Céline Chevalier

From MaRDI portal
Person:2119941



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On security notions for encryption in a quantum world
Designs, Codes and Cryptography
2025-10-30Paper
Semi-quantum copy-protection and more2024-08-15Paper
Practical construction for secure trick-taking games even with cards set aside2024-07-17Paper
GeT a CAKE: \underline{Ge}neric \underline{T}ransformations from \underline{K}ey encaspulation mechanisms to password \underline{A}uthenticated \underline{K}ey \underline{E}xchanges2023-11-10Paper
Shorter and faster identity-based signatures with tight security in the (Q)ROM from lattices2023-11-09Paper
On security notions for encryption in a quantum world
Lecture Notes in Computer Science
2023-08-14Paper
Dispelling myths on superposition attacks: formal security model and attack analyses
Provable and Practical Security
2023-03-21Paper
Embedding the UC model into the IITM model2022-08-30Paper
Almost optimal oblivious transfer from QA-NIZK2022-07-01Paper
Correction to: ``Dispelling myths on superposition attacks: formal security model and attack analyses
Designs, Codes and Cryptography
2022-06-08Paper
Dispelling myths on superposition attacks: formal security model and attack analyses
Designs, Codes and Cryptography
2022-03-31Paper
Hardware security without secure hardware: how to decrypt with a password and a server
Theoretical Computer Science
2021-11-18Paper
Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions
Algorithmica
2021-02-01Paper
Structure-preserving smooth projective hashing
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Adaptive oblivious transfer and generalization
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
How to (carefully) breach a service contract?
The New Codebreakers
2016-05-02Paper
Easing Coppersmith methods using analytic combinatorics: applications to public-key cryptography with weak pseudorandomness
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Mitigating server breaches in password-based authentication: secure and efficient solutions
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
Generic construction of UC-secure oblivious transfer
Applied Cryptography and Network Security
2016-03-10Paper
Non-Interactive Zero-Knowledge Proofs of Non-Membership
Lecture Notes in Computer Science
2016-03-02Paper
Composition of password-based protocols
Formal Methods in System Design
2014-06-30Paper
Analysis and improvement of Lindell's UC-secure commitment schemes
Applied Cryptography and Network Security
2014-01-24Paper
SPHF-friendly non-interactive commitments
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
New techniques for SPHFs and efficient one-round PAKE protocols
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Transforming password protocols to compose2012-08-31Paper
Contributory password-authenticated group key exchange with join capability
Topics in Cryptology – CT-RSA 2011
2011-02-11Paper
Strong cryptography from weak secrets. Building efficient PKE and IBE from distributed passwords
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Flexible group key exchange with on-demand computation of subgroup keys
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Smooth Projective Hashing for Conditionally Extractable Commitments
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
Optimal Randomness Extraction from a Diffie-Hellman Element
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Distributed Public-Key Cryptography from Weak Secrets
Public Key Cryptography – PKC 2009
2009-03-24Paper
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper


Research outcomes over time


This page was built for person: Céline Chevalier