HOME
Blogposts
Zama Blog
- June 2023 - Parameter Optimization & Larger Precision for (T)FHE (with Loris Bergerat, Anas Boudi, Quentin Bourgerie, Damien Ligier, Jean-Baptiste Orfila and Samuel Tap) blogpost
- May 2022 - TFHE Deep Dive
- Part I - Ciphertext types blogpost
- Part II - Encodings and linear leveled operations blogpost
- Part III - Key switching and leveled multiplications blogpost
- Part IV - Programmable Bootstrapping blogpost
- September 2021 - What’s New in Concrete (with Ben Curtis, Damien Ligier, Alexandre Péré) Medium, Substack
COSIC Cryptography Blog
- April 2020 - CO6GC: Homomorphic Encryption (part 1): computing with secrets (with Charlotte Bonte) blogpost
- December 2019 - Asiacrypt 2019
- Asiacrypt’19 – Numerical method for comparison on homomorphically encrypted numbers blogpost
- Asiacrypt’19 – Order-LWE and the hardness of Ring-LWE with entropic secrets blogpost
- Asiacrypt’19 – A novel CCA attack using decryption errors against LAC blogpost
- November 2019 - ACM CCS 2019 and workshops
- PPML’19 – Garbled Neural Networks are practical blogpost
- CCS’19 – “I don’t see why I would ever want to use it”: analyzing the usability of popular smartphone password managers blogpost
- CCS’19 – Practical fully secure three-party computation via sublinear distributed zero-knowledge proofs blogpost
- Sparse-secret LWE at WAHC’19 (with Ilia Iliashenko) blogpost
- October 2019 - IDASH 2019 – KU Leuven among the winners blogpost
- July 2019 - The three musketeers of secure computation: MPC, FHE AND FE blogpost
HOME