default search action
Thomas Peters
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Yaobin Shen, Thomas Peters, François-Xavier Standaert:
Multiplex: TBC-Based Authenticated Encryption with Sponge-Like Rate. IACR Trans. Symmetric Cryptol. 2024(2): 1-34 (2024) - [c37]Thi Van Thao Doan, Olivier Pereira, Thomas Peters:
Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable Elections. ACNS (1) 2024: 257-287 - [c36]Thi Van Thao Doan, Olivier Pereira, Thomas Peters:
Threshold Receipt-Free Single-Pass eVoting. E-Vote-ID 2024: 20-36 - [c35]Henri Devillez, Olivier Pereira, Thomas Peters:
Practical Traceable Receipt-Free Encryption. SCN (1) 2024: 367-387 - [c34]Henri Devillez, Olivier Pereira, Thomas Peters, Quentin Yang:
Can we cast a ballot as intended and be receipt free? SP 2024: 3440-3457 - [i29]Thomas Peters, Yaobin Shen, François-Xavier Standaert:
Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate. IACR Cryptol. ePrint Arch. 2024: 294 (2024) - [i28]Henri Devillez, Olivier Pereira, Thomas Peters:
Verifiable and Private Vote-by-Mail. IACR Cryptol. ePrint Arch. 2024: 926 (2024) - [i27]Henri Devillez, Olivier Pereira, Thomas Peters:
Practical Traceable Receipt-Free Encryption. IACR Cryptol. ePrint Arch. 2024: 1162 (2024) - 2023
- [j9]Billy G. Ram, Yu Zhang, Cristiano Costa, Mohammed Raju Ahmed, Thomas Peters, Amit Jhala, Kirk Howatt, Xin Sun:
Palmer amaranth identification using hyperspectral imaging and machine learning technologies in soybean field. Comput. Electron. Agric. 215: 108444 (2023) - [j8]Francesco Berti, Chun Guo, Thomas Peters, Yaobin Shen, François-Xavier Standaert:
Secure Message Authentication in the Presence of Leakage and Faults. IACR Trans. Symmetric Cryptol. 2023(1): 288-315 (2023) - [c33]Clément Hoffmann, Benoît Libert, Charles Momin, Thomas Peters, François-Xavier Standaert:
POLKA: Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption. Public Key Cryptography (1) 2023: 114-144 - 2022
- [j7]Yaobin Shen, Thomas Peters, François-Xavier Standaert, Gaëtan Cassiers, Corentin Verhamme:
Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 135-162 (2022) - [c32]Henri Devillez, Olivier Pereira, Thomas Peters:
Traceable Receipt-Free Encryption. ASIACRYPT (3) 2022: 273-303 - [c31]Henri Devillez, Olivier Pereira, Thomas Peters:
How to Verifiably Encrypt Many Bits for an Election? ESORICS (2) 2022: 653-671 - [c30]Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung:
One-Shot Fiat-Shamir-Based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Signatures in the Standard Model. EUROCRYPT (2) 2022: 488-519 - [c29]Julien Devevey, Benoît Libert, Thomas Peters:
Rational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model. Public Key Cryptography (1) 2022: 615-646 - [i26]Henri Devillez, Olivier Pereira, Thomas Peters:
Traceable Receipt-Free Encryption. IACR Cryptol. ePrint Arch. 2022: 822 (2022) - [i25]Clément Hoffmann, Benoît Libert, Charles Momin, Thomas Peters, François-Xavier Standaert:
Towards Leakage-Resistant Post-Quantum CCA-Secure Public Key Encryption. IACR Cryptol. ePrint Arch. 2022: 873 (2022) - [i24]Henri Devillez, Olivier Pereira, Thomas Peters:
How to Verifiably Encrypt Many Bits for an Election? IACR Cryptol. ePrint Arch. 2022: 1051 (2022) - [i23]Francesco Berti, Chun Guo, Thomas Peters, Yaobin Shen, François-Xavier Standaert:
Secure Message Authentication in the Presence of Leakage and Faults. IACR Cryptol. ePrint Arch. 2022: 1142 (2022) - 2021
- [j6]Olivier Bronchain, Charles Momin, Thomas Peters, François-Xavier Standaert:
Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 641-676 (2021) - [c28]Francesco Berti, Chun Guo, Thomas Peters, François-Xavier Standaert:
Efficient Leakage-Resilient MACs Without Idealized Assumptions. ASIACRYPT (2) 2021: 95-123 - [c27]Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung:
Bifurcated Signatures: Folding the Accountability vs. Anonymity Dilemma into a Single Private Signing Scheme. EUROCRYPT (3) 2021: 521-552 - [c26]Julien Devevey, Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung:
Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings. Public Key Cryptography (1) 2021: 659-690 - [i22]Julien Devevey, Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung:
Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings. IACR Cryptol. ePrint Arch. 2021: 630 (2021) - [i21]Francesco Berti, Chun Guo, Thomas Peters, François-Xavier Standaert:
Efficient Leakage-Resilient MACs without Idealized Assumptions. IACR Cryptol. ePrint Arch. 2021: 1250 (2021) - 2020
- [j5]Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1): 256-320 (2020) - [j4]Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction. IACR Trans. Symmetric Cryptol. 2020(1): 6-42 (2020) - [j3]Davide Bellizia, Francesco Berti, Olivier Bronchain, Gaëtan Cassiers, Sébastien Duval, Chun Guo, Gregor Leander, Gaëtan Leurent, Itamar Levi, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert, Balazs Udvarhelyi, Friedrich Wiemer:
Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher. IACR Trans. Symmetric Cryptol. 2020(S1): 295-349 (2020) - [c25]Davide Bellizia, Olivier Bronchain, Gaëtan Cassiers, Vincent Grosso, Chun Guo, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography - A Practical Guide Through the Leakage-Resistance Jungle. CRYPTO (1) 2020: 369-400 - [i20]Davide Bellizia, Olivier Bronchain, Gaëtan Cassiers, Vincent Grosso, Chun Guo, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle. IACR Cryptol. ePrint Arch. 2020: 211 (2020) - [i19]Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung:
Compact Simulation-Sound NIZK Arguments of Composite Residuosity and Applications to Logarithmic-Size Ring Signatures. IACR Cryptol. ePrint Arch. 2020: 1334 (2020)
2010 – 2019
- 2019
- [c24]Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions. Inscrypt 2019: 517-532 - [c23]Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract). LATINCRYPT 2019: 150-172 - [c22]Gaëtan Cassiers, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security. SPACE 2019: 67-85 - [i18]Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications. IACR Cryptol. ePrint Arch. 2019: 137 (2019) - [i17]Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge. IACR Cryptol. ePrint Arch. 2019: 193 (2019) - [i16]Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions. IACR Cryptol. ePrint Arch. 2019: 1413 (2019) - 2018
- [c21]Francesco Berti, François Koeune, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives. AsiaCCS 2018: 37-50 - [c20]Benoît Libert, Thomas Peters, Chen Qian:
Logarithmic-Size Ring Signatures with Tight Security from the DDH Assumption. ESORICS (2) 2018: 288-308 - [c19]Francesco Berti, Olivier Pereira, Thomas Peters:
Reconsidering Generic Composition: The Tag-then-Encrypt Case. INDOCRYPT 2018: 70-90 - [i15]Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions. IACR Cryptol. ePrint Arch. 2018: 484 (2018) - [i14]Francesco Berti, Olivier Pereira, Thomas Peters:
Reconsidering Generic Composition: the Tag-then-Encrypt case. IACR Cryptol. ePrint Arch. 2018: 991 (2018) - 2017
- [j2]Francesco Berti, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
On Leakage-Resilient Authenticated Encryption with Decryption Leakages. IACR Trans. Symmetric Cryptol. 2017(3): 271-293 (2017) - [c18]Geoffroy Couteau, Thomas Peters, David Pointcheval:
Removing the Strong RSA Assumption from Arguments over the Integers. EUROCRYPT (2) 2017: 321-350 - [c17]Benoît Libert, Thomas Peters, Chen Qian:
Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts. Public Key Cryptography (1) 2017: 247-276 - 2016
- [c16]Benoît Libert, Fabrice Mouhartem, Thomas Peters, Moti Yung:
Practical "Signatures with Efficient Protocols" from Simple Assumptions. AsiaCCS 2016: 511-522 - [c15]Geoffroy Couteau, Thomas Peters, David Pointcheval:
Encryption Switching Protocols. CRYPTO (1) 2016: 308-338 - [i13]Geoffroy Couteau, Thomas Peters, David Pointcheval:
Removing the Strong RSA Assumption from Arguments over the Integers. IACR Cryptol. ePrint Arch. 2016: 128 (2016) - [i12]Francesco Berti, François Koeune, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Leakage-Resilient and Misuse-Resistant Authenticated Encryption. IACR Cryptol. ePrint Arch. 2016: 996 (2016) - 2015
- [j1]Benoît Libert, Thomas Peters, Marc Joye, Moti Yung:
Linearly homomorphic structure-preserving signatures and their applications. Des. Codes Cryptogr. 77(2-3): 441-477 (2015) - [c14]Benoît Libert, Thomas Peters, Marc Joye, Moti Yung:
Compactly Hiding Linear Spans - Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications. ASIACRYPT (1) 2015: 681-707 - [c13]Benoît Libert, Thomas Peters, Moti Yung:
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions. CRYPTO (2) 2015: 296-316 - [c12]Geoffroy Couteau, Thomas Peters, David Pointcheval:
Secure Distributed Computation on Private Inputs. FPS 2015: 14-26 - [c11]Benoît Libert, Marc Joye, Moti Yung, Thomas Peters:
Secure Efficient History-Hiding Append-Only Signatures in the Standard Model. Public Key Cryptography 2015: 450-473 - [i11]Benoît Libert, Thomas Peters, Marc Joye, Moti Yung:
Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications. IACR Cryptol. ePrint Arch. 2015: 242 (2015) - [i10]Benoît Libert, Thomas Peters, Moti Yung:
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions. IACR Cryptol. ePrint Arch. 2015: 743 (2015) - [i9]Geoffroy Couteau, Thomas Peters, David Pointcheval:
Encryption Switching Protocols. IACR Cryptol. ePrint Arch. 2015: 990 (2015) - [i8]Geoffroy Couteau, Thomas Peters, David Pointcheval:
Secure Distributed Computation on Private Inputs. IACR Cryptol. ePrint Arch. 2015: 1196 (2015) - 2014
- [b1]Thomas Peters:
Privacy enhancing cryptographic mechanisms with public verifiability. Catholic University of Louvain, Louvain-la-Neuve, Belgium, 2014 - [c10]Benoît Libert, Marc Joye, Moti Yung, Thomas Peters:
Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security. ASIACRYPT (2) 2014: 1-21 - [c9]Benoît Libert, Thomas Peters, Marc Joye, Moti Yung:
Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures. EUROCRYPT 2014: 514-532 - [c8]Benoît Libert, Moti Yung, Marc Joye, Thomas Peters:
Traceable Group Encryption. Public Key Cryptography 2014: 592-610 - [i7]Thomas Peters:
The physics of volume rendering. CoRR abs/1410.6022 (2014) - [i6]Benoît Libert, Marc Joye, Moti Yung, Thomas Peters:
Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security. IACR Cryptol. ePrint Arch. 2014: 743 (2014) - 2013
- [c7]Benoît Libert, Thomas Peters, Marc Joye, Moti Yung:
Linearly Homomorphic Structure-Preserving Signatures and Their Applications. CRYPTO (2) 2013: 289-307 - [c6]Edouard Cuvelier, Olivier Pereira, Thomas Peters:
Election Verifiability or Ballot Privacy: Do We Need to Choose? ESORICS 2013: 481-498 - [c5]Sébastien Canard, Iwen Coisel, Julien Devigne, Cécilia Gallais, Thomas Peters, Olivier Sanders:
Toward Generic Method for Server-Aided Cryptography. ICICS 2013: 373-392 - [c4]Nuttapong Attrapadung, Benoît Libert, Thomas Peters:
Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures. Public Key Cryptography 2013: 386-404 - [i5]Edouard Cuvelier, Olivier Pereira, Thomas Peters:
Election Verifiability or Ballot Privacy: Do We Need to Choose? IACR Cryptol. ePrint Arch. 2013: 216 (2013) - [i4]Benoît Libert, Thomas Peters, Marc Joye, Moti Yung:
Linearly Homomorphic Structure-Preserving Signatures and Their Applications. IACR Cryptol. ePrint Arch. 2013: 361 (2013) - [i3]Benoît Libert, Thomas Peters, Marc Joye, Moti Yung:
Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures. IACR Cryptol. ePrint Arch. 2013: 691 (2013) - 2012
- [c3]Nuttapong Attrapadung, Benoît Libert, Thomas Peters:
Computing on Authenticated Data: New Privacy Definitions and Constructions. ASIACRYPT 2012: 367-385 - [c2]Benoît Libert, Thomas Peters, Moti Yung:
Group Signatures with Almost-for-Free Revocation. CRYPTO 2012: 571-589 - [c1]Benoît Libert, Thomas Peters, Moti Yung:
Scalable Group Signatures with Revocation. EUROCRYPT 2012: 609-627 - [i2]Benoît Libert, Thomas Peters, Moti Yung:
Scalable Group Signatures with Revocation. IACR Cryptol. ePrint Arch. 2012: 424 (2012) - [i1]Benoît Libert, Thomas Peters, Moti Yung:
Group Signatures with Almost-for-free Revocation. IACR Cryptol. ePrint Arch. 2012: 442 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 21:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint