvers, Mélissa Rossi, Fernando Virdia:
(One) Failure Is Not an Option: Bootstrapping the Search for Failures in Lattice-Based Encryption Schemes. EUROCRYPT (3) 2020: 3-33 - [c7]James Howe, Thomas Prest, Thomas Ricosset, Mélissa Rossi:
Isochronous Gaussian Sampling: From Inception to Implementation. PQCrypto 2020: 53-71 - [i9]Dana Dachman-Soled, Léo Ducas, Huijing Gong, Mélissa Rossi:
LWE with Side Information: Attacks and Concrete Security Estimation. IACR Cryptol. ePrint Arch. 2020: 292 (2020)
2010 – 2019
- 2019
- [c6]François Gérard, Mélissa Rossi:
An Efficient and Provable Masked Implementation of qTESLA. CARDIS 2019: 74-91 - [c5]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi:
GALACTICS: Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited. CCS 2019: 2147-2164 - [c4]Aurélie Bauer, Henri Gilbert, Guénaël Renault, Mélissa Rossi:
Assessment of the Key-Reuse Resilience of NewHope. CT-RSA 2019: 272-292 - [i8]Aurélie Bauer, Henri Gilbert, Guénaël Renault, Mélissa Rossi:
Assessment of the Key-Reuse Resilience of NewHope. IACR Cryptol. ePrint Arch. 2019: 75 (2019) - [i7]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi:
GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited. IACR Cryptol. ePrint Arch. 2019: 511 (2019) - [i6]François Gérard, Mélissa Rossi:
An Efficient and Provable Masked Implementation of qTESLA. IACR Cryptol. ePrint Arch. 2019: 606 (2019) - [i5]Jan-Pieter D'Anvers, Mélissa Rossi, Fernando Virdia:
(One) failure is not an option: Bootstrapping the search for failures in lattice-based encryption schemes. IACR Cryptol. ePrint Arch. 2019: 1399 (2019) - [i4]James Howe, Thomas Prest, Thomas Ricosset, Mélissa Rossi:
Isochronous Gaussian Sampling: From Inception to Implementation. IACR Cryptol. ePrint Arch. 2019: 1411 (2019) - 2018
- [c3]Geoffroy Couteau, Aurélien Dupin, Pierrick Méaux, Mélissa Rossi, Yann Rotella:
On the Concrete Security of Goldreich's Pseudorandom Generator. ASIACRYPT (2) 2018: 96-124 - [c2]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi:
Masking the GLP Lattice-Based Signature Scheme at Any Order. EUROCRYPT (2) 2018: 354-384 - [i3]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi:
Masking the GLP Lattice-Based Signature Scheme at Any Order. IACR Cryptol. ePrint Arch. 2018: 381 (2018) - [i2]Geoffroy Couteau, Aurélien Dupin, Pierrick Méaux, Mélissa Rossi, Yann Rotella:
On the Concrete Security of Goldreich's Pseudorandom Generator. IACR Cryptol. ePrint Arch. 2018: 1162 (2018) - 2017
- [c1]Melissa Rossi, Mike Hamburg, Michael Hutter, Mark E. Marson:
A Side-Channel Assisted Cryptanalytic Attack Against QcBits. CHES 2017: 3-23 - [i1]Melissa Rossi, Mike Hamburg, Michael Hutter, Mark E. Marson:
A Side-Channel Assisted Cryptanalytic Attack Against QcBits. IACR Cryptol. ePrint Arch. 2017: 596 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint