Tancrède Lepoint
he/him

principal applied scientist at AWS Security

author of ML-KEM (FIPS 203) and ML-DSA (FIPS 204)

director (2018-2024)
of the IACR

co-editor (2016-2023)
of the Cryptology ePrint Archive

home • publications & preprints • phd 

    2025

  1. Safe Validation of Pricing Agreements
    John Kolesar, Tancrède Lepoint, Martin Schäf, and Willem Visser
    ICSE-SEIP 2025
  2. Verifying the Fisher-Yates Shuffle Algorithm in Dafny
    Stefan Zetzsche, Tancrède Lepoint, Jean-Baptiste Tristan, and Mikael Mayer
    Dafny 2025
  3. 2024

  4. Verified Foundations for Differential Privacy
    Markus de Medeiros, Muhammad Naveed, Tancrède Lepoint, Temesghen Kahsai, Tristan Ravitch, Stefan Zetzsche, Anjali Joshi, Joseph Tassarotti, Aws Albarghouthi, and Jean-Baptiste Tristan
    Eprint 2024article
  5. Mario: Multi-round Multiple-Aggregator Secure Aggregation with Robustness against Malicious Actors
    Truong Son Nguyen, Tancrède Lepoint, and Ni Trieu
    Eprint 2024eprint
  6. Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium
    Jean-Sébastien Coron, François Gérard, Tancrède Lepoint, Matthias Trannoy, and Rina Zeitoun
    TCHES 2024eprint
  7. 2023

  8. ACORN: Input Validation for Secure Aggregation
    James Bell, Adrià Gascón, Tancrède Lepoint, Baiyu Li, Sarah Meiklejohn, Mariana Raykova, and Cathie Yun
    Usenix 2023eprint
  9. Vision Paper: Do We Need to Change Some Things? - Open Questions Posed by the Upcoming Post-quantum Migration to Existing Standards and Deployments
    Panos Kampanakis and Tancrède Lepoint
    SSR 2023pdf
  10. Security Analysis of Signature Schemes with Key Blinding
    Edward Eaton, Tancrède Lepoint, and Christopher A. Wood
    Eprint 2023eprint
  11. 2022

  12. In-app cryptographically-enforced selective access control for Microsoft office and similar platforms
    Karim Eldefrawy, Tancrède Lepoint, and Laura Tam
    CSCML 2022pdf
  13. Communication-efficient proactive MPC for dynamic groups with dishonest majorities
    Karim Eldefrawy, Tancrède Lepoint, and Antonin Leroux
    ACNS 2022eprint
  14. On the (in)Security of ROS
    Fabrice Benhamouda, Tancrède Lepoint, Julian Loss, Michele Orrù, and Mariana Raykova
    Journal of Cryptology 2022eprint
  15. Publicly Verifiable Anonymous Tokens with Private Metadata Bit
    Fabrice Benhamouda, Tancrède Lepoint, Michele Orrù, and Mariana Raykova
    Cryptology ePrint Archiveeprint
  16. Private Set Intersection and Compute (chapter)
    Flavio Bergamaschi, Tancrède Lepoint, Peter Leihn, and Sreekanth Kannepalli
    Protecting Privacy through Homomorphic Encryptionarticle
  17. 2021

  18. Private Join and Compute from PIR with Default
    Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Karn Seth, and Ni Trieu
    Asiacrypt 2021eprint
  19. On the (in)security of ROS
    Fabrice Benhamouda, Tancrède Lepoint, Julian Loss, Michele Orrù, and Mariana Raykova
    Eurocrypt 2021 (Best Paper award)eprint
  20. Communication--Computation Trade-offs in PIR
    Asra Ali, Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Phillipp Schoppmann, Karn Seth, and Kevin Yeo
    Usenix 2021eprint
  21. Advances and Open Problems in Federated Learning
    Peter Kairouz, H. Brendan McMahan, Brendan Avent, Aurélien Bellet, Mehdi Bennis, Arjun Nitin Bhagoji, Kallista A. Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, Rafael G. L. D'Oliveira, Hubert Eichner, Salim El Rouayheb, David Evans, Josh Gardner, Zachary Garrett, Adrià Gascón, Badih Ghazi, Phillip B. Gibbons, Marco Gruteser, Zaïd Harchaoui, Chaoyang He, Lie He, Zhouyuan Huo, Ben Hutchinson, Justin Hsu, Martin Jaggi, Tara Javidi, Gauri Joshi, Mikhail Khodak, Jakub Konecný, Aleksandra Korolova, Farinaz Koushanfar, Sanmi Koyejo, Tancrède Lepoint, Yang Liu, Prateek Mittal, Mehryar Mohri, Richard Nock, Ayfer Özgür, Rasmus Pagh, Hang Qi, Daniel Ramage, Ramesh Raskar, Mariana Raykova, Dawn Song, Weikang Song, Sebastian U. Stich, Ziteng Sun, Ananda Theertha Suresh, Florian Tramèr, Praneeth Vepakomma, Jianyu Wang, Li Xiong, Zheng Xu, Qiang Yang, Felix X. Yu, Han Yu, and Sen Zhao
    Foundations and Trends in Machine Learning, Volume 14pdf
  22. 2020

  23. Secure Single-Server Aggregation with (Poly)Logarithmic Overhead
    James Bell, K. A. Bonawitz, Adrià Gascón, Tancrède Lepoint, and Mariana Raykova
    ACM CCS 2020eprint
  24. Efficient Anonymous Tokens with Private Metadata Bit
    Ben Kreuter, Tancrède Lepoint, Michele Orrù, and Mariana Raykova
    Crypto 2020eprint
  25. Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities
    Karim Eldefrawy, Tancrède Lepoint, and Antonin Leroux
    ACNS 2020eprint
  26. 2019

  27. Public-Key Function-Private Hidden Vector Encryption (and More)
    James Bartusek, Brent Carmer, Abhishek Jain, Zhengzhong Jin, Tancrède Lepoint, Fermi Ma, Tal Malkin, Alex J. Malozemoff, and Mariana Raykova
    Asiacrypt 2019eprint
  28. SNUSE: A secure computation approach for large-scale user re-enrollment in biometric authentication systems
    Ivan De Oliveira Nunes, Karim Eldefrawy, and Tancrède Lepoint
    Future Generation Computer Systems 2019article
  29. New Techniques for Obfuscating Conjunctions
    James Bartusek, Tancrède Lepoint, Fermi Ma, and Mark Zhandry
    Eurocrypt 2019eprint
  30. 2018

  31. Toward an Internet of Battlefield Things: A Resilience Perspective
    Tarek F. Abdelzaher, Nora Ayanian, Tamer Basar, Suhas Diggavi, Jana Diesner, Deepak Ganesan, Ramesh Govindan, Susmit Jha, Tancrède Lepoint, Benjamin M. Marlin, Klara Nahrstedt, David M. Nicol, Raj Rajkumar, Stephen Russell, Sanjit A. Seshia, Fei Sha, Prashant J. Shenoy, Mani B. Srivastava, Gaurav S. Sukhatme, Ananthram Swami, Paulo Tabuada, Don Towsley, Nitin H. Vaidya, and Venugopal V. Veeravalli
    IEEE Computerarticle
  32. CRYSTALS -- Dilithium: Digital Signatures from Module Lattices
    Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, and Damien Stehlé
    TCHES 2018eprintgithubwebsite
  33. Will Distributed Computing Revolutionize War? The Emergency of Battlefield IoT
    Tarek F. Abdelzaher, Nora Ayanian, Tamer Basar, Suhas Diggavi, Jana Diesner, Deepak Ganesan, Ramesh Govindan, Susmit Jha, Tancrède Lepoint, Benjamin M. Marlin, Klara Nahrstedt, David M. Nicol, Raj Rajkumar, Stephen Russell, Sanjit A. Seshia, Fei Sha, Prashant J. Shenoy, Mani B. Srivastava, Gaurav S. Sukhatme, Ananthram Swami, Paulo Tabuada, Don Towsley, and Venugopal V. Veeravalli
    ICDCS 2018article
  34. Risks and Benefits of Side-Channels in Battlefields
    Ioannis Agadakos, Gabriela F. Ciocarlie, Bogdan Copos, Tancrède Lepoint, Ulf Lindqvist, and Michael Locasto
    Fusion 2018article
  35. Callisto: A Cryptographic Approach To Detect Serial Predators Of Sexual Misconduct
    Anjana Rajan, Lucy Qin, David W. Archer, Dan Boneh, Tancrède Lepoint, and Mayank Varia
    COMPASS (Best Note award)websitewhitepaper
  36. Secure Non-Interactive User Re-Enrollment in Biometrics-based Identification and Authentication Systems
    Ivan De Oliveira Nunes, Karim Eldefrawy, and Tancrède Lepoint
    CSCML 2018article
  37. Delegating Elliptic-Curve Operations with Homomorphic Encryption
    Carlos Aguilar-Melchor, Jean-Christophe Deneuville, Philippe Gaborit, Tancrède Lepoint, and Thomas Ricosset
    4th IEEE Workshop on Security and Privacy in the Cloudarticle
  38. BlockCIS---A Blockchain-based Cyber Insurance System
    Gabriela Ciocarlie, Karim Eldefrawy, and Tancrède Lepoint
    First IEEE Workshop on Blockchain Technologies and Applications 2018article
  39. CRYSTALS -- Kyber: a CCA-secure module-lattice-based KEM
    Joppe Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, and Damien Stehlé
    EuroS&P 2018eprintgithubwebsite
  40. Butterfly Effect: Causality from Chaos in the IoT
    Ioannis Agadakos, Gabriela F. Ciocarlie, Bogdan Copos, Tancrède Lepoint, Ulf Lindqvist, and Michael Locasto
    1st International Workshop on Security and Privacy for the Internet-of-Things (IoTSec) 2018
  41. Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance
    Shi Bai, Tancrède Lepoint, Adeline Roux-Langlois, Amin Sakzad, Damien Stehlé, and Ron Steinfeld
    Journal of Cryptology 2018eprint
  42. 2017

  43. Jumping the Air Gap: Modeling Cyber-Physical Attack Paths in the Internet-of-Things
    Ioannis Agadakos, Chien-Ying Chen, Matteo Campanelli, Prashant Anantharaman, Monowar Hasan, Bogdan Copos, Tancrède Lepoint, Michael Locasto, Gabriela F. Ciocarlie, and Ulf Lindqvist
    CPS-SPC 2017article
  44. Abduction by Non-Experts
    Nikolaj Bjørner, Dejan Jovanovíc, Tancrède Lepoint, Philipp Rümmer, and Martin Schäf
    LPAR 2017pdf
  45. Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
    Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, and Mehdi Tibouchi
    PKC 2017eprint
  46. FHE Over the Integers: Decomposed and Batched in the Post-Quantum Regime
    Daniel Benarroch, Zvika Brakerski, and Tancrède Lepoint
    PKC 2017eprint
  47. Optimization of Bootstrapping in Circuits
    Fabrice Benhamouda, Tancrède Lepoint, Claire Mathieu, and Hang Zhou
    SODA 2017eprint
  48. 2016

  49. Cryptanalysis of GGH15 Multilinear Maps
    Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, and Mehdi Tibouchi
    CRYPTO 2016eprint
  50. Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
    Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, and Renaud Sirdey
    FSE 2016eprint
  51. NFLlib: NTT-based Fast Lattice Library
    Carlos Aguilar-Melchor, Joris Barrier, Serge Guelton, Adrien Guinet, Marc-Olivier Killijian, and Tancrède Lepoint
    CT-RSA 2016pdfgithub
  52. 2015

  53. Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance
    Shi Bai, Adeline Langlois, Tancrède Lepoint, Damien Stehlé, and Ron Steinfeld
    ASIACRYPT 2015 (Best Paper award)eprint
  54. Trap Me If You Can—Million Dollar Curve
    Thomas Baignères, Cécile Delerablée, Matthieu Finiasz, Louis Goubin, Tancrède Lepoint, and Matthieu Rivain
    Eprint 2015eprintgithubwebsite
  55. Cryptanalysis of the Co-ACD Assumption
    Pierre-Alain Fouque, Moon Sung Lee, Tancrède Lepoint, and Mehdi Tibouchi
    CRYPTO 2015eprint
  56. New Multilinear Maps over the Integers
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi
    CRYPTO 2015eprintgithub
  57. Zeroizing Without Low-Level Zeroes: New Attacks on Multilinear Maps and Their Limitations
    Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, and Mehdi Tibouchi
    CRYPTO 2015eprint
  58. Cryptanalysis of the Quadratic Zero-Testing of GGH
    Zvika Brakerski, Craig Gentry, Shai Halevi, Tancrède Lepoint, Amit Sahai, and Mehdi Tibouchi
    Eprint 2015eprint
  59. (fr) Quatre millions d'échanges de clés par seconde
    Carlos Aguilar-Melchor, Serge Guelton, Adrien Guinet, and Tancrède Lepoint
    SSTIC 2015pdf
  60. Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR
    Tancrède Lepoint and Mehdi Tibouchi
    WAHC 2015eprint
  61. (jp) Co-ACD 仮定とそれを基にした準同型暗号方式の安全性評価
    Pierre-Alain Fouque, Tancrède Lepoint, and Mehdi Tibouchi
    SCIS 2015
  62. 2014

  63. Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi
    Eprint 2014eprint
  64. A Comparison of the Homomorphic Encryption Schemes FV and YASHE
    Tancrède Lepoint and Michael Naehrig
    AFRICACRYPT 2014eprintgithub
  65. Scale-Invariant Fully Homomorphic Encryption over the Integers
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi
    PKC 2014eprint
  66. 2013

  67. Lattice Signatures and Bimodal Gaussians
    Léo Ducas, Alain Durmus, Tancrède Lepoint, and Vadim Lyubashevsky
    CRYPTO 2013eprintwebsite
  68. Practical Multilinear Maps over the Integers
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi
    CRYPTO 2013eprintgithub
  69. Two Attacks on a White-Box AES Implementation
    Tancrède Lepoint, Matthieu Rivain, Yoni De Mulder, Peter Roelse, and Bart Preneel
    SAC 2013eprint
  70. White-Box Security Notions for Symmetric Encryption Schemes
    Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, and Matthieu Rivain
    SAC 2013eprint
  71. Batch Fully Homomorphic Encryption over the Integers
    Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, and Aaram Yun
    EUROCRYPT 2013eprint
  72. On the Minimal Number of Bootstrappings in Homomorphic Circuits
    Tancrède Lepoint and Pascal Paillier
    WAHC 2013
  73. 2012

  74. Partial key exposure on RSA with private exponents larger than N
    Marc Joye and Tancrède Lepoint
    ISPEC 2012
  75. 2011

  76. Traitor tracing schemes for protected software implementations
    Marc Joye and Tancrède Lepoint
    ACM DRM 2011