Thomas Peters

According to our database1, Thomas Peters authored at least 51 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate.
IACR Cryptol. ePrint Arch., 2024

Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable Elections.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Palmer amaranth identification using hyperspectral imaging and machine learning technologies in soybean field.
Comput. Electron. Agric., December, 2023

POLKA: Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

2022
Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Towards Leakage-Resistant Post-Quantum CCA-Secure Public Key Encryption.
IACR Cryptol. ePrint Arch., 2022

How to Verifiably Encrypt Many Bits for an Election?
IACR Cryptol. ePrint Arch., 2022

Traceable Receipt-Free Encryption.
IACR Cryptol. ePrint Arch., 2022

Secure Message Authentication in the Presence of Leakage and Faults.
IACR Cryptol. ePrint Arch., 2022

Rational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

One-Shot Fiat-Shamir-Based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Signatures in the Standard Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

2021
Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings.
IACR Cryptol. ePrint Arch., 2021

Efficient Leakage-Resilient MACs without Idealized Assumptions.
IACR Cryptol. ePrint Arch., 2021

Bifurcated Signatures: Folding the Accountability vs. Anonymity Dilemma into a Single Private Signing Scheme.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2020
Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction.
IACR Trans. Symmetric Cryptol., 2020

Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher.
IACR Trans. Symmetric Cryptol., 2020

TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Compact Simulation-Sound NIZK Arguments of Composite Residuosity and Applications to Logarithmic-Size Ring Signatures.
IACR Cryptol. ePrint Arch., 2020

Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle.
IACR Cryptol. ePrint Arch., 2020

2019
Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge.
IACR Cryptol. ePrint Arch., 2019

Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions.
IACR Cryptol. ePrint Arch., 2019

TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications.
IACR Cryptol. ePrint Arch., 2019

SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019

Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract).
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019

2018
Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions.
IACR Cryptol. ePrint Arch., 2018

Reconsidering Generic Composition: the Tag-then-Encrypt case.
IACR Cryptol. ePrint Arch., 2018

Logarithmic-Size Ring Signatures with Tight Security from the DDH Assumption.
Proceedings of the Computer Security, 2018

Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
On Leakage-Resilient Authenticated Encryption with Decryption Leakages.
IACR Trans. Symmetric Cryptol., 2017

Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

2016
Removing the Strong RSA Assumption from Arguments over the Integers.
IACR Cryptol. ePrint Arch., 2016

Leakage-Resilient and Misuse-Resistant Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2016

Practical "Signatures with Efficient Protocols" from Simple Assumptions.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions.
IACR Cryptol. ePrint Arch., 2015

Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications.
IACR Cryptol. ePrint Arch., 2015

Secure Distributed Computation on Private Inputs.
IACR Cryptol. ePrint Arch., 2015

Encryption Switching Protocols.
IACR Cryptol. ePrint Arch., 2015

Linearly homomorphic structure-preserving signatures and their applications.
Des. Codes Cryptogr., 2015

Secure Efficient History-Hiding Append-Only Signatures in the Standard Model.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

2014
Privacy enhancing cryptographic mechanisms with public verifiability.
PhD thesis, 2014

Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security.
IACR Cryptol. ePrint Arch., 2014

The physics of volume rendering.
CoRR, 2014

Traceable Group Encryption.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

2013
Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures.
IACR Cryptol. ePrint Arch., 2013

Election Verifiability or Ballot Privacy: Do We Need to Choose?
IACR Cryptol. ePrint Arch., 2013

Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Toward Generic Method for Server-Aided Cryptography.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

2012
Group Signatures with Almost-for-free Revocation.
IACR Cryptol. ePrint Arch., 2012

Scalable Group Signatures with Revocation.
IACR Cryptol. ePrint Arch., 2012

Computing on Authenticated Data: New Privacy Definitions and Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012


  Loading...