Publications
Large Domain Homomorphic Evaluation for BFV-like schemes via Ring Repacking. pdf
Designs, Codes and Cryptography, 2025. To appear.
Jean-Philippe Bossuat and Malika Izabachène
TETRIS: Composing FHE Techniques for Private Functional Exploration Over Large Datasets. pdf code
Proceedings of Privacy Enhancing Technology, PoPets 2025, issue 2, 23-38.
Jean-Philippe Bossuat and Malika Izabachene
Efficient Post-Quantum Pattern Matching on Encrypted Data. pdf code
IACR Communication in Cryptology, 2024, Volume 1, issue 2, p22.
Anis Bkakria and Malika Izabachène
Homomorphically counting elements with the same property. pdf code video
Proceedings of Privacy Enhancing Technology, PoPets 2022, issue 4, 670-683.
Ilia Iliashenko, Malika Izabachène, Axel Mertens, and Hilder V. L. Pereira.
TFHE Fast Fully Homomorphic Encryption over the Torus. pdf
Journal of Cryptology 2020.
Ilaria Chillotti, Nicolas Gama, Maryia Georgieva and Malika Izabachène.
New Anonymity Notions for Identity-Based Encryption. pdf
Formal to Practical Security 2009, LNCS 5458, 138-157.
Malika Izabachène and David Pointcheval.
Identity-based encryption from lattices using approximate trapdoors. pdf code
ACISP 2023, Information Security and Privacy, 28th Australasian Conference, LNCS 13915, 270-290.
Malika Izabachène, Lucas Prabel and Adeline Roux-Langlois.
MyOPE: Malicious securitY for Oblivious Polynomial Evaluation. pdf
SCN 2022, Security and Cryptography for Networks, 13th International Conference, LNCS 13409, 663-686.
Malika Izabachène, Anca Nitulescu, Paola de Perthuis and David Pointcheval.
Secure Hybrid Encryption in the Standard Model from Hard Learning Problems. pdf
PQCrypto 2021, 12th International Workshop, LNCS 12841, 399-418.
Xavier Boyen, Malika Izabachène and Qinyi Li.
A Simple and Efficient CCA-Secure Lattice KEM in the Standard Model. pdf
SCN 2020, Security and Cryptography for Networks, 12th International Conference, LNCS 12238, 321-337.
Xavier Boyen, Malika Izabachène and Qinyi Li.
Practical fully homomorphic encryption for fully masked neural networks. pdf
CANS 2019, Cryptology and Network Security, 18th International Conference, LNCS 11829, 24-36.
Malika Izabachène, Renaud Sirday and Martin Zuber.
New techniques for Multi-value Input Homomorphic Evaluation and Applications. pdf
CT-RSA 2019, The Cryptographers Track, LNCS 11405, 106-126.
Sergiu Carpov, Malika Izabachène and Victor Mollimard.
Privacy preserving k-means clustering, an application to driving-style recognition. pdf
Network and System Security 2019, Japan, LNCS 11928, 685-696.
Othmane El Omri, Ayman Boudguiga, Malika Izabachène and Witold Klaudel.
Faster Packed Homomorphic Operations and Efficient Circuit Bootstrapping for TFHE. pdf
ASIACRYPT 2017, 23rd International Conference on the Theory and Applications of Cryptology and Information Security, LNCS 10624, 377-408.
Ilaria Chillotti, Nicolas Gama, Maryia Georgieva and Malika Izabachène.
Faster Fully Homomorphic Encryption: Bootstrapping in less than 0.1 seconds. pdf
ASIACRYPT 2016, 22nd International Conference on the Theory and Application of Cryptology and Information Security, LNCS 10031, 3-33.
Ilaria Chillotti, Nicolas Gama, Maryia Georgieva and Malika Izabachène.
Structural Lattice Reduction: Worst-Case to Average-Case Reduction for (Almost) All Lattices. pdf
EUROCRYPT 2016, 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 9666, 528-558 (2).
Nicolas Gama, Malika Izabachène, Phong Q. Nguyen and Xiang Xie.
A Homomorphic LWE-based evoting Scheme. pdf
PQCrypto 2016, 7th International Workshop, LNCS 9606, 245-265.
Ilaria Chillotti, Nicolas Gama, Maryia Georgieva and Malika Izabachène.
Election Verifiability for Helios under Weaker Trust Assumptions. pdf
ESORICS 2014, 19th European Symposium on Research in Computer Security, LNCS 8713, 327-344.
Véronique Cortier, David Galindo, Stéphane Glondu, and Malika Izabachène.
Election Verifiability for Helios under Weaker Trust Assumptions. pdf
WPES 2013, 12th annual ACM Workshop on Privacy in the Electronic Society, 131-142.
Véronique Cortier, David Galindo, Stéphane Glondu, and Malika Izabachène.
Divisible e-cash in the standard model. pdf
Pairing 2012, 5th International Conference, LNCS 7708, 314-332.
Malika Izabachène and Benoît Libert.
Block-wise P-Signatures and Non-Interactive Anonymous Credentials with Efficient Attributes. pdf
IMAAC 2011, Cryptography and Coding, 13th IMA International Conference, LNCS 7089, 431-450.
Malika Izabachène, Benoît Libert and Damien Vergnaud.
Mediated Traceable Anonymous Encryption. pdf
Latincrypt 2010, First International Conference on Cryptology and Information Security in Latin America, LNCS 6212, 40-60.
Malika Izabachène, David Pointcheval and Damien Vergnaud.
Batch Groth Sahai. pdf
ACNS, Applied Cryptography and Network Security, 8th International Conference, 2010, LNCS 6123, 218-235.
Olivier Blazy, Amandine Jambert, Georg Fuchsbauer, Malika Izabachène, Hervé Sibert and Damien Vergnaud.
Anonymous and Transparent Gateway-based Password-Authenticated Key Exchange. pdf
CANS 2008 - Cryptology and Network Security, 7th International Conference, LNCS 5339, 133-148.
Michel Abdalla, Malika Izabachène and David Pointcheval.
New Definitions for Identity-Based Encryption and Application. pdf
SCN 2008, Security and Cryptography for Networks, 6th International Conference, LNCS 5229, 375-391.
Malika Izabachène and David Pointcheval.
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication. pdf
ACISP 2007, 12th Australasian Conference, LNCS 4586, 96-106.
Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang and Sébastien Zimmer.
Large Domain Homomorphic Evaluation for BFV-like schemes via Ring Repacking. pdf
FHE.org conference 2024.
Jean-Philippe Bossuat and Malika Izabachene
Plug-and-play sanitization for TFHE. pdf code video
FHE.org conference 2024.
Florian Bourse and Malika Izabachene
A note on the construction of pairing-friendly elliptic curves for composite order protocols. pdf
BalkanCryptsec 2018. Communications in Computer and Information Science 7899.
Sorina Ionica and Malika Izabachène.
CoverCrypt Documentation. pdf
Report I wrote when I worked at cosmian. The document describes
the specification of an efficient access policies KEM scheme called CoverCrypt, July 2022.
A generic construction for voting correctness at minimum cost - Application to Helios. pdf
Technical report, eprint 2013/177.
Véronique Cortier, David Galindo, Stéphane Glondu and Malika Izabachène.
L'anonymat dans les protocoles cryptographiques. pdf
PhD thesis manuscript (in French), 2009.
Interrogation Confidentielle de Bases de Données. pdf
Master thesis manuscript (in French), 20096.