BibTeX records: Geoffroy Couteau

download as .bib file

@inproceedings{DBLP:conf/eurocrypt/ChaidosC18,
  author    = {Pyrros Chaidos and
               Geoffroy Couteau},
  title     = {Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs
               of Knowledge},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
  pages     = {193--221},
  year      = {2018},
  crossref  = {DBLP:conf/eurocrypt/2018-3},
  url       = {https://doi.org/10.1007/978-3-319-78372-7_7},
  doi       = {10.1007/978-3-319-78372-7_7},
  timestamp = {Mon, 16 Apr 2018 14:12:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/ChaidosC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Couteau17,
  author    = {Geoffroy Couteau},
  title     = {Zero-Knowledge Proofs for Secure Computation. (Preuves {\`{a}} divulgation
               nulle pour le calcul s{\'{e}}curis{\'{e}})},
  school    = {{PSL} Research University, Paris, France},
  year      = {2017},
  url       = {https://tel.archives-ouvertes.fr/tel-01668125},
  timestamp = {Wed, 10 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/phd/hal/Couteau17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoyleCGIO17,
  author    = {Elette Boyle and
               Geoffroy Couteau and
               Niv Gilboa and
               Yuval Ishai and
               Michele Orr{\`{u}}},
  title     = {Homomorphic Secret Sharing: Optimizations and Applications},
  booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  pages     = {2105--2122},
  year      = {2017},
  crossref  = {DBLP:conf/ccs/2017},
  url       = {http://doi.acm.org/10.1145/3133956.3134107},
  doi       = {10.1145/3133956.3134107},
  timestamp = {Tue, 13 Mar 2018 15:08:56 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/BoyleCGIO17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CouteauPP17,
  author    = {Geoffroy Couteau and
               Thomas Peters and
               David Pointcheval},
  title     = {Removing the Strong {RSA} Assumption from Arguments over the Integers},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}},
  pages     = {321--350},
  year      = {2017},
  crossref  = {DBLP:conf/eurocrypt/2017-2},
  url       = {https://doi.org/10.1007/978-3-319-56614-6_11},
  doi       = {10.1007/978-3-319-56614-6_11},
  timestamp = {Sat, 16 Sep 2017 12:12:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/CouteauPP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaidosC17,
  author    = {Pyrros Chaidos and
               Geoffroy Couteau},
  title     = {Efficient Designated-Verifier Non-Interactive Zero-Knowledge Proofs
               of Knowledge},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {1029},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/1029},
  timestamp = {Mon, 19 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ChaidosC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CouteauPP16,
  author    = {Geoffroy Couteau and
               Thomas Peters and
               David Pointcheval},
  title     = {Encryption Switching Protocols},
  booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {I}},
  pages     = {308--338},
  year      = {2016},
  crossref  = {DBLP:conf/crypto/2016-1},
  url       = {https://doi.org/10.1007/978-3-662-53018-4_12},
  doi       = {10.1007/978-3-662-53018-4_12},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/CouteauPP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauPP16,
  author    = {Geoffroy Couteau and
               Thomas Peters and
               David Pointcheval},
  title     = {Removing the Strong {RSA} Assumption from Arguments over the Integers},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {128},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/128},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CouteauPP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Couteau16,
  author    = {Geoffroy Couteau},
  title     = {Efficient Secure Comparison Protocols},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {544},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/544},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Couteau16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Couteau16a,
  author    = {Geoffroy Couteau},
  title     = {Revisiting Covert Multiparty Computation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {951},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/951},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Couteau16a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BenhamoudaCPW15,
  author    = {Fabrice Benhamouda and
               Geoffroy Couteau and
               David Pointcheval and
               Hoeteck Wee},
  title     = {Implicit Zero-Knowledge Arguments and Applications to the Malicious
               Setting},
  booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  pages     = {107--129},
  year      = {2015},
  crossref  = {DBLP:conf/crypto/2015-2},
  url       = {https://doi.org/10.1007/978-3-662-48000-7_6},
  doi       = {10.1007/978-3-662-48000-7_6},
  timestamp = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/BenhamoudaCPW15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/CouteauPP15,
  author    = {Geoffroy Couteau and
               Thomas Peters and
               David Pointcheval},
  title     = {Secure Distributed Computation on Private Inputs},
  booktitle = {Foundations and Practice of Security - 8th International Symposium,
               {FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised
               Selected Papers},
  pages     = {14--26},
  year      = {2015},
  crossref  = {DBLP:conf/fps/2015},
  url       = {https://doi.org/10.1007/978-3-319-30303-1_2},
  doi       = {10.1007/978-3-319-30303-1_2},
  timestamp = {Wed, 24 May 2017 08:29:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fps/CouteauPP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaCPW15,
  author    = {Fabrice Benhamouda and
               Geoffroy Couteau and
               David Pointcheval and
               Hoeteck Wee},
  title     = {Implicit Zero-Knowledge Arguments and Applications to the Malicious
               Setting},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {246},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/246},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BenhamoudaCPW15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauPP15,
  author    = {Geoffroy Couteau and
               Thomas Peters and
               David Pointcheval},
  title     = {Encryption Switching Protocols},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {990},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/990},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CouteauPP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauPP15a,
  author    = {Geoffroy Couteau and
               Thomas Peters and
               David Pointcheval},
  title     = {Secure Distributed Computation on Private Inputs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {1196},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1196},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CouteauPP15a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2018-3,
  editor    = {Jesper Buus Nielsen and
               Vincent Rijmen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10822},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-78372-7},
  doi       = {10.1007/978-3-319-78372-7},
  isbn      = {978-3-319-78371-0},
  timestamp = {Mon, 16 Apr 2018 14:12:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2018-3},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017,
  editor    = {Bhavani M. Thuraisingham and
               David Evans and
               Tal Malkin and
               Dongyan Xu},
  title     = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://doi.acm.org/10.1145/3133956},
  doi       = {10.1145/3133956},
  isbn      = {978-1-4503-4946-8},
  timestamp = {Tue, 13 Mar 2018 15:08:56 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2017-2,
  editor    = {Jean{-}S{\'{e}}bastien Coron and
               Jesper Buus Nielsen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10211},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-56614-6},
  doi       = {10.1007/978-3-319-56614-6},
  isbn      = {978-3-319-56613-9},
  timestamp = {Sat, 16 Sep 2017 12:12:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2017-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2016-1,
  editor    = {Matthew Robshaw and
               Jonathan Katz},
  title     = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9814},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53018-4},
  doi       = {10.1007/978-3-662-53018-4},
  isbn      = {978-3-662-53017-7},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2016-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2015-2,
  editor    = {Rosario Gennaro and
               Matthew Robshaw},
  title     = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9216},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48000-7},
  doi       = {10.1007/978-3-662-48000-7},
  isbn      = {978-3-662-47999-5},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2015-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fps/2015,
  editor    = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
               Evangelos Kranakis and
               Guillaume Bonfante},
  title     = {Foundations and Practice of Security - 8th International Symposium,
               {FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9482},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-30303-1},
  doi       = {10.1007/978-3-319-30303-1},
  isbn      = {978-3-319-30302-4},
  timestamp = {Wed, 24 May 2017 08:29:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fps/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier