default search action
Aymen Boudguiga
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Hichem Sedjelmaci, Nesrine Kaaniche, Aymen Boudguiga, Nirwan Ansari:
Secure Attack Detection Framework for Hierarchical 6G-Enabled Internet of Vehicles. IEEE Trans. Veh. Technol. 73(2): 2633-2642 (2024) - [c35]Marina Checri, Renaud Sirdey, Aymen Boudguiga, Jean-Paul Bultel:
On the Practical CPAD Security of "exact" and Threshold FHE Schemes and Libraries. CRYPTO (3) 2024: 3-33 - [c34]Olive Chakraborty, Aymen Boudguiga:
A Decentralized Federated Learning Using Reputation. ICISSP 2024: 799-806 - [c33]Devharsh Trivedi, Nesrine Kaaniche, Aymen Boudguiga, Nikos Triandopoulos:
chiku: Efficient Probabilistic Polynomial Approximations Library. SECRYPT 2024: 634-641 - [i9]Marina Checri, Renaud Sirdey, Aymen Boudguiga, Jean-Paul Bultel, Antoine Choffrut:
On the practical CPAD security of "exact" and threshold FHE schemes and libraries. IACR Cryptol. ePrint Arch. 2024: 116 (2024) - [i8]Olive Chakraborty, Aymen Boudguiga:
A Decentralized Federated Learning using Reputation. IACR Cryptol. ePrint Arch. 2024: 506 (2024) - [i7]Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey:
Chocobo: Creating Homomorphic Circuit Operating with Functional Bootstrapping in basis B. IACR Cryptol. ePrint Arch. 2024: 673 (2024) - [i6]Daphné Trama, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey:
Designing a General-Purpose 8-bit (T)FHE Processor Abstraction. IACR Cryptol. ePrint Arch. 2024: 1201 (2024) - 2023
- [j4]Devharsh Trivedi, Aymen Boudguiga, Nesrine Kaaniche, Nikos Triandopoulos:
SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation. Cryptogr. 7(4): 52 (2023) - [c32]Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey, Martin Zuber:
ComBo: A Novel Functional Bootstrapping Method for Efficient Evaluation of Nonlinear Functions in the Encrypted Domain. AFRICACRYPT 2023: 317-343 - [c31]Daphné Trama, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey:
Building Blocks for LSTM Homomorphic Evaluation with TFHE. CSCML 2023: 117-134 - [c30]Devharsh Trivedi, Aymen Boudguiga, Nikos Triandopoulos:
SigML: Supervised Log Anomaly with Fully Homomorphic Encryption. CSCML 2023: 372-388 - [c29]Alberto Pedrouzo-Ulloa, Aymen Boudguiga, Olive Chakraborty, Renaud Sirdey, Oana Stan, Martin Zuber:
Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Average Aggregation. CSR 2023: 612-617 - [c28]Adda-Akram Bendoukha, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey:
Optimized Stream-Cipher-Based Transciphering by Means of Functional-Bootstrapping. DBSec 2023: 91-109 - [c27]Marina Checri, Jean-Paul Bultel, Renaud Sirdey, Aymen Boudguiga:
Lightweight FHE-based Protocols Achieving Results Consistency for Data Encrypted Under Different Keys. SECRYPT 2023: 704-709 - [c26]Daphné Trama, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey:
A Homomorphic AES Evaluation in Less than 30 Seconds by Means of TFHE. WAHC@CCS 2023: 79-90 - [i5]Daphné Trama, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey:
At Last! A Homomorphic AES Evaluation in Less than 30 Seconds by Means of TFHE. IACR Cryptol. ePrint Arch. 2023: 1020 (2023) - [i4]Adda-Akram Bendoukha, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey:
Optimized stream-cipher-based transciphering by means of functional-bootstrapping. IACR Cryptol. ePrint Arch. 2023: 1111 (2023) - 2022
- [c25]Hichem Sedjelmaci, Nizar Kheir, Aymen Boudguiga, Nesrine Kaaniche:
Cooperative and smart attacks detection systems in 6G-enabled Internet of Things. ICC 2022: 5238-5243 - [c24]Oana Stan, Vincent Thouvenot, Aymen Boudguiga, Katarzyna Kapusta, Martin Zuber, Renaud Sirdey:
A Secure Federated Learning: Analysis of Different Cryptographic Tools. SECRYPT 2022: 669-674 - [c23]Nesrine Kaaniche, Aymen Boudguiga, Gustavo Gonzalez Granadillo:
Efficient Hybrid Model for Intrusion Detection Systems. SECRYPT 2022: 694-700 - [i3]Pierre-Emmanuel Clet, Martin Zuber, Aymen Boudguiga, Renaud Sirdey, Cédric Gouy-Pailler:
Putting up the swiss army knife of homomorphic calculations by means of TFHE functional bootstrapping. IACR Cryptol. ePrint Arch. 2022: 149 (2022) - [i2]Alberto Pedrouzo-Ulloa, Aymen Boudguiga, Olive Chakraborty, Renaud Sirdey, Oana Stan, Martin Zuber:
Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Aggregation (preliminary work). IACR Cryptol. ePrint Arch. 2022: 1674 (2022) - 2021
- [c22]Adda-Akram Bendoukha, Aymen Boudguiga, Renaud Sirdey:
Revisiting Stream-Cipher-Based Homomorphic Transciphering in the TFHE Era. FPS 2021: 19-33 - [c21]Aymen Boudguiga, Oana Stan, Abdessamad Fazzat, Houda Labiod, Pierre-Emmanuel Clet:
Privacy Preserving Services for Intelligent Transportation Systems with Homomorphic Encryption. ICISSP 2021: 684-693 - 2020
- [c20]Walid Arabi, Reda Yaich, Aymen Boudguiga, Mawloud Omar:
Secure Data Processing for Industrial Remote Diagnosis and Maintenance. CRiSIS 2020: 335-346 - [c19]Aymen Boudguiga, Oana Stan, Hichem Sedjelmaci, Sergiu Carpov:
Homomorphic Encryption at Work for Private Analysis of Security Logs. ICISSP 2020: 515-523
2010 – 2019
- 2019
- [j3]Hichem Sedjelmaci, Aymen Boudguiga, Inès Ben Jemaa, Sidi Mohammed Senouci:
An efficient cyber defense framework for UAV-Edge computing network. Ad Hoc Networks 94 (2019) - [c18]Othmane El Omri, Aymen Boudguiga, Malika Izabachène, Witold Klaudel:
Privacy-Preserving k-means Clustering: an Application to Driving Style Recognition. NSS 2019: 685-696 - [c17]Aymen Boudguiga, Jérôme Letailleur, Renaud Sirdey, Witold Klaudel:
Enhancing CAN Security by Means of Lightweight Stream-Ciphers and Protocols. SAFECOMP Workshops 2019: 235-250 - 2018
- [c16]Hichem Sedjelmaci, Imane Horiya Brahmi, Aymen Boudguiga, Witold Klaudel:
A generic cyber defense scheme based on stackelberg game for vehicular network. CCNC 2018: 1-6 - [c15]Jean-Philippe Monteuuis, Aymen Boudguiga, Jun Zhang, Houda Labiod, Alain Servel, Pascal Urien:
SARA: Security Automotive Risk Analysis Method. CPSS@AsiaCCS 2018: 3-14 - [c14]Hichem Sedjelmaci, Fateh Guenab, Aymen Boudguiga, Yohann Petiot:
Cooperative Security Framework for CBTC Network. ICC 2018: 1-6 - 2017
- [c13]Aymen Boudguiga, Nabil Bouzerna, Louis Granboulan, Alexis Olivereau, Flavien Quesnel, Anthony Roger, Renaud Sirdey:
Towards Better Availability and Accountability for IoT Updates by Means of a Blockchain. EuroS&P Workshops 2017: 50-58 - [i1]Hengchuan Tan, Maode Ma, Houda Labiod, Aymen Boudguiga, Jun Zhang, Peter Han Joo Chong:
A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks. CoRR abs/1712.09859 (2017) - 2016
- [j2]Hengchuan Tan, Maode Ma, Houda Labiod, Aymen Boudguiga, Jun Zhang, Peter Han Joo Chong:
A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks. IEEE Trans. Veh. Technol. 65(12): 9570-9584 (2016) - [c12]Aymen Boudguiga, Witold Klaudel, Antoine Boulanger, Pascale Chiron:
A simple intrusion detection method for controller area network. ICC 2016: 1-7 - 2015
- [c11]Aymen Boudguiga, Witold Klaudel, Jimmy Durand Wesolowski:
On the performance of freescale i.MX6 cryptographic acceleration and assurance module. RAPIDO@HiPEAC 2015: 8:1-8:8 - [c10]Aymen Boudguiga, Antoine Boulanger, Pascale Chiron, Witold Klaudel, Houda Labiod, Jean-Christophe Seguy:
RACE: Risk analysis for cooperative engines. NTMS 2015: 1-5 - [c9]Pierpaolo Cincilla, Aymen Boudguiga, Makhlouf Hadji, Arnaud Kaiser:
Light Blind: Why Encrypt If You Can Share?. SECRYPT 2015: 361-368 - 2013
- [c8]Nesrine Kaaniche, Aymen Boudguiga, Maryline Laurent:
ID Based Cryptography for Cloud Data Storage. IEEE CLOUD 2013: 375-382 - [c7]Mohammed Bahria, Alexis Olivereau, Aymen Boudguiga:
A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks. IWSOS 2013: 157-162 - [c6]Nouha Oualha, Alexis Olivereau, Aymen Boudguiga:
Pseudonymous communications in secure industrial wireless sensor networks. PST 2013: 98-102 - [c5]Aymen Boudguiga, Alexis Olivereau, Nouha Oualha:
Server Assisted Key Establishment for WSN: A MIKEY-Ticket Approach. TrustCom/ISPA/IUCC 2013: 94-101 - 2012
- [c4]Aymen Boudguiga, Maryline Laurent:
An authentication scheme for IEEE 802.11s mesh networks relying on Sakai-Kasahara ID-Based Cryptographic algorithms. COMNET 2012: 1-8 - 2011
- [c3]Aymen Boudguiga, Maryline Laurent:
An EAP ID-based authentication method for wireless networks. ICITST 2011: 232-239 - [c2]Aymen Boudguiga, Maryline Laurent:
Key-escrow resistant ID-based authentication scheme for IEEE 802.11s mesh networks. WCNC 2011: 784-789 - 2010
- [j1]Tony Cheneau, Aymen Boudguiga, Maryline Laurent:
Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU. Comput. Secur. 29(4): 419-431 (2010) - [c1]Aymen Boudguiga, Maryline Laurent:
An ID-based authentication scheme for the IEEE 802.11s Mesh Network. WiMob 2010: 256-263
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint