BibTeX records: Thomas Peters

download as .bib file

@inproceedings{DBLP:conf/acns/DoanPP24,
  author       = {Thi Van Thao Doan and
                  Olivier Pereira and
                  Thomas Peters},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable
                  Elections},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  pages        = {257--287},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6\_11},
  doi          = {10.1007/978-3-031-54770-6\_11},
  timestamp    = {Mon, 11 Mar 2024 15:20:49 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/DoanPP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PetersSS24,
  author       = {Thomas Peters and
                  Yaobin Shen and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {294},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/294},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PetersSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cea/RamZCAPJHS23,
  author       = {Billy G. Ram and
                  Yu Zhang and
                  Cristiano Costa and
                  Mohammed Raju Ahmed and
                  Thomas Peters and
                  Amit Jhala and
                  Kirk Howatt and
                  Xin Sun},
  title        = {Palmer amaranth identification using hyperspectral imaging and machine
                  learning technologies in soybean field},
  journal      = {Comput. Electron. Agric.},
  volume       = {215},
  pages        = {108444},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compag.2023.108444},
  doi          = {10.1016/J.COMPAG.2023.108444},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cea/RamZCAPJHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BertiGPSS23,
  author       = {Francesco Berti and
                  Chun Guo and
                  Thomas Peters and
                  Yaobin Shen and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Secure Message Authentication in the Presence of Leakage and Faults},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {1},
  pages        = {288--315},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i1.288-315},
  doi          = {10.46586/TOSC.V2023.I1.288-315},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BertiGPSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HoffmannLMPS23,
  author       = {Cl{\'{e}}ment Hoffmann and
                  Beno{\^{\i}}t Libert and
                  Charles Momin and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {{POLKA:} Towards Leakage-Resistant Post-quantum CCA-Secure Public
                  Key Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {114--144},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_5},
  doi          = {10.1007/978-3-031-31368-4\_5},
  timestamp    = {Fri, 05 May 2023 22:44:30 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HoffmannLMPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ShenPSCV22,
  author       = {Yaobin Shen and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Ga{\"{e}}tan Cassiers and
                  Corentin Verhamme},
  title        = {Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {135--162},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.135-162},
  doi          = {10.46586/TCHES.V2022.I4.135-162},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ShenPSCV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DevillezPP22,
  author       = {Henri Devillez and
                  Olivier Pereira and
                  Thomas Peters},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Traceable Receipt-Free Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13793},
  pages        = {273--303},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22969-5\_10},
  doi          = {10.1007/978-3-031-22969-5\_10},
  timestamp    = {Fri, 03 Feb 2023 17:07:14 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DevillezPP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DevillezPP22,
  author       = {Henri Devillez and
                  Olivier Pereira and
                  Thomas Peters},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {How to Verifiably Encrypt Many Bits for an Election?},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13555},
  pages        = {653--671},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17146-8\_32},
  doi          = {10.1007/978-3-031-17146-8\_32},
  timestamp    = {Tue, 27 Sep 2022 21:07:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DevillezPP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LibertNPY22,
  author       = {Beno{\^{\i}}t Libert and
                  Khoa Nguyen and
                  Thomas Peters and
                  Moti Yung},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {One-Shot Fiat-Shamir-Based {NIZK} Arguments of Composite Residuosity
                  and Logarithmic-Size Ring Signatures in the Standard Model},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13276},
  pages        = {488--519},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07085-3\_17},
  doi          = {10.1007/978-3-031-07085-3\_17},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LibertNPY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DeveveyLP22,
  author       = {Julien Devevey and
                  Beno{\^{\i}}t Libert and
                  Thomas Peters},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Rational Modular Encoding in the {DCR} Setting: Non-interactive Range
                  Proofs and Paillier-Based Naor-Yung in the Standard Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {615--646},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_22},
  doi          = {10.1007/978-3-030-97121-2\_22},
  timestamp    = {Thu, 10 Mar 2022 11:26:10 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/DeveveyLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DevillezPP22,
  author       = {Henri Devillez and
                  Olivier Pereira and
                  Thomas Peters},
  title        = {Traceable Receipt-Free Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {822},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/822},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DevillezPP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoffmannLMPS22,
  author       = {Cl{\'{e}}ment Hoffmann and
                  Beno{\^{\i}}t Libert and
                  Charles Momin and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Towards Leakage-Resistant Post-Quantum CCA-Secure Public Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {873},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/873},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoffmannLMPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DevillezPP22a,
  author       = {Henri Devillez and
                  Olivier Pereira and
                  Thomas Peters},
  title        = {How to Verifiably Encrypt Many Bits for an Election?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1051},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1051},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DevillezPP22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Berti0PSS22,
  author       = {Francesco Berti and
                  Chun Guo and
                  Thomas Peters and
                  Yaobin Shen and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Secure Message Authentication in the Presence of Leakage and Faults},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1142},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1142},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Berti0PSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BronchainMPS21,
  author       = {Olivier Bronchain and
                  Charles Momin and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Improved Leakage-Resistant Authenticated Encryption based on Hardware
                  {AES} Coprocessors},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {641--676},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.641-676},
  doi          = {10.46586/TCHES.V2021.I3.641-676},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BronchainMPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BertiGPS21,
  author       = {Francesco Berti and
                  Chun Guo and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Efficient Leakage-Resilient MACs Without Idealized Assumptions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13091},
  pages        = {95--123},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92075-3\_4},
  doi          = {10.1007/978-3-030-92075-3\_4},
  timestamp    = {Fri, 03 Dec 2021 17:36:49 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BertiGPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LibertNPY21,
  author       = {Beno{\^{\i}}t Libert and
                  Khoa Nguyen and
                  Thomas Peters and
                  Moti Yung},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Bifurcated Signatures: Folding the Accountability vs. Anonymity Dilemma
                  into a Single Private Signing Scheme},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12698},
  pages        = {521--552},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77883-5\_18},
  doi          = {10.1007/978-3-030-77883-5\_18},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LibertNPY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DeveveyLNPY21,
  author       = {Julien Devevey and
                  Beno{\^{\i}}t Libert and
                  Khoa Nguyen and
                  Thomas Peters and
                  Moti Yung},
  editor       = {Juan A. Garay},
  title        = {Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive
                  Security in the Standard Model Without Pairings},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {659--690},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_24},
  doi          = {10.1007/978-3-030-75245-3\_24},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/DeveveyLNPY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeveveyLNPY21,
  author       = {Julien Devevey and
                  Beno{\^{\i}}t Libert and
                  Khoa Nguyen and
                  Thomas Peters and
                  Moti Yung},
  title        = {Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive
                  Security in the Standard Model Without Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {630},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/630},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DeveveyLNPY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertiGPS21,
  author       = {Francesco Berti and
                  Chun Guo and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Efficient Leakage-Resilient MACs without Idealized Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1250},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1250},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertiGPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BertiGPPS20,
  author       = {Francesco Berti and
                  Chun Guo and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {TEDT, a Leakage-Resist {AEAD} Mode for High Physical Security Applications},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {1},
  pages        = {256--320},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i1.256-320},
  doi          = {10.13154/TCHES.V2020.I1.256-320},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/BertiGPPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GuoPPS20,
  author       = {Chun Guo and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Towards Low-Energy Leakage-Resistant Authenticated Encryption from
                  the Duplex Sponge Construction},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {1},
  pages        = {6--42},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i1.6-42},
  doi          = {10.13154/TOSC.V2020.I1.6-42},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/GuoPPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BelliziaBBCDGLL20,
  author       = {Davide Bellizia and
                  Francesco Berti and
                  Olivier Bronchain and
                  Ga{\"{e}}tan Cassiers and
                  S{\'{e}}bastien Duval and
                  Chun Guo and
                  Gregor Leander and
                  Ga{\"{e}}tan Leurent and
                  Itamar Levi and
                  Charles Momin and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Balazs Udvarhelyi and
                  Friedrich Wiemer},
  title        = {Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with
                  a Masked Tweakable Block Cipher},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {295--349},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.295-349},
  doi          = {10.13154/TOSC.V2020.IS1.295-349},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BelliziaBBCDGLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BelliziaBCGGMPP20,
  author       = {Davide Bellizia and
                  Olivier Bronchain and
                  Ga{\"{e}}tan Cassiers and
                  Vincent Grosso and
                  Chun Guo and
                  Charles Momin and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Mode-Level vs. Implementation-Level Physical Security in Symmetric
                  Cryptography - {A} Practical Guide Through the Leakage-Resistance
                  Jungle},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {369--400},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_13},
  doi          = {10.1007/978-3-030-56784-2\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BelliziaBCGGMPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelliziaBCGGMPP20,
  author       = {Davide Bellizia and
                  Olivier Bronchain and
                  Ga{\"{e}}tan Cassiers and
                  Vincent Grosso and
                  Chun Guo and
                  Charles Momin and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Mode-Level vs. Implementation-Level Physical Security in Symmetric
                  Cryptography: {A} Practical Guide Through the Leakage-Resistance Jungle},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {211},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/211},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BelliziaBCGGMPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertNPY20,
  author       = {Beno{\^{\i}}t Libert and
                  Khoa Nguyen and
                  Thomas Peters and
                  Moti Yung},
  title        = {Compact Simulation-Sound {NIZK} Arguments of Composite Residuosity
                  and Applications to Logarithmic-Size Ring Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1334},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1334},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertNPY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/BertiGPPS19,
  author       = {Francesco Berti and
                  Chun Guo and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Zhe Liu and
                  Moti Yung},
  title        = {Strong Authenticity with Leakage Under Weak and Falsifiable Physical
                  Assumptions},
  booktitle    = {Information Security and Cryptology - 15th International Conference,
                  Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12020},
  pages        = {517--532},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-42921-8\_31},
  doi          = {10.1007/978-3-030-42921-8\_31},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/BertiGPPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/GuoPPS19,
  author       = {Chun Guo and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Peter Schwabe and
                  Nicolas Th{\'{e}}riault},
  title        = {Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions,
                  Separation Results and First Construction - (Extended Abstract)},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2019 - 6th International Conference
                  on Cryptology and Information Security in Latin America, Santiago
                  de Chile, Chile, October 2-4, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11774},
  pages        = {150--172},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30530-7\_8},
  doi          = {10.1007/978-3-030-30530-7\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/GuoPPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/CassiersGPPS19,
  author       = {Ga{\"{e}}tan Cassiers and
                  Chun Guo and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Shivam Bhasin and
                  Avi Mendelson and
                  Mridul Nandi},
  title        = {SpookChain: Chaining a Sponge-Based {AEAD} with Beyond-Birthday Security},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 9th International
                  Conference, {SPACE} 2019, Gandhinagar, India, December 3-7, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11947},
  pages        = {67--85},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35869-3\_7},
  doi          = {10.1007/978-3-030-35869-3\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/space/CassiersGPPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertiGPPS19,
  author       = {Francesco Berti and
                  Chun Guo and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {TEDT, a Leakage-Resilient {AEAD} mode for High (Physical) Security
                  Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {137},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/137},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BertiGPPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoPPS19,
  author       = {Chun Guo and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Towards Lightweight Side-Channel Security and the Leakage-Resilience
                  of the Duplex Sponge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {193},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/193},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoPPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertiGPPS19a,
  author       = {Francesco Berti and
                  Chun Guo and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Strong Authenticity with Leakage under Weak and Falsifiable Physical
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1413},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1413},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BertiGPPS19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BertiKPPS18,
  author       = {Francesco Berti and
                  Fran{\c{c}}ois Koeune and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Ciphertext Integrity with Misuse and Leakage: Definition and Efficient
                  Constructions with Symmetric Primitives},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {37--50},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196525},
  doi          = {10.1145/3196494.3196525},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BertiKPPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LibertP018,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Chen Qian},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Logarithmic-Size Ring Signatures with Tight Security from the {DDH}
                  Assumption},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11099},
  pages        = {288--308},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98989-1\_15},
  doi          = {10.1007/978-3-319-98989-1\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LibertP018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BertiPP18,
  author       = {Francesco Berti and
                  Olivier Pereira and
                  Thomas Peters},
  editor       = {Debrup Chakraborty and
                  Tetsu Iwata},
  title        = {Reconsidering Generic Composition: The Tag-then-Encrypt Case},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2018 - 19th International Conference
                  on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11356},
  pages        = {70--90},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05378-9\_4},
  doi          = {10.1007/978-3-030-05378-9\_4},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BertiPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoPPS18,
  author       = {Chun Guo and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Leakage-Resilient Authenticated Encryption with Misuse in the Leveled
                  Leakage Setting: Definitions, Separation Results, and Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {484},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/484},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoPPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertiPP18,
  author       = {Francesco Berti and
                  Olivier Pereira and
                  Thomas Peters},
  title        = {Reconsidering Generic Composition: the Tag-then-Encrypt case},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {991},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/991},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertiPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BertiPPS17,
  author       = {Francesco Berti and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {On Leakage-Resilient Authenticated Encryption with Decryption Leakages},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {3},
  pages        = {271--293},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i3.271-293},
  doi          = {10.13154/TOSC.V2017.I3.271-293},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BertiPPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CouteauPP17,
  author       = {Geoffroy Couteau and
                  Thomas Peters and
                  David Pointcheval},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Removing the Strong {RSA} Assumption from Arguments over the Integers},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10211},
  pages        = {321--350},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56614-6\_11},
  doi          = {10.1007/978-3-319-56614-6\_11},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CouteauPP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertPQ17,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Chen Qian},
  editor       = {Serge Fehr},
  title        = {Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable
                  Ciphertexts},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {247--276},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_11},
  doi          = {10.1007/978-3-662-54365-8\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertPQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LibertMPY16,
  author       = {Beno{\^{\i}}t Libert and
                  Fabrice Mouhartem and
                  Thomas Peters and
                  Moti Yung},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {Practical "Signatures with Efficient Protocols" from Simple
                  Assumptions},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {511--522},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897898},
  doi          = {10.1145/2897845.2897898},
  timestamp    = {Mon, 25 Apr 2022 08:42:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LibertMPY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CouteauPP16,
  author       = {Geoffroy Couteau and
                  Thomas Peters and
                  David Pointcheval},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Encryption Switching Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {308--338},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_12},
  doi          = {10.1007/978-3-662-53018-4\_12},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CouteauPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauPP16,
  author       = {Geoffroy Couteau and
                  Thomas Peters and
                  David Pointcheval},
  title        = {Removing the Strong {RSA} Assumption from Arguments over the Integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {128},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/128},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CouteauPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertiKPPS16,
  author       = {Francesco Berti and
                  Fran{\c{c}}ois Koeune and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Leakage-Resilient and Misuse-Resistant Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {996},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/996},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertiKPPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LibertPJY15,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Marc Joye and
                  Moti Yung},
  title        = {Linearly homomorphic structure-preserving signatures and their applications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {77},
  number       = {2-3},
  pages        = {441--477},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-015-0079-1},
  doi          = {10.1007/S10623-015-0079-1},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LibertPJY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LibertPJY15,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Marc Joye and
                  Moti Yung},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Compactly Hiding Linear Spans - Tightly Secure Constant-Size Simulation-Sound
                  {QA-NIZK} Proofs and Applications},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9452},
  pages        = {681--707},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48797-6\_28},
  doi          = {10.1007/978-3-662-48797-6\_28},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LibertPJY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LibertPY15,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Moti Yung},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Short Group Signatures via Structure-Preserving Signatures: Standard
                  Model Security from Simple Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {296--316},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_15},
  doi          = {10.1007/978-3-662-48000-7\_15},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LibertPY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/CouteauPP15,
  author       = {Geoffroy Couteau and
                  Thomas Peters and
                  David Pointcheval},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Evangelos Kranakis and
                  Guillaume Bonfante},
  title        = {Secure Distributed Computation on Private Inputs},
  booktitle    = {Foundations and Practice of Security - 8th International Symposium,
                  {FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9482},
  pages        = {14--26},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-30303-1\_2},
  doi          = {10.1007/978-3-319-30303-1\_2},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/CouteauPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertJYP15,
  author       = {Beno{\^{\i}}t Libert and
                  Marc Joye and
                  Moti Yung and
                  Thomas Peters},
  editor       = {Jonathan Katz},
  title        = {Secure Efficient History-Hiding Append-Only Signatures in the Standard
                  Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {450--473},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_20},
  doi          = {10.1007/978-3-662-46447-2\_20},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertJYP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertPJY15,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Marc Joye and
                  Moti Yung},
  title        = {Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound
                  {QA-NIZK} Proofs and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {242},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/242},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertPJY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertPY15,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Moti Yung},
  title        = {Short Group Signatures via Structure-Preserving Signatures: Standard
                  Model Security from Simple Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {743},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/743},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertPY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauPP15,
  author       = {Geoffroy Couteau and
                  Thomas Peters and
                  David Pointcheval},
  title        = {Encryption Switching Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {990},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/990},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CouteauPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauPP15a,
  author       = {Geoffroy Couteau and
                  Thomas Peters and
                  David Pointcheval},
  title        = {Secure Distributed Computation on Private Inputs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1196},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CouteauPP15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Peters14,
  author       = {Thomas Peters},
  title        = {Privacy enhancing cryptographic mechanisms with public verifiability},
  school       = {Catholic University of Louvain, Louvain-la-Neuve, Belgium},
  year         = {2014},
  url          = {https://hdl.handle.net/2078.1/144019},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Peters14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LibertJYP14,
  author       = {Beno{\^{\i}}t Libert and
                  Marc Joye and
                  Moti Yung and
                  Thomas Peters},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Concise Multi-challenge CCA-Secure Encryption and Signatures with
                  Almost Tight Security},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8874},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45608-8\_1},
  doi          = {10.1007/978-3-662-45608-8\_1},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LibertJYP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LibertPJY14,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Marc Joye and
                  Moti Yung},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive
                  {NIZK} Proofs and CCA2-Secure Encryption from Homomorphic Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {514--532},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_29},
  doi          = {10.1007/978-3-642-55220-5\_29},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LibertPJY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertYJP14,
  author       = {Beno{\^{\i}}t Libert and
                  Moti Yung and
                  Marc Joye and
                  Thomas Peters},
  editor       = {Hugo Krawczyk},
  title        = {Traceable Group Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {592--610},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_34},
  doi          = {10.1007/978-3-642-54631-0\_34},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertYJP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Peters14,
  author       = {Thomas Peters},
  title        = {The physics of volume rendering},
  journal      = {CoRR},
  volume       = {abs/1410.6022},
  year         = {2014},
  url          = {http://arxiv.org/abs/1410.6022},
  eprinttype    = {arXiv},
  eprint       = {1410.6022},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Peters14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertJYP14,
  author       = {Beno{\^{\i}}t Libert and
                  Marc Joye and
                  Moti Yung and
                  Thomas Peters},
  title        = {Concise Multi-Challenge CCA-Secure Encryption and Signatures with
                  Almost Tight Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {743},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/743},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertJYP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LibertPJY13,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Marc Joye and
                  Moti Yung},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Linearly Homomorphic Structure-Preserving Signatures and Their Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {289--307},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_17},
  doi          = {10.1007/978-3-642-40084-1\_17},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LibertPJY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CuvelierPP13,
  author       = {Edouard Cuvelier and
                  Olivier Pereira and
                  Thomas Peters},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {Election Verifiability or Ballot Privacy: Do We Need to Choose?},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {481--498},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_27},
  doi          = {10.1007/978-3-642-40203-6\_27},
  timestamp    = {Wed, 25 Sep 2019 18:03:15 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CuvelierPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/CanardCDGPS13,
  author       = {S{\'{e}}bastien Canard and
                  Iwen Coisel and
                  Julien Devigne and
                  C{\'{e}}cilia Gallais and
                  Thomas Peters and
                  Olivier Sanders},
  editor       = {Sihan Qing and
                  Jianying Zhou and
                  Dongmei Liu},
  title        = {Toward Generic Method for Server-Aided Cryptography},
  booktitle    = {Information and Communications Security - 15th International Conference,
                  {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8233},
  pages        = {373--392},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02726-5\_27},
  doi          = {10.1007/978-3-319-02726-5\_27},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/CanardCDGPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AttrapadungLP13,
  author       = {Nuttapong Attrapadung and
                  Beno{\^{\i}}t Libert and
                  Thomas Peters},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Efficient Completely Context-Hiding Quotable and Linearly Homomorphic
                  Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {386--404},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_24},
  doi          = {10.1007/978-3-642-36362-7\_24},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AttrapadungLP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CuvelierPP13,
  author       = {Edouard Cuvelier and
                  Olivier Pereira and
                  Thomas Peters},
  title        = {Election Verifiability or Ballot Privacy: Do We Need to Choose?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {216},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/216},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CuvelierPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertPJY13,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Marc Joye and
                  Moti Yung},
  title        = {Linearly Homomorphic Structure-Preserving Signatures and Their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {361},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/361},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertPJY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertPJY13a,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Marc Joye and
                  Moti Yung},
  title        = {Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive
                  {NIZK} Proofs and CCA2-Secure Encryption from Homomorphic Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {691},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/691},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertPJY13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AttrapadungLP12,
  author       = {Nuttapong Attrapadung and
                  Beno{\^{\i}}t Libert and
                  Thomas Peters},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {Computing on Authenticated Data: New Privacy Definitions and Constructions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {367--385},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_23},
  doi          = {10.1007/978-3-642-34961-4\_23},
  timestamp    = {Mon, 25 Nov 2019 15:32:14 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AttrapadungLP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LibertPY12,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Moti Yung},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Group Signatures with Almost-for-Free Revocation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {571--589},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_34},
  doi          = {10.1007/978-3-642-32009-5\_34},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LibertPY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LibertPY12,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Moti Yung},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Scalable Group Signatures with Revocation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {609--627},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_36},
  doi          = {10.1007/978-3-642-29011-4\_36},
  timestamp    = {Sun, 12 Nov 2023 02:15:08 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LibertPY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertPY12,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Moti Yung},
  title        = {Scalable Group Signatures with Revocation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {424},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/424},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertPY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertPY12a,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Moti Yung},
  title        = {Group Signatures with Almost-for-free Revocation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {442},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/442},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertPY12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics