default search action
Tancrède Lepoint
Person information
- affiliation: Amazon Web Services, Seattle, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Jean-Sébastien Coron, François Gérard, Tancrède Lepoint, Matthias Trannoy, Rina Zeitoun:
Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 335-354 (2024) - [i37]Jean-Sébastien Coron, François Gérard, Tancrède Lepoint, Matthias Trannoy, Rina Zeitoun:
Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium. IACR Cryptol. ePrint Arch. 2024: 1149 (2024) - [i36]Truong Son Nguyen, Tancrède Lepoint, Ni Trieu:
Mario: Multi-round Multiple-Aggregator Secure Aggregation with Robustness against Malicious Actors. IACR Cryptol. ePrint Arch. 2024: 1428 (2024) - 2023
- [c43]Panos Kampanakis, Tancrède Lepoint:
Vision Paper: Do We Need to Change Some Things? - Open Questions Posed by the Upcoming Post-quantum Migration to Existing Standards and Deployments. SSR 2023: 78-102 - [c42]James Bell, Adrià Gascón, Tancrède Lepoint, Baiyu Li, Sarah Meiklejohn, Mariana Raykova, Cathie Yun:
ACORN: Input Validation for Secure Aggregation. USENIX Security Symposium 2023: 4805-4822 - [i35]Panos Kampanakis, Tancrède Lepoint:
Do we need to change some things? Open questions posed by the upcoming post-quantum migration to existing standards and deployments. IACR Cryptol. ePrint Arch. 2023: 266 (2023) - [i34]Edward Eaton, Tancrède Lepoint, Christopher A. Wood:
Security Analysis of Signature Schemes with Key Blinding. IACR Cryptol. ePrint Arch. 2023: 380 (2023) - 2022
- [j7]Fabrice Benhamouda, Tancrède Lepoint, Julian Loss, Michele Orrù, Mariana Raykova:
On the (in)Security of ROS. J. Cryptol. 35(4): 25 (2022) - [c41]Karim Eldefrawy, Tancrède Lepoint, Antonin Leroux:
Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities. ACNS 2022: 565-584 - [c40]Karim Eldefrawy, Tancrède Lepoint, Laura Tam:
In-App Cryptographically-Enforced Selective Access Control for Microsoft Office and Similar Platforms. CSCML 2022: 447-467 - [i33]Fabrice Benhamouda, Tancrède Lepoint, Michele Orrù, Mariana Raykova:
Publicly verifiable anonymous tokens with private metadata bit. IACR Cryptol. ePrint Arch. 2022: 4 (2022) - [i32]James Bell, Adrià Gascón, Tancrède Lepoint, Baiyu Li, Sarah Meiklejohn, Mariana Raykova, Cathie Yun:
ACORN: Input Validation for Secure Aggregation. IACR Cryptol. ePrint Arch. 2022: 1461 (2022) - 2021
- [j6]Peter Kairouz, H. Brendan McMahan, Brendan Avent, Aurélien Bellet, Mehdi Bennis, Arjun Nitin Bhagoji, Kallista A. Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, Rafael G. L. D'Oliveira, Hubert Eichner, Salim El Rouayheb, David Evans, Josh Gardner, Zachary Garrett, Adrià Gascón, Badih Ghazi, Phillip B. Gibbons, Marco Gruteser, Zaïd Harchaoui, Chaoyang He, Lie He, Zhouyuan Huo, Ben Hutchinson, Justin Hsu, Martin Jaggi, Tara Javidi, Gauri Joshi, Mikhail Khodak, Jakub Konecný, Aleksandra Korolova, Farinaz Koushanfar, Sanmi Koyejo, Tancrède Lepoint, Yang Liu, Prateek Mittal, Mehryar Mohri, Richard Nock, Ayfer Özgür, Rasmus Pagh, Hang Qi, Daniel Ramage, Ramesh Raskar, Mariana Raykova, Dawn Song, Weikang Song, Sebastian U. Stich, Ziteng Sun, Ananda Theertha Suresh, Florian Tramèr, Praneeth Vepakomma, Jianyu Wang, Li Xiong, Zheng Xu, Qiang Yang, Felix X. Yu, Han Yu, Sen Zhao:
Advances and Open Problems in Federated Learning. Found. Trends Mach. Learn. 14(1-2): 1-210 (2021) - [c39]Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Karn Seth, Ni Trieu:
Private Join and Compute from PIR with Default. ASIACRYPT (2) 2021: 605-634 - [c38]Fabrice Benhamouda, Tancrède Lepoint, Julian Loss, Michele Orrù, Mariana Raykova:
On the (in)security of ROS. EUROCRYPT (1) 2021: 33-53 - [c37]Asra Ali, Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Phillipp Schoppmann, Karn Seth, Kevin Yeo:
Communication-Computation Trade-offs in PIR. USENIX Security Symposium 2021: 1811-1828 - [i31]Karim Eldefrawy, Tancrède Lepoint, Antonin Leroux:
Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities. IACR Cryptol. ePrint Arch. 2021: 1564 (2021) - 2020
- [c36]Karim Eldefrawy, Tancrède Lepoint, Antonin Leroux:
Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities. ACNS (1) 2020: 3-23 - [c35]James Henry Bell, Kallista A. Bonawitz, Adrià Gascón, Tancrède Lepoint, Mariana Raykova:
Secure Single-Server Aggregation with (Poly)Logarithmic Overhead. CCS 2020: 1253-1269 - [c34]Ben Kreuter, Tancrède Lepoint, Michele Orrù, Mariana Raykova:
Anonymous Tokens with Private Metadata Bit. CRYPTO (1) 2020: 308-336 - [i30]Ben Kreuter, Tancrède Lepoint, Michele Orrù, Mariana Raykova:
Anonymous Tokens with Private Metadata Bit. IACR Cryptol. ePrint Arch. 2020: 72 (2020) - [i29]James Bell, Kallista A. Bonawitz, Adrià Gascón, Tancrède Lepoint, Mariana Raykova:
Secure Single-Server Aggregation with (Poly)Logarithmic Overhead. IACR Cryptol. ePrint Arch. 2020: 704 (2020) - [i28]Fabrice Benhamouda, Tancrède Lepoint, Michele Orrù, Mariana Raykova:
On the (in)security of ROS. IACR Cryptol. ePrint Arch. 2020: 945 (2020) - [i27]Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Karn Seth, Ni Trieu:
Private Join and Compute from PIR with Default. IACR Cryptol. ePrint Arch. 2020: 1011 (2020)
2010 – 2019
- 2019
- [j5]Ivan De Oliveira Nunes, Karim Eldefrawy, Tancrède Lepoint:
SNUSE: A secure computation approach for large-scale user re-enrollment in biometric authentication systems. Future Gener. Comput. Syst. 98: 259-273 (2019) - [c33]James Bartusek, Brent Carmer, Abhishek Jain, Zhengzhong Jin, Tancrède Lepoint, Fermi Ma, Tal Malkin, Alex J. Malozemoff, Mariana Raykova:
Public-Key Function-Private Hidden Vector Encryption (and More). ASIACRYPT (3) 2019: 489-519 - [c32]Michael Brenner, Tancrède Lepoint, Kurt Rohloff:
WAHC'19: 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptograph. CCS 2019: 2703-2704 - [c31]James Bartusek, Tancrède Lepoint, Fermi Ma, Mark Zhandry:
New Techniques for Obfuscating Conjunctions. EUROCRYPT (3) 2019: 636-666 - [e1]Michael Brenner, Tancrède Lepoint, Kurt Rohloff:
Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography, WAHC@CCS 2019, London, UK, November 11-15, 2019. ACM 2019, ISBN 978-1-4503-6829-2 [contents] - [i26]Peter Kairouz, H. Brendan McMahan, Brendan Avent, Aurélien Bellet, Mehdi Bennis, Arjun Nitin Bhagoji, Kallista A. Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, Rafael G. L. D'Oliveira, Salim El Rouayheb, David Evans, Josh Gardner, Zachary Garrett, Adrià Gascón, Badih Ghazi, Phillip B. Gibbons, Marco Gruteser, Zaïd Harchaoui, Chaoyang He, Lie He, Zhouyuan Huo, Ben Hutchinson, Justin Hsu, Martin Jaggi, Tara Javidi, Gauri Joshi, Mikhail Khodak, Jakub Konecný, Aleksandra Korolova, Farinaz Koushanfar, Sanmi Koyejo, Tancrède Lepoint, Yang Liu, Prateek Mittal, Mehryar Mohri, Richard Nock, Ayfer Özgür, Rasmus Pagh, Mariana Raykova, Hang Qi, Daniel Ramage, Ramesh Raskar, Dawn Song, Weikang Song, Sebastian U. Stich, Ziteng Sun, Ananda Theertha Suresh, Florian Tramèr, Praneeth Vepakomma, Jianyu Wang, Li Xiong, Zheng Xu, Qiang Yang, Felix X. Yu, Han Yu, Sen Zhao:
Advances and Open Problems in Federated Learning. CoRR abs/1912.04977 (2019) - [i25]James Bartusek, Brent Carmer, Abhishek Jain, Zhengzhong Jin, Tancrède Lepoint, Fermi Ma, Tal Malkin, Alex J. Malozemoff, Mariana Raykova:
Public-Key Function-Private Hidden Vector Encryption (and More). IACR Cryptol. ePrint Arch. 2019: 746 (2019) - [i24]Karim Eldefrawy, Tancrède Lepoint, Antonin Leroux:
Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities. IACR Cryptol. ePrint Arch. 2019: 1383 (2019) - [i23]Asra Ali, Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Phillipp Schoppmann, Karn Seth, Kevin Yeo:
Communication-Computation Trade-offs in PIR. IACR Cryptol. ePrint Arch. 2019: 1483 (2019) - 2018
- [j4]Tarek F. Abdelzaher, Nora Ayanian, Tamer Basar, Suhas N. Diggavi, Jana Diesner, Deepak Ganesan, Ramesh Govindan, Susmit Jha, Tancrède Lepoint, Benjamin M. Marlin, Klara Nahrstedt, David M. Nicol, Raj Rajkumar, Stephen Russell, Sanjit A. Seshia, Fei Sha, Prashant J. Shenoy, Mani B. Srivastava, Gaurav S. Sukhatme, Ananthram Swami, Paulo Tabuada, Don Towsley, Nitin H. Vaidya, Venugopal V. Veeravalli:
Toward an Internet of Battlefield Things: A Resilience Perspective. Computer 51(11): 24-36 (2018) - [j3]Shi Bai, Tancrède Lepoint, Adeline Roux-Langlois, Amin Sakzad, Damien Stehlé, Ron Steinfeld:
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance. J. Cryptol. 31(2): 610-640 (2018) - [j2]Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey:
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression. J. Cryptol. 31(3): 885-916 (2018) - [j1]Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, Damien Stehlé:
CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(1): 238-268 (2018) - [c30]Carlos Aguilar Melchor, Jean-Christophe Deneuville, Philippe Gaborit, Tancrède Lepoint, Thomas Ricosset:
Delegating Elliptic-Curve Operations with Homomorphic Encryption. CNS 2018: 1-9 - [c29]Ivan De Oliveira Nunes, Karim Eldefrawy, Tancrède Lepoint:
Secure Non-interactive User Re-enrollment in Biometrics-Based Identification and Authentication Systems. CSCML 2018: 162-180 - [c28]Anjana Rajan, Lucy Qin, David W. Archer, Dan Boneh, Tancrède Lepoint, Mayank Varia:
Callisto: A Cryptographic Approach to Detecting Serial Perpetrators of Sexual Misconduct. COMPASS 2018: 49:1-49:4 - [c27]Joppe W. Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, Damien Stehlé:
CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM. EuroS&P 2018: 353-367 - [c26]Ioannis Agadakos, Gabriela F. Ciocarlie, Bogdan Copos, Tancrède Lepoint, Ulf Lindqvist, Michael E. Locasto, James R. Michaelis:
Risks and Benefits of Side-Channels in Battlefields. FUSION 2018: 2290-2297 - [c25]Tancrède Lepoint, Gabriela F. Ciocarlie, Karim Eldefrawy:
BlockCIS - A Blockchain-Based Cyber Insurance System. IC2E 2018: 378-384 - [c24]Tarek F. Abdelzaher, Nora Ayanian, Tamer Basar, Suhas N. Diggavi, Jana Diesner, Deepak Ganesan, Ramesh Govindan, Susmit Jha, Tancrède Lepoint, Benjamin M. Marlin, Klara Nahrstedt, David M. Nicol, Raj Rajkumar, Stephen Russell, Sanjit A. Seshia, Fei Sha, Prashant J. Shenoy, Mani B. Srivastava, Gaurav S. Sukhatme, Ananthram Swami, Paulo Tabuada, Don Towsley, Nitin H. Vaidya, Venugopal V. Veeravalli:
Will Distributed Computing Revolutionize Peace? The Emergence of Battlefield IoT. ICDCS 2018: 1129-1138 - [i22]James Bartusek, Tancrède Lepoint, Fermi Ma, Mark Zhandry:
New Techniques for Obfuscating Conjunctions. IACR Cryptol. ePrint Arch. 2018: 936 (2018) - 2017
- [c23]Ioannis Agadakos, Chien-Ying Chen, Matteo Campanelli, Prashant Anantharaman, Monowar Hasan, Bogdan Copos, Tancrède Lepoint, Michael E. Locasto, Gabriela F. Ciocarlie, Ulf Lindqvist:
Jumping the Air Gap: Modeling Cyber-Physical Attack Paths in the Internet-of-Things. CPS-SPC@CCS 2017: 37-48 - [c22]Nikolaj S. Bjørner, Dejan Jovanovic, Tancrède Lepoint, Philipp Rümmer, Martin Schäf:
Abduction by Non-Experts. LPAR (Short Presentations) 2017: 58-72 - [c21]Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi:
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13. Public Key Cryptography (1) 2017: 41-58 - [c20]Daniel Benarroch, Zvika Brakerski, Tancrède Lepoint:
FHE over the Integers: Decomposed and Batched in the Post-Quantum Regime. Public Key Cryptography (2) 2017: 271-301 - [c19]Fabrice Benhamouda, Tancrède Lepoint, Claire Mathieu, Hang Zhou:
Optimization of Bootstrapping in Circuits. SODA 2017: 2423-2433 - [i21]Daniel Benarroch, Zvika Brakerski, Tancrède Lepoint:
FHE Over the Integers: Decomposed and Batched in the Post-Quantum Regime. IACR Cryptol. ePrint Arch. 2017: 65 (2017) - [i20]Léo Ducas, Tancrède Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, Damien Stehlé:
CRYSTALS - Dilithium: Digital Signatures from Module Lattices. IACR Cryptol. ePrint Arch. 2017: 633 (2017) - [i19]Joppe W. Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Damien Stehlé:
CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM. IACR Cryptol. ePrint Arch. 2017: 634 (2017) - 2016
- [c18]Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi:
Cryptanalysis of GGH15 Multilinear Maps. CRYPTO (2) 2016: 607-628 - [c17]Carlos Aguilar Melchor, Joris Barrier, Serge Guelton, Adrien Guinet, Marc-Olivier Killijian, Tancrède Lepoint:
NFLlib: NTT-Based Fast Lattice Library. CT-RSA 2016: 341-356 - [c16]Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey:
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression. FSE 2016: 313-333 - [i18]Fabrice Benhamouda, Tancrède Lepoint, Claire Mathieu, Hang Zhou:
Optimization of Bootstrapping in Circuits. CoRR abs/1608.04535 (2016) - [i17]Fabrice Benhamouda, Tancrède Lepoint, Claire Mathieu, Hang Zhou:
Optimization of Bootstrapping in Circuits. IACR Cryptol. ePrint Arch. 2016: 785 (2016) - [i16]Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi:
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13. IACR Cryptol. ePrint Arch. 2016: 1011 (2016) - 2015
- [c15]Shi Bai, Adeline Langlois, Tancrède Lepoint, Damien Stehlé, Ron Steinfeld:
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather Than the Statistical Distance. ASIACRYPT (1) 2015: 3-24 - [c14]Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations. CRYPTO (1) 2015: 247-266 - [c13]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
New Multilinear Maps Over the Integers. CRYPTO (1) 2015: 267-286 - [c12]Pierre-Alain Fouque, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi:
Cryptanalysis of the Co-ACD Assumption. CRYPTO (1) 2015: 561-580 - [c11]Tancrède Lepoint, Mehdi Tibouchi:
Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR. Financial Cryptography Workshops 2015: 184-193 - [i15]Tancrède Lepoint, Mehdi Tibouchi:
Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR. IACR Cryptol. ePrint Arch. 2015: 12 (2015) - [i14]Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey:
How to Compress Homomorphic Ciphertexts. IACR Cryptol. ePrint Arch. 2015: 113 (2015) - [i13]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
New Multilinear Maps over the Integers. IACR Cryptol. ePrint Arch. 2015: 162 (2015) - [i12]Shi Bai, Adeline Langlois, Tancrède Lepoint, Damien Stehlé, Ron Steinfeld:
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance. IACR Cryptol. ePrint Arch. 2015: 483 (2015) - [i11]Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations. IACR Cryptol. ePrint Arch. 2015: 596 (2015) - [i10]Zvika Brakerski, Craig Gentry, Shai Halevi, Tancrède Lepoint, Amit Sahai, Mehdi Tibouchi:
Cryptanalysis of the Quadratic Zero-Testing of GGH. IACR Cryptol. ePrint Arch. 2015: 845 (2015) - [i9]Thomas Baignères, Cécile Delerablée, Matthieu Finiasz, Louis Goubin, Tancrède Lepoint, Matthieu Rivain:
Trap Me If You Can - Million Dollar Curve. IACR Cryptol. ePrint Arch. 2015: 1249 (2015) - 2014
- [b1]Tancrède Lepoint:
Design and Implementation of Lattice-Based Cryptography. (Conception and implémentation de cryptographie à base de réseaux). École Normale Supérieure, Paris, France, 2014 - [c10]Tancrède Lepoint, Michael Naehrig:
A Comparison of the Homomorphic Encryption Schemes FV and YASHE. AFRICACRYPT 2014: 318-335 - [c9]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Scale-Invariant Fully Homomorphic Encryption over the Integers. Public Key Cryptography 2014: 311-328 - [i8]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Scale-Invariant Fully Homomorphic Encryption over the Integers. IACR Cryptol. ePrint Arch. 2014: 32 (2014) - [i7]Tancrède Lepoint, Michael Naehrig:
A Comparison of the Homomorphic Encryption Schemes FV and YASHE. IACR Cryptol. ePrint Arch. 2014: 62 (2014) - [i6]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers. IACR Cryptol. ePrint Arch. 2014: 975 (2014) - 2013
- [c8]Léo Ducas, Alain Durmus, Tancrède Lepoint, Vadim Lyubashevsky:
Lattice Signatures and Bimodal Gaussians. CRYPTO (1) 2013: 40-56 - [c7]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Practical Multilinear Maps over the Integers. CRYPTO (1) 2013: 476-493 - [c6]Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, Aaram Yun:
Batch Fully Homomorphic Encryption over the Integers. EUROCRYPT 2013: 315-335 - [c5]Tancrède Lepoint, Pascal Paillier:
On the Minimal Number of Bootstrappings in Homomorphic Circuits. Financial Cryptography Workshops 2013: 189-200 - [c4]Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, Matthieu Rivain:
White-Box Security Notions for Symmetric Encryption Schemes. Selected Areas in Cryptography 2013: 247-264 - [c3]Tancrède Lepoint, Matthieu Rivain, Yoni De Mulder, Peter Roelse, Bart Preneel:
Two Attacks on a White-Box AES Implementation. Selected Areas in Cryptography 2013: 265-285 - [i5]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Batch Fully Homomorphic Encryption over the Integers. IACR Cryptol. ePrint Arch. 2013: 36 (2013) - [i4]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Practical Multilinear Maps over the Integers. IACR Cryptol. ePrint Arch. 2013: 183 (2013) - [i3]Léo Ducas, Alain Durmus, Tancrède Lepoint, Vadim Lyubashevsky:
Lattice Signatures and Bimodal Gaussians. IACR Cryptol. ePrint Arch. 2013: 383 (2013) - [i2]Tancrède Lepoint, Matthieu Rivain:
Another Nail in the Coffin of White-Box AES Implementations. IACR Cryptol. ePrint Arch. 2013: 455 (2013) - [i1]Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, Matthieu Rivain:
White-Box Security Notions for Symmetric Encryption Schemes. IACR Cryptol. ePrint Arch. 2013: 523 (2013) - 2012
- [c2]Marc Joye, Tancrède Lepoint:
Partial Key Exposure on RSA with Private Exponents Larger Than N. ISPEC 2012: 369-380 - 2011
- [c1]Marc Joye, Tancrède Lepoint:
Traitor tracing schemes for protected software implementations. Digital Rights Management Workshop 2011: 15-22
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint