BibTeX records: Geoffroy Couteau

download as .bib file

@inproceedings{DBLP:conf/acns/Couteau18,
  author    = {Geoffroy Couteau},
  title     = {New Protocols for Secure Equality Test and Comparison},
  booktitle = {Applied Cryptography and Network Security - 16th International Conference,
               {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  pages     = {303--320},
  year      = {2018},
  crossref  = {DBLP:conf/acns/2018},
  url       = {https://doi.org/10.1007/978-3-319-93387-0\_16},
  doi       = {10.1007/978-3-319-93387-0\_16},
  timestamp = {Wed, 13 Jun 2018 13:59:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/Couteau18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CouteauDMRR18,
  author    = {Geoffroy Couteau and
               Aur{\'{e}}lien Dupin and
               Pierrick M{\'{e}}aux and
               M{\'{e}}lissa Rossi and
               Yann Rotella},
  title     = {On the Concrete Security of Goldreich's Pseudorandom Generator},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}},
  pages     = {96--124},
  year      = {2018},
  crossref  = {DBLP:conf/asiacrypt/2018-2},
  url       = {https://doi.org/10.1007/978-3-030-03329-3\_4},
  doi       = {10.1007/978-3-030-03329-3\_4},
  timestamp = {Thu, 22 Nov 2018 11:22:38 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/CouteauDMRR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoyleCGI18,
  author    = {Elette Boyle and
               Geoffroy Couteau and
               Niv Gilboa and
               Yuval Ishai},
  title     = {Compressing Vector {OLE}},
  booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2018, Toronto, ON, Canada, October
               15-19, 2018},
  pages     = {896--912},
  year      = {2018},
  crossref  = {DBLP:conf/ccs/2018},
  url       = {https://doi.org/10.1145/3243734.3243868},
  doi       = {10.1145/3243734.3243868},
  timestamp = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/BoyleCGI18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChaidosC18,
  author    = {Pyrros Chaidos and
               Geoffroy Couteau},
  title     = {Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs
               of Knowledge},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
  pages     = {193--221},
  year      = {2018},
  crossref  = {DBLP:conf/eurocrypt/2018-3},
  url       = {https://doi.org/10.1007/978-3-319-78372-7\_7},
  doi       = {10.1007/978-3-319-78372-7\_7},
  timestamp = {Mon, 16 Apr 2018 14:12:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/ChaidosC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleCGIO18,
  author    = {Elette Boyle and
               Geoffroy Couteau and
               Niv Gilboa and
               Yuval Ishai and
               Michele Orr{\`{u}}},
  title     = {Homomorphic Secret Sharing: Optimizations and Applications},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {419},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/419},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BoyleCGIO18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Couteau18,
  author    = {Geoffroy Couteau},
  title     = {A Note on the Communication Complexity of Multiparty Computation in
               the Correlated Randomness Model},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {465},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/465},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Couteau18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrikolaCH18,
  author    = {Thomas Agrikola and
               Geoffroy Couteau and
               Dennis Hofheinz},
  title     = {The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential
               iO},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {470},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/470},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AgrikolaCH18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauDMRR18,
  author    = {Geoffroy Couteau and
               Aur{\'{e}}lien Dupin and
               Pierrick M{\'{e}}aux and
               M{\'{e}}lissa Rossi and
               Yann Rotella},
  title     = {On the Concrete Security of Goldreich's Pseudorandom Generator},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {1162},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/1162},
  timestamp = {Tue, 11 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CouteauDMRR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Couteau17,
  author    = {Geoffroy Couteau},
  title     = {Zero-Knowledge Proofs for Secure Computation. (Preuves {\`{a}} divulgation
               nulle pour le calcul s{\'{e}}curis{\'{e}})},
  school    = {{PSL} Research University, Paris, France},
  year      = {2017},
  url       = {https://tel.archives-ouvertes.fr/tel-01668125},
  timestamp = {Wed, 10 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/phd/hal/Couteau17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoyleCGIO17,
  author    = {Elette Boyle and
               Geoffroy Couteau and
               Niv Gilboa and
               Yuval Ishai and
               Michele Orr{\`{u}}},
  title     = {Homomorphic Secret Sharing: Optimizations and Applications},
  booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  pages     = {2105--2122},
  year      = {2017},
  crossref  = {DBLP:conf/ccs/2017},
  url       = {https://doi.org/10.1145/3133956.3134107},
  doi       = {10.1145/3133956.3134107},
  timestamp = {Tue, 06 Nov 2018 11:07:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/BoyleCGIO17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CouteauPP17,
  author    = {Geoffroy Couteau and
               Thomas Peters and
               David Pointcheval},
  title     = {Removing the Strong {RSA} Assumption from Arguments over the Integers},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}},
  pages     = {321--350},
  year      = {2017},
  crossref  = {DBLP:conf/eurocrypt/2017-2},
  url       = {https://doi.org/10.1007/978-3-319-56614-6\_11},
  doi       = {10.1007/978-3-319-56614-6\_11},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/CouteauPP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaidosC17,
  author    = {Pyrros Chaidos and
               Geoffroy Couteau},
  title     = {Efficient Designated-Verifier Non-Interactive Zero-Knowledge Proofs
               of Knowledge},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {1029},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/1029},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ChaidosC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CouteauPP16,
  author    = {Geoffroy Couteau and
               Thomas Peters and
               David Pointcheval},
  title     = {Encryption Switching Protocols},
  booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {I}},
  pages     = {308--338},
  year      = {2016},
  crossref  = {DBLP:conf/crypto/2016-1},
  url       = {https://doi.org/10.1007/978-3-662-53018-4\_12},
  doi       = {10.1007/978-3-662-53018-4\_12},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/CouteauPP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauPP16,
  author    = {Geoffroy Couteau and
               Thomas Peters and
               David Pointcheval},
  title     = {Removing the Strong {RSA} Assumption from Arguments over the Integers},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {128},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/128},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CouteauPP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Couteau16,
  author    = {Geoffroy Couteau},
  title     = {Efficient Secure Comparison Protocols},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {544},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/544},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Couteau16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Couteau16a,
  author    = {Geoffroy Couteau},
  title     = {Revisiting Covert Multiparty Computation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {951},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/951},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Couteau16a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BenhamoudaCPW15,
  author    = {Fabrice Benhamouda and
               Geoffroy Couteau and
               David Pointcheval and
               Hoeteck Wee},
  title     = {Implicit Zero-Knowledge Arguments and Applications to the Malicious
               Setting},
  booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  pages     = {107--129},
  year      = {2015},
  crossref  = {DBLP:conf/crypto/2015-2},
  url       = {https://doi.org/10.1007/978-3-662-48000-7\_6},
  doi       = {10.1007/978-3-662-48000-7\_6},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/BenhamoudaCPW15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/CouteauPP15,
  author    = {Geoffroy Couteau and
               Thomas Peters and
               David Pointcheval},
  title     = {Secure Distributed Computation on Private Inputs},
  booktitle = {Foundations and Practice of Security - 8th International Symposium,
               {FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised
               Selected Papers},
  pages     = {14--26},
  year      = {2015},
  crossref  = {DBLP:conf/fps/2015},
  url       = {https://doi.org/10.1007/978-3-319-30303-1\_2},
  doi       = {10.1007/978-3-319-30303-1\_2},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fps/CouteauPP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaCPW15,
  author    = {Fabrice Benhamouda and
               Geoffroy Couteau and
               David Pointcheval and
               Hoeteck Wee},
  title     = {Implicit Zero-Knowledge Arguments and Applications to the Malicious
               Setting},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {246},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/246},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BenhamoudaCPW15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauPP15,
  author    = {Geoffroy Couteau and
               Thomas Peters and
               David Pointcheval},
  title     = {Encryption Switching Protocols},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {990},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/990},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CouteauPP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauPP15a,
  author    = {Geoffroy Couteau and
               Thomas Peters and
               David Pointcheval},
  title     = {Secure Distributed Computation on Private Inputs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {1196},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1196},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CouteauPP15a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2018,
  editor    = {Bart Preneel and
               Frederik Vercauteren},
  title     = {Applied Cryptography and Network Security - 16th International Conference,
               {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10892},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-93387-0},
  doi       = {10.1007/978-3-319-93387-0},
  isbn      = {978-3-319-93386-3},
  timestamp = {Wed, 13 Jun 2018 13:59:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2018-2,
  editor    = {Thomas Peyrin and
               Steven D. Galbraith},
  title     = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11273},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-03329-3},
  doi       = {10.1007/978-3-030-03329-3},
  isbn      = {978-3-030-03328-6},
  timestamp = {Thu, 22 Nov 2018 11:22:38 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2018-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2018,
  editor    = {David Lie and
               Mohammad Mannan and
               Michael Backes and
               XiaoFeng Wang},
  title     = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2018, Toronto, ON, Canada, October
               15-19, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {http://dl.acm.org/citation.cfm?id=3243734},
  isbn      = {978-1-4503-5693-0},
  timestamp = {Wed, 31 Oct 2018 17:23:34 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2018-3,
  editor    = {Jesper Buus Nielsen and
               Vincent Rijmen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10822},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-78372-7},
  doi       = {10.1007/978-3-319-78372-7},
  isbn      = {978-3-319-78371-0},
  timestamp = {Mon, 16 Apr 2018 14:12:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2018-3},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017,
  editor    = {Bhavani M. Thuraisingham and
               David Evans and
               Tal Malkin and
               Dongyan Xu},
  title     = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3133956},
  doi       = {10.1145/3133956},
  isbn      = {978-1-4503-4946-8},
  timestamp = {Tue, 06 Nov 2018 11:07:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2017-2,
  editor    = {Jean{-}S{\'{e}}bastien Coron and
               Jesper Buus Nielsen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10211},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-56614-6},
  doi       = {10.1007/978-3-319-56614-6},
  isbn      = {978-3-319-56613-9},
  timestamp = {Sat, 16 Sep 2017 12:12:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2017-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2016-1,
  editor    = {Matthew Robshaw and
               Jonathan Katz},
  title     = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9814},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53018-4},
  doi       = {10.1007/978-3-662-53018-4},
  isbn      = {978-3-662-53017-7},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2016-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2015-2,
  editor    = {Rosario Gennaro and
               Matthew Robshaw},
  title     = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9216},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48000-7},
  doi       = {10.1007/978-3-662-48000-7},
  isbn      = {978-3-662-47999-5},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2015-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fps/2015,
  editor    = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
               Evangelos Kranakis and
               Guillaume Bonfante},
  title     = {Foundations and Practice of Security - 8th International Symposium,
               {FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9482},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-30303-1},
  doi       = {10.1007/978-3-319-30303-1},
  isbn      = {978-3-319-30302-4},
  timestamp = {Wed, 24 May 2017 08:29:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fps/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier