Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Thomas Peters
@inproceedings{DBLP:conf/acns/DoanPP24, author = {Thi Van Thao Doan and Olivier Pereira and Thomas Peters}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable Elections}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, pages = {257--287}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6\_11}, doi = {10.1007/978-3-031-54770-6\_11}, timestamp = {Mon, 11 Mar 2024 15:20:49 +0100}, biburl = {https://dblp.org/rec/conf/acns/DoanPP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PetersSS24, author = {Thomas Peters and Yaobin Shen and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {294}, year = {2024}, url = {https://eprint.iacr.org/2024/294}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PetersSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cea/RamZCAPJHS23, author = {Billy G. Ram and Yu Zhang and Cristiano Costa and Mohammed Raju Ahmed and Thomas Peters and Amit Jhala and Kirk Howatt and Xin Sun}, title = {Palmer amaranth identification using hyperspectral imaging and machine learning technologies in soybean field}, journal = {Comput. Electron. Agric.}, volume = {215}, pages = {108444}, year = {2023}, url = {https://doi.org/10.1016/j.compag.2023.108444}, doi = {10.1016/J.COMPAG.2023.108444}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cea/RamZCAPJHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BertiGPSS23, author = {Francesco Berti and Chun Guo and Thomas Peters and Yaobin Shen and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Secure Message Authentication in the Presence of Leakage and Faults}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {1}, pages = {288--315}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i1.288-315}, doi = {10.46586/TOSC.V2023.I1.288-315}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BertiGPSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HoffmannLMPS23, author = {Cl{\'{e}}ment Hoffmann and Beno{\^{\i}}t Libert and Charles Momin and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {{POLKA:} Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {114--144}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_5}, doi = {10.1007/978-3-031-31368-4\_5}, timestamp = {Fri, 05 May 2023 22:44:30 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HoffmannLMPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ShenPSCV22, author = {Yaobin Shen and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert and Ga{\"{e}}tan Cassiers and Corentin Verhamme}, title = {Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {135--162}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.135-162}, doi = {10.46586/TCHES.V2022.I4.135-162}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ShenPSCV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DevillezPP22, author = {Henri Devillez and Olivier Pereira and Thomas Peters}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Traceable Receipt-Free Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13793}, pages = {273--303}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22969-5\_10}, doi = {10.1007/978-3-031-22969-5\_10}, timestamp = {Fri, 03 Feb 2023 17:07:14 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/DevillezPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DevillezPP22, author = {Henri Devillez and Olivier Pereira and Thomas Peters}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {How to Verifiably Encrypt Many Bits for an Election?}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13555}, pages = {653--671}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17146-8\_32}, doi = {10.1007/978-3-031-17146-8\_32}, timestamp = {Tue, 27 Sep 2022 21:07:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DevillezPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LibertNPY22, author = {Beno{\^{\i}}t Libert and Khoa Nguyen and Thomas Peters and Moti Yung}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {One-Shot Fiat-Shamir-Based {NIZK} Arguments of Composite Residuosity and Logarithmic-Size Ring Signatures in the Standard Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {488--519}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_17}, doi = {10.1007/978-3-031-07085-3\_17}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/LibertNPY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DeveveyLP22, author = {Julien Devevey and Beno{\^{\i}}t Libert and Thomas Peters}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Rational Modular Encoding in the {DCR} Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {615--646}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_22}, doi = {10.1007/978-3-030-97121-2\_22}, timestamp = {Thu, 10 Mar 2022 11:26:10 +0100}, biburl = {https://dblp.org/rec/conf/pkc/DeveveyLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DevillezPP22, author = {Henri Devillez and Olivier Pereira and Thomas Peters}, title = {Traceable Receipt-Free Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {822}, year = {2022}, url = {https://eprint.iacr.org/2022/822}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DevillezPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoffmannLMPS22, author = {Cl{\'{e}}ment Hoffmann and Beno{\^{\i}}t Libert and Charles Momin and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Towards Leakage-Resistant Post-Quantum CCA-Secure Public Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {873}, year = {2022}, url = {https://eprint.iacr.org/2022/873}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoffmannLMPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DevillezPP22a, author = {Henri Devillez and Olivier Pereira and Thomas Peters}, title = {How to Verifiably Encrypt Many Bits for an Election?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1051}, year = {2022}, url = {https://eprint.iacr.org/2022/1051}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DevillezPP22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Berti0PSS22, author = {Francesco Berti and Chun Guo and Thomas Peters and Yaobin Shen and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Secure Message Authentication in the Presence of Leakage and Faults}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1142}, year = {2022}, url = {https://eprint.iacr.org/2022/1142}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Berti0PSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BronchainMPS21, author = {Olivier Bronchain and Charles Momin and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Improved Leakage-Resistant Authenticated Encryption based on Hardware {AES} Coprocessors}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {641--676}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.641-676}, doi = {10.46586/TCHES.V2021.I3.641-676}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BronchainMPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BertiGPS21, author = {Francesco Berti and Chun Guo and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Efficient Leakage-Resilient MACs Without Idealized Assumptions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13091}, pages = {95--123}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92075-3\_4}, doi = {10.1007/978-3-030-92075-3\_4}, timestamp = {Fri, 03 Dec 2021 17:36:49 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BertiGPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LibertNPY21, author = {Beno{\^{\i}}t Libert and Khoa Nguyen and Thomas Peters and Moti Yung}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Bifurcated Signatures: Folding the Accountability vs. Anonymity Dilemma into a Single Private Signing Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {521--552}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_18}, doi = {10.1007/978-3-030-77883-5\_18}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/LibertNPY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DeveveyLNPY21, author = {Julien Devevey and Beno{\^{\i}}t Libert and Khoa Nguyen and Thomas Peters and Moti Yung}, editor = {Juan A. Garay}, title = {Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {659--690}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_24}, doi = {10.1007/978-3-030-75245-3\_24}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/DeveveyLNPY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeveveyLNPY21, author = {Julien Devevey and Beno{\^{\i}}t Libert and Khoa Nguyen and Thomas Peters and Moti Yung}, title = {Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {630}, year = {2021}, url = {https://eprint.iacr.org/2021/630}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DeveveyLNPY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertiGPS21, author = {Francesco Berti and Chun Guo and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Efficient Leakage-Resilient MACs without Idealized Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1250}, year = {2021}, url = {https://eprint.iacr.org/2021/1250}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertiGPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BertiGPPS20, author = {Francesco Berti and Chun Guo and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {TEDT, a Leakage-Resist {AEAD} Mode for High Physical Security Applications}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {1}, pages = {256--320}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i1.256-320}, doi = {10.13154/TCHES.V2020.I1.256-320}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/BertiGPPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GuoPPS20, author = {Chun Guo and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {1}, pages = {6--42}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i1.6-42}, doi = {10.13154/TOSC.V2020.I1.6-42}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/GuoPPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BelliziaBBCDGLL20, author = {Davide Bellizia and Francesco Berti and Olivier Bronchain and Ga{\"{e}}tan Cassiers and S{\'{e}}bastien Duval and Chun Guo and Gregor Leander and Ga{\"{e}}tan Leurent and Itamar Levi and Charles Momin and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert and Balazs Udvarhelyi and Friedrich Wiemer}, title = {Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {295--349}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.295-349}, doi = {10.13154/TOSC.V2020.IS1.295-349}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BelliziaBBCDGLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BelliziaBCGGMPP20, author = {Davide Bellizia and Olivier Bronchain and Ga{\"{e}}tan Cassiers and Vincent Grosso and Chun Guo and Charles Momin and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography - {A} Practical Guide Through the Leakage-Resistance Jungle}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {369--400}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_13}, doi = {10.1007/978-3-030-56784-2\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BelliziaBCGGMPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BelliziaBCGGMPP20, author = {Davide Bellizia and Olivier Bronchain and Ga{\"{e}}tan Cassiers and Vincent Grosso and Chun Guo and Charles Momin and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: {A} Practical Guide Through the Leakage-Resistance Jungle}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {211}, year = {2020}, url = {https://eprint.iacr.org/2020/211}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BelliziaBCGGMPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertNPY20, author = {Beno{\^{\i}}t Libert and Khoa Nguyen and Thomas Peters and Moti Yung}, title = {Compact Simulation-Sound {NIZK} Arguments of Composite Residuosity and Applications to Logarithmic-Size Ring Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1334}, year = {2020}, url = {https://eprint.iacr.org/2020/1334}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LibertNPY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/BertiGPPS19, author = {Francesco Berti and Chun Guo and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Zhe Liu and Moti Yung}, title = {Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions}, booktitle = {Information Security and Cryptology - 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12020}, pages = {517--532}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42921-8\_31}, doi = {10.1007/978-3-030-42921-8\_31}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/BertiGPPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/GuoPPS19, author = {Chun Guo and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Peter Schwabe and Nicolas Th{\'{e}}riault}, title = {Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract)}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2-4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11774}, pages = {150--172}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30530-7\_8}, doi = {10.1007/978-3-030-30530-7\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/GuoPPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/CassiersGPPS19, author = {Ga{\"{e}}tan Cassiers and Chun Guo and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Shivam Bhasin and Avi Mendelson and Mridul Nandi}, title = {SpookChain: Chaining a Sponge-Based {AEAD} with Beyond-Birthday Security}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, {SPACE} 2019, Gandhinagar, India, December 3-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11947}, pages = {67--85}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35869-3\_7}, doi = {10.1007/978-3-030-35869-3\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/space/CassiersGPPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertiGPPS19, author = {Francesco Berti and Chun Guo and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {TEDT, a Leakage-Resilient {AEAD} mode for High (Physical) Security Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {137}, year = {2019}, url = {https://eprint.iacr.org/2019/137}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BertiGPPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoPPS19, author = {Chun Guo and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {193}, year = {2019}, url = {https://eprint.iacr.org/2019/193}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GuoPPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertiGPPS19a, author = {Francesco Berti and Chun Guo and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1413}, year = {2019}, url = {https://eprint.iacr.org/2019/1413}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BertiGPPS19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BertiKPPS18, author = {Francesco Berti and Fran{\c{c}}ois Koeune and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {37--50}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196525}, doi = {10.1145/3196494.3196525}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BertiKPPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LibertP018, author = {Beno{\^{\i}}t Libert and Thomas Peters and Chen Qian}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Logarithmic-Size Ring Signatures with Tight Security from the {DDH} Assumption}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {288--308}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_15}, doi = {10.1007/978-3-319-98989-1\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LibertP018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BertiPP18, author = {Francesco Berti and Olivier Pereira and Thomas Peters}, editor = {Debrup Chakraborty and Tetsu Iwata}, title = {Reconsidering Generic Composition: The Tag-then-Encrypt Case}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2018 - 19th International Conference on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11356}, pages = {70--90}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05378-9\_4}, doi = {10.1007/978-3-030-05378-9\_4}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BertiPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoPPS18, author = {Chun Guo and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {484}, year = {2018}, url = {https://eprint.iacr.org/2018/484}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GuoPPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertiPP18, author = {Francesco Berti and Olivier Pereira and Thomas Peters}, title = {Reconsidering Generic Composition: the Tag-then-Encrypt case}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {991}, year = {2018}, url = {https://eprint.iacr.org/2018/991}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertiPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BertiPPS17, author = {Francesco Berti and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {On Leakage-Resilient Authenticated Encryption with Decryption Leakages}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {3}, pages = {271--293}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i3.271-293}, doi = {10.13154/TOSC.V2017.I3.271-293}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BertiPPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CouteauPP17, author = {Geoffroy Couteau and Thomas Peters and David Pointcheval}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Removing the Strong {RSA} Assumption from Arguments over the Integers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {321--350}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_11}, doi = {10.1007/978-3-319-56614-6\_11}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CouteauPP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertPQ17, author = {Beno{\^{\i}}t Libert and Thomas Peters and Chen Qian}, editor = {Serge Fehr}, title = {Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {247--276}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_11}, doi = {10.1007/978-3-662-54365-8\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LibertPQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LibertMPY16, author = {Beno{\^{\i}}t Libert and Fabrice Mouhartem and Thomas Peters and Moti Yung}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {Practical "Signatures with Efficient Protocols" from Simple Assumptions}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {511--522}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897898}, doi = {10.1145/2897845.2897898}, timestamp = {Mon, 25 Apr 2022 08:42:03 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LibertMPY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CouteauPP16, author = {Geoffroy Couteau and Thomas Peters and David Pointcheval}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Encryption Switching Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {308--338}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_12}, doi = {10.1007/978-3-662-53018-4\_12}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CouteauPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CouteauPP16, author = {Geoffroy Couteau and Thomas Peters and David Pointcheval}, title = {Removing the Strong {RSA} Assumption from Arguments over the Integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {128}, year = {2016}, url = {http://eprint.iacr.org/2016/128}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CouteauPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertiKPPS16, author = {Francesco Berti and Fran{\c{c}}ois Koeune and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Leakage-Resilient and Misuse-Resistant Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {996}, year = {2016}, url = {http://eprint.iacr.org/2016/996}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertiKPPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LibertPJY15, author = {Beno{\^{\i}}t Libert and Thomas Peters and Marc Joye and Moti Yung}, title = {Linearly homomorphic structure-preserving signatures and their applications}, journal = {Des. Codes Cryptogr.}, volume = {77}, number = {2-3}, pages = {441--477}, year = {2015}, url = {https://doi.org/10.1007/s10623-015-0079-1}, doi = {10.1007/S10623-015-0079-1}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LibertPJY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LibertPJY15, author = {Beno{\^{\i}}t Libert and Thomas Peters and Marc Joye and Moti Yung}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Compactly Hiding Linear Spans - Tightly Secure Constant-Size Simulation-Sound {QA-NIZK} Proofs and Applications}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9452}, pages = {681--707}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48797-6\_28}, doi = {10.1007/978-3-662-48797-6\_28}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/LibertPJY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LibertPY15, author = {Beno{\^{\i}}t Libert and Thomas Peters and Moti Yung}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {296--316}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_15}, doi = {10.1007/978-3-662-48000-7\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LibertPY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/CouteauPP15, author = {Geoffroy Couteau and Thomas Peters and David Pointcheval}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Evangelos Kranakis and Guillaume Bonfante}, title = {Secure Distributed Computation on Private Inputs}, booktitle = {Foundations and Practice of Security - 8th International Symposium, {FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9482}, pages = {14--26}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-30303-1\_2}, doi = {10.1007/978-3-319-30303-1\_2}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/CouteauPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertJYP15, author = {Beno{\^{\i}}t Libert and Marc Joye and Moti Yung and Thomas Peters}, editor = {Jonathan Katz}, title = {Secure Efficient History-Hiding Append-Only Signatures in the Standard Model}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {450--473}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_20}, doi = {10.1007/978-3-662-46447-2\_20}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LibertJYP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertPJY15, author = {Beno{\^{\i}}t Libert and Thomas Peters and Marc Joye and Moti Yung}, title = {Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound {QA-NIZK} Proofs and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {242}, year = {2015}, url = {http://eprint.iacr.org/2015/242}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertPJY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertPY15, author = {Beno{\^{\i}}t Libert and Thomas Peters and Moti Yung}, title = {Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {743}, year = {2015}, url = {http://eprint.iacr.org/2015/743}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertPY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CouteauPP15, author = {Geoffroy Couteau and Thomas Peters and David Pointcheval}, title = {Encryption Switching Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {990}, year = {2015}, url = {http://eprint.iacr.org/2015/990}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CouteauPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CouteauPP15a, author = {Geoffroy Couteau and Thomas Peters and David Pointcheval}, title = {Secure Distributed Computation on Private Inputs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1196}, year = {2015}, url = {http://eprint.iacr.org/2015/1196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CouteauPP15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Peters14, author = {Thomas Peters}, title = {Privacy enhancing cryptographic mechanisms with public verifiability}, school = {Catholic University of Louvain, Louvain-la-Neuve, Belgium}, year = {2014}, url = {https://hdl.handle.net/2078.1/144019}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Peters14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LibertJYP14, author = {Beno{\^{\i}}t Libert and Marc Joye and Moti Yung and Thomas Peters}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8874}, pages = {1--21}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45608-8\_1}, doi = {10.1007/978-3-662-45608-8\_1}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/LibertJYP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LibertPJY14, author = {Beno{\^{\i}}t Libert and Thomas Peters and Marc Joye and Moti Yung}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive {NIZK} Proofs and CCA2-Secure Encryption from Homomorphic Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {514--532}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_29}, doi = {10.1007/978-3-642-55220-5\_29}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LibertPJY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertYJP14, author = {Beno{\^{\i}}t Libert and Moti Yung and Marc Joye and Thomas Peters}, editor = {Hugo Krawczyk}, title = {Traceable Group Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {592--610}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_34}, doi = {10.1007/978-3-642-54631-0\_34}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LibertYJP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Peters14, author = {Thomas Peters}, title = {The physics of volume rendering}, journal = {CoRR}, volume = {abs/1410.6022}, year = {2014}, url = {http://arxiv.org/abs/1410.6022}, eprinttype = {arXiv}, eprint = {1410.6022}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Peters14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertJYP14, author = {Beno{\^{\i}}t Libert and Marc Joye and Moti Yung and Thomas Peters}, title = {Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {743}, year = {2014}, url = {http://eprint.iacr.org/2014/743}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertJYP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LibertPJY13, author = {Beno{\^{\i}}t Libert and Thomas Peters and Marc Joye and Moti Yung}, editor = {Ran Canetti and Juan A. Garay}, title = {Linearly Homomorphic Structure-Preserving Signatures and Their Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {289--307}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_17}, doi = {10.1007/978-3-642-40084-1\_17}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LibertPJY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CuvelierPP13, author = {Edouard Cuvelier and Olivier Pereira and Thomas Peters}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Election Verifiability or Ballot Privacy: Do We Need to Choose?}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {481--498}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_27}, doi = {10.1007/978-3-642-40203-6\_27}, timestamp = {Wed, 25 Sep 2019 18:03:15 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CuvelierPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/CanardCDGPS13, author = {S{\'{e}}bastien Canard and Iwen Coisel and Julien Devigne and C{\'{e}}cilia Gallais and Thomas Peters and Olivier Sanders}, editor = {Sihan Qing and Jianying Zhou and Dongmei Liu}, title = {Toward Generic Method for Server-Aided Cryptography}, booktitle = {Information and Communications Security - 15th International Conference, {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8233}, pages = {373--392}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02726-5\_27}, doi = {10.1007/978-3-319-02726-5\_27}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/CanardCDGPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AttrapadungLP13, author = {Nuttapong Attrapadung and Beno{\^{\i}}t Libert and Thomas Peters}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {386--404}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_24}, doi = {10.1007/978-3-642-36362-7\_24}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AttrapadungLP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CuvelierPP13, author = {Edouard Cuvelier and Olivier Pereira and Thomas Peters}, title = {Election Verifiability or Ballot Privacy: Do We Need to Choose?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {216}, year = {2013}, url = {http://eprint.iacr.org/2013/216}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CuvelierPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertPJY13, author = {Beno{\^{\i}}t Libert and Thomas Peters and Marc Joye and Moti Yung}, title = {Linearly Homomorphic Structure-Preserving Signatures and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {361}, year = {2013}, url = {http://eprint.iacr.org/2013/361}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertPJY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertPJY13a, author = {Beno{\^{\i}}t Libert and Thomas Peters and Marc Joye and Moti Yung}, title = {Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive {NIZK} Proofs and CCA2-Secure Encryption from Homomorphic Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {691}, year = {2013}, url = {http://eprint.iacr.org/2013/691}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertPJY13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AttrapadungLP12, author = {Nuttapong Attrapadung and Beno{\^{\i}}t Libert and Thomas Peters}, editor = {Xiaoyun Wang and Kazue Sako}, title = {Computing on Authenticated Data: New Privacy Definitions and Constructions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {367--385}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_23}, doi = {10.1007/978-3-642-34961-4\_23}, timestamp = {Mon, 25 Nov 2019 15:32:14 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AttrapadungLP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LibertPY12, author = {Beno{\^{\i}}t Libert and Thomas Peters and Moti Yung}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Group Signatures with Almost-for-Free Revocation}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {571--589}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_34}, doi = {10.1007/978-3-642-32009-5\_34}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LibertPY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LibertPY12, author = {Beno{\^{\i}}t Libert and Thomas Peters and Moti Yung}, editor = {David Pointcheval and Thomas Johansson}, title = {Scalable Group Signatures with Revocation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {609--627}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_36}, doi = {10.1007/978-3-642-29011-4\_36}, timestamp = {Sun, 12 Nov 2023 02:15:08 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/LibertPY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertPY12, author = {Beno{\^{\i}}t Libert and Thomas Peters and Moti Yung}, title = {Scalable Group Signatures with Revocation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {424}, year = {2012}, url = {http://eprint.iacr.org/2012/424}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertPY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertPY12a, author = {Beno{\^{\i}}t Libert and Thomas Peters and Moti Yung}, title = {Group Signatures with Almost-for-free Revocation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {442}, year = {2012}, url = {http://eprint.iacr.org/2012/442}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertPY12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.