Louis Salvail

According to our database1, Louis Salvail authored at least 44 papers between 1992 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Pseudo-Deterministic One-Way Functions from Pseudorandom States.
CoRR, 2023

Functional Encryption in the Bounded Storage Models.
CoRR, 2023

How to Sign Quantum Messages.
CoRR, 2023

Powerful Primitives in the Bounded Quantum Storage Model.
CoRR, 2023

2022
Fiat-Shamir for Proofs Lacks a Proof Even in the Presence of Shared Entanglement.
IACR Cryptol. ePrint Arch., 2022

2020
Practical Relativistic Zero-Knowledge for NP.
Electron. Colloquium Comput. Complex., 2020

2019
Key Establishment à la Merkle in a Quantum World.
J. Cryptol., 2019

2018
Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation.
IACR Cryptol. ePrint Arch., 2018

2017
Quantum Authentication and Encryption with Key Recycling.
IACR Cryptol. ePrint Arch., 2017

Provably Secure Key Establishment Against Quantum Adversaries.
Proceedings of the 12th Conference on the Theory of Quantum Computation, 2017

Quantum Authentication and Encryption with Key Recycling - Or: How to Re-use a One-Time Pad Even if P=NP - Safely & Feasibly.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

2016
Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Quantifying the Leakage of Quantum Protocols for Classical Two-Party Cryptography.
CoRR, 2015

2014
Secure identification and QKD in the bounded-quantum-storage model.
Theor. Comput. Sci., 2014

Using quantum key distribution for cryptographic purposes: A survey.
Theor. Comput. Sci., 2014

How to re-use a one-time pad safely and almost optimally even if P = NP.
Nat. Comput., 2014

2012
Actively Secure Two-Party Evaluation of any Quantum Operation.
IACR Cryptol. ePrint Arch., 2012

2011
Superposition Attacks on Cryptographic Protocols}.
IACR Cryptol. ePrint Arch., 2011

Merkle Puzzles in a Quantum World.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Two Provers in Isolation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Security of trusted repeater quantum key distribution networks.
J. Comput. Secur., 2010

Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries.
Proceedings of the Advances in Cryptology, 2010

2009

Improving the Security of Quantum Protocols via Commit-and-Open.
Proceedings of the Advances in Cryptology, 2009

On the Power of Two-Party Quantum Cryptography.
Proceedings of the Advances in Cryptology, 2009

2008
Cryptography in the Bounded-Quantum-Storage Model.
SIAM J. Comput., 2008

Quantum Merkle Puzzles.
Proceedings of the Second International Conference on Quantum, 2008

2007
A Tight High-Order Entropic Quantum Uncertainty Relation With Applications.
IACR Cryptol. ePrint Arch., 2007

SECOQC White Paper on Quantum Key Distribution and Cryptography
CoRR, 2007

2005
Oblivious Transfer and Linear Functions.
IACR Cryptol. ePrint Arch., 2005

A Quantum Cipher with Near Optimal Key-Recycling.
Proceedings of the Advances in Cryptology, 2005

2004
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission.
IACR Cryptol. ePrint Arch., 2004

Unfair Noisy Channels and Oblivious Transfer.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004

Computational Collapse of Quantum State with Application to Oblivious Transfer.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004

Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks.
Proceedings of the Advances in Cryptology, 2004

2001
How to Convert the Flavor of a Quantum Bit Commitment.
Proceedings of the Advances in Cryptology, 2001

2000
Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation.
Proceedings of the Advances in Cryptology, 2000

1999
On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions.
Proceedings of the Advances in Cryptology, 1999

1998
Quantum Bit Commitment from a Physical Assumption.
Proceedings of the Advances in Cryptology, 1998

The Search for the Holy Grail in Quantum Cryptography.
Proceedings of the Lectures on Data Security, 1998

1995
Quantum Oblivious Mutual Identification.
Proceedings of the Advances in Cryptology, 1995

1993
Solving the maximum clique problem using a tabu search approach.
Ann. Oper. Res., 1993

Secret-Key Reconciliation by Public Discussion.
Proceedings of the Advances in Cryptology, 1993

1992
Experimental Quantum Cryptography.
J. Cryptol., 1992


  Loading...