Tancrède Lepoint

According to our database1, Tancrède Lepoint authored at least 54 papers between 2011 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Private Join and Compute from PIR with Default.
IACR Cryptol. ePrint Arch., 2020

Anonymous Tokens with Private Metadata Bit.
IACR Cryptol. ePrint Arch., 2020

On the (in)security of ROS.
IACR Cryptol. ePrint Arch., 2020

Secure Single-Server Aggregation with (Poly)Logarithmic Overhead.
IACR Cryptol. ePrint Arch., 2020

Secure Single-Server Aggregation with (Poly)Logarithmic Overhead.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities.
IACR Cryptol. ePrint Arch., 2019

Public-Key Function-Private Hidden Vector Encryption (and More).
IACR Cryptol. ePrint Arch., 2019

Communication-Computation Trade-offs in PIR.
IACR Cryptol. ePrint Arch., 2019

SNUSE: A secure computation approach for large-scale user re-enrollment in biometric authentication systems.
Future Gener. Comput. Syst., 2019

Advances and Open Problems in Federated Learning.
CoRR, 2019

WAHC'19: 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptograph.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression.
J. Cryptol., 2018

Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance.
J. Cryptol., 2018

New Techniques for Obfuscating Conjunctions.
IACR Cryptol. ePrint Arch., 2018

Toward an Internet of Battlefield Things: A Resilience Perspective.
Computer, 2018


BlockCIS - A Blockchain-Based Cyber Insurance System.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018

Risks and Benefits of Side-Channels in Battlefields.
Proceedings of the 21st International Conference on Information Fusion, 2018

CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Callisto: A Cryptographic Approach to Detecting Serial Perpetrators of Sexual Misconduct.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018

Secure Non-interactive User Re-enrollment in Biometrics-Based Identification and Authentication Systems.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018

Delegating Elliptic-Curve Operations with Homomorphic Encryption.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
CRYSTALS - Dilithium: Digital Signatures from Module Lattices.
IACR Cryptol. ePrint Arch., 2017

CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM.
IACR Cryptol. ePrint Arch., 2017

FHE Over the Integers: Decomposed and Batched in the Post-Quantum Regime.
IACR Cryptol. ePrint Arch., 2017

Abduction by Non-Experts.
Proceedings of the IWIL@LPAR 2017 Workshop and LPAR-21 Short Presentations, 2017

Jumping the Air Gap: Modeling Cyber-Physical Attack Paths in the Internet-of-Things.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

2016
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13.
IACR Cryptol. ePrint Arch., 2016

Optimization of Bootstrapping in Circuits.
IACR Cryptol. ePrint Arch., 2016

NFLlib: NTT-Based Fast Lattice Library.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

Cryptanalysis of GGH15 Multilinear Maps.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR.
IACR Cryptol. ePrint Arch., 2015

New Multilinear Maps over the Integers.
IACR Cryptol. ePrint Arch., 2015

Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations.
IACR Cryptol. ePrint Arch., 2015

How to Compress Homomorphic Ciphertexts.
IACR Cryptol. ePrint Arch., 2015

Cryptanalysis of the Quadratic Zero-Testing of GGH.
IACR Cryptol. ePrint Arch., 2015

Trap Me If You Can - Million Dollar Curve.
IACR Cryptol. ePrint Arch., 2015

Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance.
IACR Cryptol. ePrint Arch., 2015

Cryptanalysis of the Co-ACD Assumption.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Design and Implementation of Lattice-Based Cryptography. (Conception and implémentation de cryptographie à base de réseaux).
PhD thesis, 2014

A Comparison of the Homomorphic Encryption Schemes FV and YASHE.
IACR Cryptol. ePrint Arch., 2014

Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers.
IACR Cryptol. ePrint Arch., 2014

Scale-Invariant Fully Homomorphic Encryption over the Integers.
IACR Cryptol. ePrint Arch., 2014

2013
Another Nail in the Coffin of White-Box AES Implementations.
IACR Cryptol. ePrint Arch., 2013

Lattice Signatures and Bimodal Gaussians.
IACR Cryptol. ePrint Arch., 2013

White-Box Security Notions for Symmetric Encryption Schemes.
IACR Cryptol. ePrint Arch., 2013

Practical Multilinear Maps over the Integers.
IACR Cryptol. ePrint Arch., 2013

Batch Fully Homomorphic Encryption over the Integers.
IACR Cryptol. ePrint Arch., 2013

Two Attacks on a White-Box AES Implementation.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

On the Minimal Number of Bootstrappings in Homomorphic Circuits.
Proceedings of the Financial Cryptography and Data Security, 2013

Batch Fully Homomorphic Encryption over the Integers.
Proceedings of the Advances in Cryptology, 2013

2012
Partial Key Exposure on RSA with Private Exponents Larger Than N.
Proceedings of the Information Security Practice and Experience, 2012

2011
Traitor tracing schemes for protected software implementations.
Proceedings of the 11th ACM Workshop on Digital Rights Management, 2011


  Loading...