What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Thomas Pornin
Google Scholar
12
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Efficient Proofs of Possession for Legacy Signatures.
Anna P. Y. Woo
Alex Ozdemir
Chad Sharp
Thomas Pornin
Paul Grubbs
2024
journals/cic
A Prime-Order Group with Complete Formulas from Even-Order Elliptic Curves.
Thomas Pornin
2022
journals/tches
BAT: Small and Fast KEM over NTRU Lattices.
Pierre-Alain Fouque
Paul Kirchner
Thomas Pornin
Yang Yu
2020
journals/tosc
Saturnin: a suite of lightweight symmetric algorithms for post-quantum security.
Anne Canteaut
Sébastien Duval
Gaëtan Leurent
María Naya-Plasencia
Léo Perrin
Thomas Pornin
André Schrottenloher
2019
conf/pkc
More Efficient Algorithms for the NTRU Key Generation Using the Field Norm.
Thomas Pornin
Thomas Prest
2007
journals/joc
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication.
Dario Catalano
David Pointcheval
Thomas Pornin
2007
conf/fse
Perfect Block Ciphers with Small Blocks.
Louis Granboulan
Thomas Pornin
2005
conf/acns
Digital Signatures Do Not Guarantee Exclusive Ownership.
Thomas Pornin
Julien P. Stern
2004
conf/crypto
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange.
Dario Catalano
David Pointcheval
Thomas Pornin
2001
conf/ches
Transparent Harddisk Encryption.
Thomas Pornin
2000
conf/ches
Software-Hardware Trade-Offs: Application to A5/1 Cryptanalysis.
Thomas Pornin
Jacques Stern
1998
conf/asiacrypt
Optimal Resistance Against the Davies and Murphy Attack.
Thomas Pornin
Coauthors
Alex Ozdemir
(1)
André Schrottenloher
(1)
Anna P. Y. Woo
(1)
Anne Canteaut
(1)
Chad Sharp
(1)
Dario Catalano
(2)
David Pointcheval
(2)
Gaëtan Leurent
(1)
Jacques Stern
(1)
Julien P. Stern
(1)
Léo Perrin
(1)
Louis Granboulan
(1)
María Naya-Plasencia
(1)
Paul Grubbs
(1)
Paul Kirchner
(1)
Pierre-Alain Fouque
(1)
Sébastien Duval
(1)
Thomas Pornin
(12)
Thomas Prest
(1)
Yang Yu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to