BibTeX records: Adeline Roux-Langlois

download as .bib file

@article{DBLP:journals/joc/BaiLRSSS18,
  author    = {Shi Bai and
               Tancr{\`{e}}de Lepoint and
               Adeline Roux{-}Langlois and
               Amin Sakzad and
               Damien Stehl{\'{e}} and
               Ron Steinfeld},
  title     = {Improved Security Proofs in Lattice-Based Cryptography: Using the
               R{\'{e}}nyi Divergence Rather than the Statistical Distance},
  journal   = {J. Cryptology},
  volume    = {31},
  number    = {2},
  pages     = {610--640},
  year      = {2018},
  url       = {https://doi.org/10.1007/s00145-017-9265-9},
  doi       = {10.1007/s00145-017-9265-9},
  timestamp = {Mon, 12 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/joc/BaiLRSSS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BertFRS18,
  author    = {Pauline Bert and
               Pierre{-}Alain Fouque and
               Adeline Roux{-}Langlois and
               Mohamed Sabt},
  title     = {Practical Implementation of Ring-SIS/LWE Based Signature and {IBE}},
  booktitle = {Post-Quantum Cryptography - 9th International Conference, PQCrypto
               2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings},
  pages     = {271--291},
  year      = {2018},
  crossref  = {DBLP:conf/pqcrypto/2018},
  url       = {https://doi.org/10.1007/978-3-319-79063-3_13},
  doi       = {10.1007/978-3-319-79063-3_13},
  timestamp = {Thu, 05 Apr 2018 12:57:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/BertFRS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c2si/BonnoronFGHLMR17,
  author    = {Guillaume Bonnoron and
               Caroline Fontaine and
               Guy Gogniat and
               Vincent Herbert and
               Vianney Lap{\^{o}}tre and
               Vincent Migliore and
               Adeline Roux{-}Langlois},
  title     = {Somewhat/Fully Homomorphic Encryption: Implementation Progresses and
               Challenges},
  booktitle = {Codes, Cryptology and Information Security - Second International
               Conference, {C2SI} 2017, Rabat, Morocco, April 10-12, 2017, Proceedings
               - In Honor of Claude Carlet},
  pages     = {68--82},
  year      = {2017},
  crossref  = {DBLP:conf/c2si/2017},
  url       = {https://doi.org/10.1007/978-3-319-55589-8_5},
  doi       = {10.1007/978-3-319-55589-8_5},
  timestamp = {Wed, 24 May 2017 08:27:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/c2si/BonnoronFGHLMR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LangloisS15,
  author    = {Adeline Langlois and
               Damien Stehl{\'{e}}},
  title     = {Worst-case to average-case reductions for module lattices},
  journal   = {Des. Codes Cryptography},
  volume    = {75},
  number    = {3},
  pages     = {565--599},
  year      = {2015},
  url       = {https://doi.org/10.1007/s10623-014-9938-4},
  doi       = {10.1007/s10623-014-9938-4},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/LangloisS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BaiLLSS15,
  author    = {Shi Bai and
               Adeline Langlois and
               Tancr{\`{e}}de Lepoint and
               Damien Stehl{\'{e}} and
               Ron Steinfeld},
  title     = {Improved Security Proofs in Lattice-Based Cryptography: Using the
               R{\'{e}}nyi Divergence Rather Than the Statistical Distance},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {I}},
  pages     = {3--24},
  year      = {2015},
  crossref  = {DBLP:conf/asiacrypt/2015-1},
  url       = {https://doi.org/10.1007/978-3-662-48797-6_1},
  doi       = {10.1007/978-3-662-48797-6_1},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/BaiLLSS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AlbrechtCLL15,
  author    = {Martin R. Albrecht and
               Catalin Cocis and
               Fabien Laguillaumie and
               Adeline Langlois},
  title     = {Implementing Candidate Graded Encoding Schemes from Ideal Lattices},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {II}},
  pages     = {752--775},
  year      = {2015},
  crossref  = {DBLP:conf/asiacrypt/2015-2},
  url       = {https://doi.org/10.1007/978-3-662-48800-3_31},
  doi       = {10.1007/978-3-662-48800-3_31},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/AlbrechtCLL15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiLLSS15,
  author    = {Shi Bai and
               Adeline Langlois and
               Tancr{\`{e}}de Lepoint and
               Damien Stehl{\'{e}} and
               Ron Steinfeld},
  title     = {Improved security proofs in lattice-based cryptography: using the
               R{\'{e}}nyi divergence rather than the statistical distance},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {483},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/483},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BaiLLSS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Langlois14,
  author    = {Adeline Langlois},
  title     = {Lattice - Based Cryptography - Security Foundations and Constructions.
               (Cryptographie reposant sur les r{\'{e}}seaux Euclidiens - Fondations
               de s{\'{e}}curit{\'{e}} et Constructions)},
  school    = {{\'{E}}cole normale sup{\'{e}}rieure de Lyon, France},
  year      = {2014},
  url       = {https://tel.archives-ouvertes.fr/tel-01126931},
  timestamp = {Thu, 30 Jun 2016 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/phd/hal/Langlois14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LangloisSS14,
  author    = {Adeline Langlois and
               Damien Stehl{\'{e}} and
               Ron Steinfeld},
  title     = {GGHLite: More Efficient Multilinear Maps from Ideal Lattices},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  pages     = {239--256},
  year      = {2014},
  crossref  = {DBLP:conf/eurocrypt/2014},
  url       = {https://doi.org/10.1007/978-3-642-55220-5_14},
  doi       = {10.1007/978-3-642-55220-5_14},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/LangloisSS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LangloisLNW14,
  author    = {Adeline Langlois and
               San Ling and
               Khoa Nguyen and
               Huaxiong Wang},
  title     = {Lattice-Based Group Signature Scheme with Verifier-Local Revocation},
  booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
               on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
               March 26-28, 2014. Proceedings},
  pages     = {345--361},
  year      = {2014},
  crossref  = {DBLP:conf/pkc/2014},
  url       = {https://doi.org/10.1007/978-3-642-54631-0_20},
  doi       = {10.1007/978-3-642-54631-0_20},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/LangloisLNW14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LangloisLNW14,
  author    = {Adeline Langlois and
               San Ling and
               Khoa Nguyen and
               Huaxiong Wang},
  title     = {Lattice-based Group Signature Scheme with Verifier-local Revocation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {33},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/033},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/LangloisLNW14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LangloisSS14,
  author    = {Adeline Langlois and
               Damien Stehl{\'{e}} and
               Ron Steinfeld},
  title     = {GGHLite: More Efficient Multilinear Maps from Ideal Lattices},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {487},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/487},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/LangloisSS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtCLL14,
  author    = {Martin R. Albrecht and
               Catalin Cocis and
               Fabien Laguillaumie and
               Adeline Langlois},
  title     = {Improved Parameters and an Implementation of Graded Encoding Schemes
               from Ideal Lattices},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {928},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/928},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AlbrechtCLL14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LaguillaumieLLS13,
  author    = {Fabien Laguillaumie and
               Adeline Langlois and
               Beno{\^{\i}}t Libert and
               Damien Stehl{\'{e}}},
  title     = {Lattice-Based Group Signatures with Logarithmic Signature Size},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  pages     = {41--61},
  year      = {2013},
  crossref  = {DBLP:conf/asiacrypt/2013-2},
  url       = {https://doi.org/10.1007/978-3-642-42045-0_3},
  doi       = {10.1007/978-3-642-42045-0_3},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/LaguillaumieLLS13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BrakerskiLPRS13,
  author    = {Zvika Brakerski and
               Adeline Langlois and
               Chris Peikert and
               Oded Regev and
               Damien Stehl{\'{e}}},
  title     = {Classical hardness of learning with errors},
  booktitle = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA,
               USA, June 1-4, 2013},
  pages     = {575--584},
  year      = {2013},
  crossref  = {DBLP:conf/stoc/2013},
  url       = {http://doi.acm.org/10.1145/2488608.2488680},
  doi       = {10.1145/2488608.2488680},
  timestamp = {Mon, 20 Mar 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/stoc/BrakerskiLPRS13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BrakerskiLPRS13,
  author    = {Zvika Brakerski and
               Adeline Langlois and
               Chris Peikert and
               Oded Regev and
               Damien Stehl{\'{e}}},
  title     = {Classical Hardness of Learning with Errors},
  journal   = {CoRR},
  volume    = {abs/1306.0281},
  year      = {2013},
  url       = {http://arxiv.org/abs/1306.0281},
  archivePrefix = {arXiv},
  eprint    = {1306.0281},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/BrakerskiLPRS13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaguillaumieLLS13,
  author    = {Fabien Laguillaumie and
               Adeline Langlois and
               Beno{\^{\i}}t Libert and
               Damien Stehl{\'{e}}},
  title     = {Lattice-Based Group Signatures with Logarithmic Signature Size},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {308},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/308},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/LaguillaumieLLS13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LangloisS12,
  author    = {Adeline Langlois and
               Damien Stehl{\'{e}}},
  title     = {Worst-Case to Average-Case Reductions for Module Lattices},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {90},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/090},
  timestamp = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/LangloisS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pqcrypto/2018,
  editor    = {Tanja Lange and
               Rainer Steinwandt},
  title     = {Post-Quantum Cryptography - 9th International Conference, PQCrypto
               2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10786},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-79063-3},
  doi       = {10.1007/978-3-319-79063-3},
  isbn      = {978-3-319-79062-6},
  timestamp = {Thu, 05 Apr 2018 12:57:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/c2si/2017,
  editor    = {Said El Hajji and
               Abderrahmane Nitaj and
               El Mamoun Souidi},
  title     = {Codes, Cryptology and Information Security - Second International
               Conference, {C2SI} 2017, Rabat, Morocco, April 10-12, 2017, Proceedings
               - In Honor of Claude Carlet},
  series    = {Lecture Notes in Computer Science},
  volume    = {10194},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-55589-8},
  doi       = {10.1007/978-3-319-55589-8},
  isbn      = {978-3-319-55588-1},
  timestamp = {Wed, 24 May 2017 08:27:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/c2si/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2015-1,
  editor    = {Tetsu Iwata and
               Jung Hee Cheon},
  title     = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9452},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48797-6},
  doi       = {10.1007/978-3-662-48797-6},
  isbn      = {978-3-662-48796-9},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2015-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2015-2,
  editor    = {Tetsu Iwata and
               Jung Hee Cheon},
  title     = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9453},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48800-3},
  doi       = {10.1007/978-3-662-48800-3},
  isbn      = {978-3-662-48799-0},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2015-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2014,
  editor    = {Phong Q. Nguyen and
               Elisabeth Oswald},
  title     = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8441},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-55220-5},
  doi       = {10.1007/978-3-642-55220-5},
  isbn      = {978-3-642-55219-9},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2014,
  editor    = {Hugo Krawczyk},
  title     = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
               on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
               March 26-28, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8383},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-54631-0},
  doi       = {10.1007/978-3-642-54631-0},
  isbn      = {978-3-642-54630-3},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2013-2,
  editor    = {Kazue Sako and
               Palash Sarkar},
  title     = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8270},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-42045-0},
  doi       = {10.1007/978-3-642-42045-0},
  isbn      = {978-3-642-42044-3},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2013-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stoc/2013,
  editor    = {Dan Boneh and
               Tim Roughgarden and
               Joan Feigenbaum},
  title     = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA,
               USA, June 1-4, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2488608},
  isbn      = {978-1-4503-2029-0},
  timestamp = {Sun, 26 May 2013 10:30:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stoc/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier