Denis Butin

Orcid: 0000-0002-7461-1918

According to our database1, Denis Butin authored at least 27 papers between 2011 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
The Status of Quantum-Key-Distribution-Based Long-Term Secure Internet Communication.
IEEE Trans. Sustain. Comput., 2021

2019
Function-Dependent Commitments from Homomorphic Authenticators.
IACR Cryptol. ePrint Arch., 2019

Selecting Secret Sharing Instantiations for Distributed Storage.
Proceedings of the 7th International Workshop on Security in Cloud Computing, 2019

2018
XMSS: eXtended Merkle Signature Scheme.
RFC, May, 2018

Function-Dependent Commitments for Verifiable Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2018

Context Hiding Multi-Key Linearly Homomorphic Authenticators.
IACR Cryptol. ePrint Arch., 2018

CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case.
IACR Cryptol. ePrint Arch., 2018

Differential Power Analysis of XMSS and SPHINCS.
IACR Cryptol. ePrint Arch., 2018

Coalition-Resistant Peer Rating for Long-Term Confidentiality.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

2017
Hash-Based Signatures: State of Play.
IEEE Secur. Priv., 2017

The Status of Quantum-Based Long-Term Secure Communication over the Internet.
CoRR, 2017

Analysing Privacy Analyses.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017

Post-quantum authentication in OpenSSL with hash-based signatures.
Proceedings of the Tenth International Conference on Mobile Computing and Ubiquitous Network, 2017

2016
State Management for Hash Based Signatures.
IACR Cryptol. ePrint Arch., 2016

Formal Policy-Based Provenance Audit.
Proceedings of the Advances in Information and Computer Security, 2016

Post-Quantum Cryptography: State of the Art.
Proceedings of the New Codebreakers, 2016

2015
Body-worn cameras for police accountability: Opportunities and risks.
Comput. Law Secur. Rev., 2015

A Guide to End-to-End Privacy Accountability.
Proceedings of the 1st IEEE/ACM International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, 2015

Real-World Post-Quantum Digital Signatures.
Proceedings of the Cyber Security and Privacy, 2015

Formal Accountability for Biometric Surveillance: A Case Study.
Proceedings of the Privacy Technologies and Policy - Third Annual Privacy Forum, 2015

2014
Inferring Accountability from Trust Perceptions.
Proceedings of the Information Systems Security - 10th International Conference, 2014

Log Analysis for Data Protection Accountability.
Proceedings of the FM 2014: Formal Methods, 2014

Towards a Multidisciplinary Framework to Include Privacy in the Design of Video Surveillance Systems.
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014

2013
Log Design for Accountability.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Towards Verifying Voter Privacy through Unlinkability.
Proceedings of the Engineering Secure Software and Systems - 5th International Symposium, 2013

2012
Verifying Privacy by Little Interaction and No Process Equivalence.
Proceedings of the SECRYPT 2012, 2012

2011
Holistic analysis of mix protocols.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011


  Loading...