Marc Beunardeau

According to our database1, Marc Beunardeau authored at least 21 papers between 2016 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Timed Commitments Revisited.
IACR Cryptol. ePrint Arch., 2023

a<i>P</i>lon<i>K</i>: Aggregated <i>P</i>lon<i>K</i> from Multi-polynomial Commitment Schemes.
Proceedings of the Advances in Information and Computer Security, 2023

2022
aPlonK : Aggregated PlonK from Multi-Polynomial Commitment Schemes.
IACR Cryptol. ePrint Arch., 2022

2021
Partitioned Searchable Encryption.
Proceedings of the Provable and Practical Security, 2021

2020
Optimal Covid-19 Pool Testing with a priori Information.
CoRR, 2020

2019
Application of cryptographic and verification techniques to the security and privacy of information systems. (Cryptographie appliquée à la sécurité des systèmes d'information).
PhD thesis, 2019

Authenticated Key Distribution: When the Coupon Collector is Your Enemy.
IACR Cryptol. ePrint Arch., 2019

2018
Reusing Nonces in Schnorr Signatures.
IACR Cryptol. ePrint Arch., 2018

From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions.
CoRR, 2018

2017
A First DFA on PRIDE: from Theory to Practice (extended version).
IACR Cryptol. ePrint Arch., 2017

Honey Encryption for Language.
IACR Cryptol. ePrint Arch., 2017

On the Hardness of the Mersenne Low Hamming Ratio Assumption.
IACR Cryptol. ePrint Arch., 2017

Reusing Nonces in Schnorr Signatures - (and Keeping It Secure...).
Proceedings of the Computer Security - ESORICS 2017, 2017

The Case for System Command Encryption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
White-Box Cryptography: Security in an Insecure Environment.
IEEE Secur. Priv., 2016

Cdoe Obofsucaitn: Securing Software from Within.
IEEE Secur. Priv., 2016

Fully Homomorphic Encryption: Computations with a Blindfold.
IEEE Secur. Priv., 2016

Uniform Sampling for Timed Automata with Application to Language Inclusion Measurement.
Proceedings of the Quantitative Evaluation of Systems - 13th International Conference, 2016

Honey Encryption for Language - Robbing Shannon to Pay Turing?
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

A First DFA on PRIDE: From Theory to Practice.
Proceedings of the Risks and Security of Internet and Systems, 2016

Failure is Also an Option.
Proceedings of the New Codebreakers, 2016


  Loading...