Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Daniel P. Kennedy
Roland Zumkeller
Maximilian Dürr
Dan Graur
Liangliang Shang
Kun Chen
Brunelli Pinto Miranda
Chen Ma
Barbara Aquilani
Manfred Besner
Home
/
Author
/
THOMAS PETERS
Author Info
Open Visualization
Name
Affiliation
Papers
THOMAS PETERS
Université Catholique de Louvain, ICTEAM Institute, Belgium
25
Collaborators
Citations
PageRank
32
212
11.78
Referers
Referees
References
319
451
535
Search Limit
100
451
Publications (25 rows)
Collaborators (32 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Spook: Sponge-Based Leakage-Resistant Authenticated Encryption With A Masked Tweakable Block Cipher
0
0.34
2020
Towards Low-Energy Leakage-Resistant Authenticated Encryption From The Duplex Sponge Construction
0
0.34
2020
TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications.
0
0.34
2020
Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions.
0
0.34
2019
Spookchain: Chaining A Sponge-Based Aead With Beyond-Birthday Security
0
0.34
2019
Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge.
0
0.34
2019
TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications.
0
0.34
2019
Reconsidering Generic Composition: the Tag-then-Encrypt case.
0
0.34
2018
Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions.
0
0.34
2018
Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives.
1
0.37
2018
Removing the Strong RSA Assumption from Arguments over the Integers.
2
0.36
2017
On Leakage-Resilient Authenticated Encryption With Decryption Leakages
0
0.34
2017
Structure-Preserving Chosen-Ciphertext Security With Shorter Verifiable Ciphertexts
1
0.35
2017
Practical "Signatures with Efficient Protocols" from Simple Assumptions.
3
0.37
2016
Encryption Switching Protocols.
0
0.34
2016
Leakage-Resilient and Misuse-Resistant Authenticated Encryption.
1
0.35
2016
Short Group Signatures Via Structure-Preserving Signatures: Standard Model Security From Simple Assumptions
20
0.62
2015
Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications.
0
0.34
2015
Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security.
11
0.49
2014
Election Verifiability or Ballot Privacy: Do We Need to Choose?
15
0.65
2013
Linearly Homomorphic Structure-Preserving Signatures and Their Applications.
39
0.99
2013
Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures.
10
0.48
2013
Scalable group signatures with revocation
16
0.58
2012
Computing on authenticated data: new privacy definitions and constructions
50
1.07
2012
Group Signatures with Almost-for-free Revocation.
43
1.05
2012
1