Louis Salvail

According to our database1, Louis Salvail authored at least 39 papers between 1992 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Practical Relativistic Zero-Knowledge for NP.
Electronic Colloquium on Computational Complexity (ECCC), 2020

2019
Key Establishment à la Merkle in a Quantum World.
J. Cryptology, 2019

2018
Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation.
IACR Cryptology ePrint Archive, 2018

2017
Quantum Authentication and Encryption with Key Recycling.
IACR Cryptology ePrint Archive, 2017

Provably Secure Key Establishment Against Quantum Adversaries.
Proceedings of the 12th Conference on the Theory of Quantum Computation, 2017

Quantum Authentication and Encryption with Key Recycling - Or: How to Re-use a One-Time Pad Even if P=NP - Safely & Feasibly.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

2016
Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Quantifying the Leakage of Quantum Protocols for Classical Two-Party Cryptography.
CoRR, 2015

2014
Secure identification and QKD in the bounded-quantum-storage model.
Theor. Comput. Sci., 2014

Using quantum key distribution for cryptographic purposes: A survey.
Theor. Comput. Sci., 2014

How to re-use a one-time pad safely and almost optimally even if P = NP.
Natural Computing, 2014

2012
Actively Secure Two-Party Evaluation of any Quantum Operation.
IACR Cryptology ePrint Archive, 2012

2011
Superposition Attacks on Cryptographic Protocols}.
IACR Cryptology ePrint Archive, 2011

Merkle Puzzles in a Quantum World.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Two Provers in Isolation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Security of trusted repeater quantum key distribution networks.
Journal of Computer Security, 2010

Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries.
Proceedings of the Advances in Cryptology, 2010

2009

Improving the Security of Quantum Protocols via Commit-and-Open.
Proceedings of the Advances in Cryptology, 2009

On the Power of Two-Party Quantum Cryptography.
Proceedings of the Advances in Cryptology, 2009

2008
Quantum Merkle Puzzles.
Proceedings of the Second International Conference on Quantum, 2008

2007
A Tight High-Order Entropic Quantum Uncertainty Relation With Applications.
IACR Cryptology ePrint Archive, 2007

SECOQC White Paper on Quantum Key Distribution and Cryptography
CoRR, 2007

2005
Cryptography In the Bounded Quantum-Storage Model.
IACR Cryptology ePrint Archive, 2005

Oblivious Transfer and Linear Functions.
IACR Cryptology ePrint Archive, 2005

A Quantum Cipher with Near Optimal Key-Recycling.
Proceedings of the Advances in Cryptology, 2005

2004
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission.
IACR Cryptology ePrint Archive, 2004

Unfair Noisy Channels and Oblivious Transfer.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004

Computational Collapse of Quantum State with Application to Oblivious Transfer.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004

Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks.
Proceedings of the Advances in Cryptology, 2004

2001
How to Convert the Flavor of a Quantum Bit Commitment.
Proceedings of the Advances in Cryptology, 2001

2000
Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation.
Proceedings of the Advances in Cryptology, 2000

1999
On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions.
Proceedings of the Advances in Cryptology, 1999

1998
Quantum Bit Commitment from a Physical Assumption.
Proceedings of the Advances in Cryptology, 1998

The Search for the Holy Grail in Quantum Cryptography.
Proceedings of the Lectures on Data Security, 1998

1995
Quantum Oblivious Mutual Identification.
Proceedings of the Advances in Cryptology, 1995

1993
Solving the maximum clique problem using a tabu search approach.
Annals OR, 1993

Secret-Key Reconciliation by Public Discussion.
Proceedings of the Advances in Cryptology, 1993

1992
Experimental Quantum Cryptography.
J. Cryptology, 1992


  Loading...