Tancrède Lepoint

research scientist
at Google

director (2018-2020)
of the IACR

co-editor (since 2016)
of the Cryptology ePrint Archive

home • publications & preprints • phd 

    2019

  1. New Techniques for Obfuscating Conjunctions
    James Bartusek, Tancrède Lepoint, Fermi Ma, and Mark Zhandry
    Eurocrypt 2019eprint
  2. 2018

  3. Toward an Internet of Battlefield Things: A Resilience Perspective
    Tarek F. Abdelzaher, Nora Ayanian, Tamer Basar, Suhas Diggavi, Jana Diesner, Deepak Ganesan, Ramesh Govindan, Susmit Jha, Tancrède Lepoint, Benjamin M. Marlin, Klara Nahrstedt, David M. Nicol, Raj Rajkumar, Stephen Russell, Sanjit A. Seshia, Fei Sha, Prashant J. Shenoy, Mani B. Srivastava, Gaurav S. Sukhatme, Ananthram Swami, Paulo Tabuada, Don Towsley, Nitin H. Vaidya, and Venugopal V. Veeravalli
    IEEE Computerarticle
  4. CRYSTALS -- Dilithium: Digital Signatures from Module Lattices
    Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, and Damien Stehlé
    TCHES 2018eprintgithubwebsite
  5. Will Distributed Computing Revolutionize War? The Emergency of Battlefield IoT
    Tarek F. Abdelzaher, Nora Ayanian, Tamer Basar, Suhas Diggavi, Jana Diesner, Deepak Ganesan, Ramesh Govindan, Susmit Jha, Tancrède Lepoint, Benjamin M. Marlin, Klara Nahrstedt, David M. Nicol, Raj Rajkumar, Stephen Russell, Sanjit A. Seshia, Fei Sha, Prashant J. Shenoy, Mani B. Srivastava, Gaurav S. Sukhatme, Ananthram Swami, Paulo Tabuada, Don Towsley, and Venugopal V. Veeravalli
    ICDCS 2018article
  6. Risks and Benefits of Side-Channels in Battlefields
    Ioannis Agadakos, Gabriela F. Ciocarlie, Bogdan Copos, Tancrède Lepoint, Ulf Lindqvist, and Michael Locasto
    Fusion 2018article
  7. Callisto: A Cryptographic Approach To Detect Serial Predators Of Sexual Misconduct
    Anjana Rajan, Lucy Qin, David W. Archer, Dan Boneh, Tancrède Lepoint, and Mayank Varia
    COMPASS (Best Note award)websitewhitepaper
  8. Secure Non-Interactive User Re-Enrollment in Biometrics-based Identification and Authentication Systems
    Ivan de Oliveira Nunes, Karim Eldefrawy, and Tancrède Lepoint
    CSCML 2018article
  9. Delegating Elliptic-Curve Operations with Homomorphic Encryption
    Carlos Aguilar-Melchor, Jean-Christophe Deneuville, Philippe Gaborit, Tancrède Lepoint, and Thomas Ricosset
    4th IEEE Workshop on Security and Privacy in the Cloudarticle
  10. BlockCIS---A Blockchain-based Cyber Insurance System
    Gabriela Ciocarlie, Karim Eldefrawy, and Tancrède Lepoint
    First IEEE Workshop on Blockchain Technologies and Applications 2018article
  11. CRYSTALS -- Kyber: a CCA-secure module-lattice-based KEM
    Joppe Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, and Damien Stehlé
    EuroS&P 2018eprintgithubwebsite
  12. Butterfly Effect: Causality from Chaos in the IoT
    Ioannis Agadakos, Gabriela F. Ciocarlie, Bogdan Copos, Tancrède Lepoint, Ulf Lindqvist, and Michael Locasto
    1st International Workshop on Security and Privacy for the Internet-of-Things (IoTSec) 2018
  13. Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance
    Shi Bai, Tancrède Lepoint, Adeline Roux-Langlois, Amin Sakzad, Damien Stehlé, and Ron Steinfeld
    Journal of Cryptology 2018eprint
  14. 2017

  15. Jumping the Air Gap: Modeling Cyber-Physical Attack Paths in the Internet-of-Things
    Ioannis Agadakos, Chien-Ying Chen, Matteo Campanelli, Prashant Anantharaman, Monowar Hasan, Bogdan Copos, Tancrède Lepoint, Michael Locasto, Gabriela F. Ciocarlie, and Ulf Lindqvist
    CPS-SPC 2017article
  16. Abduction by Non-Experts
    Nikolaj Bjørner, Dejan Jovanovíc, Tancrède Lepoint, Philipp Rümmer, and Martin Schäf
    LPAR 2017pdf
  17. Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
    Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, and Mehdi Tibouchi
    PKC 2017eprint
  18. FHE Over the Integers: Decomposed and Batched in the Post-Quantum Regime
    Daniel Benarroch, Zvika Brakerski, and Tancrède Lepoint
    PKC 2017eprint
  19. Optimization of Bootstrapping in Circuits
    Fabrice Benhamouda, Tancrède Lepoint, Claire Mathieu, and Hang Zhou
    SODA 2017eprint
  20. 2016

  21. Cryptanalysis of GGH15 Multilinear Maps
    Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, and Mehdi Tibouchi
    CRYPTO 2016eprint
  22. Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
    Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, and Renaud Sirdey
    FSE 2016eprint
  23. NFLlib: NTT-based Fast Lattice Library
    Carlos Aguilar-Melchor, Joris Barrier, Serge Guelton, Adrien Guinet, Marc-Olivier Killijian, and Tancrède Lepoint
    CT-RSA 2016pdfgithub
  24. 2015

  25. Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance
    Shi Bai, Adeline Langlois, Tancrède Lepoint, Damien Stehlé, and Ron Steinfeld
    ASIACRYPT 2015 (Best Paper award)eprint
  26. Cryptanalysis of the Co-ACD Assumption
    Pierre-Alain Fouque, Moon Sung Lee, Tancrède Lepoint, and Mehdi Tibouchi
    CRYPTO 2015eprint
  27. New Multilinear Maps over the Integers
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi
    CRYPTO 2015eprintgithub
  28. Zeroizing Without Low-Level Zeroes: New Attacks on Multilinear Maps and Their Limitations
    Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, and Mehdi Tibouchi
    CRYPTO 2015eprint
  29. (fr) Quatre millions d'échanges de clés par seconde
    Carlos Aguilar-Melchor, Serge Guelton, Adrien Guinet, and Tancrède Lepoint
    SSTIC 2015pdf
  30. Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR
    Tancrède Lepoint and Mehdi Tibouchi
    WAHC 2015eprint
  31. (jp) Co-ACD 仮定とそれを基にした準同型暗号方式の安全性評価
    Pierre-Alain Fouque, Tancrède Lepoint, and Mehdi Tibouchi
    SCIS 2015
  32. 2014

  33. A Comparison of the Homomorphic Encryption Schemes FV and YASHE
    Tancrède Lepoint and Michael Naehrig
    AFRICACRYPT 2014eprintgithub
  34. Scale-Invariant Fully Homomorphic Encryption over the Integers
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi
    PKC 2014eprint
  35. 2013

  36. Lattice Signatures and Bimodal Gaussians
    Léo Ducas, Alain Durmus, Tancrède Lepoint, and Vadim Lyubashevsky
    CRYPTO 2013eprintwebsite
  37. Practical Multilinear Maps over the Integers
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi
    CRYPTO 2013eprintgithub
  38. Two Attacks on a White-Box AES Implementation
    Tancrède Lepoint, Matthieu Rivain, Yoni De Mulder, Peter Roelse, and Bart Preneel
    SAC 2013eprint
  39. White-Box Security Notions for Symmetric Encryption Schemes
    Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, and Matthieu Rivain
    SAC 2013eprint
  40. Batch Fully Homomorphic Encryption over the Integers
    Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, and Aaram Yun
    EUROCRYPT 2013eprint
  41. On the Minimal Number of Bootstrappings in Homomorphic Circuits
    Tancrède Lepoint and Pascal Paillier
    WAHC 2013
  42. 2012

  43. Partial key exposure on RSA with private exponents larger than N
    Marc Joye and Tancrède Lepoint
    ISPEC 2012
  44. 2011

  45. Traitor tracing schemes for protected software implementations
    Marc Joye and Tancrède Lepoint
    ACM DRM 2011

Preprints

  1. Trap Me If You Can—Million Dollar Curve
    Thomas Baignères, Cécile Delerablée, Matthieu Finiasz, Louis Goubin, Tancrède Lepoint, and Matthieu Rivain
    Eprint 2015eprintgithubwebsite

  2. Cryptanalysis of the Quadratic Zero-Testing of GGH
    Zvika Brakerski, Craig Gentry, Shai Halevi, Tancrède Lepoint, Amit Sahai, and Mehdi Tibouchi
    Eprint 2015eprint

  3. Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi
    Eprint 2014eprint