BibTeX records: Tancrède Lepoint

download as .bib file

@inproceedings{DBLP:conf/secsr/KampanakisL23,
  author       = {Panos Kampanakis and
                  Tancr{\`{e}}de Lepoint},
  editor       = {Felix G{\"{u}}nther and
                  Julia Hesse},
  title        = {Vision Paper: Do We Need to Change Some Things? - Open Questions Posed
                  by the Upcoming Post-quantum Migration to Existing Standards and Deployments},
  booktitle    = {Security Standardisation Research - 8th International Conference,
                  {SSR} 2023, Lyon, France, April 22-23, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13895},
  pages        = {78--102},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30731-7\_4},
  doi          = {10.1007/978-3-031-30731-7\_4},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/KampanakisL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0001GLLM0Y23,
  author       = {James Bell and
                  Adri{\`{a}} Gasc{\'{o}}n and
                  Tancr{\`{e}}de Lepoint and
                  Baiyu Li and
                  Sarah Meiklejohn and
                  Mariana Raykova and
                  Cathie Yun},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {{ACORN:} Input Validation for Secure Aggregation},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {4805--4822},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/bell},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0001GLLM0Y23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KampanakisL23,
  author       = {Panos Kampanakis and
                  Tancr{\`{e}}de Lepoint},
  title        = {Do we need to change some things? Open questions posed by the upcoming
                  post-quantum migration to existing standards and deployments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {266},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/266},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KampanakisL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EatonLW23,
  author       = {Edward Eaton and
                  Tancr{\`{e}}de Lepoint and
                  Christopher A. Wood},
  title        = {Security Analysis of Signature Schemes with Key Blinding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {380},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/380},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EatonLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BenhamoudaLLOR22,
  author       = {Fabrice Benhamouda and
                  Tancr{\`{e}}de Lepoint and
                  Julian Loss and
                  Michele Orr{\`{u}} and
                  Mariana Raykova},
  title        = {On the (in)Security of {ROS}},
  journal      = {J. Cryptol.},
  volume       = {35},
  number       = {4},
  pages        = {25},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00145-022-09436-0},
  doi          = {10.1007/S00145-022-09436-0},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BenhamoudaLLOR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/EldefrawyLL22,
  author       = {Karim Eldefrawy and
                  Tancr{\`{e}}de Lepoint and
                  Antonin Leroux},
  editor       = {Giuseppe Ateniese and
                  Daniele Venturi},
  title        = {Communication-Efficient Proactive {MPC} for Dynamic Groups with Dishonest
                  Majorities},
  booktitle    = {Applied Cryptography and Network Security - 20th International Conference,
                  {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13269},
  pages        = {565--584},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-09234-3\_28},
  doi          = {10.1007/978-3-031-09234-3\_28},
  timestamp    = {Tue, 21 Jun 2022 15:24:40 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/EldefrawyLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/EldefrawyLT22,
  author       = {Karim Eldefrawy and
                  Tancr{\`{e}}de Lepoint and
                  Laura Tam},
  editor       = {Shlomi Dolev and
                  Jonathan Katz and
                  Amnon Meisels},
  title        = {In-App Cryptographically-Enforced Selective Access Control for Microsoft
                  Office and Similar Platforms},
  booktitle    = {Cyber Security, Cryptology, and Machine Learning - 6th International
                  Symposium, {CSCML} 2022, Be'er Sheva, Israel, June 30 - July 1, 2022,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13301},
  pages        = {447--467},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07689-3\_32},
  doi          = {10.1007/978-3-031-07689-3\_32},
  timestamp    = {Fri, 24 Jun 2022 18:23:22 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/EldefrawyLT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaLOR22,
  author       = {Fabrice Benhamouda and
                  Tancr{\`{e}}de Lepoint and
                  Michele Orr{\`{u}} and
                  Mariana Raykova},
  title        = {Publicly verifiable anonymous tokens with private metadata bit},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/004},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaLOR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellGLLMRY22,
  author       = {James Bell and
                  Adri{\`{a}} Gasc{\'{o}}n and
                  Tancr{\`{e}}de Lepoint and
                  Baiyu Li and
                  Sarah Meiklejohn and
                  Mariana Raykova and
                  Cathie Yun},
  title        = {{ACORN:} Input Validation for Secure Aggregation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1461},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1461},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BellGLLMRY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftml/KairouzMABBBBCC21,
  author       = {Peter Kairouz and
                  H. Brendan McMahan and
                  Brendan Avent and
                  Aur{\'{e}}lien Bellet and
                  Mehdi Bennis and
                  Arjun Nitin Bhagoji and
                  Kallista A. Bonawitz and
                  Zachary Charles and
                  Graham Cormode and
                  Rachel Cummings and
                  Rafael G. L. D'Oliveira and
                  Hubert Eichner and
                  Salim El Rouayheb and
                  David Evans and
                  Josh Gardner and
                  Zachary Garrett and
                  Adri{\`{a}} Gasc{\'{o}}n and
                  Badih Ghazi and
                  Phillip B. Gibbons and
                  Marco Gruteser and
                  Za{\"{\i}}d Harchaoui and
                  Chaoyang He and
                  Lie He and
                  Zhouyuan Huo and
                  Ben Hutchinson and
                  Justin Hsu and
                  Martin Jaggi and
                  Tara Javidi and
                  Gauri Joshi and
                  Mikhail Khodak and
                  Jakub Kone{\v{c}}n{\'y} and
                  Aleksandra Korolova and
                  Farinaz Koushanfar and
                  Sanmi Koyejo and
                  Tancr{\`{e}}de Lepoint and
                  Yang Liu and
                  Prateek Mittal and
                  Mehryar Mohri and
                  Richard Nock and
                  Ayfer {\"{O}}zg{\"{u}}r and
                  Rasmus Pagh and
                  Hang Qi and
                  Daniel Ramage and
                  Ramesh Raskar and
                  Mariana Raykova and
                  Dawn Song and
                  Weikang Song and
                  Sebastian U. Stich and
                  Ziteng Sun and
                  Ananda Theertha Suresh and
                  Florian Tram{\`{e}}r and
                  Praneeth Vepakomma and
                  Jianyu Wang and
                  Li Xiong and
                  Zheng Xu and
                  Qiang Yang and
                  Felix X. Yu and
                  Han Yu and
                  Sen Zhao},
  title        = {Advances and Open Problems in Federated Learning},
  journal      = {Found. Trends Mach. Learn.},
  volume       = {14},
  number       = {1-2},
  pages        = {1--210},
  year         = {2021},
  url          = {https://doi.org/10.1561/2200000083},
  doi          = {10.1561/2200000083},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ftml/KairouzMABBBBCC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LepointPRST21,
  author       = {Tancr{\`{e}}de Lepoint and
                  Sarvar Patel and
                  Mariana Raykova and
                  Karn Seth and
                  Ni Trieu},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Private Join and Compute from {PIR} with Default},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13091},
  pages        = {605--634},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92075-3\_21},
  doi          = {10.1007/978-3-030-92075-3\_21},
  timestamp    = {Fri, 03 Dec 2021 17:36:49 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LepointPRST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BenhamoudaLLO021,
  author       = {Fabrice Benhamouda and
                  Tancr{\`{e}}de Lepoint and
                  Julian Loss and
                  Michele Orr{\`{u}} and
                  Mariana Raykova},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {On the (in)security of {ROS}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12696},
  pages        = {33--53},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77870-5\_2},
  doi          = {10.1007/978-3-030-77870-5\_2},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BenhamoudaLLO021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AliLP0SSY21,
  author       = {Asra Ali and
                  Tancr{\`{e}}de Lepoint and
                  Sarvar Patel and
                  Mariana Raykova and
                  Phillipp Schoppmann and
                  Karn Seth and
                  Kevin Yeo},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Communication-Computation Trade-offs in {PIR}},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1811--1828},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ali},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AliLP0SSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EldefrawyLL21,
  author       = {Karim Eldefrawy and
                  Tancr{\`{e}}de Lepoint and
                  Antonin Leroux},
  title        = {Communication-Efficient Proactive {MPC} for Dynamic Groups with Dishonest
                  Majorities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1564},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1564},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/EldefrawyLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/EldefrawyLL20,
  author       = {Karim Eldefrawy and
                  Tancr{\`{e}}de Lepoint and
                  Antonin Leroux},
  editor       = {Mauro Conti and
                  Jianying Zhou and
                  Emiliano Casalicchio and
                  Angelo Spognardi},
  title        = {Communication-Efficient Proactive Secret Sharing for Dynamic Groups
                  with Dishonest Majorities},
  booktitle    = {Applied Cryptography and Network Security - 18th International Conference,
                  {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12146},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57808-4\_1},
  doi          = {10.1007/978-3-030-57808-4\_1},
  timestamp    = {Thu, 27 Aug 2020 11:49:09 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/EldefrawyLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BellBGL020,
  author       = {James Henry Bell and
                  Kallista A. Bonawitz and
                  Adri{\`{a}} Gasc{\'{o}}n and
                  Tancr{\`{e}}de Lepoint and
                  Mariana Raykova},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Secure Single-Server Aggregation with (Poly)Logarithmic Overhead},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {1253--1269},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417885},
  doi          = {10.1145/3372297.3417885},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BellBGL020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KreuterLO020,
  author       = {Ben Kreuter and
                  Tancr{\`{e}}de Lepoint and
                  Michele Orr{\`{u}} and
                  Mariana Raykova},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Anonymous Tokens with Private Metadata Bit},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {308--336},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_11},
  doi          = {10.1007/978-3-030-56784-2\_11},
  timestamp    = {Wed, 12 Aug 2020 14:16:56 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KreuterLO020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KreuterLOR20,
  author       = {Ben Kreuter and
                  Tancr{\`{e}}de Lepoint and
                  Michele Orr{\`{u}} and
                  Mariana Raykova},
  title        = {Anonymous Tokens with Private Metadata Bit},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {72},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/072},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KreuterLOR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellBGLR20,
  author       = {James Bell and
                  Kallista A. Bonawitz and
                  Adri{\`{a}} Gasc{\'{o}}n and
                  Tancr{\`{e}}de Lepoint and
                  Mariana Raykova},
  title        = {Secure Single-Server Aggregation with (Poly)Logarithmic Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {704},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/704},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellBGLR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaLOR20,
  author       = {Fabrice Benhamouda and
                  Tancr{\`{e}}de Lepoint and
                  Michele Orr{\`{u}} and
                  Mariana Raykova},
  title        = {On the (in)security of {ROS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {945},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/945},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaLOR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LepointPRST20,
  author       = {Tancr{\`{e}}de Lepoint and
                  Sarvar Patel and
                  Mariana Raykova and
                  Karn Seth and
                  Ni Trieu},
  title        = {Private Join and Compute from {PIR} with Default},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1011},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1011},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LepointPRST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/NunesEL19,
  author       = {Ivan De Oliveira Nunes and
                  Karim Eldefrawy and
                  Tancr{\`{e}}de Lepoint},
  title        = {{SNUSE:} {A} secure computation approach for large-scale user re-enrollment
                  in biometric authentication systems},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {98},
  pages        = {259--273},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2019.03.051},
  doi          = {10.1016/J.FUTURE.2019.03.051},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/NunesEL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BartusekCJJLMMM19,
  author       = {James Bartusek and
                  Brent Carmer and
                  Abhishek Jain and
                  Zhengzhong Jin and
                  Tancr{\`{e}}de Lepoint and
                  Fermi Ma and
                  Tal Malkin and
                  Alex J. Malozemoff and
                  Mariana Raykova},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Public-Key Function-Private Hidden Vector Encryption (and More)},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11923},
  pages        = {489--519},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34618-8\_17},
  doi          = {10.1007/978-3-030-34618-8\_17},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BartusekCJJLMMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0003LR19,
  author       = {Michael Brenner and
                  Tancr{\`{e}}de Lepoint and
                  Kurt Rohloff},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {WAHC'19: 7th Workshop on Encrypted Computing {\&} Applied Homomorphic
                  Cryptograph},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2703--2704},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3353554},
  doi          = {10.1145/3319535.3353554},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0003LR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BartusekLMZ19,
  author       = {James Bartusek and
                  Tancr{\`{e}}de Lepoint and
                  Fermi Ma and
                  Mark Zhandry},
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {New Techniques for Obfuscating Conjunctions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11478},
  pages        = {636--666},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17659-4\_22},
  doi          = {10.1007/978-3-030-17659-4\_22},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BartusekLMZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2019wahc,
  editor       = {Michael Brenner and
                  Tancr{\`{e}}de Lepoint and
                  Kurt Rohloff},
  title        = {Proceedings of the 7th {ACM} Workshop on Encrypted Computing {\&}
                  Applied Homomorphic Cryptography, WAHC@CCS 2019, London, UK, November
                  11-15, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338469},
  doi          = {10.1145/3338469},
  isbn         = {978-1-4503-6829-2},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2019wahc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-04977,
  author       = {Peter Kairouz and
                  H. Brendan McMahan and
                  Brendan Avent and
                  Aur{\'{e}}lien Bellet and
                  Mehdi Bennis and
                  Arjun Nitin Bhagoji and
                  Kallista A. Bonawitz and
                  Zachary Charles and
                  Graham Cormode and
                  Rachel Cummings and
                  Rafael G. L. D'Oliveira and
                  Salim El Rouayheb and
                  David Evans and
                  Josh Gardner and
                  Zachary Garrett and
                  Adri{\`{a}} Gasc{\'{o}}n and
                  Badih Ghazi and
                  Phillip B. Gibbons and
                  Marco Gruteser and
                  Za{\"{\i}}d Harchaoui and
                  Chaoyang He and
                  Lie He and
                  Zhouyuan Huo and
                  Ben Hutchinson and
                  Justin Hsu and
                  Martin Jaggi and
                  Tara Javidi and
                  Gauri Joshi and
                  Mikhail Khodak and
                  Jakub Kone{\v{c}}n{\'y} and
                  Aleksandra Korolova and
                  Farinaz Koushanfar and
                  Sanmi Koyejo and
                  Tancr{\`{e}}de Lepoint and
                  Yang Liu and
                  Prateek Mittal and
                  Mehryar Mohri and
                  Richard Nock and
                  Ayfer {\"{O}}zg{\"{u}}r and
                  Rasmus Pagh and
                  Mariana Raykova and
                  Hang Qi and
                  Daniel Ramage and
                  Ramesh Raskar and
                  Dawn Song and
                  Weikang Song and
                  Sebastian U. Stich and
                  Ziteng Sun and
                  Ananda Theertha Suresh and
                  Florian Tram{\`{e}}r and
                  Praneeth Vepakomma and
                  Jianyu Wang and
                  Li Xiong and
                  Zheng Xu and
                  Qiang Yang and
                  Felix X. Yu and
                  Han Yu and
                  Sen Zhao},
  title        = {Advances and Open Problems in Federated Learning},
  journal      = {CoRR},
  volume       = {abs/1912.04977},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.04977},
  eprinttype    = {arXiv},
  eprint       = {1912.04977},
  timestamp    = {Mon, 11 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-04977.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartusekCJJLMMM19,
  author       = {James Bartusek and
                  Brent Carmer and
                  Abhishek Jain and
                  Zhengzhong Jin and
                  Tancr{\`{e}}de Lepoint and
                  Fermi Ma and
                  Tal Malkin and
                  Alex J. Malozemoff and
                  Mariana Raykova},
  title        = {Public-Key Function-Private Hidden Vector Encryption (and More)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {746},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/746},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartusekCJJLMMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EldefrawyLL19,
  author       = {Karim Eldefrawy and
                  Tancr{\`{e}}de Lepoint and
                  Antonin Leroux},
  title        = {Communication-Efficient Proactive Secret Sharing for Dynamic Groups
                  with Dishonest Majorities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1383},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1383},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EldefrawyLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AliLP0SSY19,
  author       = {Asra Ali and
                  Tancr{\`{e}}de Lepoint and
                  Sarvar Patel and
                  Mariana Raykova and
                  Phillipp Schoppmann and
                  Karn Seth and
                  Kevin Yeo},
  title        = {Communication-Computation Trade-offs in {PIR}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1483},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1483},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AliLP0SSY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/AbdelzaherABDDG18,
  author       = {Tarek F. Abdelzaher and
                  Nora Ayanian and
                  Tamer Basar and
                  Suhas N. Diggavi and
                  Jana Diesner and
                  Deepak Ganesan and
                  Ramesh Govindan and
                  Susmit Jha and
                  Tancr{\`{e}}de Lepoint and
                  Benjamin M. Marlin and
                  Klara Nahrstedt and
                  David M. Nicol and
                  Raj Rajkumar and
                  Stephen Russell and
                  Sanjit A. Seshia and
                  Fei Sha and
                  Prashant J. Shenoy and
                  Mani B. Srivastava and
                  Gaurav S. Sukhatme and
                  Ananthram Swami and
                  Paulo Tabuada and
                  Don Towsley and
                  Nitin H. Vaidya and
                  Venugopal V. Veeravalli},
  title        = {Toward an Internet of Battlefield Things: {A} Resilience Perspective},
  journal      = {Computer},
  volume       = {51},
  number       = {11},
  pages        = {24--36},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2876048},
  doi          = {10.1109/MC.2018.2876048},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/AbdelzaherABDDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BaiLRSSS18,
  author       = {Shi Bai and
                  Tancr{\`{e}}de Lepoint and
                  Adeline Roux{-}Langlois and
                  Amin Sakzad and
                  Damien Stehl{\'{e}} and
                  Ron Steinfeld},
  title        = {Improved Security Proofs in Lattice-Based Cryptography: Using the
                  R{\'{e}}nyi Divergence Rather than the Statistical Distance},
  journal      = {J. Cryptol.},
  volume       = {31},
  number       = {2},
  pages        = {610--640},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00145-017-9265-9},
  doi          = {10.1007/S00145-017-9265-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BaiLRSSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CanteautCFLNPS18,
  author       = {Anne Canteaut and
                  Sergiu Carpov and
                  Caroline Fontaine and
                  Tancr{\`{e}}de Lepoint and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Pascal Paillier and
                  Renaud Sirdey},
  title        = {Stream Ciphers: {A} Practical Solution for Efficient Homomorphic-Ciphertext
                  Compression},
  journal      = {J. Cryptol.},
  volume       = {31},
  number       = {3},
  pages        = {885--916},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00145-017-9273-9},
  doi          = {10.1007/S00145-017-9273-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CanteautCFLNPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DucasKLLSSS18,
  author       = {L{\'{e}}o Ducas and
                  Eike Kiltz and
                  Tancr{\`{e}}de Lepoint and
                  Vadim Lyubashevsky and
                  Peter Schwabe and
                  Gregor Seiler and
                  Damien Stehl{\'{e}}},
  title        = {CRYSTALS-Dilithium: {A} Lattice-Based Digital Signature Scheme},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {1},
  pages        = {238--268},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i1.238-268},
  doi          = {10.13154/TCHES.V2018.I1.238-268},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/DucasKLLSSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MelchorDGLR18,
  author       = {Carlos Aguilar Melchor and
                  Jean{-}Christophe Deneuville and
                  Philippe Gaborit and
                  Tancr{\`{e}}de Lepoint and
                  Thomas Ricosset},
  title        = {Delegating Elliptic-Curve Operations with Homomorphic Encryption},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433140},
  doi          = {10.1109/CNS.2018.8433140},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MelchorDGLR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/NunesEL18,
  author       = {Ivan De Oliveira Nunes and
                  Karim Eldefrawy and
                  Tancr{\`{e}}de Lepoint},
  editor       = {Itai Dinur and
                  Shlomi Dolev and
                  Sachin Lodha},
  title        = {Secure Non-interactive User Re-enrollment in Biometrics-Based Identification
                  and Authentication Systems},
  booktitle    = {Cyber Security Cryptography and Machine Learning - Second International
                  Symposium, {CSCML} 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10879},
  pages        = {162--180},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-94147-9\_13},
  doi          = {10.1007/978-3-319-94147-9\_13},
  timestamp    = {Sat, 19 Oct 2019 20:25:56 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/NunesEL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dev/RajanQABLV18,
  author       = {Anjana Rajan and
                  Lucy Qin and
                  David W. Archer and
                  Dan Boneh and
                  Tancr{\`{e}}de Lepoint and
                  Mayank Varia},
  editor       = {Ellen W. Zegura},
  title        = {Callisto: {A} Cryptographic Approach to Detecting Serial Perpetrators
                  of Sexual Misconduct},
  booktitle    = {Proceedings of the 1st {ACM} {SIGCAS} Conference on Computing and
                  Sustainable Societies, {COMPASS} 2018, Menlo Park and San Jose, CA,
                  USA, June 20-22, 2018},
  pages        = {49:1--49:4},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3209811.3212699},
  doi          = {10.1145/3209811.3212699},
  timestamp    = {Wed, 21 Nov 2018 12:44:24 +0100},
  biburl       = {https://dblp.org/rec/conf/dev/RajanQABLV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BosDKLLSSSS18,
  author       = {Joppe W. Bos and
                  L{\'{e}}o Ducas and
                  Eike Kiltz and
                  Tancr{\`{e}}de Lepoint and
                  Vadim Lyubashevsky and
                  John M. Schanck and
                  Peter Schwabe and
                  Gregor Seiler and
                  Damien Stehl{\'{e}}},
  title        = {{CRYSTALS} - Kyber: {A} CCA-Secure Module-Lattice-Based {KEM}},
  booktitle    = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2018, London, United Kingdom, April 24-26, 2018},
  pages        = {353--367},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EuroSP.2018.00032},
  doi          = {10.1109/EUROSP.2018.00032},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/BosDKLLSSSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fusion/AgadakosCCLLLM18,
  author       = {Ioannis Agadakos and
                  Gabriela F. Ciocarlie and
                  Bogdan Copos and
                  Tancr{\`{e}}de Lepoint and
                  Ulf Lindqvist and
                  Michael E. Locasto and
                  James R. Michaelis},
  title        = {Risks and Benefits of Side-Channels in Battlefields},
  booktitle    = {21st International Conference on Information Fusion, {FUSION} 2018,
                  Cambridge, UK, July 10-13, 2018},
  pages        = {2290--2297},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/ICIF.2018.8455283},
  doi          = {10.23919/ICIF.2018.8455283},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fusion/AgadakosCCLLLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic2e/LepointCE18,
  author       = {Tancr{\`{e}}de Lepoint and
                  Gabriela F. Ciocarlie and
                  Karim Eldefrawy},
  editor       = {Abhishek Chandra and
                  Jie Li and
                  Ying Cai and
                  Tian Guo},
  title        = {BlockCIS - {A} Blockchain-Based Cyber Insurance System},
  booktitle    = {2018 {IEEE} International Conference on Cloud Engineering, {IC2E}
                  2018, Orlando, FL, USA, April 17-20, 2018},
  pages        = {378--384},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/IC2E.2018.00072},
  doi          = {10.1109/IC2E.2018.00072},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic2e/LepointCE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/AbdelzaherABDDG18,
  author       = {Tarek F. Abdelzaher and
                  Nora Ayanian and
                  Tamer Basar and
                  Suhas N. Diggavi and
                  Jana Diesner and
                  Deepak Ganesan and
                  Ramesh Govindan and
                  Susmit Jha and
                  Tancr{\`{e}}de Lepoint and
                  Benjamin M. Marlin and
                  Klara Nahrstedt and
                  David M. Nicol and
                  Raj Rajkumar and
                  Stephen Russell and
                  Sanjit A. Seshia and
                  Fei Sha and
                  Prashant J. Shenoy and
                  Mani B. Srivastava and
                  Gaurav S. Sukhatme and
                  Ananthram Swami and
                  Paulo Tabuada and
                  Don Towsley and
                  Nitin H. Vaidya and
                  Venugopal V. Veeravalli},
  title        = {Will Distributed Computing Revolutionize Peace? The Emergence of Battlefield
                  IoT},
  booktitle    = {38th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2018, Vienna, Austria, July 2-6, 2018},
  pages        = {1129--1138},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICDCS.2018.00112},
  doi          = {10.1109/ICDCS.2018.00112},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/AbdelzaherABDDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartusekLMZ18,
  author       = {James Bartusek and
                  Tancr{\`{e}}de Lepoint and
                  Fermi Ma and
                  Mark Zhandry},
  title        = {New Techniques for Obfuscating Conjunctions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {936},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/936},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartusekLMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AgadakosCCAHCLL17,
  author       = {Ioannis Agadakos and
                  Chien{-}Ying Chen and
                  Matteo Campanelli and
                  Prashant Anantharaman and
                  Monowar Hasan and
                  Bogdan Copos and
                  Tancr{\`{e}}de Lepoint and
                  Michael E. Locasto and
                  Gabriela F. Ciocarlie and
                  Ulf Lindqvist},
  editor       = {Bhavani Thuraisingham and
                  Rakesh B. Bobba and
                  Awais Rashid},
  title        = {Jumping the Air Gap: Modeling Cyber-Physical Attack Paths in the Internet-of-Things},
  booktitle    = {Proceedings of the 2017 Workshop on Cyber-Physical Systems Security
                  and PrivaCy, Dallas, TX, USA, November 3, 2017},
  pages        = {37--48},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3140241.3140252},
  doi          = {10.1145/3140241.3140252},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AgadakosCCAHCLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lpar/BjornerJLRS17,
  author       = {Nikolaj S. Bj{\o}rner and
                  Dejan Jovanovic and
                  Tancr{\`{e}}de Lepoint and
                  Philipp R{\"{u}}mmer and
                  Martin Sch{\"{a}}f},
  editor       = {Thomas Eiter and
                  David Sands and
                  Geoff Sutcliffe and
                  Andrei Voronkov},
  title        = {Abduction by Non-Experts},
  booktitle    = {IWIL@LPAR 2017 Workshop and {LPAR-21} Short Presentations, Maun, Botswana,
                  May 7-12, 2017},
  series       = {Kalpa Publications in Computing},
  volume       = {1},
  pages        = {58--72},
  publisher    = {EasyChair},
  year         = {2017},
  url          = {https://doi.org/10.29007/pz3t},
  doi          = {10.29007/PZ3T},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/lpar/BjornerJLRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CoronLLT17,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Moon Sung Lee and
                  Tancr{\`{e}}de Lepoint and
                  Mehdi Tibouchi},
  editor       = {Serge Fehr},
  title        = {Zeroizing Attacks on Indistinguishability Obfuscation over {CLT13}},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {41--58},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_3},
  doi          = {10.1007/978-3-662-54365-8\_3},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CoronLLT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BenarrochBL17,
  author       = {Daniel Benarroch and
                  Zvika Brakerski and
                  Tancr{\`{e}}de Lepoint},
  editor       = {Serge Fehr},
  title        = {{FHE} over the Integers: Decomposed and Batched in the Post-Quantum
                  Regime},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {271--301},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_10},
  doi          = {10.1007/978-3-662-54388-7\_10},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BenarrochBL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/BenhamoudaLMZ17,
  author       = {Fabrice Benhamouda and
                  Tancr{\`{e}}de Lepoint and
                  Claire Mathieu and
                  Hang Zhou},
  editor       = {Philip N. Klein},
  title        = {Optimization of Bootstrapping in Circuits},
  booktitle    = {Proceedings of the Twenty-Eighth Annual {ACM-SIAM} Symposium on Discrete
                  Algorithms, {SODA} 2017, Barcelona, Spain, Hotel Porta Fira, January
                  16-19},
  pages        = {2423--2433},
  publisher    = {{SIAM}},
  year         = {2017},
  url          = {https://doi.org/10.1137/1.9781611974782.160},
  doi          = {10.1137/1.9781611974782.160},
  timestamp    = {Tue, 02 Feb 2021 17:07:33 +0100},
  biburl       = {https://dblp.org/rec/conf/soda/BenhamoudaLMZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenarrochBL17,
  author       = {Daniel Benarroch and
                  Zvika Brakerski and
                  Tancr{\`{e}}de Lepoint},
  title        = {{FHE} Over the Integers: Decomposed and Batched in the Post-Quantum
                  Regime},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenarrochBL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucasLLSSS17,
  author       = {L{\'{e}}o Ducas and
                  Tancr{\`{e}}de Lepoint and
                  Vadim Lyubashevsky and
                  Peter Schwabe and
                  Gregor Seiler and
                  Damien Stehl{\'{e}}},
  title        = {{CRYSTALS} - Dilithium: Digital Signatures from Module Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {633},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/633},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DucasLLSSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosDKLLSSS17,
  author       = {Joppe W. Bos and
                  L{\'{e}}o Ducas and
                  Eike Kiltz and
                  Tancr{\`{e}}de Lepoint and
                  Vadim Lyubashevsky and
                  John M. Schanck and
                  Peter Schwabe and
                  Damien Stehl{\'{e}}},
  title        = {{CRYSTALS} - Kyber: a CCA-secure module-lattice-based {KEM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {634},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/634},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosDKLLSSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronLLT16,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Moon Sung Lee and
                  Tancr{\`{e}}de Lepoint and
                  Mehdi Tibouchi},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Cryptanalysis of {GGH15} Multilinear Maps},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {607--628},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_21},
  doi          = {10.1007/978-3-662-53008-5\_21},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CoronLLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MelchorBGGKL16,
  author       = {Carlos Aguilar Melchor and
                  Joris Barrier and
                  Serge Guelton and
                  Adrien Guinet and
                  Marc{-}Olivier Killijian and
                  Tancr{\`{e}}de Lepoint},
  editor       = {Kazue Sako},
  title        = {NFLlib: NTT-Based Fast Lattice Library},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
                  the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
                  4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9610},
  pages        = {341--356},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29485-8\_20},
  doi          = {10.1007/978-3-319-29485-8\_20},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MelchorBGGKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CanteautCFLNPS16,
  author       = {Anne Canteaut and
                  Sergiu Carpov and
                  Caroline Fontaine and
                  Tancr{\`{e}}de Lepoint and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Pascal Paillier and
                  Renaud Sirdey},
  editor       = {Thomas Peyrin},
  title        = {Stream Ciphers: {A} Practical Solution for Efficient Homomorphic-Ciphertext
                  Compression},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {313--333},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_16},
  doi          = {10.1007/978-3-662-52993-5\_16},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CanteautCFLNPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BenhamoudaLM016,
  author       = {Fabrice Benhamouda and
                  Tancr{\`{e}}de Lepoint and
                  Claire Mathieu and
                  Hang Zhou},
  title        = {Optimization of Bootstrapping in Circuits},
  journal      = {CoRR},
  volume       = {abs/1608.04535},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.04535},
  eprinttype    = {arXiv},
  eprint       = {1608.04535},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BenhamoudaLM016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaLM016,
  author       = {Fabrice Benhamouda and
                  Tancr{\`{e}}de Lepoint and
                  Claire Mathieu and
                  Hang Zhou},
  title        = {Optimization of Bootstrapping in Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {785},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/785},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaLM016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronLLT16,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Moon Sung Lee and
                  Tancr{\`{e}}de Lepoint and
                  Mehdi Tibouchi},
  title        = {Zeroizing Attacks on Indistinguishability Obfuscation over {CLT13}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1011},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronLLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BaiLLSS15,
  author       = {Shi Bai and
                  Adeline Langlois and
                  Tancr{\`{e}}de Lepoint and
                  Damien Stehl{\'{e}} and
                  Ron Steinfeld},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Improved Security Proofs in Lattice-Based Cryptography: Using the
                  R{\'{e}}nyi Divergence Rather Than the Statistical Distance},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9452},
  pages        = {3--24},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48797-6\_1},
  doi          = {10.1007/978-3-662-48797-6\_1},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BaiLLSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronGHLMM0ST15,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Craig Gentry and
                  Shai Halevi and
                  Tancr{\`{e}}de Lepoint and
                  Hemanta K. Maji and
                  Eric Miles and
                  Mariana Raykova and
                  Amit Sahai and
                  Mehdi Tibouchi},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Zeroizing Without Low-Level Zeroes: New {MMAP} Attacks and their Limitations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {247--266},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_12},
  doi          = {10.1007/978-3-662-47989-6\_12},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CoronGHLMM0ST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronLT15,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Tancr{\`{e}}de Lepoint and
                  Mehdi Tibouchi},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {New Multilinear Maps Over the Integers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {267--286},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_13},
  doi          = {10.1007/978-3-662-47989-6\_13},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CoronLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FouqueLLT15,
  author       = {Pierre{-}Alain Fouque and
                  Moon Sung Lee and
                  Tancr{\`{e}}de Lepoint and
                  Mehdi Tibouchi},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Cryptanalysis of the Co-ACD Assumption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {561--580},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_27},
  doi          = {10.1007/978-3-662-47989-6\_27},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FouqueLLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/LepointT15,
  author       = {Tancr{\`{e}}de Lepoint and
                  Mehdi Tibouchi},
  editor       = {Michael Brenner and
                  Nicolas Christin and
                  Benjamin Johnson and
                  Kurt Rohloff},
  title        = {Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme
                  Used in {PIR}},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2015 International
                  Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January
                  30, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8976},
  pages        = {184--193},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48051-9\_14},
  doi          = {10.1007/978-3-662-48051-9\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/LepointT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LepointT15,
  author       = {Tancr{\`{e}}de Lepoint and
                  Mehdi Tibouchi},
  title        = {Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme
                  Used in {PIR}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {12},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LepointT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautCFLNPS15,
  author       = {Anne Canteaut and
                  Sergiu Carpov and
                  Caroline Fontaine and
                  Tancr{\`{e}}de Lepoint and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Pascal Paillier and
                  Renaud Sirdey},
  title        = {How to Compress Homomorphic Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {113},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/113},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanteautCFLNPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronLT15,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Tancr{\`{e}}de Lepoint and
                  Mehdi Tibouchi},
  title        = {New Multilinear Maps over the Integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {162},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiLLSS15,
  author       = {Shi Bai and
                  Adeline Langlois and
                  Tancr{\`{e}}de Lepoint and
                  Damien Stehl{\'{e}} and
                  Ron Steinfeld},
  title        = {Improved security proofs in lattice-based cryptography: using the
                  R{\'{e}}nyi divergence rather than the statistical distance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {483},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/483},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiLLSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronGHLMM0ST15,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Craig Gentry and
                  Shai Halevi and
                  Tancr{\`{e}}de Lepoint and
                  Hemanta K. Maji and
                  Eric Miles and
                  Mariana Raykova and
                  Amit Sahai and
                  Mehdi Tibouchi},
  title        = {Zeroizing Without Low-Level Zeroes: New {MMAP} Attacks and Their Limitations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {596},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/596},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronGHLMM0ST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiGHLST15,
  author       = {Zvika Brakerski and
                  Craig Gentry and
                  Shai Halevi and
                  Tancr{\`{e}}de Lepoint and
                  Amit Sahai and
                  Mehdi Tibouchi},
  title        = {Cryptanalysis of the Quadratic Zero-Testing of {GGH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {845},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/845},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiGHLST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaigneresDFGLR15,
  author       = {Thomas Baign{\`{e}}res and
                  C{\'{e}}cile Delerabl{\'{e}}e and
                  Matthieu Finiasz and
                  Louis Goubin and
                  Tancr{\`{e}}de Lepoint and
                  Matthieu Rivain},
  title        = {Trap Me If You Can - Million Dollar Curve},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1249},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1249},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaigneresDFGLR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Lepoint14,
  author       = {Tancr{\`{e}}de Lepoint},
  title        = {Design and Implementation of Lattice-Based Cryptography. (Conception
                  and impl{\'{e}}mentation de cryptographie {\`{a}} base de r{\'{e}}seaux)},
  school       = {{\'{E}}cole Normale Sup{\'{e}}rieure, Paris, France},
  year         = {2014},
  url          = {https://tel.archives-ouvertes.fr/tel-01069864},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Lepoint14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/LepointN14,
  author       = {Tancr{\`{e}}de Lepoint and
                  Michael Naehrig},
  editor       = {David Pointcheval and
                  Damien Vergnaud},
  title        = {A Comparison of the Homomorphic Encryption Schemes {FV} and {YASHE}},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
                  on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8469},
  pages        = {318--335},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06734-6\_20},
  doi          = {10.1007/978-3-319-06734-6\_20},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/LepointN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CoronLT14,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Tancr{\`{e}}de Lepoint and
                  Mehdi Tibouchi},
  editor       = {Hugo Krawczyk},
  title        = {Scale-Invariant Fully Homomorphic Encryption over the Integers},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {311--328},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_18},
  doi          = {10.1007/978-3-642-54631-0\_18},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CoronLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronLT14,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Tancr{\`{e}}de Lepoint and
                  Mehdi Tibouchi},
  title        = {Scale-Invariant Fully Homomorphic Encryption over the Integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {32},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LepointN14,
  author       = {Tancr{\`{e}}de Lepoint and
                  Michael Naehrig},
  title        = {A Comparison of the Homomorphic Encryption Schemes {FV} and {YASHE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {62},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/062},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LepointN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronLT14a,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Tancr{\`{e}}de Lepoint and
                  Mehdi Tibouchi},
  title        = {Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the
                  Integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {975},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/975},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronLT14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DucasDLL13,
  author       = {L{\'{e}}o Ducas and
                  Alain Durmus and
                  Tancr{\`{e}}de Lepoint and
                  Vadim Lyubashevsky},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Lattice Signatures and Bimodal Gaussians},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {40--56},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_3},
  doi          = {10.1007/978-3-642-40041-4\_3},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DucasDLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronLT13,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Tancr{\`{e}}de Lepoint and
                  Mehdi Tibouchi},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Practical Multilinear Maps over the Integers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {476--493},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_26},
  doi          = {10.1007/978-3-642-40041-4\_26},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/CoronLT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CheonCKLLTY13,
  author       = {Jung Hee Cheon and
                  Jean{-}S{\'{e}}bastien Coron and
                  Jinsu Kim and
                  Moon Sung Lee and
                  Tancr{\`{e}}de Lepoint and
                  Mehdi Tibouchi and
                  Aaram Yun},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Batch Fully Homomorphic Encryption over the Integers},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {315--335},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_20},
  doi          = {10.1007/978-3-642-38348-9\_20},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CheonCKLLTY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/LepointP13,
  author       = {Tancr{\`{e}}de Lepoint and
                  Pascal Paillier},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {On the Minimal Number of Bootstrappings in Homomorphic Circuits},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {189--200},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_13},
  doi          = {10.1007/978-3-642-41320-9\_13},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/LepointP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/DelerableeLPR13,
  author       = {C{\'{e}}cile Delerabl{\'{e}}e and
                  Tancr{\`{e}}de Lepoint and
                  Pascal Paillier and
                  Matthieu Rivain},
  editor       = {Tanja Lange and
                  Kristin E. Lauter and
                  Petr Lisonek},
  title        = {White-Box Security Notions for Symmetric Encryption Schemes},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
                  Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8282},
  pages        = {247--264},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43414-7\_13},
  doi          = {10.1007/978-3-662-43414-7\_13},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/DelerableeLPR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/LepointRMRP13,
  author       = {Tancr{\`{e}}de Lepoint and
                  Matthieu Rivain and
                  Yoni De Mulder and
                  Peter Roelse and
                  Bart Preneel},
  editor       = {Tanja Lange and
                  Kristin E. Lauter and
                  Petr Lisonek},
  title        = {Two Attacks on a White-Box {AES} Implementation},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
                  Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8282},
  pages        = {265--285},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43414-7\_14},
  doi          = {10.1007/978-3-662-43414-7\_14},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/LepointRMRP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronLT13,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Tancr{\`{e}}de Lepoint and
                  Mehdi Tibouchi},
  title        = {Batch Fully Homomorphic Encryption over the Integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {36},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronLT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronLT13a,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Tancr{\`{e}}de Lepoint and
                  Mehdi Tibouchi},
  title        = {Practical Multilinear Maps over the Integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {183},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronLT13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucasDLL13,
  author       = {L{\'{e}}o Ducas and
                  Alain Durmus and
                  Tancr{\`{e}}de Lepoint and
                  Vadim Lyubashevsky},
  title        = {Lattice Signatures and Bimodal Gaussians},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {383},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/383},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DucasDLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LepointR13,
  author       = {Tancr{\`{e}}de Lepoint and
                  Matthieu Rivain},
  title        = {Another Nail in the Coffin of White-Box {AES} Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {455},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/455},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LepointR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DelerableeLPR13,
  author       = {C{\'{e}}cile Delerabl{\'{e}}e and
                  Tancr{\`{e}}de Lepoint and
                  Pascal Paillier and
                  Matthieu Rivain},
  title        = {White-Box Security Notions for Symmetric Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {523},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/523},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DelerableeLPR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/JoyeL12,
  author       = {Marc Joye and
                  Tancr{\`{e}}de Lepoint},
  editor       = {Mark Dermot Ryan and
                  Ben Smyth and
                  Guilin Wang},
  title        = {Partial Key Exposure on {RSA} with Private Exponents Larger Than {N}},
  booktitle    = {Information Security Practice and Experience - 8th International Conference,
                  {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7232},
  pages        = {369--380},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29101-2\_25},
  doi          = {10.1007/978-3-642-29101-2\_25},
  timestamp    = {Wed, 07 Dec 2022 23:12:45 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/JoyeL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/JoyeL11,
  author       = {Marc Joye and
                  Tancr{\`{e}}de Lepoint},
  editor       = {Yan Chen and
                  Stefan Katzenbeisser and
                  Ahmad{-}Reza Sadeghi},
  title        = {Traitor tracing schemes for protected software implementations},
  booktitle    = {Proceedings of the 11th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 21, 2011},
  pages        = {15--22},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046631.2046636},
  doi          = {10.1145/2046631.2046636},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/JoyeL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics