Thomas Peters

According to our database1, Thomas Peters authored at least 60 papers between 2012 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Threshold Receipt-Free Voting with Server-Side Vote Validation.
Proceedings of the Electronic Voting - 10th International Joint Conference, 2025

Leveled Software Implementation of Polka and Comparison with Uniformly Masked Kyber.
Proceedings of the Applied Cryptography and Network Security Workshops, 2025

On Proofs of Plaintext Knowledge for the Joye-Libert Encryption Scheme.
Proceedings of the Applied Cryptography and Network Security, 2025

2024
Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate.
IACR Cryptol. ePrint Arch., 2024

Post-Quantum Privacy for Traceable Receipt-Free Encryption.
IACR Cryptol. ePrint Arch., 2024

Verifiable and Private Vote-by-Mail.
IACR Cryptol. ePrint Arch., 2024

Can we cast a ballot as intended and be receipt free?
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Practical Traceable Receipt-Free Encryption.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

Electrostatic Force Between a Sphere at Constant Voltage and Another at Fixed Charge.
Proceedings of the IEEE Industry Applications Society Annual Meeting, 2024

Threshold Receipt-Free Single-Pass eVoting.
Proceedings of the Electronic Voting - 9th International Joint Conference, 2024

Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable Elections.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Palmer amaranth identification using hyperspectral imaging and machine learning technologies in soybean field.
Comput. Electron. Agric., December, 2023

POLKA: Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

2022
Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Towards Leakage-Resistant Post-Quantum CCA-Secure Public Key Encryption.
IACR Cryptol. ePrint Arch., 2022

Secure Message Authentication in the Presence of Leakage and Faults.
IACR Cryptol. ePrint Arch., 2022

Rational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

One-Shot Fiat-Shamir-Based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Signatures in the Standard Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

How to Verifiably Encrypt Many Bits for an Election?
Proceedings of the Computer Security - ESORICS 2022, 2022

Traceable Receipt-Free Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

Bifurcated Signatures: Folding the Accountability vs. Anonymity Dilemma into a Single Private Signing Scheme.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Efficient Leakage-Resilient MACs Without Idealized Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction.
IACR Trans. Symmetric Cryptol., 2020

Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher.
IACR Trans. Symmetric Cryptol., 2020

TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Compact Simulation-Sound NIZK Arguments of Composite Residuosity and Applications to Logarithmic-Size Ring Signatures.
IACR Cryptol. ePrint Arch., 2020

Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography - A Practical Guide Through the Leakage-Resistance Jungle.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge.
IACR Cryptol. ePrint Arch., 2019

TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications.
IACR Cryptol. ePrint Arch., 2019

SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019

Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract).
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019

Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions.
IACR Cryptol. ePrint Arch., 2018

Reconsidering Generic Composition: The Tag-then-Encrypt Case.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018

Logarithmic-Size Ring Signatures with Tight Security from the DDH Assumption.
Proceedings of the Computer Security, 2018

Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
On Leakage-Resilient Authenticated Encryption with Decryption Leakages.
IACR Trans. Symmetric Cryptol., 2017

Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Removing the Strong RSA Assumption from Arguments over the Integers.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

2016
Leakage-Resilient and Misuse-Resistant Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2016

Encryption Switching Protocols.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Practical "Signatures with Efficient Protocols" from Simple Assumptions.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Secure Efficient History-Hiding Append-Only Signatures in the Standard Model.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Secure Distributed Computation on Private Inputs.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Compactly Hiding Linear Spans - Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Privacy enhancing cryptographic mechanisms with public verifiability.
PhD thesis, 2014

The physics of volume rendering.
CoRR, 2014

Traceable Group Encryption.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Toward Generic Method for Server-Aided Cryptography.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Election Verifiability or Ballot Privacy: Do We Need to Choose?
Proceedings of the Computer Security - ESORICS 2013, 2013

Linearly Homomorphic Structure-Preserving Signatures and Their Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Scalable Group Signatures with Revocation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Group Signatures with Almost-for-Free Revocation.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

Computing on Authenticated Data: New Privacy Definitions and Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012


  Loading...