Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Tancrède Lepoint
@inproceedings{DBLP:conf/secsr/KampanakisL23, author = {Panos Kampanakis and Tancr{\`{e}}de Lepoint}, editor = {Felix G{\"{u}}nther and Julia Hesse}, title = {Vision Paper: Do We Need to Change Some Things? - Open Questions Posed by the Upcoming Post-quantum Migration to Existing Standards and Deployments}, booktitle = {Security Standardisation Research - 8th International Conference, {SSR} 2023, Lyon, France, April 22-23, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13895}, pages = {78--102}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30731-7\_4}, doi = {10.1007/978-3-031-30731-7\_4}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secsr/KampanakisL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0001GLLM0Y23, author = {James Bell and Adri{\`{a}} Gasc{\'{o}}n and Tancr{\`{e}}de Lepoint and Baiyu Li and Sarah Meiklejohn and Mariana Raykova and Cathie Yun}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {{ACORN:} Input Validation for Secure Aggregation}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {4805--4822}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/bell}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/0001GLLM0Y23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KampanakisL23, author = {Panos Kampanakis and Tancr{\`{e}}de Lepoint}, title = {Do we need to change some things? Open questions posed by the upcoming post-quantum migration to existing standards and deployments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {266}, year = {2023}, url = {https://eprint.iacr.org/2023/266}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KampanakisL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EatonLW23, author = {Edward Eaton and Tancr{\`{e}}de Lepoint and Christopher A. Wood}, title = {Security Analysis of Signature Schemes with Key Blinding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {380}, year = {2023}, url = {https://eprint.iacr.org/2023/380}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EatonLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BenhamoudaLLOR22, author = {Fabrice Benhamouda and Tancr{\`{e}}de Lepoint and Julian Loss and Michele Orr{\`{u}} and Mariana Raykova}, title = {On the (in)Security of {ROS}}, journal = {J. Cryptol.}, volume = {35}, number = {4}, pages = {25}, year = {2022}, url = {https://doi.org/10.1007/s00145-022-09436-0}, doi = {10.1007/S00145-022-09436-0}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BenhamoudaLLOR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/EldefrawyLL22, author = {Karim Eldefrawy and Tancr{\`{e}}de Lepoint and Antonin Leroux}, editor = {Giuseppe Ateniese and Daniele Venturi}, title = {Communication-Efficient Proactive {MPC} for Dynamic Groups with Dishonest Majorities}, booktitle = {Applied Cryptography and Network Security - 20th International Conference, {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13269}, pages = {565--584}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09234-3\_28}, doi = {10.1007/978-3-031-09234-3\_28}, timestamp = {Tue, 21 Jun 2022 15:24:40 +0200}, biburl = {https://dblp.org/rec/conf/acns/EldefrawyLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/EldefrawyLT22, author = {Karim Eldefrawy and Tancr{\`{e}}de Lepoint and Laura Tam}, editor = {Shlomi Dolev and Jonathan Katz and Amnon Meisels}, title = {In-App Cryptographically-Enforced Selective Access Control for Microsoft Office and Similar Platforms}, booktitle = {Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, {CSCML} 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13301}, pages = {447--467}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07689-3\_32}, doi = {10.1007/978-3-031-07689-3\_32}, timestamp = {Fri, 24 Jun 2022 18:23:22 +0200}, biburl = {https://dblp.org/rec/conf/cscml/EldefrawyLT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaLOR22, author = {Fabrice Benhamouda and Tancr{\`{e}}de Lepoint and Michele Orr{\`{u}} and Mariana Raykova}, title = {Publicly verifiable anonymous tokens with private metadata bit}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {4}, year = {2022}, url = {https://eprint.iacr.org/2022/004}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaLOR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellGLLMRY22, author = {James Bell and Adri{\`{a}} Gasc{\'{o}}n and Tancr{\`{e}}de Lepoint and Baiyu Li and Sarah Meiklejohn and Mariana Raykova and Cathie Yun}, title = {{ACORN:} Input Validation for Secure Aggregation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1461}, year = {2022}, url = {https://eprint.iacr.org/2022/1461}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BellGLLMRY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftml/KairouzMABBBBCC21, author = {Peter Kairouz and H. Brendan McMahan and Brendan Avent and Aur{\'{e}}lien Bellet and Mehdi Bennis and Arjun Nitin Bhagoji and Kallista A. Bonawitz and Zachary Charles and Graham Cormode and Rachel Cummings and Rafael G. L. D'Oliveira and Hubert Eichner and Salim El Rouayheb and David Evans and Josh Gardner and Zachary Garrett and Adri{\`{a}} Gasc{\'{o}}n and Badih Ghazi and Phillip B. Gibbons and Marco Gruteser and Za{\"{\i}}d Harchaoui and Chaoyang He and Lie He and Zhouyuan Huo and Ben Hutchinson and Justin Hsu and Martin Jaggi and Tara Javidi and Gauri Joshi and Mikhail Khodak and Jakub Kone{\v{c}}n{\'y} and Aleksandra Korolova and Farinaz Koushanfar and Sanmi Koyejo and Tancr{\`{e}}de Lepoint and Yang Liu and Prateek Mittal and Mehryar Mohri and Richard Nock and Ayfer {\"{O}}zg{\"{u}}r and Rasmus Pagh and Hang Qi and Daniel Ramage and Ramesh Raskar and Mariana Raykova and Dawn Song and Weikang Song and Sebastian U. Stich and Ziteng Sun and Ananda Theertha Suresh and Florian Tram{\`{e}}r and Praneeth Vepakomma and Jianyu Wang and Li Xiong and Zheng Xu and Qiang Yang and Felix X. Yu and Han Yu and Sen Zhao}, title = {Advances and Open Problems in Federated Learning}, journal = {Found. Trends Mach. Learn.}, volume = {14}, number = {1-2}, pages = {1--210}, year = {2021}, url = {https://doi.org/10.1561/2200000083}, doi = {10.1561/2200000083}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ftml/KairouzMABBBBCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LepointPRST21, author = {Tancr{\`{e}}de Lepoint and Sarvar Patel and Mariana Raykova and Karn Seth and Ni Trieu}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Private Join and Compute from {PIR} with Default}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13091}, pages = {605--634}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92075-3\_21}, doi = {10.1007/978-3-030-92075-3\_21}, timestamp = {Fri, 03 Dec 2021 17:36:49 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LepointPRST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BenhamoudaLLO021, author = {Fabrice Benhamouda and Tancr{\`{e}}de Lepoint and Julian Loss and Michele Orr{\`{u}} and Mariana Raykova}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {On the (in)security of {ROS}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {33--53}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_2}, doi = {10.1007/978-3-030-77870-5\_2}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BenhamoudaLLO021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AliLP0SSY21, author = {Asra Ali and Tancr{\`{e}}de Lepoint and Sarvar Patel and Mariana Raykova and Phillipp Schoppmann and Karn Seth and Kevin Yeo}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Communication-Computation Trade-offs in {PIR}}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1811--1828}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ali}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/AliLP0SSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EldefrawyLL21, author = {Karim Eldefrawy and Tancr{\`{e}}de Lepoint and Antonin Leroux}, title = {Communication-Efficient Proactive {MPC} for Dynamic Groups with Dishonest Majorities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1564}, year = {2021}, url = {https://eprint.iacr.org/2021/1564}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/EldefrawyLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/EldefrawyLL20, author = {Karim Eldefrawy and Tancr{\`{e}}de Lepoint and Antonin Leroux}, editor = {Mauro Conti and Jianying Zhou and Emiliano Casalicchio and Angelo Spognardi}, title = {Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities}, booktitle = {Applied Cryptography and Network Security - 18th International Conference, {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12146}, pages = {3--23}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57808-4\_1}, doi = {10.1007/978-3-030-57808-4\_1}, timestamp = {Thu, 27 Aug 2020 11:49:09 +0200}, biburl = {https://dblp.org/rec/conf/acns/EldefrawyLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BellBGL020, author = {James Henry Bell and Kallista A. Bonawitz and Adri{\`{a}} Gasc{\'{o}}n and Tancr{\`{e}}de Lepoint and Mariana Raykova}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Secure Single-Server Aggregation with (Poly)Logarithmic Overhead}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1253--1269}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417885}, doi = {10.1145/3372297.3417885}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BellBGL020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KreuterLO020, author = {Ben Kreuter and Tancr{\`{e}}de Lepoint and Michele Orr{\`{u}} and Mariana Raykova}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Anonymous Tokens with Private Metadata Bit}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {308--336}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_11}, doi = {10.1007/978-3-030-56784-2\_11}, timestamp = {Wed, 12 Aug 2020 14:16:56 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KreuterLO020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KreuterLOR20, author = {Ben Kreuter and Tancr{\`{e}}de Lepoint and Michele Orr{\`{u}} and Mariana Raykova}, title = {Anonymous Tokens with Private Metadata Bit}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {72}, year = {2020}, url = {https://eprint.iacr.org/2020/072}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KreuterLOR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellBGLR20, author = {James Bell and Kallista A. Bonawitz and Adri{\`{a}} Gasc{\'{o}}n and Tancr{\`{e}}de Lepoint and Mariana Raykova}, title = {Secure Single-Server Aggregation with (Poly)Logarithmic Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {704}, year = {2020}, url = {https://eprint.iacr.org/2020/704}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellBGLR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaLOR20, author = {Fabrice Benhamouda and Tancr{\`{e}}de Lepoint and Michele Orr{\`{u}} and Mariana Raykova}, title = {On the (in)security of {ROS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {945}, year = {2020}, url = {https://eprint.iacr.org/2020/945}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaLOR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LepointPRST20, author = {Tancr{\`{e}}de Lepoint and Sarvar Patel and Mariana Raykova and Karn Seth and Ni Trieu}, title = {Private Join and Compute from {PIR} with Default}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1011}, year = {2020}, url = {https://eprint.iacr.org/2020/1011}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LepointPRST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/NunesEL19, author = {Ivan De Oliveira Nunes and Karim Eldefrawy and Tancr{\`{e}}de Lepoint}, title = {{SNUSE:} {A} secure computation approach for large-scale user re-enrollment in biometric authentication systems}, journal = {Future Gener. Comput. Syst.}, volume = {98}, pages = {259--273}, year = {2019}, url = {https://doi.org/10.1016/j.future.2019.03.051}, doi = {10.1016/J.FUTURE.2019.03.051}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/NunesEL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BartusekCJJLMMM19, author = {James Bartusek and Brent Carmer and Abhishek Jain and Zhengzhong Jin and Tancr{\`{e}}de Lepoint and Fermi Ma and Tal Malkin and Alex J. Malozemoff and Mariana Raykova}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Public-Key Function-Private Hidden Vector Encryption (and More)}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11923}, pages = {489--519}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34618-8\_17}, doi = {10.1007/978-3-030-34618-8\_17}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BartusekCJJLMMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0003LR19, author = {Michael Brenner and Tancr{\`{e}}de Lepoint and Kurt Rohloff}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {WAHC'19: 7th Workshop on Encrypted Computing {\&} Applied Homomorphic Cryptograph}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2703--2704}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3353554}, doi = {10.1145/3319535.3353554}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0003LR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BartusekLMZ19, author = {James Bartusek and Tancr{\`{e}}de Lepoint and Fermi Ma and Mark Zhandry}, editor = {Yuval Ishai and Vincent Rijmen}, title = {New Techniques for Obfuscating Conjunctions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {636--666}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_22}, doi = {10.1007/978-3-030-17659-4\_22}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BartusekLMZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2019wahc, editor = {Michael Brenner and Tancr{\`{e}}de Lepoint and Kurt Rohloff}, title = {Proceedings of the 7th {ACM} Workshop on Encrypted Computing {\&} Applied Homomorphic Cryptography, WAHC@CCS 2019, London, UK, November 11-15, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338469}, doi = {10.1145/3338469}, isbn = {978-1-4503-6829-2}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2019wahc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-04977, author = {Peter Kairouz and H. Brendan McMahan and Brendan Avent and Aur{\'{e}}lien Bellet and Mehdi Bennis and Arjun Nitin Bhagoji and Kallista A. Bonawitz and Zachary Charles and Graham Cormode and Rachel Cummings and Rafael G. L. D'Oliveira and Salim El Rouayheb and David Evans and Josh Gardner and Zachary Garrett and Adri{\`{a}} Gasc{\'{o}}n and Badih Ghazi and Phillip B. Gibbons and Marco Gruteser and Za{\"{\i}}d Harchaoui and Chaoyang He and Lie He and Zhouyuan Huo and Ben Hutchinson and Justin Hsu and Martin Jaggi and Tara Javidi and Gauri Joshi and Mikhail Khodak and Jakub Kone{\v{c}}n{\'y} and Aleksandra Korolova and Farinaz Koushanfar and Sanmi Koyejo and Tancr{\`{e}}de Lepoint and Yang Liu and Prateek Mittal and Mehryar Mohri and Richard Nock and Ayfer {\"{O}}zg{\"{u}}r and Rasmus Pagh and Mariana Raykova and Hang Qi and Daniel Ramage and Ramesh Raskar and Dawn Song and Weikang Song and Sebastian U. Stich and Ziteng Sun and Ananda Theertha Suresh and Florian Tram{\`{e}}r and Praneeth Vepakomma and Jianyu Wang and Li Xiong and Zheng Xu and Qiang Yang and Felix X. Yu and Han Yu and Sen Zhao}, title = {Advances and Open Problems in Federated Learning}, journal = {CoRR}, volume = {abs/1912.04977}, year = {2019}, url = {http://arxiv.org/abs/1912.04977}, eprinttype = {arXiv}, eprint = {1912.04977}, timestamp = {Mon, 11 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-04977.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartusekCJJLMMM19, author = {James Bartusek and Brent Carmer and Abhishek Jain and Zhengzhong Jin and Tancr{\`{e}}de Lepoint and Fermi Ma and Tal Malkin and Alex J. Malozemoff and Mariana Raykova}, title = {Public-Key Function-Private Hidden Vector Encryption (and More)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {746}, year = {2019}, url = {https://eprint.iacr.org/2019/746}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartusekCJJLMMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EldefrawyLL19, author = {Karim Eldefrawy and Tancr{\`{e}}de Lepoint and Antonin Leroux}, title = {Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1383}, year = {2019}, url = {https://eprint.iacr.org/2019/1383}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EldefrawyLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AliLP0SSY19, author = {Asra Ali and Tancr{\`{e}}de Lepoint and Sarvar Patel and Mariana Raykova and Phillipp Schoppmann and Karn Seth and Kevin Yeo}, title = {Communication-Computation Trade-offs in {PIR}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1483}, year = {2019}, url = {https://eprint.iacr.org/2019/1483}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AliLP0SSY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AbdelzaherABDDG18, author = {Tarek F. Abdelzaher and Nora Ayanian and Tamer Basar and Suhas N. Diggavi and Jana Diesner and Deepak Ganesan and Ramesh Govindan and Susmit Jha and Tancr{\`{e}}de Lepoint and Benjamin M. Marlin and Klara Nahrstedt and David M. Nicol and Raj Rajkumar and Stephen Russell and Sanjit A. Seshia and Fei Sha and Prashant J. Shenoy and Mani B. Srivastava and Gaurav S. Sukhatme and Ananthram Swami and Paulo Tabuada and Don Towsley and Nitin H. Vaidya and Venugopal V. Veeravalli}, title = {Toward an Internet of Battlefield Things: {A} Resilience Perspective}, journal = {Computer}, volume = {51}, number = {11}, pages = {24--36}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2876048}, doi = {10.1109/MC.2018.2876048}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/AbdelzaherABDDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BaiLRSSS18, author = {Shi Bai and Tancr{\`{e}}de Lepoint and Adeline Roux{-}Langlois and Amin Sakzad and Damien Stehl{\'{e}} and Ron Steinfeld}, title = {Improved Security Proofs in Lattice-Based Cryptography: Using the R{\'{e}}nyi Divergence Rather than the Statistical Distance}, journal = {J. Cryptol.}, volume = {31}, number = {2}, pages = {610--640}, year = {2018}, url = {https://doi.org/10.1007/s00145-017-9265-9}, doi = {10.1007/S00145-017-9265-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BaiLRSSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CanteautCFLNPS18, author = {Anne Canteaut and Sergiu Carpov and Caroline Fontaine and Tancr{\`{e}}de Lepoint and Mar{\'{\i}}a Naya{-}Plasencia and Pascal Paillier and Renaud Sirdey}, title = {Stream Ciphers: {A} Practical Solution for Efficient Homomorphic-Ciphertext Compression}, journal = {J. Cryptol.}, volume = {31}, number = {3}, pages = {885--916}, year = {2018}, url = {https://doi.org/10.1007/s00145-017-9273-9}, doi = {10.1007/S00145-017-9273-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CanteautCFLNPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DucasKLLSSS18, author = {L{\'{e}}o Ducas and Eike Kiltz and Tancr{\`{e}}de Lepoint and Vadim Lyubashevsky and Peter Schwabe and Gregor Seiler and Damien Stehl{\'{e}}}, title = {CRYSTALS-Dilithium: {A} Lattice-Based Digital Signature Scheme}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {1}, pages = {238--268}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i1.238-268}, doi = {10.13154/TCHES.V2018.I1.238-268}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/DucasKLLSSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MelchorDGLR18, author = {Carlos Aguilar Melchor and Jean{-}Christophe Deneuville and Philippe Gaborit and Tancr{\`{e}}de Lepoint and Thomas Ricosset}, title = {Delegating Elliptic-Curve Operations with Homomorphic Encryption}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433140}, doi = {10.1109/CNS.2018.8433140}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/MelchorDGLR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/NunesEL18, author = {Ivan De Oliveira Nunes and Karim Eldefrawy and Tancr{\`{e}}de Lepoint}, editor = {Itai Dinur and Shlomi Dolev and Sachin Lodha}, title = {Secure Non-interactive User Re-enrollment in Biometrics-Based Identification and Authentication Systems}, booktitle = {Cyber Security Cryptography and Machine Learning - Second International Symposium, {CSCML} 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10879}, pages = {162--180}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-94147-9\_13}, doi = {10.1007/978-3-319-94147-9\_13}, timestamp = {Sat, 19 Oct 2019 20:25:56 +0200}, biburl = {https://dblp.org/rec/conf/cscml/NunesEL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dev/RajanQABLV18, author = {Anjana Rajan and Lucy Qin and David W. Archer and Dan Boneh and Tancr{\`{e}}de Lepoint and Mayank Varia}, editor = {Ellen W. Zegura}, title = {Callisto: {A} Cryptographic Approach to Detecting Serial Perpetrators of Sexual Misconduct}, booktitle = {Proceedings of the 1st {ACM} {SIGCAS} Conference on Computing and Sustainable Societies, {COMPASS} 2018, Menlo Park and San Jose, CA, USA, June 20-22, 2018}, pages = {49:1--49:4}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3209811.3212699}, doi = {10.1145/3209811.3212699}, timestamp = {Wed, 21 Nov 2018 12:44:24 +0100}, biburl = {https://dblp.org/rec/conf/dev/RajanQABLV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/BosDKLLSSSS18, author = {Joppe W. Bos and L{\'{e}}o Ducas and Eike Kiltz and Tancr{\`{e}}de Lepoint and Vadim Lyubashevsky and John M. Schanck and Peter Schwabe and Gregor Seiler and Damien Stehl{\'{e}}}, title = {{CRYSTALS} - Kyber: {A} CCA-Secure Module-Lattice-Based {KEM}}, booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2018, London, United Kingdom, April 24-26, 2018}, pages = {353--367}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EuroSP.2018.00032}, doi = {10.1109/EUROSP.2018.00032}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/BosDKLLSSSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fusion/AgadakosCCLLLM18, author = {Ioannis Agadakos and Gabriela F. Ciocarlie and Bogdan Copos and Tancr{\`{e}}de Lepoint and Ulf Lindqvist and Michael E. Locasto and James R. Michaelis}, title = {Risks and Benefits of Side-Channels in Battlefields}, booktitle = {21st International Conference on Information Fusion, {FUSION} 2018, Cambridge, UK, July 10-13, 2018}, pages = {2290--2297}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/ICIF.2018.8455283}, doi = {10.23919/ICIF.2018.8455283}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fusion/AgadakosCCLLLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic2e/LepointCE18, author = {Tancr{\`{e}}de Lepoint and Gabriela F. Ciocarlie and Karim Eldefrawy}, editor = {Abhishek Chandra and Jie Li and Ying Cai and Tian Guo}, title = {BlockCIS - {A} Blockchain-Based Cyber Insurance System}, booktitle = {2018 {IEEE} International Conference on Cloud Engineering, {IC2E} 2018, Orlando, FL, USA, April 17-20, 2018}, pages = {378--384}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/IC2E.2018.00072}, doi = {10.1109/IC2E.2018.00072}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic2e/LepointCE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/AbdelzaherABDDG18, author = {Tarek F. Abdelzaher and Nora Ayanian and Tamer Basar and Suhas N. Diggavi and Jana Diesner and Deepak Ganesan and Ramesh Govindan and Susmit Jha and Tancr{\`{e}}de Lepoint and Benjamin M. Marlin and Klara Nahrstedt and David M. Nicol and Raj Rajkumar and Stephen Russell and Sanjit A. Seshia and Fei Sha and Prashant J. Shenoy and Mani B. Srivastava and Gaurav S. Sukhatme and Ananthram Swami and Paulo Tabuada and Don Towsley and Nitin H. Vaidya and Venugopal V. Veeravalli}, title = {Will Distributed Computing Revolutionize Peace? The Emergence of Battlefield IoT}, booktitle = {38th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2018, Vienna, Austria, July 2-6, 2018}, pages = {1129--1138}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ICDCS.2018.00112}, doi = {10.1109/ICDCS.2018.00112}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/AbdelzaherABDDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartusekLMZ18, author = {James Bartusek and Tancr{\`{e}}de Lepoint and Fermi Ma and Mark Zhandry}, title = {New Techniques for Obfuscating Conjunctions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {936}, year = {2018}, url = {https://eprint.iacr.org/2018/936}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartusekLMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AgadakosCCAHCLL17, author = {Ioannis Agadakos and Chien{-}Ying Chen and Matteo Campanelli and Prashant Anantharaman and Monowar Hasan and Bogdan Copos and Tancr{\`{e}}de Lepoint and Michael E. Locasto and Gabriela F. Ciocarlie and Ulf Lindqvist}, editor = {Bhavani Thuraisingham and Rakesh B. Bobba and Awais Rashid}, title = {Jumping the Air Gap: Modeling Cyber-Physical Attack Paths in the Internet-of-Things}, booktitle = {Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, Dallas, TX, USA, November 3, 2017}, pages = {37--48}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3140241.3140252}, doi = {10.1145/3140241.3140252}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AgadakosCCAHCLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lpar/BjornerJLRS17, author = {Nikolaj S. Bj{\o}rner and Dejan Jovanovic and Tancr{\`{e}}de Lepoint and Philipp R{\"{u}}mmer and Martin Sch{\"{a}}f}, editor = {Thomas Eiter and David Sands and Geoff Sutcliffe and Andrei Voronkov}, title = {Abduction by Non-Experts}, booktitle = {IWIL@LPAR 2017 Workshop and {LPAR-21} Short Presentations, Maun, Botswana, May 7-12, 2017}, series = {Kalpa Publications in Computing}, volume = {1}, pages = {58--72}, publisher = {EasyChair}, year = {2017}, url = {https://doi.org/10.29007/pz3t}, doi = {10.29007/PZ3T}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/lpar/BjornerJLRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CoronLLT17, author = {Jean{-}S{\'{e}}bastien Coron and Moon Sung Lee and Tancr{\`{e}}de Lepoint and Mehdi Tibouchi}, editor = {Serge Fehr}, title = {Zeroizing Attacks on Indistinguishability Obfuscation over {CLT13}}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {41--58}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_3}, doi = {10.1007/978-3-662-54365-8\_3}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CoronLLT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BenarrochBL17, author = {Daniel Benarroch and Zvika Brakerski and Tancr{\`{e}}de Lepoint}, editor = {Serge Fehr}, title = {{FHE} over the Integers: Decomposed and Batched in the Post-Quantum Regime}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {271--301}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_10}, doi = {10.1007/978-3-662-54388-7\_10}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BenarrochBL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/BenhamoudaLMZ17, author = {Fabrice Benhamouda and Tancr{\`{e}}de Lepoint and Claire Mathieu and Hang Zhou}, editor = {Philip N. Klein}, title = {Optimization of Bootstrapping in Circuits}, booktitle = {Proceedings of the Twenty-Eighth Annual {ACM-SIAM} Symposium on Discrete Algorithms, {SODA} 2017, Barcelona, Spain, Hotel Porta Fira, January 16-19}, pages = {2423--2433}, publisher = {{SIAM}}, year = {2017}, url = {https://doi.org/10.1137/1.9781611974782.160}, doi = {10.1137/1.9781611974782.160}, timestamp = {Tue, 02 Feb 2021 17:07:33 +0100}, biburl = {https://dblp.org/rec/conf/soda/BenhamoudaLMZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenarrochBL17, author = {Daniel Benarroch and Zvika Brakerski and Tancr{\`{e}}de Lepoint}, title = {{FHE} Over the Integers: Decomposed and Batched in the Post-Quantum Regime}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {65}, year = {2017}, url = {http://eprint.iacr.org/2017/065}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenarrochBL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DucasLLSSS17, author = {L{\'{e}}o Ducas and Tancr{\`{e}}de Lepoint and Vadim Lyubashevsky and Peter Schwabe and Gregor Seiler and Damien Stehl{\'{e}}}, title = {{CRYSTALS} - Dilithium: Digital Signatures from Module Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {633}, year = {2017}, url = {http://eprint.iacr.org/2017/633}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DucasLLSSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosDKLLSSS17, author = {Joppe W. Bos and L{\'{e}}o Ducas and Eike Kiltz and Tancr{\`{e}}de Lepoint and Vadim Lyubashevsky and John M. Schanck and Peter Schwabe and Damien Stehl{\'{e}}}, title = {{CRYSTALS} - Kyber: a CCA-secure module-lattice-based {KEM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {634}, year = {2017}, url = {http://eprint.iacr.org/2017/634}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosDKLLSSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoronLLT16, author = {Jean{-}S{\'{e}}bastien Coron and Moon Sung Lee and Tancr{\`{e}}de Lepoint and Mehdi Tibouchi}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Cryptanalysis of {GGH15} Multilinear Maps}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {607--628}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_21}, doi = {10.1007/978-3-662-53008-5\_21}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CoronLLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MelchorBGGKL16, author = {Carlos Aguilar Melchor and Joris Barrier and Serge Guelton and Adrien Guinet and Marc{-}Olivier Killijian and Tancr{\`{e}}de Lepoint}, editor = {Kazue Sako}, title = {NFLlib: NTT-Based Fast Lattice Library}, booktitle = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9610}, pages = {341--356}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29485-8\_20}, doi = {10.1007/978-3-319-29485-8\_20}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/MelchorBGGKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CanteautCFLNPS16, author = {Anne Canteaut and Sergiu Carpov and Caroline Fontaine and Tancr{\`{e}}de Lepoint and Mar{\'{\i}}a Naya{-}Plasencia and Pascal Paillier and Renaud Sirdey}, editor = {Thomas Peyrin}, title = {Stream Ciphers: {A} Practical Solution for Efficient Homomorphic-Ciphertext Compression}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {313--333}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_16}, doi = {10.1007/978-3-662-52993-5\_16}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/CanteautCFLNPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BenhamoudaLM016, author = {Fabrice Benhamouda and Tancr{\`{e}}de Lepoint and Claire Mathieu and Hang Zhou}, title = {Optimization of Bootstrapping in Circuits}, journal = {CoRR}, volume = {abs/1608.04535}, year = {2016}, url = {http://arxiv.org/abs/1608.04535}, eprinttype = {arXiv}, eprint = {1608.04535}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BenhamoudaLM016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaLM016, author = {Fabrice Benhamouda and Tancr{\`{e}}de Lepoint and Claire Mathieu and Hang Zhou}, title = {Optimization of Bootstrapping in Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {785}, year = {2016}, url = {http://eprint.iacr.org/2016/785}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaLM016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronLLT16, author = {Jean{-}S{\'{e}}bastien Coron and Moon Sung Lee and Tancr{\`{e}}de Lepoint and Mehdi Tibouchi}, title = {Zeroizing Attacks on Indistinguishability Obfuscation over {CLT13}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1011}, year = {2016}, url = {http://eprint.iacr.org/2016/1011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronLLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BaiLLSS15, author = {Shi Bai and Adeline Langlois and Tancr{\`{e}}de Lepoint and Damien Stehl{\'{e}} and Ron Steinfeld}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Improved Security Proofs in Lattice-Based Cryptography: Using the R{\'{e}}nyi Divergence Rather Than the Statistical Distance}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9452}, pages = {3--24}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48797-6\_1}, doi = {10.1007/978-3-662-48797-6\_1}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BaiLLSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoronGHLMM0ST15, author = {Jean{-}S{\'{e}}bastien Coron and Craig Gentry and Shai Halevi and Tancr{\`{e}}de Lepoint and Hemanta K. Maji and Eric Miles and Mariana Raykova and Amit Sahai and Mehdi Tibouchi}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Zeroizing Without Low-Level Zeroes: New {MMAP} Attacks and their Limitations}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {247--266}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_12}, doi = {10.1007/978-3-662-47989-6\_12}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CoronGHLMM0ST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoronLT15, author = {Jean{-}S{\'{e}}bastien Coron and Tancr{\`{e}}de Lepoint and Mehdi Tibouchi}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {New Multilinear Maps Over the Integers}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {267--286}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_13}, doi = {10.1007/978-3-662-47989-6\_13}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CoronLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FouqueLLT15, author = {Pierre{-}Alain Fouque and Moon Sung Lee and Tancr{\`{e}}de Lepoint and Mehdi Tibouchi}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Cryptanalysis of the Co-ACD Assumption}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {561--580}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_27}, doi = {10.1007/978-3-662-47989-6\_27}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FouqueLLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/LepointT15, author = {Tancr{\`{e}}de Lepoint and Mehdi Tibouchi}, editor = {Michael Brenner and Nicolas Christin and Benjamin Johnson and Kurt Rohloff}, title = {Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in {PIR}}, booktitle = {Financial Cryptography and Data Security - {FC} 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8976}, pages = {184--193}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48051-9\_14}, doi = {10.1007/978-3-662-48051-9\_14}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/LepointT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LepointT15, author = {Tancr{\`{e}}de Lepoint and Mehdi Tibouchi}, title = {Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in {PIR}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {12}, year = {2015}, url = {http://eprint.iacr.org/2015/012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LepointT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanteautCFLNPS15, author = {Anne Canteaut and Sergiu Carpov and Caroline Fontaine and Tancr{\`{e}}de Lepoint and Mar{\'{\i}}a Naya{-}Plasencia and Pascal Paillier and Renaud Sirdey}, title = {How to Compress Homomorphic Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {113}, year = {2015}, url = {http://eprint.iacr.org/2015/113}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanteautCFLNPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronLT15, author = {Jean{-}S{\'{e}}bastien Coron and Tancr{\`{e}}de Lepoint and Mehdi Tibouchi}, title = {New Multilinear Maps over the Integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {162}, year = {2015}, url = {http://eprint.iacr.org/2015/162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaiLLSS15, author = {Shi Bai and Adeline Langlois and Tancr{\`{e}}de Lepoint and Damien Stehl{\'{e}} and Ron Steinfeld}, title = {Improved security proofs in lattice-based cryptography: using the R{\'{e}}nyi divergence rather than the statistical distance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {483}, year = {2015}, url = {http://eprint.iacr.org/2015/483}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaiLLSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronGHLMM0ST15, author = {Jean{-}S{\'{e}}bastien Coron and Craig Gentry and Shai Halevi and Tancr{\`{e}}de Lepoint and Hemanta K. Maji and Eric Miles and Mariana Raykova and Amit Sahai and Mehdi Tibouchi}, title = {Zeroizing Without Low-Level Zeroes: New {MMAP} Attacks and Their Limitations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {596}, year = {2015}, url = {http://eprint.iacr.org/2015/596}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronGHLMM0ST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiGHLST15, author = {Zvika Brakerski and Craig Gentry and Shai Halevi and Tancr{\`{e}}de Lepoint and Amit Sahai and Mehdi Tibouchi}, title = {Cryptanalysis of the Quadratic Zero-Testing of {GGH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {845}, year = {2015}, url = {http://eprint.iacr.org/2015/845}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiGHLST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaigneresDFGLR15, author = {Thomas Baign{\`{e}}res and C{\'{e}}cile Delerabl{\'{e}}e and Matthieu Finiasz and Louis Goubin and Tancr{\`{e}}de Lepoint and Matthieu Rivain}, title = {Trap Me If You Can - Million Dollar Curve}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1249}, year = {2015}, url = {http://eprint.iacr.org/2015/1249}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaigneresDFGLR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Lepoint14, author = {Tancr{\`{e}}de Lepoint}, title = {Design and Implementation of Lattice-Based Cryptography. (Conception and impl{\'{e}}mentation de cryptographie {\`{a}} base de r{\'{e}}seaux)}, school = {{\'{E}}cole Normale Sup{\'{e}}rieure, Paris, France}, year = {2014}, url = {https://tel.archives-ouvertes.fr/tel-01069864}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Lepoint14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/LepointN14, author = {Tancr{\`{e}}de Lepoint and Michael Naehrig}, editor = {David Pointcheval and Damien Vergnaud}, title = {A Comparison of the Homomorphic Encryption Schemes {FV} and {YASHE}}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8469}, pages = {318--335}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06734-6\_20}, doi = {10.1007/978-3-319-06734-6\_20}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/LepointN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CoronLT14, author = {Jean{-}S{\'{e}}bastien Coron and Tancr{\`{e}}de Lepoint and Mehdi Tibouchi}, editor = {Hugo Krawczyk}, title = {Scale-Invariant Fully Homomorphic Encryption over the Integers}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {311--328}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_18}, doi = {10.1007/978-3-642-54631-0\_18}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CoronLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronLT14, author = {Jean{-}S{\'{e}}bastien Coron and Tancr{\`{e}}de Lepoint and Mehdi Tibouchi}, title = {Scale-Invariant Fully Homomorphic Encryption over the Integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {32}, year = {2014}, url = {http://eprint.iacr.org/2014/032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LepointN14, author = {Tancr{\`{e}}de Lepoint and Michael Naehrig}, title = {A Comparison of the Homomorphic Encryption Schemes {FV} and {YASHE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {62}, year = {2014}, url = {http://eprint.iacr.org/2014/062}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LepointN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronLT14a, author = {Jean{-}S{\'{e}}bastien Coron and Tancr{\`{e}}de Lepoint and Mehdi Tibouchi}, title = {Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {975}, year = {2014}, url = {http://eprint.iacr.org/2014/975}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronLT14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DucasDLL13, author = {L{\'{e}}o Ducas and Alain Durmus and Tancr{\`{e}}de Lepoint and Vadim Lyubashevsky}, editor = {Ran Canetti and Juan A. Garay}, title = {Lattice Signatures and Bimodal Gaussians}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {40--56}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_3}, doi = {10.1007/978-3-642-40041-4\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DucasDLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoronLT13, author = {Jean{-}S{\'{e}}bastien Coron and Tancr{\`{e}}de Lepoint and Mehdi Tibouchi}, editor = {Ran Canetti and Juan A. Garay}, title = {Practical Multilinear Maps over the Integers}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {476--493}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_26}, doi = {10.1007/978-3-642-40041-4\_26}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/CoronLT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CheonCKLLTY13, author = {Jung Hee Cheon and Jean{-}S{\'{e}}bastien Coron and Jinsu Kim and Moon Sung Lee and Tancr{\`{e}}de Lepoint and Mehdi Tibouchi and Aaram Yun}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Batch Fully Homomorphic Encryption over the Integers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {315--335}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_20}, doi = {10.1007/978-3-642-38348-9\_20}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CheonCKLLTY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/LepointP13, author = {Tancr{\`{e}}de Lepoint and Pascal Paillier}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {On the Minimal Number of Bootstrappings in Homomorphic Circuits}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {189--200}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_13}, doi = {10.1007/978-3-642-41320-9\_13}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/LepointP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/DelerableeLPR13, author = {C{\'{e}}cile Delerabl{\'{e}}e and Tancr{\`{e}}de Lepoint and Pascal Paillier and Matthieu Rivain}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {White-Box Security Notions for Symmetric Encryption Schemes}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {247--264}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_13}, doi = {10.1007/978-3-662-43414-7\_13}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/DelerableeLPR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/LepointRMRP13, author = {Tancr{\`{e}}de Lepoint and Matthieu Rivain and Yoni De Mulder and Peter Roelse and Bart Preneel}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Two Attacks on a White-Box {AES} Implementation}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {265--285}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_14}, doi = {10.1007/978-3-662-43414-7\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/LepointRMRP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronLT13, author = {Jean{-}S{\'{e}}bastien Coron and Tancr{\`{e}}de Lepoint and Mehdi Tibouchi}, title = {Batch Fully Homomorphic Encryption over the Integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {36}, year = {2013}, url = {http://eprint.iacr.org/2013/036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronLT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronLT13a, author = {Jean{-}S{\'{e}}bastien Coron and Tancr{\`{e}}de Lepoint and Mehdi Tibouchi}, title = {Practical Multilinear Maps over the Integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {183}, year = {2013}, url = {http://eprint.iacr.org/2013/183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronLT13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DucasDLL13, author = {L{\'{e}}o Ducas and Alain Durmus and Tancr{\`{e}}de Lepoint and Vadim Lyubashevsky}, title = {Lattice Signatures and Bimodal Gaussians}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {383}, year = {2013}, url = {http://eprint.iacr.org/2013/383}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DucasDLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LepointR13, author = {Tancr{\`{e}}de Lepoint and Matthieu Rivain}, title = {Another Nail in the Coffin of White-Box {AES} Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {455}, year = {2013}, url = {http://eprint.iacr.org/2013/455}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LepointR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DelerableeLPR13, author = {C{\'{e}}cile Delerabl{\'{e}}e and Tancr{\`{e}}de Lepoint and Pascal Paillier and Matthieu Rivain}, title = {White-Box Security Notions for Symmetric Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {523}, year = {2013}, url = {http://eprint.iacr.org/2013/523}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DelerableeLPR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/JoyeL12, author = {Marc Joye and Tancr{\`{e}}de Lepoint}, editor = {Mark Dermot Ryan and Ben Smyth and Guilin Wang}, title = {Partial Key Exposure on {RSA} with Private Exponents Larger Than {N}}, booktitle = {Information Security Practice and Experience - 8th International Conference, {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7232}, pages = {369--380}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29101-2\_25}, doi = {10.1007/978-3-642-29101-2\_25}, timestamp = {Wed, 07 Dec 2022 23:12:45 +0100}, biburl = {https://dblp.org/rec/conf/ispec/JoyeL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/JoyeL11, author = {Marc Joye and Tancr{\`{e}}de Lepoint}, editor = {Yan Chen and Stefan Katzenbeisser and Ahmad{-}Reza Sadeghi}, title = {Traitor tracing schemes for protected software implementations}, booktitle = {Proceedings of the 11th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 21, 2011}, pages = {15--22}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046631.2046636}, doi = {10.1145/2046631.2046636}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/JoyeL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.