Thomas Peters
Thomas Peters
Research Associate (F.R.S.-FNRS), UCLouvain, Belgium
uclouvain.be üzerinde doğrulanmış e-posta adresine sahip - Ana Sayfa
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Group signatures with almost-for-free revocation
B Libert, T Peters, M Yung
Annual Cryptology Conference, 571-589, 2012
1382012
Scalable group signatures with revocation
B Libert, T Peters, M Yung
Annual International Conference on the Theory and Applications of …, 2012
1282012
Computing on authenticated data: New privacy definitions and constructions
N Attrapadung, B Libert, T Peters
International Conference on the Theory and Application of Cryptology and …, 2012
1032012
Linearly Homomorphic Structure-Preserving Signatures and Their Applications
B Libert, T Peters, M Joye, M Yung
Advances in Cryptology–CRYPTO 2013, 0
96*
Non-malleability from malleability: Simulation-sound quasi-adaptive NIZK proofs and CCA2-secure encryption from homomorphic signatures
B Libert, T Peters, M Joye, M Yung
Annual International Conference on the Theory and Applications of …, 2014
832014
Short group signatures via structure-preserving signatures: Standard model security from simple assumptions
B Libert, T Peters, M Yung
Annual Cryptology Conference, 296-316, 2015
762015
Efficient completely context-hiding quotable and linearly homomorphic signatures
N Attrapadung, B Libert, T Peters
International Workshop on Public Key Cryptography, 386-404, 2013
762013
Election verifiability or ballot privacy: Do we need to choose?
E Cuvelier, O Pereira, T Peters
European Symposium on Research in Computer Security, 481-498, 2013
562013
Compactly hiding linear spans
B Libert, T Peters, M Joye, M Yung
International Conference on the Theory and Application of Cryptology and …, 2015
492015
Concise multi-challenge CCA-secure encryption and signatures with almost tight security
B Libert, M Joye, M Yung, T Peters
International Conference on the Theory and Application of Cryptology and …, 2014
442014
On leakage-resilient authenticated encryption with decryption leakages
F Berti, O Pereira, T Peters, FX Standaert
IACR Transactions on Symmetric Cryptology, 271-293, 2017
432017
Spook: sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher
D Bellizia, F Berti, O Bronchain, G Cassiers, S Duval, C Guo, G Leander, ...
IACR Transactions on Symmetric Cryptology, 2020
312020
Encryption switching protocols
G Couteau, T Peters, D Pointcheval
Annual International Cryptology Conference, 308-338, 2016
272016
Practical" signatures with efficient protocols" from simple assumptions
B Libert, F Mouhartem, T Peters, M Yung
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
232016
Mode-level vs. implementation-level physical security in symmetric cryptography
D Bellizia, O Bronchain, G Cassiers, V Grosso, C Guo, C Momin, ...
Annual International Cryptology Conference, 369-400, 2020
222020
Towards low-energy leakage-resistant authenticated encryption from the duplex sponge construction
C Guo, O Pereira, T Peters, FX Standaert
Cryptology ePrint Archive, 2019
222019
TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications.
F Berti, C Guo, O Pereira, T Peters, FX Standaert
IACR Cryptol. ePrint Arch. 2019, 137, 2019
222019
Ciphertext integrity with misuse and leakage: definition and efficient constructions with symmetric primitives
F Berti, F Koeune, O Pereira, T Peters, FX Standaert
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
212018
Logarithmic-size ring signatures with tight security from the DDH assumption
B Libert, T Peters, C Qian
European Symposium on Research in Computer Security, 288-308, 2018
182018
Leakage-Resilient and Misuse-Resistant Authenticated Encryption.
F Berti, F Koeune, O Pereira, T Peters, FX Standaert
IACR Cryptol. ePrint Arch. 2016, 996, 2016
182016
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20