Thomas Peters
Thomas Peters
Verified email at uclouvain.be - Homepage
Title
Cited by
Cited by
Year
Group signatures with almost-for-free revocation
B Libert, T Peters, M Yung
Annual Cryptology Conference, 571-589, 2012
1122012
Scalable group signatures with revocation
B Libert, T Peters, M Yung
Annual International Conference on the Theory and Applications of …, 2012
1072012
Computing on authenticated data: New privacy definitions and constructions
N Attrapadung, B Libert, T Peters
International Conference on the Theory and Application of Cryptology and …, 2012
972012
Linearly Homomorphic Structure-Preserving Signatures and Their Applications
B Libert, T Peters, M Joye, M Yung
Advances in Cryptology–CRYPTO 2013, 0
85*
Efficient completely context-hiding quotable and linearly homomorphic signatures
N Attrapadung, B Libert, T Peters
International Workshop on Public Key Cryptography, 386-404, 2013
712013
Non-malleability from malleability: Simulation-sound quasi-adaptive NIZK proofs and CCA2-secure encryption from homomorphic signatures
B Libert, T Peters, M Joye, M Yung
Annual International Conference on the Theory and Applications of …, 2014
692014
Short group signatures via structure-preserving signatures: Standard model security from simple assumptions
B Libert, T Peters, M Yung
Annual Cryptology Conference, 296-316, 2015
672015
Election verifiability or ballot privacy: Do we need to choose?
E Cuvelier, O Pereira, T Peters
European Symposium on Research in Computer Security, 481-498, 2013
432013
Compactly hiding linear spans
B Libert, T Peters, M Joye, M Yung
International Conference on the Theory and Application of Cryptology and …, 2015
402015
Concise multi-challenge CCA-secure encryption and signatures with almost tight security
B Libert, M Joye, M Yung, T Peters
International Conference on the Theory and Application of Cryptology and …, 2014
392014
On leakage-resilient authenticated encryption with decryption leakages
F Berti, O Pereira, T Peters, FX Standaert
IACR Transactions on Symmetric Cryptology, 271-293, 2017
272017
Encryption switching protocols
G Couteau, T Peters, D Pointcheval
Annual International Cryptology Conference, 308-338, 2016
192016
Practical" signatures with efficient protocols" from simple assumptions
B Libert, F Mouhartem, T Peters, M Yung
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
182016
Ciphertext integrity with misuse and leakage: definition and efficient constructions with symmetric primitives
F Berti, F Koeune, O Pereira, T Peters, FX Standaert
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
172018
TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications.
F Berti, C Guo, O Pereira, T Peters, FX Standaert
IACR Cryptology ePrint Archive 2019, 137, 2019
162019
Leakage-Resilient and Misuse-Resistant Authenticated Encryption.
F Berti, F Koeune, O Pereira, T Peters, FX Standaert
IACR Cryptology ePrint Archive 2016, 996, 2016
142016
Traceable group encryption
B Libert, M Yung, M Joye, T Peters
International Workshop on Public Key Cryptography, 592-610, 2014
132014
Removing the strong RSA assumption from arguments over the integers
G Couteau, T Peters, D Pointcheval
Annual International Conference on the Theory and Applications of …, 2017
112017
Toward generic method for server-aided cryptography
S Canard, I Coisel, J Devigne, C Gallais, T Peters, O Sanders
International Conference on Information and Communications Security, 373-392, 2013
112013
Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge.
C Guo, O Pereira, T Peters, FX Standaert
IACR Cryptology ePrint Archive 2019, 193, 2019
102019
The system can't perform the operation now. Try again later.
Articles 1–20