Follow
Florian Bourse
Florian Bourse
Professeur agrégé
Verified email at ens.fr - Homepage
Title
Cited by
Cited by
Year
Simple functional encryption schemes for inner products
M Abdalla, F Bourse, A De Caro, D Pointcheval
IACR International Workshop on Public Key Cryptography, 733-751, 2015
3862015
Fast homomorphic evaluation of deep discretized neural networks
F Bourse, M Minelli, M Minihold, P Paillier
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
3772018
Balanced graph edge partition
F Bourse, M Lelarge, M Vojnovic
Proceedings of the 20th ACM SIGKDD international conference on Knowledge …, 2014
1752014
FHE circuit privacy almost for free
F Bourse, R Del Pino, M Minelli, H Wee
Annual International Cryptology Conference, 62-89, 2016
762016
CCA-secure inner-product functional encryption from projective hash functions
F Benhamouda, F Bourse, H Lipmaa
Public-Key Cryptography–PKC 2017: 20th IACR International Conference on …, 2017
582017
Better security for functional encryption for inner product evaluations
M Abdalla, F Bourse, A De Caro, D Pointcheval
Cryptology ePrint Archive, 2016
572016
Improved secure integer comparison via homomorphic encryption
F Bourse, O Sanders, J Traoré
Cryptographers’ Track at the RSA Conference, 391-416, 2020
492020
Multi-client inner-product functional encryption in the random-oracle model
M Abdalla, F Bourse, H Marival, D Pointcheval, A Soleimanian, H Waldner
Security and Cryptography for Networks: 12th International Conference, SCN …, 2020
282020
Divisible e-cash from constrained pseudo-random functions
F Bourse, D Pointcheval, O Sanders
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
202019
Functional encryption for inner-product evaluations
F Bourse
Université Paris sciences et lettres, 2017
82017
Plug-and-play sanitization for TFHE
F Bourse, M Izabachène
Cryptology ePrint Archive, 2022
22022
From Rational Number Reconstruction to Set Reconciliation and File Synchronization
A Amarilli, F Benhamouda, F Bourse, R Morisset, D Naccache, P Rauzy
Trustworthy Global Computing, 1-18, 2013
12013
Cryptographic method of secure comparison of two secret data x and y
F Bourse, O Sanders, J Traore
US Patent App. 17/278,861, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–13