Geoffroy Couteau

From MaRDI portal
Person:1653084


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On building fine-grained one-way functions from strong average-case hardness
Journal of Cryptology
2025-01-17Paper
Instantiating the hash-then-evaluate paradigm: strengthening PRFs, PCFs, and OPRFs
 
2025-01-10Paper
An efficient ZK compiler from SIMD circuits to general circuits
Journal of Cryptology
2024-12-27Paper
10-party sublinear secure computation from standard assumptions
 
2024-12-13Paper
Fine-grained non-interactive key exchange, revisited
 
2024-12-04Paper
Fast public-key silent OT and more from constrained Naor-Reingold
 
2024-11-13Paper
Correlated pseudorandomness from the hardness of quasi-abelian decoding
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
A note on non-interactive zero-knowledge from CDH
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Fine-grained non-interactive key-exchange: constructions and lower bounds
Advances in Cryptology – EUROCRYPT 2023
2024-01-16Paper
Oblivious transfer with constant computational overhead
Advances in Cryptology – EUROCRYPT 2023
2024-01-16Paper
Constrained pseudorandom functions from homomorphic secret sharing
Advances in Cryptology – EUROCRYPT 2023
2023-12-12Paper
Sublinear-communication secure multiparty computation does not require FHE
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Short signatures from regular syndrome decoding in the head
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Pseudorandom correlation functions from variable-density LPN, revisited
Lecture Notes in Computer Science
2023-11-16Paper
Improved private set intersection for sets with small entries
Lecture Notes in Computer Science
2023-11-16Paper
Random sources in private computation
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Non-interactive secure computation of inner-product from LPN and LWE
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Sublinear secure computation from new assumptions
Theory of Cryptography
2023-08-14Paper
Anonymous whistleblowing over authenticated channels
Theory of Cryptography
2023-08-14Paper
Correlated pseudorandomness from expand-accumulate codes
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Efficient NIZKs for algebraic sets
Lecture Notes in Computer Science
2023-05-12Paper
On derandomizing Yao's weak-to-strong OWF construction
 
2023-04-13Paper
Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer
 
2023-04-13Paper
Statistical ZAPs from group-based assumptions
 
2023-03-31Paper
Shorter non-interactive zero-knowledge arguments and ZAPs for algebraic languages
 
2022-12-07Paper
Efficient pseudorandom correlation generators from ring-LPN
 
2022-11-09Paper
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO
Lecture Notes in Computer Science
2022-10-13Paper
On building fine-grained one-way functions from strong average-case hardness
 
2022-08-30Paper
Low-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2\)]
 
2022-05-18Paper
Silver: silent VOLE and oblivious transfer from hardness of decoding structured LDPC codes
 
2022-04-22Paper
On pseudorandom encodings
 
2022-03-23Paper
Breaking the circuit size barrier for secure computation under quasi-polynomial LPN
 
2021-12-08Paper
Efficient range proofs with transparent setup from bounded integer commitments
 
2021-12-08Paper
Non-interactive zero-knowledge in pairing-free groups from weaker assumptions
 
2021-12-01Paper
Efficient pseudorandom correlation generators: silent OT extension and more
 
2020-03-09Paper
A note on the communication complexity of multiparty computation in the correlated randomness model
 
2020-02-06Paper
Designated-verifier pseudorandom generators, and their applications
 
2020-02-06Paper
Non-interactive keyed-verification anonymous credentials
 
2020-01-28Paper
On the concrete security of Goldreich's pseudorandom generator
 
2019-01-23Paper
New protocols for secure equality test and comparison
 
2018-08-10Paper
Efficient designated-verifier non-interactive zero-knowledge proofs of knowledge
 
2018-07-17Paper
Encryption switching protocols
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
Implicit zero-knowledge arguments and applications to the malicious setting
Lecture Notes in Computer Science
2015-12-10Paper


Research outcomes over time


This page was built for person: Geoffroy Couteau