Jean Lancrenon

Affiliations:
  • Université du Luxembourg


According to our database1, Jean Lancrenon authored at least 14 papers between 2009 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
On Composability of Game-based Password Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2020

2018
A training-resistant anomaly detection system.
Comput. Secur., 2018

2017
Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

2016
Two More Efficient Variants of the J-PAKE Protocol.
IACR Cryptol. ePrint Arch., 2016

Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-QuantumWorld.
IACR Cryptol. ePrint Arch., 2016

SPARER: Secure Cloud-Proof Storage for e-Health Scenarios.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.
IACR Cryptol. ePrint Arch., 2015

An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
IACR Cryptol. ePrint Arch., 2015

On Password-Authenticated Key Exchange Security Modeling.
Proceedings of the Technology and Practice of Passwords - 9th International Conference, 2015

On the Provable Security of the Dragonfly Protocol.
Proceedings of the Information Security - 18th International Conference, 2015

Attribute-Based Signatures with Controllable Linkability.
Proceedings of the Trusted Systems - 7th International Conference, 2015

2013
What Public Keys Can Do for 3-Party, Password-Authenticated Key Exchange.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013

2011
Isolating Partial Information of Indistinguishable Encryptions.
Proceedings of the Public Key Infrastructures, Services and Applications, 2011

2009
Remote object authentication: confidence model, cryptosystem and protocol.
Proceedings of the Data Mining, 2009


  Loading...