@article{DBLP:journals/iacr/CouteauR19,
author = {Geoffroy Couteau and
Michael Reichle},
title = {Non-Interactive Keyed-Verification Anonymous Credentials},
journal = {{IACR} Cryptology ePrint Archive},
volume = {2019},
pages = {117},
year = {2019},
url = {https://eprint.iacr.org/2019/117},
timestamp = {Tue, 12 Feb 2019 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/journals/iacr/CouteauR19},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Couteau18,
author = {Geoffroy Couteau},
title = {New Protocols for Secure Equality Test and Comparison},
booktitle = {Applied Cryptography and Network Security - 16th International Conference,
{ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
pages = {303--320},
year = {2018},
crossref = {DBLP:conf/acns/2018},
url = {https://doi.org/10.1007/978-3-319-93387-0\_16},
doi = {10.1007/978-3-319-93387-0\_16},
timestamp = {Wed, 13 Jun 2018 13:59:55 +0200},
biburl = {https://dblp.org/rec/bib/conf/acns/Couteau18},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CouteauDMRR18,
author = {Geoffroy Couteau and
Aur{\'{e}}lien Dupin and
Pierrick M{\'{e}}aux and
M{\'{e}}lissa Rossi and
Yann Rotella},
title = {On the Concrete Security of Goldreich's Pseudorandom Generator},
booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
on the Theory and Application of Cryptology and Information Security,
Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}},
pages = {96--124},
year = {2018},
crossref = {DBLP:conf/asiacrypt/2018-2},
url = {https://doi.org/10.1007/978-3-030-03329-3\_4},
doi = {10.1007/978-3-030-03329-3\_4},
timestamp = {Thu, 22 Nov 2018 11:22:38 +0100},
biburl = {https://dblp.org/rec/bib/conf/asiacrypt/CouteauDMRR18},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoyleCGI18,
author = {Elette Boyle and
Geoffroy Couteau and
Niv Gilboa and
Yuval Ishai},
title = {Compressing Vector {OLE}},
booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
Communications Security, {CCS} 2018, Toronto, ON, Canada, October
15-19, 2018},
pages = {896--912},
year = {2018},
crossref = {DBLP:conf/ccs/2018},
url = {https://doi.org/10.1145/3243734.3243868},
doi = {10.1145/3243734.3243868},
timestamp = {Wed, 21 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/ccs/BoyleCGI18},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChaidosC18,
author = {Pyrros Chaidos and
Geoffroy Couteau},
title = {Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs
of Knowledge},
booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
Conference on the Theory and Applications of Cryptographic Techniques,
Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
pages = {193--221},
year = {2018},
crossref = {DBLP:conf/eurocrypt/2018-3},
url = {https://doi.org/10.1007/978-3-319-78372-7\_7},
doi = {10.1007/978-3-319-78372-7\_7},
timestamp = {Mon, 16 Apr 2018 14:12:13 +0200},
biburl = {https://dblp.org/rec/bib/conf/eurocrypt/ChaidosC18},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleCGIO18,
author = {Elette Boyle and
Geoffroy Couteau and
Niv Gilboa and
Yuval Ishai and
Michele Orr{\`{u}}},
title = {Homomorphic Secret Sharing: Optimizations and Applications},
journal = {{IACR} Cryptology ePrint Archive},
volume = {2018},
pages = {419},
year = {2018},
url = {https://eprint.iacr.org/2018/419},
timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/iacr/BoyleCGIO18},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Couteau18,
author = {Geoffroy Couteau},
title = {A Note on the Communication Complexity of Multiparty Computation in
the Correlated Randomness Model},
journal = {{IACR} Cryptology ePrint Archive},
volume = {2018},
pages = {465},
year = {2018},
url = {https://eprint.iacr.org/2018/465},
timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/iacr/Couteau18},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrikolaCH18,
author = {Thomas Agrikola and
Geoffroy Couteau and
Dennis Hofheinz},
title = {The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential
iO},
journal = {{IACR} Cryptology ePrint Archive},
volume = {2018},
pages = {470},
year = {2018},
url = {https://eprint.iacr.org/2018/470},
timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/iacr/AgrikolaCH18},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauDMRR18,
author = {Geoffroy Couteau and
Aur{\'{e}}lien Dupin and
Pierrick M{\'{e}}aux and
M{\'{e}}lissa Rossi and
Yann Rotella},
title = {On the Concrete Security of Goldreich's Pseudorandom Generator},
journal = {{IACR} Cryptology ePrint Archive},
volume = {2018},
pages = {1162},
year = {2018},
url = {https://eprint.iacr.org/2018/1162},
timestamp = {Tue, 11 Dec 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/journals/iacr/CouteauDMRR18},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Couteau17,
author = {Geoffroy Couteau},
title = {Zero-Knowledge Proofs for Secure Computation. (Preuves {\`{a}} divulgation
nulle pour le calcul s{\'{e}}curis{\'{e}})},
school = {{PSL} Research University, Paris, France},
year = {2017},
url = {https://tel.archives-ouvertes.fr/tel-01668125},
timestamp = {Wed, 10 Jan 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/phd/hal/Couteau17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoyleCGIO17,
author = {Elette Boyle and
Geoffroy Couteau and
Niv Gilboa and
Yuval Ishai and
Michele Orr{\`{u}}},
title = {Homomorphic Secret Sharing: Optimizations and Applications},
booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
November 03, 2017},
pages = {2105--2122},
year = {2017},
crossref = {DBLP:conf/ccs/2017},
url = {https://doi.org/10.1145/3133956.3134107},
doi = {10.1145/3133956.3134107},
timestamp = {Tue, 06 Nov 2018 11:07:28 +0100},
biburl = {https://dblp.org/rec/bib/conf/ccs/BoyleCGIO17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CouteauPP17,
author = {Geoffroy Couteau and
Thomas Peters and
David Pointcheval},
title = {Removing the Strong {RSA} Assumption from Arguments over the Integers},
booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
Conference on the Theory and Applications of Cryptographic Techniques,
Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}},
pages = {321--350},
year = {2017},
crossref = {DBLP:conf/eurocrypt/2017-2},
url = {https://doi.org/10.1007/978-3-319-56614-6\_11},
doi = {10.1007/978-3-319-56614-6\_11},
timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/eurocrypt/CouteauPP17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaidosC17,
author = {Pyrros Chaidos and
Geoffroy Couteau},
title = {Efficient Designated-Verifier Non-Interactive Zero-Knowledge Proofs
of Knowledge},
journal = {{IACR} Cryptology ePrint Archive},
volume = {2017},
pages = {1029},
year = {2017},
url = {http://eprint.iacr.org/2017/1029},
timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/iacr/ChaidosC17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CouteauPP16,
author = {Geoffroy Couteau and
Thomas Peters and
David Pointcheval},
title = {Encryption Switching Protocols},
booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
Proceedings, Part {I}},
pages = {308--338},
year = {2016},
crossref = {DBLP:conf/crypto/2016-1},
url = {https://doi.org/10.1007/978-3-662-53018-4\_12},
doi = {10.1007/978-3-662-53018-4\_12},
timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/crypto/CouteauPP16},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauPP16,
author = {Geoffroy Couteau and
Thomas Peters and
David Pointcheval},
title = {Removing the Strong {RSA} Assumption from Arguments over the Integers},
journal = {{IACR} Cryptology ePrint Archive},
volume = {2016},
pages = {128},
year = {2016},
url = {http://eprint.iacr.org/2016/128},
timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/iacr/CouteauPP16},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Couteau16,
author = {Geoffroy Couteau},
title = {Efficient Secure Comparison Protocols},
journal = {{IACR} Cryptology ePrint Archive},
volume = {2016},
pages = {544},
year = {2016},
url = {http://eprint.iacr.org/2016/544},
timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/iacr/Couteau16},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Couteau16a,
author = {Geoffroy Couteau},
title = {Revisiting Covert Multiparty Computation},
journal = {{IACR} Cryptology ePrint Archive},
volume = {2016},
pages = {951},
year = {2016},
url = {http://eprint.iacr.org/2016/951},
timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/iacr/Couteau16a},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BenhamoudaCPW15,
author = {Fabrice Benhamouda and
Geoffroy Couteau and
David Pointcheval and
Hoeteck Wee},
title = {Implicit Zero-Knowledge Arguments and Applications to the Malicious
Setting},
booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
pages = {107--129},
year = {2015},
crossref = {DBLP:conf/crypto/2015-2},
url = {https://doi.org/10.1007/978-3-662-48000-7\_6},
doi = {10.1007/978-3-662-48000-7\_6},
timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/crypto/BenhamoudaCPW15},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/CouteauPP15,
author = {Geoffroy Couteau and
Thomas Peters and
David Pointcheval},
title = {Secure Distributed Computation on Private Inputs},
booktitle = {Foundations and Practice of Security - 8th International Symposium,
{FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised
Selected Papers},
pages = {14--26},
year = {2015},
crossref = {DBLP:conf/fps/2015},
url = {https://doi.org/10.1007/978-3-319-30303-1\_2},
doi = {10.1007/978-3-319-30303-1\_2},
timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/fps/CouteauPP15},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaCPW15,
author = {Fabrice Benhamouda and
Geoffroy Couteau and
David Pointcheval and
Hoeteck Wee},
title = {Implicit Zero-Knowledge Arguments and Applications to the Malicious
Setting},
journal = {{IACR} Cryptology ePrint Archive},
volume = {2015},
pages = {246},
year = {2015},
url = {http://eprint.iacr.org/2015/246},
timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/iacr/BenhamoudaCPW15},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauPP15,
author = {Geoffroy Couteau and
Thomas Peters and
David Pointcheval},
title = {Encryption Switching Protocols},
journal = {{IACR} Cryptology ePrint Archive},
volume = {2015},
pages = {990},
year = {2015},
url = {http://eprint.iacr.org/2015/990},
timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/iacr/CouteauPP15},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauPP15a,
author = {Geoffroy Couteau and
Thomas Peters and
David Pointcheval},
title = {Secure Distributed Computation on Private Inputs},
journal = {{IACR} Cryptology ePrint Archive},
volume = {2015},
pages = {1196},
year = {2015},
url = {http://eprint.iacr.org/2015/1196},
timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/iacr/CouteauPP15a},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2018,
editor = {Bart Preneel and
Frederik Vercauteren},
title = {Applied Cryptography and Network Security - 16th International Conference,
{ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {10892},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-319-93387-0},
doi = {10.1007/978-3-319-93387-0},
isbn = {978-3-319-93386-3},
timestamp = {Wed, 13 Jun 2018 13:59:55 +0200},
biburl = {https://dblp.org/rec/bib/conf/acns/2018},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2018-2,
editor = {Thomas Peyrin and
Steven D. Galbraith},
title = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
on the Theory and Application of Cryptology and Information Security,
Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}},
series = {Lecture Notes in Computer Science},
volume = {11273},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-030-03329-3},
doi = {10.1007/978-3-030-03329-3},
isbn = {978-3-030-03328-6},
timestamp = {Thu, 22 Nov 2018 11:22:38 +0100},
biburl = {https://dblp.org/rec/bib/conf/asiacrypt/2018-2},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2018,
editor = {David Lie and
Mohammad Mannan and
Michael Backes and
XiaoFeng Wang},
title = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
Communications Security, {CCS} 2018, Toronto, ON, Canada, October
15-19, 2018},
publisher = {{ACM}},
year = {2018},
url = {http://dl.acm.org/citation.cfm?id=3243734},
isbn = {978-1-4503-5693-0},
timestamp = {Wed, 31 Oct 2018 17:23:34 +0100},
biburl = {https://dblp.org/rec/bib/conf/ccs/2018},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2018-3,
editor = {Jesper Buus Nielsen and
Vincent Rijmen},
title = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
Conference on the Theory and Applications of Cryptographic Techniques,
Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
series = {Lecture Notes in Computer Science},
volume = {10822},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-319-78372-7},
doi = {10.1007/978-3-319-78372-7},
isbn = {978-3-319-78371-0},
timestamp = {Mon, 16 Apr 2018 14:12:13 +0200},
biburl = {https://dblp.org/rec/bib/conf/eurocrypt/2018-3},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017,
editor = {Bhavani M. Thuraisingham and
David Evans and
Tal Malkin and
Dongyan Xu},
title = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
November 03, 2017},
publisher = {{ACM}},
year = {2017},
url = {https://doi.org/10.1145/3133956},
doi = {10.1145/3133956},
isbn = {978-1-4503-4946-8},
timestamp = {Tue, 06 Nov 2018 11:07:28 +0100},
biburl = {https://dblp.org/rec/bib/conf/ccs/2017},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2017-2,
editor = {Jean{-}S{\'{e}}bastien Coron and
Jesper Buus Nielsen},
title = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
Conference on the Theory and Applications of Cryptographic Techniques,
Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}},
series = {Lecture Notes in Computer Science},
volume = {10211},
year = {2017},
url = {https://doi.org/10.1007/978-3-319-56614-6},
doi = {10.1007/978-3-319-56614-6},
isbn = {978-3-319-56613-9},
timestamp = {Sat, 16 Sep 2017 12:12:20 +0200},
biburl = {https://dblp.org/rec/bib/conf/eurocrypt/2017-2},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2016-1,
editor = {Matthew Robshaw and
Jonathan Katz},
title = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
Proceedings, Part {I}},
series = {Lecture Notes in Computer Science},
volume = {9814},
publisher = {Springer},
year = {2016},
url = {https://doi.org/10.1007/978-3-662-53018-4},
doi = {10.1007/978-3-662-53018-4},
isbn = {978-3-662-53017-7},
timestamp = {Fri, 26 May 2017 00:50:20 +0200},
biburl = {https://dblp.org/rec/bib/conf/crypto/2016-1},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2015-2,
editor = {Rosario Gennaro and
Matthew Robshaw},
title = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
series = {Lecture Notes in Computer Science},
volume = {9216},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-662-48000-7},
doi = {10.1007/978-3-662-48000-7},
isbn = {978-3-662-47999-5},
timestamp = {Fri, 26 May 2017 00:50:20 +0200},
biburl = {https://dblp.org/rec/bib/conf/crypto/2015-2},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fps/2015,
editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
Evangelos Kranakis and
Guillaume Bonfante},
title = {Foundations and Practice of Security - 8th International Symposium,
{FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised
Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {9482},
publisher = {Springer},
year = {2016},
url = {https://doi.org/10.1007/978-3-319-30303-1},
doi = {10.1007/978-3-319-30303-1},
isbn = {978-3-319-30302-4},
timestamp = {Wed, 24 May 2017 08:29:32 +0200},
biburl = {https://dblp.org/rec/bib/conf/fps/2015},
bibsource = {dblp computer science bibliography, https://dblp.org}
}