What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Céline Chevalier
Google Scholar
31
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/acns
Spilling-Cascade: An Optimal PKE Combiner for KEM Hybridization.
Céline Chevalier
Guirec Lebrun
Ange Martinelli
2025
conf/eurosp
Cryptographic Commitments on Anonymizable Data.
Xavier Bultel
Céline Chevalier
Charlène Jojon
Diandian Liu
Benjamin Nguyen
2025
conf/eurosp
The Art of Bonsai: How Well-Shaped Trees Improve the Communication Cost of MLS.
Céline Chevalier
Guirec Lebrun
Ange Martinelli
Jérôme Plût
2024
journals/cic
On Quantum Simulation-Soundness.
Behzad Abdolmaleki
Céline Chevalier
Ehsan Ebrahimi
Giulio Malavolta
Quoc-Huy Vu
2024
conf/ccs
Quarantined-TreeKEM: A Continuous Group Key Agreement for MLS, Secure in Presence of Inactive Users.
Céline Chevalier
Guirec Lebrun
Ange Martinelli
Abdul Rahman Taleb
2023
conf/fc
Practical Construction for Secure Trick-Taking Games Even with Cards Set Aside.
Rohann Bella
Xavier Bultel
Céline Chevalier
Pascal Lafourcade
Charles Olivier-Anclin
2023
conf/acns
GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges.
Hugo Beguinet
Céline Chevalier
David Pointcheval
Thomas Ricosset
Mélissa Rossi
2023
conf/acns
Shorter and Faster Identity-Based Signatures with Tight Security in the (Q)ROM from Lattices.
Éric Sageloli
Pierre Pébereau
Pierrick Méaux
Céline Chevalier
2023
conf/tcc
Semi-quantum Copy-Protection and More.
Céline Chevalier
Paul Hermouet
Quoc-Huy Vu
2022
conf/eurocrypt
Embedding the UC Model into the IITM Model.
Daniel Rausch
Ralf Küsters
Céline Chevalier
2020
conf/provsec
Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses.
Luka Music
Céline Chevalier
Elham Kashefi
2017
conf/acns
Almost Optimal Oblivious Transfer from QA-NIZK.
Olivier Blazy
Céline Chevalier
Paul Germouty
2016
conf/esorics
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions.
Céline Chevalier
Fabien Laguillaumie
Damien Vergnaud
2016
conf/pkc
Easing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness.
Fabrice Benhamouda
Céline Chevalier
Adrian Thillard
Damien Vergnaud
2016
conf/ctrsa
Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions.
Olivier Blazy
Céline Chevalier
Damien Vergnaud
2016
conf/asiacrypt
Adaptive Oblivious Transfer and Generalization.
Olivier Blazy
Céline Chevalier
Paul Germouty
2016
conf/asiacrypt
Structure-Preserving Smooth Projective Hashing.
Olivier Blazy
Céline Chevalier
2015
conf/acns
Generic Construction of UC-Secure Oblivious Transfer.
Olivier Blazy
Céline Chevalier
2015
conf/ctrsa
Non-Interactive Zero-Knowledge Proofs of Non-Membership.
Olivier Blazy
Céline Chevalier
Damien Vergnaud
2013
conf/crypto
New Techniques for SPHFs and Efficient One-Round PAKE Protocols.
Fabrice Benhamouda
Olivier Blazy
Céline Chevalier
David Pointcheval
Damien Vergnaud
2013
conf/acns
Analysis and Improvement of Lindell's UC-Secure Commitment Schemes.
Olivier Blazy
Céline Chevalier
David Pointcheval
Damien Vergnaud
2013
conf/pkc
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.
Fabrice Ben Hamouda
Olivier Blazy
Céline Chevalier
David Pointcheval
Damien Vergnaud
2013
conf/asiacrypt
SPHF-Friendly Non-interactive Commitments.
Michel Abdalla
Fabrice Benhamouda
Olivier Blazy
Céline Chevalier
David Pointcheval
2011
conf/ctrsa
Contributory Password-Authenticated Group Key Exchange with Join Capability.
Michel Abdalla
Céline Chevalier
Louis Granboulan
David Pointcheval
2010
conf/africacrypt
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys.
Michel Abdalla
Céline Chevalier
Mark Manulis
David Pointcheval
2010
conf/africacrypt
Strong Cryptography from Weak Secrets.
Xavier Boyen
Céline Chevalier
Georg Fuchsbauer
David Pointcheval
2009
conf/crypto
Smooth Projective Hashing for Conditionally Extractable Commitments.
Michel Abdalla
Céline Chevalier
David Pointcheval
2009
conf/pkc
Distributed Public-Key Cryptography from Weak Secrets.
Michel Abdalla
Xavier Boyen
Céline Chevalier
David Pointcheval
2009
conf/eurocrypt
Optimal Randomness Extraction from a Diffie-Hellman Element.
Céline Chevalier
Pierre-Alain Fouque
David Pointcheval
Sébastien Zimmer
2009
conf/africacrypt
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness.
Michel Abdalla
Dario Catalano
Céline Chevalier
David Pointcheval
2008
conf/ctrsa
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework.
Michel Abdalla
Dario Catalano
Céline Chevalier
David Pointcheval
Coauthors
Abdul Rahman Taleb
(1)
Adrian Thillard
(1)
Ange Martinelli
(3)
Behzad Abdolmaleki
(1)
Benjamin Nguyen
(1)
Céline Chevalier
(31)
Charlène Jojon
(1)
Charles Olivier-Anclin
(1)
Damien Vergnaud
(7)
Daniel Rausch
(1)
Dario Catalano
(2)
David Pointcheval
(13)
Diandian Liu
(1)
Ehsan Ebrahimi
(1)
Elham Kashefi
(1)
Éric Sageloli
(1)
Fabien Laguillaumie
(1)
Fabrice Ben Hamouda
(1)
Fabrice Benhamouda
(3)
Georg Fuchsbauer
(1)
Giulio Malavolta
(1)
Guirec Lebrun
(3)
Hugo Beguinet
(1)
Jérôme Plût
(1)
Louis Granboulan
(1)
Luka Music
(1)
Mark Manulis
(1)
Mélissa Rossi
(1)
Michel Abdalla
(7)
Olivier Blazy
(10)
Pascal Lafourcade
(1)
Paul Germouty
(2)
Paul Hermouet
(1)
Pierre Pébereau
(1)
Pierre-Alain Fouque
(1)
Pierrick Méaux
(1)
Quoc-Huy Vu
(2)
Ralf Küsters
(1)
Rohann Bella
(1)
Sébastien Zimmer
(1)
Thomas Ricosset
(1)
Xavier Boyen
(2)
Xavier Bultel
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to