Léo Robert

Orcid: 0000-0002-9638-3143

According to our database1, Léo Robert authored at least 31 papers between 2020 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Analyzing Self-Stabilization of Synchronous Unison via Propositional Satisfiability.
Proceedings of the 31st International Conference on Principles and Practice of Constraint Programming, 2025

Post-Compromise Security with Application-Level Key-Controls - with a comprehensive study of the 5G AKMA protocol.
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025

2024
Efficient Card-Based ZKP for Single Loop Condition and Its Application to Moon-or-Sun.
New Gener. Comput., September, 2024

Secure Keyless Multi-party Storage Scheme.
Proceedings of the Computer Security - ESORICS 2024, 2024

iUC-Secure Distributed File Transfer from Standard Attribute-Based Encryption.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2024, 2024

2023
Physical ZKP protocols for Nurimisaki and Kurodoko.
Theor. Comput. Sci., September, 2023

Privacy-preserving Attestation for Virtualized Network Infrastructures.
IACR Cryptol. ePrint Arch., 2023

The Calissons Puzzle.
CoRR, 2023

How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment.
Proceedings of the 32nd USENIX Security Symposium, 2023

RMC-PVC: A Multi-Client Reusable Verifiable Computation Protocol.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun.
Proceedings of the Advances in Information and Computer Security, 2023

Towards a Privacy-Preserving Attestation for Virtualized Networks.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Design and analysis of provably secure protocols: Applications to messaging and attestation. (Conceptions et analyses de protocoles en sécurité prouvable: applications aux messageries et à l'attestation).
PhD thesis, 2022

Card-Based ZKP for Connectivity: Applications to Nurikabe, Hitori, and Heyawake.
New Gener. Comput., 2022

Optimal threshold padlock systems.
J. Comput. Secur., 2022

Physical zero-knowledge proof and NP-completeness proof of Suguru puzzle.
Inf. Comput., 2022

RMC-PVC: A Multi-Client Reusable Verifiable Computation Protocol (Long version).
IACR Cryptol. ePrint Arch., 2022

Hide a Liar: Card-Based ZKP Protocol for Usowan.
Proceedings of the Theory and Applications of Models of Computation, 2022

Card-Based ZKP Protocol for Nurimisaki.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2022

MARSHAL: messaging with asynchronous ratchets and signatures for faster HeALing.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

A Survey on Identity-Based Blind Signature.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
How to construct physical zero-knowledge proofs for puzzles with a "single loop" condition.
Theor. Comput. Sci., 2021

Fast Cramer-Shoup Cryptosystem.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Card-Based ZKP Protocols for Takuzu and Juosan.
Proceedings of the 10th International Conference on Fun with Algorithms, 2021

Generic Construction for Identity-Based Proxy Blind Signature.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021

Interactive Physical ZKP for Connectivity: Applications to Nurikabe and Hitori.
Proceedings of the Connecting with Computability, 2021

2020
How to Teach the Undecidability of Malware Detection Problem and Halting Problem.
Proceedings of the Information Security Education. Information Security in Action, 2020

Physical Zero-Knowledge Proof for Suguru Puzzle.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2020

Linear Generalized ElGamal Encryption Scheme.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Fast Short and Fast Linear Cramer-Shoup.
Proceedings of the Foundations and Practice of Security - 13th International Symposium, 2020


  Loading...