Céline Chevalier

From MaRDI portal
Person:2119941

Available identifiers

zbMath Open chevalier.celineWikidataQ102358658 ScholiaQ102358658MaRDI QIDQ2119941

List of research outcomes





PublicationDate of PublicationType
Semi-quantum copy-protection and more2024-08-15Paper
Practical construction for secure trick-taking games even with cards set aside2024-07-17Paper
GeT a CAKE: \underline{Ge}neric \underline{T}ransformations from \underline{K}ey encaspulation mechanisms to password \underline{A}uthenticated \underline{K}ey \underline{E}xchanges2023-11-10Paper
Shorter and faster identity-based signatures with tight security in the (Q)ROM from lattices2023-11-09Paper
On security notions for encryption in a quantum world2023-08-14Paper
Dispelling myths on superposition attacks: formal security model and attack analyses2023-03-21Paper
Embedding the UC model into the IITM model2022-08-30Paper
Almost optimal oblivious transfer from QA-NIZK2022-07-01Paper
Correction to: ``Dispelling myths on superposition attacks: formal security model and attack analyses2022-06-08Paper
Dispelling myths on superposition attacks: formal security model and attack analyses2022-03-31Paper
Hardware security without secure hardware: how to decrypt with a password and a server2021-11-18Paper
Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions2021-02-01Paper
Structure-preserving smooth projective hashing2017-01-06Paper
Adaptive oblivious transfer and generalization2017-01-06Paper
How to (carefully) breach a service contract?2016-05-02Paper
Easing Coppersmith methods using analytic combinatorics: applications to public-key cryptography with weak pseudorandomness2016-04-13Paper
Mitigating server breaches in password-based authentication: secure and efficient solutions2016-04-08Paper
Generic construction of UC-secure oblivious transfer2016-03-10Paper
Non-Interactive Zero-Knowledge Proofs of Non-Membership2016-03-02Paper
Composition of password-based protocols2014-06-30Paper
Analysis and improvement of Lindell's UC-secure commitment schemes2014-01-24Paper
SPHF-friendly non-interactive commitments2013-12-10Paper
New techniques for SPHFs and efficient one-round PAKE protocols2013-09-02Paper
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages2013-04-19Paper
Transforming password protocols to compose2012-08-31Paper
Contributory password-authenticated group key exchange with join capability2011-02-11Paper
Strong cryptography from weak secrets. Building efficient PKE and IBE from distributed passwords2010-05-04Paper
Flexible group key exchange with on-demand computation of subgroup keys2010-05-04Paper
Smooth Projective Hashing for Conditionally Extractable Commitments2009-10-20Paper
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness2009-07-07Paper
Optimal Randomness Extraction from a Diffie-Hellman Element2009-05-12Paper
Distributed Public-Key Cryptography from Weak Secrets2009-03-24Paper
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework2008-04-24Paper

Research outcomes over time

This page was built for person: Céline Chevalier