Céline Chevalier
Orcid: 0009-0006-4231-4958
According to our database1,
Céline Chevalier
authored at least 51 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
Quarantined-TreeKEM: A Continuous Group Key Agreement for MLS, Secure in Presence of Inactive Users.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Shorter and Faster Identity-Based Signatures with Tight Security in the (Q)ROM from Lattices.
IACR Cryptol. ePrint Arch., 2023
Quarantined-TreeKEM: a Continuous Group Key Agreement for MLS, Secure in Presence of Inactive Users.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Verification and Evaluation of Computer and Communication Systems, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Correction to: Dispelling myths on superposition attacks: formal security model and attack analyses.
Des. Codes Cryptogr., 2022
Dispelling myths on superposition attacks: formal security model and attack analyses.
Des. Codes Cryptogr., 2022
2021
Hardware security without secure hardware: How to decrypt with a password and a server.
Theor. Comput. Sci., 2021
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions.
Algorithmica, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Converting networks to predictive logic models from perturbation signalling data with CellNOpt.
Bioinform., 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
2019
Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions.
IACR Cryptol. ePrint Arch., 2019
CoRR, 2019
2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
2016
Easing Coppersmith Methods using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the New Codebreakers, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
2012
IACR Cryptol. ePrint Arch., 2012
2011
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
2010
Proceedings of the Progress in Cryptology, 2010
Proceedings of the Progress in Cryptology, 2010
2009
Proceedings of the Public Key Cryptography, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness.
Proceedings of the Progress in Cryptology, 2009
2008
Proceedings of the Topics in Cryptology, 2008