Roch Lescuyer

According to our database1, Roch Lescuyer authored at least 20 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Revisiting PACD-based Attacks on RSA-CRT.
IACR Cryptol. ePrint Arch., 2024

2018
Biometric Systems Private by Design: Reasoning about privacy properties of biometric system architectures.
Trans. Data Priv., 2018

Recognition Over Encrypted Faces.
Proceedings of the Mobile, Secure, and Programmable Networking, 2018

2016
Delegating Biometric Authentication with the Sumcheck Protocol.
Proceedings of the Information Security Theory and Practice, 2016

Study of a Verifiable Biometric Matching.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

Searchable Encryption for Biometric Identification Revisited.
Proceedings of the Data Privacy Management and Security Assurance, 2016

Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Hierarchical Identities from Group Signatures and Pseudonymous Signatures.
Proceedings of the New Codebreakers, 2016

A Verifiable System for Automated Face Identification.
Proceedings of the 2016 International Conference of the Biometrics Special Interest Group, 2016

Software-Only Two-Factor Authentication Secure Against Active Servers.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016

2015
Some applications of verifiable computation to biometric verification.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Reasoning about Privacy Properties of Biometric Systems Architectures in the Presence of Information Leakage.
Proceedings of the Information Security - 18th International Conference, 2015

Privacy by Design in Practice: Reasoning about Privacy Properties of Biometric System Architectures.
Proceedings of the FM 2015: Formal Methods, 2015

2014
Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents.
IACR Cryptol. ePrint Arch., 2014

Direct Anonymous Attestations with Dependent Basename Opening.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

2013
A Privacy-Preserving Contactless Transport Service for NFC Smartphones.
Proceedings of the Mobile Computing, Applications, and Services, 2013

Protecting privacy by sanitizing personal data: a new approach to anonymous credentials.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Sanitizable Signatures with Several Signers and Sanitizers.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
Anonymous credentials from (indexed) aggregate signatures.
Proceedings of the DIM'11, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Chicago, IL, USA, 2011

Multi-show Anonymous Credentials with Encrypted Attributes in the Standard Model.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011


  Loading...