Céline Chevalier
Orcid: 0009-0006-4231-4958
According to our database1,
Céline Chevalier
authored at least 56 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the 10th IEEE European Symposium on Security and Privacy, 2025
Proceedings of the 10th IEEE European Symposium on Security and Privacy, 2025
Proceedings of the Applied Cryptography and Network Security, 2025
2024
Quarantined-TreeKEM: A Continuous Group Key Agreement for MLS, Secure in Presence of Inactive Users.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Quarantined-TreeKEM: a Continuous Group Key Agreement for MLS, Secure in Presence of Inactive Users.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Verification and Evaluation of Computer and Communication Systems, 2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the Financial Cryptography and Data Security, 2023
Shorter and Faster Identity-Based Signatures with Tight Security in the (Q)ROM from Lattices.
Proceedings of the Applied Cryptography and Network Security, 2023
GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges.
Proceedings of the Applied Cryptography and Network Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Correction to: Dispelling myths on superposition attacks: formal security model and attack analyses.
Des. Codes Cryptogr., 2022
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
2021
Hardware security without secure hardware: How to decrypt with a password and a server.
Theor. Comput. Sci., 2021
2020
Converting networks to predictive logic models from perturbation signalling data with CellNOpt.
Bioinform., 2020
Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
2019
CoRR, 2019
Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
Easing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions.
Proceedings of the Computer Security - ESORICS 2016, 2016
Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016
Proceedings of the New Codebreakers, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
Proceedings of the Topics in Cryptology, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
2012
IACR Cryptol. ePrint Arch., 2012
2011
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
2010
Proceedings of the Progress in Cryptology, 2010
Proceedings of the Progress in Cryptology, 2010
2009
Proceedings of the Public Key Cryptography, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness.
Proceedings of the Progress in Cryptology, 2009
2008
Proceedings of the Topics in Cryptology, 2008