Search publications by date:
1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004
2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014
2015 | 2016 | 2017 | Latest | Forthcoming
BibTeX - Year 2017

Latest publications

March 2017

Benoit Libert, Thomas Peters, and Chen Qian. Structure-Preserving Chosen-Ciphertext Security With Shorter Verifiable Ciphertexts, In Serge Fehr, editor(s), Public-Key Cryptography -- PKC'17, Lecture Notes in Computer Science, Spinger, March 2017, To appear BibTeX

December 2016

Olivier Pereira. Internet Voting with Helios, Feng Hao and Peter Y. A. Ryan ed., In Real-World Electronic Voting: Design, Analysis and Deployment, pages 277-308, CRC Press, December 2016 PDF BibTeX

Dina Heidar Kamel, Guerric de Streel, Santos Merino Del Pozo, Kashif Nawaz, François-Xavier Standaert, Denis Flandre, and David Bol. Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd Randomizers, In C. Carlet and A. Hasan and V. Saraswat, editor(s), Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings, Lecture Notes in Computer Science, pages 233-248, Springer, December 2016, BibTeX

November 2016

Francesco Berti, and François-Xavier Standaert. An Analysis of the Learning Parity with Noise Assumption Against Fault Attacks, In Springer, editor(s), Lecture Notes in Computer Science, Springer, November 2016 BibTeX

August 2016

François Durvaux, François-Xavier Standaert, and Santos Merino Del Pozo. Towards Easy Leakage Certification, In B. Gierlichs and A. Poschmann, editor(s), Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, California, USA, August 17-19, 2016, Proceedings, Volume 9813 of Lecture Notes in Computer Science, pages 40-60, Springer, August 2016, BibTeX

Geoffroy Couteau, Thomas Peters, and David Pointcheval. Encryption Switching Protocols, In M. Robshow & J. Katz, editor(s), Crypto'16, Lecture Notes in Computer Science, Spinger, August 2016, To appear BibTeX

June 2016

Édouard Cuvelier, and Olivier Pereira. Verifiable Multi-Party Computation with Perfectly Private Audit Trail, In Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider, editor(s), 14th International Conference on Applied Cryptography and Network Security, Volume 9696 of Lecture Notes in Computer Science (LNCS), Springer, June 2016 PDF BibTeX

May 2016

Benoit Libert, Fabrice Mouhartem, Thomas Peters, and Moti Yung. Practical ``Signatures with Efficient Protocols'' from Simple Assumptions, In X.F. Wang & X. Huang, editor(s), ASIACCS 2016, ACM, May 2016 BibTeX

December 2015

Benoit Libert, Thomas Peters, Marc Joye, and Moti Yung. Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications, In T. Iwata & J. H. Cheon, editor(s), Asiacrypt'15, Volume 9452 of Lecture Notes in Computer Science, Spinger, December 2015 BibTeX

Vincent Grosso, and François-Xavier Standaert. ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?, In T. Iwata & J. H. Cheon, editor(s), Asiacrypt, Volume 9452 of Lecture Notes in Computer Science (LNCS), Springer, December 2015 PDF BibTeX

Copyright Notice

(click here to expand/retract)