Tancrède Lepoint

research scientist
at Google

director (2018-2020)
of the IACR

co-editor (since 2016)
of the Cryptology ePrint Archive

home • publications & preprints • phd 

    2019

  1. Public-Key Function-Private Hidden Vector Encryption (and More)
    James Bartusek, Brent Carmer, Abhishek Jain, Zhengzhong Jin, Tancrède Lepoint, Fermi Ma, Tal Malkin, Alex J. Malozemoff, and Mariana Raykova
    Asiacrypt 2019eprint
  2. SNUSE: A secure computation approach for large-scale user re-enrollment in biometric authentication systems
    Ivan De Oliveira Nunes, Karim Eldefrawy, and Tancrède Lepoint
    Future Generation Computer Systems 2019article
  3. New Techniques for Obfuscating Conjunctions
    James Bartusek, Tancrède Lepoint, Fermi Ma, and Mark Zhandry
    Eurocrypt 2019eprint
  4. 2018

  5. Toward an Internet of Battlefield Things: A Resilience Perspective
    Tarek F. Abdelzaher, Nora Ayanian, Tamer Basar, Suhas Diggavi, Jana Diesner, Deepak Ganesan, Ramesh Govindan, Susmit Jha, Tancrède Lepoint, Benjamin M. Marlin, Klara Nahrstedt, David M. Nicol, Raj Rajkumar, Stephen Russell, Sanjit A. Seshia, Fei Sha, Prashant J. Shenoy, Mani B. Srivastava, Gaurav S. Sukhatme, Ananthram Swami, Paulo Tabuada, Don Towsley, Nitin H. Vaidya, and Venugopal V. Veeravalli
    IEEE Computerarticle
  6. CRYSTALS -- Dilithium: Digital Signatures from Module Lattices
    Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, and Damien Stehlé
    TCHES 2018eprintgithubwebsite
  7. Will Distributed Computing Revolutionize War? The Emergency of Battlefield IoT
    Tarek F. Abdelzaher, Nora Ayanian, Tamer Basar, Suhas Diggavi, Jana Diesner, Deepak Ganesan, Ramesh Govindan, Susmit Jha, Tancrède Lepoint, Benjamin M. Marlin, Klara Nahrstedt, David M. Nicol, Raj Rajkumar, Stephen Russell, Sanjit A. Seshia, Fei Sha, Prashant J. Shenoy, Mani B. Srivastava, Gaurav S. Sukhatme, Ananthram Swami, Paulo Tabuada, Don Towsley, and Venugopal V. Veeravalli
    ICDCS 2018article
  8. Risks and Benefits of Side-Channels in Battlefields
    Ioannis Agadakos, Gabriela F. Ciocarlie, Bogdan Copos, Tancrède Lepoint, Ulf Lindqvist, and Michael Locasto
    Fusion 2018article
  9. Callisto: A Cryptographic Approach To Detect Serial Predators Of Sexual Misconduct
    Anjana Rajan, Lucy Qin, David W. Archer, Dan Boneh, Tancrède Lepoint, and Mayank Varia
    COMPASS (Best Note award)websitewhitepaper
  10. Secure Non-Interactive User Re-Enrollment in Biometrics-based Identification and Authentication Systems
    Ivan De Oliveira Nunes, Karim Eldefrawy, and Tancrède Lepoint
    CSCML 2018article
  11. Delegating Elliptic-Curve Operations with Homomorphic Encryption
    Carlos Aguilar-Melchor, Jean-Christophe Deneuville, Philippe Gaborit, Tancrède Lepoint, and Thomas Ricosset
    4th IEEE Workshop on Security and Privacy in the Cloudarticle
  12. BlockCIS---A Blockchain-based Cyber Insurance System
    Gabriela Ciocarlie, Karim Eldefrawy, and Tancrède Lepoint
    First IEEE Workshop on Blockchain Technologies and Applications 2018article
  13. CRYSTALS -- Kyber: a CCA-secure module-lattice-based KEM
    Joppe Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, and Damien Stehlé
    EuroS&P 2018eprintgithubwebsite
  14. Butterfly Effect: Causality from Chaos in the IoT
    Ioannis Agadakos, Gabriela F. Ciocarlie, Bogdan Copos, Tancrède Lepoint, Ulf Lindqvist, and Michael Locasto
    1st International Workshop on Security and Privacy for the Internet-of-Things (IoTSec) 2018
  15. Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance
    Shi Bai, Tancrède Lepoint, Adeline Roux-Langlois, Amin Sakzad, Damien Stehlé, and Ron Steinfeld
    Journal of Cryptology 2018eprint
  16. 2017

  17. Jumping the Air Gap: Modeling Cyber-Physical Attack Paths in the Internet-of-Things
    Ioannis Agadakos, Chien-Ying Chen, Matteo Campanelli, Prashant Anantharaman, Monowar Hasan, Bogdan Copos, Tancrède Lepoint, Michael Locasto, Gabriela F. Ciocarlie, and Ulf Lindqvist
    CPS-SPC 2017article
  18. Abduction by Non-Experts
    Nikolaj Bjørner, Dejan Jovanovíc, Tancrède Lepoint, Philipp Rümmer, and Martin Schäf
    LPAR 2017pdf
  19. Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
    Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, and Mehdi Tibouchi
    PKC 2017eprint
  20. FHE Over the Integers: Decomposed and Batched in the Post-Quantum Regime
    Daniel Benarroch, Zvika Brakerski, and Tancrède Lepoint
    PKC 2017eprint
  21. Optimization of Bootstrapping in Circuits
    Fabrice Benhamouda, Tancrède Lepoint, Claire Mathieu, and Hang Zhou
    SODA 2017eprint
  22. 2016

  23. Cryptanalysis of GGH15 Multilinear Maps
    Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, and Mehdi Tibouchi
    CRYPTO 2016eprint
  24. Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
    Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, and Renaud Sirdey
    FSE 2016eprint
  25. NFLlib: NTT-based Fast Lattice Library
    Carlos Aguilar-Melchor, Joris Barrier, Serge Guelton, Adrien Guinet, Marc-Olivier Killijian, and Tancrède Lepoint
    CT-RSA 2016pdfgithub
  26. 2015

  27. Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance
    Shi Bai, Adeline Langlois, Tancrède Lepoint, Damien Stehlé, and Ron Steinfeld
    ASIACRYPT 2015 (Best Paper award)eprint
  28. Cryptanalysis of the Co-ACD Assumption
    Pierre-Alain Fouque, Moon Sung Lee, Tancrède Lepoint, and Mehdi Tibouchi
    CRYPTO 2015eprint
  29. New Multilinear Maps over the Integers
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi
    CRYPTO 2015eprintgithub
  30. Zeroizing Without Low-Level Zeroes: New Attacks on Multilinear Maps and Their Limitations
    Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, and Mehdi Tibouchi
    CRYPTO 2015eprint
  31. (fr) Quatre millions d'échanges de clés par seconde
    Carlos Aguilar-Melchor, Serge Guelton, Adrien Guinet, and Tancrède Lepoint
    SSTIC 2015pdf
  32. Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR
    Tancrède Lepoint and Mehdi Tibouchi
    WAHC 2015eprint
  33. (jp) Co-ACD 仮定とそれを基にした準同型暗号方式の安全性評価
    Pierre-Alain Fouque, Tancrède Lepoint, and Mehdi Tibouchi
    SCIS 2015
  34. 2014

  35. A Comparison of the Homomorphic Encryption Schemes FV and YASHE
    Tancrède Lepoint and Michael Naehrig
    AFRICACRYPT 2014eprintgithub
  36. Scale-Invariant Fully Homomorphic Encryption over the Integers
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi
    PKC 2014eprint
  37. 2013

  38. Lattice Signatures and Bimodal Gaussians
    Léo Ducas, Alain Durmus, Tancrède Lepoint, and Vadim Lyubashevsky
    CRYPTO 2013eprintwebsite
  39. Practical Multilinear Maps over the Integers
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi
    CRYPTO 2013eprintgithub
  40. Two Attacks on a White-Box AES Implementation
    Tancrède Lepoint, Matthieu Rivain, Yoni De Mulder, Peter Roelse, and Bart Preneel
    SAC 2013eprint
  41. White-Box Security Notions for Symmetric Encryption Schemes
    Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, and Matthieu Rivain
    SAC 2013eprint
  42. Batch Fully Homomorphic Encryption over the Integers
    Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, and Aaram Yun
    EUROCRYPT 2013eprint
  43. On the Minimal Number of Bootstrappings in Homomorphic Circuits
    Tancrède Lepoint and Pascal Paillier
    WAHC 2013
  44. 2012

  45. Partial key exposure on RSA with private exponents larger than N
    Marc Joye and Tancrède Lepoint
    ISPEC 2012
  46. 2011

  47. Traitor tracing schemes for protected software implementations
    Marc Joye and Tancrède Lepoint
    ACM DRM 2011

Preprints

  1. Trap Me If You Can—Million Dollar Curve
    Thomas Baignères, Cécile Delerablée, Matthieu Finiasz, Louis Goubin, Tancrède Lepoint, and Matthieu Rivain
    Eprint 2015eprintgithubwebsite

  2. Cryptanalysis of the Quadratic Zero-Testing of GGH
    Zvika Brakerski, Craig Gentry, Shai Halevi, Tancrède Lepoint, Amit Sahai, and Mehdi Tibouchi
    Eprint 2015eprint

  3. Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi
    Eprint 2014eprint