International audienceWe design and analyze new protocols to verify the correctness of various computations on matrices over the ring F[x] of univariate polynomials over a field F. For the sake of efficiency, and because many of the properties we verify are specific to matrices over a principal ideal domain, we cannot simply rely on previously-developed linear algebra protocols for matrices over a field. Our protocols are interactive, often randomized, and feature a constant number of rounds of communication between the Prover and Verifier. We seek to minimize the communication cost so that the amount of data sent during the protocol is significantly smaller than the size of the result being verified, which can be useful when combining prot...
Abstract. Linear algebra plays an important role in computer science, especially in cryptography.Num...
Exact linear algebra is an essential tool for scientific computation, which is used ina wide array o...
International audienceThis paper deals with distributed matrix multiplication. Each player owns only...
International audienceWe design and analyze new protocols to verify the correctness of various compu...
International audienceComputational problem certificates are additional data structures for each out...
International audienceCertificates to a linear algebra computation are additional data structures fo...
Certificates to a linear algebra computation are additional data struc-tures for each output, which ...
This paper proposes new Polynomial IOPs for arithmetic circuits. They rely on the monomial coefficie...
International audienceWith the emergence of cloud computing services, computationally weak devices (...
International audienceThis paper deals with distributed matrix multiplication. Each player owns only...
International audienceWe present an interactive probabilistic proof protocol that certifies in (log ...
This thesis focuses on polynomial commitment schemes - cryptographic protocols that allow committing...
In this work we present secure two-party protocols for various core problems in linear algebra. Our ...
Polynomial matrices over fields and rings provide a unifying framework for many control system desig...
Abstract. Linear algebra plays an important role in computer science, especially in cryptography.Num...
Exact linear algebra is an essential tool for scientific computation, which is used ina wide array o...
International audienceThis paper deals with distributed matrix multiplication. Each player owns only...
International audienceWe design and analyze new protocols to verify the correctness of various compu...
International audienceComputational problem certificates are additional data structures for each out...
International audienceCertificates to a linear algebra computation are additional data structures fo...
Certificates to a linear algebra computation are additional data struc-tures for each output, which ...
This paper proposes new Polynomial IOPs for arithmetic circuits. They rely on the monomial coefficie...
International audienceWith the emergence of cloud computing services, computationally weak devices (...
International audienceThis paper deals with distributed matrix multiplication. Each player owns only...
International audienceWe present an interactive probabilistic proof protocol that certifies in (log ...
This thesis focuses on polynomial commitment schemes - cryptographic protocols that allow committing...
In this work we present secure two-party protocols for various core problems in linear algebra. Our ...
Polynomial matrices over fields and rings provide a unifying framework for many control system desig...
Abstract. Linear algebra plays an important role in computer science, especially in cryptography.Num...
Exact linear algebra is an essential tool for scientific computation, which is used ina wide array o...
International audienceThis paper deals with distributed matrix multiplication. Each player owns only...