BibTeX records: Aisling Connolly

download as .bib file

@article{DBLP:journals/iacr/CerulliCNPS23,
  author       = {Andrea Cerulli and
                  Aisling Connolly and
                  Gregory Neven and
                  Franz{-}Stefan Preiss and
                  Victor Shoup},
  title        = {vetKeys: How a Blockchain Can Keep Many Secrets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {616},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/616},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CerulliCNPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ConnollyDLP22,
  author       = {Aisling Connolly and
                  J{\'{e}}r{\^{o}}me Deschamps and
                  Pascal Lafourcade and
                  Octavio Perez{-}Kempner},
  editor       = {Takanori Isobe and
                  Santanu Sarkar},
  title        = {Protego: Efficient, Revocable and Auditable Anonymous Credentials
                  with Applications to Hyperledger Fabric},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2022 - 23rd International Conference
                  on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13774},
  pages        = {249--271},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22912-1\_11},
  doi          = {10.1007/978-3-031-22912-1\_11},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/ConnollyDLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Connolly0P22,
  author       = {Aisling Connolly and
                  Pascal Lafourcade and
                  Octavio Perez{-}Kempner},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Improved Constructions of Anonymous Credentials from Structure-Preserving
                  Signatures on Equivalence Classes},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {409--438},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_15},
  doi          = {10.1007/978-3-030-97121-2\_15},
  timestamp    = {Thu, 10 Mar 2022 11:26:10 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Connolly0P22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ConnollyDLP22,
  author       = {Aisling Connolly and
                  J{\'{e}}r{\^{o}}me Deschamps and
                  Pascal Lafourcade and
                  Octavio Perez{-}Kempner},
  title        = {Protego: {A} Credential Scheme for Permissioned Blockchains (Extended
                  Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {661},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/661},
  timestamp    = {Fri, 06 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ConnollyDLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ConnollyLP21,
  author       = {Aisling Connolly and
                  Pascal Lafourcade and
                  Octavio Perez{-}Kempner},
  title        = {Improved Constructions of Anonymous Credentials From Structure-Preserving
                  Signatures on Equivalence Classes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1680},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1680},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ConnollyLP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-02940,
  author       = {Marc Beunardeau and
                  {\'{E}}ric Brier and
                  No{\'{e}}mie Cartier and
                  Aisling Connolly and
                  Nathana{\"{e}}l Courant and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  David Naccache and
                  Ofer Yifrach{-}Stav},
  title        = {Optimal Covid-19 Pool Testing with a priori Information},
  journal      = {CoRR},
  volume       = {abs/2005.02940},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.02940},
  eprinttype    = {arXiv},
  eprint       = {2005.02940},
  timestamp    = {Sat, 09 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-02940.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Connolly19,
  author       = {Aisling Connolly},
  title        = {Try Again. Fail Again. Fail Better : New notions of security, broken
                  assumptions, and increased efficiency in cryptography. (Essaie encore.
                  Echoue encore. Echoue mieux : Nouvelles notions de s{\'{e}}curit{\'{e}},
                  d'hypoth{\`{e}}ses bris{\'{e}}es et d'efficacit{\'{e}} accrue
                  de la cryptographie)},
  school       = {{PSL} Research University, Paris, France},
  year         = {2019},
  url          = {https://tel.archives-ouvertes.fr/tel-02896331},
  timestamp    = {Mon, 28 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Connolly19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ConnollyFF19,
  author       = {Aisling Connolly and
                  Pooya Farshim and
                  Georg Fuchsbauer},
  title        = {Security of Symmetric Primitives against Key-Correlated Attacks},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {3},
  pages        = {193--230},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i3.193-230},
  doi          = {10.13154/TOSC.V2019.I3.193-230},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ConnollyFF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ConnollyFF19,
  author       = {Aisling Connolly and
                  Pooya Farshim and
                  Georg Fuchsbauer},
  title        = {Security of Symmetric Primitives against Key-Correlated Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1000},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1000},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ConnollyFF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Connolly18,
  author       = {Aisling Connolly},
  title        = {Freedom of Encryption},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {1},
  pages        = {102--103},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1331023},
  doi          = {10.1109/MSP.2018.1331023},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Connolly18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-00703,
  author       = {Arash Atashpendar and
                  Marc Beunardeau and
                  Aisling Connolly and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Mestel and
                  A. W. Roscoe and
                  Peter Y. A. Ryan},
  title        = {From Clustering Supersequences to Entropy Minimizing Subsequences
                  for Single and Double Deletions},
  journal      = {CoRR},
  volume       = {abs/1802.00703},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.00703},
  eprinttype    = {arXiv},
  eprint       = {1802.00703},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-00703.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeunardeauCFGNV18,
  author       = {Marc Beunardeau and
                  Aisling Connolly and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache and
                  Damien Vergnaud},
  title        = {Reusing Nonces in Schnorr Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeunardeauCFGNV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BeunardeauCGN17,
  author       = {Marc Beunardeau and
                  Aisling Connolly and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {The Case for System Command Encryption},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3056129},
  doi          = {10.1145/3052973.3056129},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BeunardeauCGN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BeunardeauCFGNV17,
  author       = {Marc Beunardeau and
                  Aisling Connolly and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache and
                  Damien Vergnaud},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {Reusing Nonces in Schnorr Signatures - (and Keeping It Secure...)},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10492},
  pages        = {224--241},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66402-6\_14},
  doi          = {10.1007/978-3-319-66402-6\_14},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/BeunardeauCFGNV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/BeunardeauCGN17,
  author       = {Marc Beunardeau and
                  Aisling Connolly and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  editor       = {Tanja Lange and
                  Orr Dunkelman},
  title        = {On the Hardness of the Mersenne Low Hamming Ratio Assumption},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2017 - 5th International Conference
                  on Cryptology and Information Security in Latin America, Havana, Cuba,
                  September 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11368},
  pages        = {166--174},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-030-25283-0\_9},
  doi          = {10.1007/978-3-030-25283-0\_9},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/latincrypt/BeunardeauCGN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeunardeauCGN17,
  author       = {Marc Beunardeau and
                  Aisling Connolly and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {On the Hardness of the Mersenne Low Hamming Ratio Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {522},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/522},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeunardeauCGN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BeunardeauCGN16,
  author       = {Marc Beunardeau and
                  Aisling Connolly and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {Fully Homomorphic Encryption: Computations with a Blindfold},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {1},
  pages        = {63--67},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.8},
  doi          = {10.1109/MSP.2016.8},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BeunardeauCGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BeunardeauCGN16a,
  author       = {Marc Beunardeau and
                  Aisling Connolly and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {Cdoe Obofsucaitn: Securing Software from Within},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {3},
  pages        = {78--81},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.60},
  doi          = {10.1109/MSP.2016.60},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BeunardeauCGN16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BeunardeauCGN16b,
  author       = {Marc Beunardeau and
                  Aisling Connolly and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {White-Box Cryptography: Security in an Insecure Environment},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {5},
  pages        = {88--92},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.100},
  doi          = {10.1109/MSP.2016.100},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BeunardeauCGN16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics