Name
Affiliation
Papers
THOMAS PETERS
Université Catholique de Louvain, ICTEAM Institute, Belgium
25
Collaborators
Citations 
PageRank 
32
212
11.78
Referers 
Referees 
References 
319
451
535
Search Limit
100451
Title
Citations
PageRank
Year
Spook: Sponge-Based Leakage-Resistant Authenticated Encryption With A Masked Tweakable Block Cipher00.342020
Towards Low-Energy Leakage-Resistant Authenticated Encryption From The Duplex Sponge Construction00.342020
TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications.00.342020
Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions.00.342019
Spookchain: Chaining A Sponge-Based Aead With Beyond-Birthday Security00.342019
Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge.00.342019
TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications.00.342019
Reconsidering Generic Composition: the Tag-then-Encrypt case.00.342018
Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions.00.342018
Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives.10.372018
Removing the Strong RSA Assumption from Arguments over the Integers.20.362017
On Leakage-Resilient Authenticated Encryption With Decryption Leakages00.342017
Structure-Preserving Chosen-Ciphertext Security With Shorter Verifiable Ciphertexts10.352017
Practical "Signatures with Efficient Protocols" from Simple Assumptions.30.372016
Encryption Switching Protocols.00.342016
Leakage-Resilient and Misuse-Resistant Authenticated Encryption.10.352016
Short Group Signatures Via Structure-Preserving Signatures: Standard Model Security From Simple Assumptions200.622015
Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications.00.342015
Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security.110.492014
Election Verifiability or Ballot Privacy: Do We Need to Choose?150.652013
Linearly Homomorphic Structure-Preserving Signatures and Their Applications.390.992013
Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures.100.482013
Scalable group signatures with revocation160.582012
Computing on authenticated data: new privacy definitions and constructions501.072012
Group Signatures with Almost-for-free Revocation.431.052012