BibTeX records: Geoffroy Couteau

download as .bib file

@inproceedings{DBLP:conf/eurocrypt/CouteauKU20,
  author    = {Geoffroy Couteau and
               Shuichi Katsumata and
               Bogdan Ursu},
  editor    = {Anne Canteaut and
               Yuval Ishai},
  title     = {Non-interactive Zero-Knowledge in Pairing-Free Groups from Weaker
               Assumptions},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {12107},
  pages     = {442--471},
  publisher = {Springer},
  year      = {2020},
  url       = {https://doi.org/10.1007/978-3-030-45727-3\_15},
  doi       = {10.1007/978-3-030-45727-3\_15},
  timestamp = {Mon, 04 May 2020 14:40:23 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/CouteauKU20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AgrikolaCH20,
  author    = {Thomas Agrikola and
               Geoffroy Couteau and
               Dennis Hofheinz},
  editor    = {Aggelos Kiayias and
               Markulf Kohlweiss and
               Petros Wallden and
               Vassilis Zikas},
  title     = {The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential
               iO},
  booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
               on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
               May 4-7, 2020, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {12110},
  pages     = {187--219},
  publisher = {Springer},
  year      = {2020},
  url       = {https://doi.org/10.1007/978-3-030-45374-9\_7},
  doi       = {10.1007/978-3-030-45374-9\_7},
  timestamp = {Fri, 01 May 2020 18:32:25 +0200},
  biburl    = {https://dblp.org/rec/conf/pkc/AgrikolaCH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauH20,
  author    = {Geoffroy Couteau and
               Dominik Hartmann},
  title     = {Shorter Non-Interactive Zero-Knowledge Arguments and ZAPs for Algebraic
               Languages},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2020},
  pages     = {286},
  year      = {2020},
  url       = {https://eprint.iacr.org/2020/286},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CouteauH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrikolaCIJS20,
  author    = {Thomas Agrikola and
               Geoffroy Couteau and
               Yuval Ishai and
               Stanislaw Jarecki and
               Amit Sahai},
  title     = {On Pseudorandom Encodings},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2020},
  pages     = {445},
  year      = {2020},
  url       = {https://eprint.iacr.org/2020/445},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AgrikolaCIJS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoyleCGIKRS19,
  author    = {Elette Boyle and
               Geoffroy Couteau and
               Niv Gilboa and
               Yuval Ishai and
               Lisa Kohl and
               Peter Rindal and
               Peter Scholl},
  editor    = {Lorenzo Cavallaro and
               Johannes Kinder and
               XiaoFeng Wang and
               Jonathan Katz},
  title     = {Efficient Two-Round {OT} Extension and Silent Non-Interactive Secure
               Computation},
  booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages     = {291--308},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3319535.3354255},
  doi       = {10.1145/3319535.3354255},
  timestamp = {Fri, 06 Mar 2020 13:19:56 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/BoyleCGIKRS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyleCGIKS19,
  author    = {Elette Boyle and
               Geoffroy Couteau and
               Niv Gilboa and
               Yuval Ishai and
               Lisa Kohl and
               Peter Scholl},
  editor    = {Alexandra Boldyreva and
               Daniele Micciancio},
  title     = {Efficient Pseudorandom Correlation Generators: Silent {OT} Extension
               and More},
  booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
               Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11694},
  pages     = {489--518},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-26954-8\_16},
  doi       = {10.1007/978-3-030-26954-8\_16},
  timestamp = {Fri, 09 Aug 2019 14:27:02 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/BoyleCGIKS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Couteau19,
  author    = {Geoffroy Couteau},
  editor    = {Yuval Ishai and
               Vincent Rijmen},
  title     = {A Note on the Communication Complexity of Multiparty Computation in
               the Correlated Randomness Model},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11477},
  pages     = {473--503},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-17656-3\_17},
  doi       = {10.1007/978-3-030-17656-3\_17},
  timestamp = {Tue, 14 May 2019 13:55:31 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/Couteau19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CouteauH19,
  author    = {Geoffroy Couteau and
               Dennis Hofheinz},
  editor    = {Yuval Ishai and
               Vincent Rijmen},
  title     = {Designated-Verifier Pseudorandom Generators, and Their Applications},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11477},
  pages     = {562--592},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-17656-3\_20},
  doi       = {10.1007/978-3-030-17656-3\_20},
  timestamp = {Tue, 14 May 2019 13:55:31 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/CouteauH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CouteauR19,
  author    = {Geoffroy Couteau and
               Michael Reichle},
  editor    = {Dongdai Lin and
               Kazue Sako},
  title     = {Non-interactive Keyed-Verification Anonymous Credentials},
  booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
               on Practice and Theory of Public-Key Cryptography, Beijing, China,
               April 14-17, 2019, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11442},
  pages     = {66--96},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-17253-4\_3},
  doi       = {10.1007/978-3-030-17253-4\_3},
  timestamp = {Fri, 01 May 2020 18:32:25 +0200},
  biburl    = {https://dblp.org/rec/conf/pkc/CouteauR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauR19,
  author    = {Geoffroy Couteau and
               Michael Reichle},
  title     = {Non-Interactive Keyed-Verification Anonymous Credentials},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {117},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/117},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CouteauR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauH19,
  author    = {Geoffroy Couteau and
               Dennis Hofheinz},
  title     = {Designated-verifier pseudorandom generators, and their applications},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {236},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/236},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CouteauH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleCGI19,
  author    = {Elette Boyle and
               Geoffroy Couteau and
               Niv Gilboa and
               Yuval Ishai},
  title     = {Compressing Vector {OLE}},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {273},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/273},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/BoyleCGI19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleCGIKS19,
  author    = {Elette Boyle and
               Geoffroy Couteau and
               Niv Gilboa and
               Yuval Ishai and
               Lisa Kohl and
               Peter Scholl},
  title     = {Efficient Pseudorandom Correlation Generators: Silent {OT} Extension
               and More},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {448},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/448},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/BoyleCGIKS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleCGIKRS19,
  author    = {Elette Boyle and
               Geoffroy Couteau and
               Niv Gilboa and
               Yuval Ishai and
               Lisa Kohl and
               Peter Rindal and
               Peter Scholl},
  title     = {Efficient Two-Round {OT} Extension and Silent Non-Interactive Secure
               Computation},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {1159},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/1159},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/BoyleCGIKRS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauRR19,
  author    = {Geoffroy Couteau and
               Bill Roscoe and
               Peter Ryan},
  title     = {Partially-Fair Computation from Timed-Release Encryption and Oblivious
               Transfer},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {1281},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/1281},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CouteauRR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Couteau18,
  author    = {Geoffroy Couteau},
  editor    = {Bart Preneel and
               Frederik Vercauteren},
  title     = {New Protocols for Secure Equality Test and Comparison},
  booktitle = {Applied Cryptography and Network Security - 16th International Conference,
               {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10892},
  pages     = {303--320},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-93387-0\_16},
  doi       = {10.1007/978-3-319-93387-0\_16},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/acns/Couteau18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CouteauDMRR18,
  author    = {Geoffroy Couteau and
               Aur{\'{e}}lien Dupin and
               Pierrick M{\'{e}}aux and
               M{\'{e}}lissa Rossi and
               Yann Rotella},
  editor    = {Thomas Peyrin and
               Steven D. Galbraith},
  title     = {On the Concrete Security of Goldreich's Pseudorandom Generator},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11273},
  pages     = {96--124},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-03329-3\_4},
  doi       = {10.1007/978-3-030-03329-3\_4},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/conf/asiacrypt/CouteauDMRR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoyleCGI18,
  author    = {Elette Boyle and
               Geoffroy Couteau and
               Niv Gilboa and
               Yuval Ishai},
  editor    = {David Lie and
               Mohammad Mannan and
               Michael Backes and
               XiaoFeng Wang},
  title     = {Compressing Vector {OLE}},
  booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2018, Toronto, ON, Canada, October
               15-19, 2018},
  pages     = {896--912},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://doi.org/10.1145/3243734.3243868},
  doi       = {10.1145/3243734.3243868},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ccs/BoyleCGI18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChaidosC18,
  author    = {Pyrros Chaidos and
               Geoffroy Couteau},
  editor    = {Jesper Buus Nielsen and
               Vincent Rijmen},
  title     = {Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs
               of Knowledge},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10822},
  pages     = {193--221},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-78372-7\_7},
  doi       = {10.1007/978-3-319-78372-7\_7},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/ChaidosC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleCGIO18,
  author    = {Elette Boyle and
               Geoffroy Couteau and
               Niv Gilboa and
               Yuval Ishai and
               Michele Orr{\`{u}}},
  title     = {Homomorphic Secret Sharing: Optimizations and Applications},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2018},
  pages     = {419},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/419},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/BoyleCGIO18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Couteau18,
  author    = {Geoffroy Couteau},
  title     = {A Note on the Communication Complexity of Multiparty Computation in
               the Correlated Randomness Model},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2018},
  pages     = {465},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/465},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/Couteau18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrikolaCH18,
  author    = {Thomas Agrikola and
               Geoffroy Couteau and
               Dennis Hofheinz},
  title     = {The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential
               iO},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2018},
  pages     = {470},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/470},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AgrikolaCH18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauDMRR18,
  author    = {Geoffroy Couteau and
               Aur{\'{e}}lien Dupin and
               Pierrick M{\'{e}}aux and
               M{\'{e}}lissa Rossi and
               Yann Rotella},
  title     = {On the Concrete Security of Goldreich's Pseudorandom Generator},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2018},
  pages     = {1162},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/1162},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CouteauDMRR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Couteau17,
  author    = {Geoffroy Couteau},
  title     = {Zero-Knowledge Proofs for Secure Computation. (Preuves {\`{a}} divulgation
               nulle pour le calcul s{\'{e}}curis{\'{e}})},
  school    = {{PSL} Research University, Paris, France},
  year      = {2017},
  url       = {https://tel.archives-ouvertes.fr/tel-01668125},
  timestamp = {Wed, 10 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/phd/hal/Couteau17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoyleCGIO17,
  author    = {Elette Boyle and
               Geoffroy Couteau and
               Niv Gilboa and
               Yuval Ishai and
               Michele Orr{\`{u}}},
  editor    = {Bhavani M. Thuraisingham and
               David Evans and
               Tal Malkin and
               Dongyan Xu},
  title     = {Homomorphic Secret Sharing: Optimizations and Applications},
  booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  pages     = {2105--2122},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3133956.3134107},
  doi       = {10.1145/3133956.3134107},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ccs/BoyleCGIO17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CouteauPP17,
  author    = {Geoffroy Couteau and
               Thomas Peters and
               David Pointcheval},
  editor    = {Jean{-}S{\'{e}}bastien Coron and
               Jesper Buus Nielsen},
  title     = {Removing the Strong {RSA} Assumption from Arguments over the Integers},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10211},
  pages     = {321--350},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-56614-6\_11},
  doi       = {10.1007/978-3-319-56614-6\_11},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/CouteauPP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaidosC17,
  author    = {Pyrros Chaidos and
               Geoffroy Couteau},
  title     = {Efficient Designated-Verifier Non-Interactive Zero-Knowledge Proofs
               of Knowledge},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2017},
  pages     = {1029},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/1029},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/ChaidosC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CouteauPP16,
  author    = {Geoffroy Couteau and
               Thomas Peters and
               David Pointcheval},
  editor    = {Matthew Robshaw and
               Jonathan Katz},
  title     = {Encryption Switching Protocols},
  booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9814},
  pages     = {308--338},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53018-4\_12},
  doi       = {10.1007/978-3-662-53018-4\_12},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/CouteauPP16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauPP16,
  author    = {Geoffroy Couteau and
               Thomas Peters and
               David Pointcheval},
  title     = {Removing the Strong {RSA} Assumption from Arguments over the Integers},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2016},
  pages     = {128},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/128},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CouteauPP16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Couteau16,
  author    = {Geoffroy Couteau},
  title     = {Efficient Secure Comparison Protocols},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2016},
  pages     = {544},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/544},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/Couteau16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Couteau16a,
  author    = {Geoffroy Couteau},
  title     = {Revisiting Covert Multiparty Computation},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2016},
  pages     = {951},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/951},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/Couteau16a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BenhamoudaCPW15,
  author    = {Fabrice Benhamouda and
               Geoffroy Couteau and
               David Pointcheval and
               Hoeteck Wee},
  editor    = {Rosario Gennaro and
               Matthew Robshaw},
  title     = {Implicit Zero-Knowledge Arguments and Applications to the Malicious
               Setting},
  booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9216},
  pages     = {107--129},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48000-7\_6},
  doi       = {10.1007/978-3-662-48000-7\_6},
  timestamp = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/BenhamoudaCPW15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/CouteauPP15,
  author    = {Geoffroy Couteau and
               Thomas Peters and
               David Pointcheval},
  editor    = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
               Evangelos Kranakis and
               Guillaume Bonfante},
  title     = {Secure Distributed Computation on Private Inputs},
  booktitle = {Foundations and Practice of Security - 8th International Symposium,
               {FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9482},
  pages     = {14--26},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-30303-1\_2},
  doi       = {10.1007/978-3-319-30303-1\_2},
  timestamp = {Fri, 27 Dec 2019 21:23:06 +0100},
  biburl    = {https://dblp.org/rec/conf/fps/CouteauPP15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaCPW15,
  author    = {Fabrice Benhamouda and
               Geoffroy Couteau and
               David Pointcheval and
               Hoeteck Wee},
  title     = {Implicit Zero-Knowledge Arguments and Applications to the Malicious
               Setting},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2015},
  pages     = {246},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/246},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/BenhamoudaCPW15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauPP15,
  author    = {Geoffroy Couteau and
               Thomas Peters and
               David Pointcheval},
  title     = {Encryption Switching Protocols},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2015},
  pages     = {990},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/990},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CouteauPP15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauPP15a,
  author    = {Geoffroy Couteau and
               Thomas Peters and
               David Pointcheval},
  title     = {Secure Distributed Computation on Private Inputs},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2015},
  pages     = {1196},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1196},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CouteauPP15a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics