Tancrède Lepoint

Tancrède Lepoint

principal applied scientist at Amazon AI & AGI Security

co-author of ML-KEM and ML-DSA

2026

  1. Delta Debugging for LLM-integrated Systems
    Hao-Nan Zhu, Muhammad Numair Mansur, Martin Schäf, Zeya Chen, Tancrède Lepoint, and Willem Visser
    ICSE-SEIP 2026

2025

  1. Mario: Multi-round Multiple-Aggregator Secure Aggregation with Robustness against Malicious Actors
    Truong Son Nguyen, Tancrède Lepoint, and Ni Trieu
    EuroS&P 2025 eprint
  2. Verified Foundations for Differential Privacy
    Markus de Medeiros, Muhammad Naveed, Tancrède Lepoint, Temesghen Kahsai, Tristan Ravitch, Stefan Zetzsche, Anjali Joshi, Joseph Tassarotti, Aws Albarghouthi, and Jean-Baptiste Tristan
    PLDI 2025 (Distinguished Artifact award) eprint arxiv
  3. Safe Validation of Pricing Agreements
    John Kolesar, Tancrède Lepoint, Martin Schäf, and Willem Visser
    ICSE-SEIP 2025 pdf website
  4. Verifying the Fisher-Yates Shuffle Algorithm in Dafny
    Stefan Zetzsche, Tancrède Lepoint, Jean-Baptiste Tristan, and Mikael Mayer
    Dafny 2025 arxiv

2024

  1. Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium
    Jean-Sébastien Coron, François Gérard, Tancrède Lepoint, Matthias Trannoy, and Rina Zeitoun
    TCHES 2024 eprint

2023

  1. ACORN: Input Validation for Secure Aggregation
    James Bell, Adrià Gascón, Tancrède Lepoint, Baiyu Li, Sarah Meiklejohn, Mariana Raykova, and Cathie Yun
    Usenix 2023 eprint
  2. Vision Paper: Do We Need to Change Some Things? - Open Questions Posed by the Upcoming Post-quantum Migration to Existing Standards and Deployments
    Panos Kampanakis and Tancrède Lepoint
    SSR 2023 pdf
  3. Security Analysis of Signature Schemes with Key Blinding
    Edward Eaton, Tancrède Lepoint, and Christopher A. Wood
    Eprint 2023 eprint

2022

  1. In-app cryptographically-enforced selective access control for Microsoft office and similar platforms
    Karim Eldefrawy, Tancrède Lepoint, and Laura Tam
    CSCML 2022 pdf
  2. Communication-efficient proactive MPC for dynamic groups with dishonest majorities
    Karim Eldefrawy, Tancrède Lepoint, and Antonin Leroux
    ACNS 2022 eprint
  3. On the (in)Security of ROS
    Fabrice Benhamouda, Tancrède Lepoint, Julian Loss, Michele Orrù, and Mariana Raykova
    Journal of Cryptology 2022 eprint
  4. Publicly Verifiable Anonymous Tokens with Private Metadata Bit
    Fabrice Benhamouda, Tancrède Lepoint, Michele Orrù, and Mariana Raykova
    Cryptology ePrint Archive eprint
  5. Private Set Intersection and Compute (chapter)
    Flavio Bergamaschi, Tancrède Lepoint, Peter Leihn, and Sreekanth Kannepalli
    Protecting Privacy through Homomorphic Encryption article

2021

  1. Private Join and Compute from PIR with Default
    Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Karn Seth, and Ni Trieu
    Asiacrypt 2021 eprint
  2. On the (in)security of ROS
    Fabrice Benhamouda, Tancrède Lepoint, Julian Loss, Michele Orrù, and Mariana Raykova
    Eurocrypt 2021 (Best Paper award) eprint
  3. Communication--Computation Trade-offs in PIR
    Asra Ali, Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Phillipp Schoppmann, Karn Seth, and Kevin Yeo
    Usenix 2021 eprint
  4. Advances and Open Problems in Federated Learning
    Peter Kairouz, H. Brendan McMahan, Brendan Avent, Aurélien Bellet, Mehdi Bennis, Arjun Nitin Bhagoji, Kallista A. Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, Rafael G. L. D'Oliveira, Hubert Eichner, Salim El Rouayheb, David Evans, Josh Gardner, Zachary Garrett, Adrià Gascón, Badih Ghazi, Phillip B. Gibbons, Marco Gruteser, Zaïd Harchaoui, Chaoyang He, Lie He, Zhouyuan Huo, Ben Hutchinson, Justin Hsu, Martin Jaggi, Tara Javidi, Gauri Joshi, Mikhail Khodak, Jakub Konecný, Aleksandra Korolova, Farinaz Koushanfar, Sanmi Koyejo, Tancrède Lepoint, Yang Liu, Prateek Mittal, Mehryar Mohri, Richard Nock, Ayfer Özgür, Rasmus Pagh, Hang Qi, Daniel Ramage, Ramesh Raskar, Mariana Raykova, Dawn Song, Weikang Song, Sebastian U. Stich, Ziteng Sun, Ananda Theertha Suresh, Florian Tramèr, Praneeth Vepakomma, Jianyu Wang, Li Xiong, Zheng Xu, Qiang Yang, Felix X. Yu, Han Yu, and Sen Zhao
    Foundations and Trends in Machine Learning, Volume 14 arxiv

2020

  1. Secure Single-Server Aggregation with (Poly)Logarithmic Overhead
    James Bell, K. A. Bonawitz, Adrià Gascón, Tancrède Lepoint, and Mariana Raykova
    ACM CCS 2020 eprint
  2. Efficient Anonymous Tokens with Private Metadata Bit
    Ben Kreuter, Tancrède Lepoint, Michele Orrù, and Mariana Raykova
    Crypto 2020 eprint
  3. Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities
    Karim Eldefrawy, Tancrède Lepoint, and Antonin Leroux
    ACNS 2020 eprint

2019

  1. Public-Key Function-Private Hidden Vector Encryption (and More)
    James Bartusek, Brent Carmer, Abhishek Jain, Zhengzhong Jin, Tancrède Lepoint, Fermi Ma, Tal Malkin, Alex J. Malozemoff, and Mariana Raykova
    Asiacrypt 2019 eprint
  2. SNUSE: A secure computation approach for large-scale user re-enrollment in biometric authentication systems
    Ivan De Oliveira Nunes, Karim Eldefrawy, and Tancrède Lepoint
    Future Generation Computer Systems 2019 article
  3. New Techniques for Obfuscating Conjunctions
    James Bartusek, Tancrède Lepoint, Fermi Ma, and Mark Zhandry
    Eurocrypt 2019 eprint

2018

  1. Toward an Internet of Battlefield Things: A Resilience Perspective
    Tarek F. Abdelzaher, Nora Ayanian, Tamer Basar, Suhas Diggavi, Jana Diesner, Deepak Ganesan, Ramesh Govindan, Susmit Jha, Tancrède Lepoint, Benjamin M. Marlin, Klara Nahrstedt, David M. Nicol, Raj Rajkumar, Stephen Russell, Sanjit A. Seshia, Fei Sha, Prashant J. Shenoy, Mani B. Srivastava, Gaurav S. Sukhatme, Ananthram Swami, Paulo Tabuada, Don Towsley, Nitin H. Vaidya, and Venugopal V. Veeravalli
    IEEE Computer article
  2. CRYSTALS -- Dilithium: Digital Signatures from Module Lattices
    Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, and Damien Stehlé
    TCHES 2018 eprint github website
  3. Will Distributed Computing Revolutionize War? The Emergency of Battlefield IoT
    Tarek F. Abdelzaher, Nora Ayanian, Tamer Basar, Suhas Diggavi, Jana Diesner, Deepak Ganesan, Ramesh Govindan, Susmit Jha, Tancrède Lepoint, Benjamin M. Marlin, Klara Nahrstedt, David M. Nicol, Raj Rajkumar, Stephen Russell, Sanjit A. Seshia, Fei Sha, Prashant J. Shenoy, Mani B. Srivastava, Gaurav S. Sukhatme, Ananthram Swami, Paulo Tabuada, Don Towsley, and Venugopal V. Veeravalli
    ICDCS 2018 article
  4. Risks and Benefits of Side-Channels in Battlefields
    Ioannis Agadakos, Gabriela F. Ciocarlie, Bogdan Copos, Tancrède Lepoint, Ulf Lindqvist, and Michael Locasto
    Fusion 2018 article
  5. Callisto: A Cryptographic Approach To Detect Serial Predators Of Sexual Misconduct
    Anjana Rajan, Lucy Qin, David W. Archer, Dan Boneh, Tancrède Lepoint, and Mayank Varia
    COMPASS (Best Note award) website whitepaper
  6. Secure Non-Interactive User Re-Enrollment in Biometrics-based Identification and Authentication Systems
    Ivan De Oliveira Nunes, Karim Eldefrawy, and Tancrède Lepoint
    CSCML 2018 article
  7. Delegating Elliptic-Curve Operations with Homomorphic Encryption
    Carlos Aguilar-Melchor, Jean-Christophe Deneuville, Philippe Gaborit, Tancrède Lepoint, and Thomas Ricosset
    4th IEEE Workshop on Security and Privacy in the Cloud article
  8. BlockCIS---A Blockchain-based Cyber Insurance System
    Gabriela Ciocarlie, Karim Eldefrawy, and Tancrède Lepoint
    First IEEE Workshop on Blockchain Technologies and Applications 2018 article
  9. CRYSTALS -- Kyber: a CCA-secure module-lattice-based KEM
    Joppe Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, and Damien Stehlé
    EuroS&P 2018 eprint github website
  10. Butterfly Effect: Causality from Chaos in the IoT
    Ioannis Agadakos, Gabriela F. Ciocarlie, Bogdan Copos, Tancrède Lepoint, Ulf Lindqvist, and Michael Locasto
    1st International Workshop on Security and Privacy for the Internet-of-Things (IoTSec) 2018
  11. Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance
    Shi Bai, Tancrède Lepoint, Adeline Roux-Langlois, Amin Sakzad, Damien Stehlé, and Ron Steinfeld
    Journal of Cryptology 2018 eprint

2017

  1. Jumping the Air Gap: Modeling Cyber-Physical Attack Paths in the Internet-of-Things
    Ioannis Agadakos, Chien-Ying Chen, Matteo Campanelli, Prashant Anantharaman, Monowar Hasan, Bogdan Copos, Tancrède Lepoint, Michael Locasto, Gabriela F. Ciocarlie, and Ulf Lindqvist
    CPS-SPC 2017 article
  2. Abduction by Non-Experts
    Nikolaj Bjørner, Dejan Jovanovíc, Tancrède Lepoint, Philipp Rümmer, and Martin Schäf
    LPAR 2017 pdf
  3. Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
    Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, and Mehdi Tibouchi
    PKC 2017 eprint
  4. FHE Over the Integers: Decomposed and Batched in the Post-Quantum Regime
    Daniel Benarroch, Zvika Brakerski, and Tancrède Lepoint
    PKC 2017 eprint
  5. Optimization of Bootstrapping in Circuits
    Fabrice Benhamouda, Tancrède Lepoint, Claire Mathieu, and Hang Zhou
    SODA 2017 eprint

2016

  1. Cryptanalysis of GGH15 Multilinear Maps
    Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, and Mehdi Tibouchi
    CRYPTO 2016 eprint
  2. Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
    Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, and Renaud Sirdey
    FSE 2016 eprint
  3. NFLlib: NTT-based Fast Lattice Library
    Carlos Aguilar-Melchor, Joris Barrier, Serge Guelton, Adrien Guinet, Marc-Olivier Killijian, and Tancrède Lepoint
    CT-RSA 2016 pdf github

2015

  1. Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance
    Shi Bai, Adeline Langlois, Tancrède Lepoint, Damien Stehlé, and Ron Steinfeld
    ASIACRYPT 2015 (Best Paper award) eprint
  2. Trap Me If You Can—Million Dollar Curve
    Thomas Baignères, Cécile Delerablée, Matthieu Finiasz, Louis Goubin, Tancrède Lepoint, and Matthieu Rivain
    Eprint 2015 eprint github website
  3. Cryptanalysis of the Co-ACD Assumption
    Pierre-Alain Fouque, Moon Sung Lee, Tancrède Lepoint, and Mehdi Tibouchi
    CRYPTO 2015 eprint
  4. New Multilinear Maps over the Integers
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi
    CRYPTO 2015 eprint github
  5. Zeroizing Without Low-Level Zeroes: New Attacks on Multilinear Maps and Their Limitations
    Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, and Mehdi Tibouchi
    CRYPTO 2015 eprint
  6. Cryptanalysis of the Quadratic Zero-Testing of GGH
    Zvika Brakerski, Craig Gentry, Shai Halevi, Tancrède Lepoint, Amit Sahai, and Mehdi Tibouchi
    Eprint 2015 eprint
  7. (fr) Quatre millions d'échanges de clés par seconde
    Carlos Aguilar-Melchor, Serge Guelton, Adrien Guinet, and Tancrède Lepoint
    SSTIC 2015 pdf
  8. Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR
    Tancrède Lepoint and Mehdi Tibouchi
    WAHC 2015 eprint
  9. (jp) Co-ACD 仮定とそれを基にした準同型暗号方式の安全性評価
    Pierre-Alain Fouque, Tancrède Lepoint, and Mehdi Tibouchi
    SCIS 2015

2014

  1. Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi
    Eprint 2014 eprint
  2. A Comparison of the Homomorphic Encryption Schemes FV and YASHE
    Tancrède Lepoint and Michael Naehrig
    AFRICACRYPT 2014 eprint github
  3. Scale-Invariant Fully Homomorphic Encryption over the Integers
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi
    PKC 2014 eprint

2013

  1. Lattice Signatures and Bimodal Gaussians
    Léo Ducas, Alain Durmus, Tancrède Lepoint, and Vadim Lyubashevsky
    CRYPTO 2013 eprint website
  2. Practical Multilinear Maps over the Integers
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi
    CRYPTO 2013 eprint github
  3. Two Attacks on a White-Box AES Implementation
    Tancrède Lepoint, Matthieu Rivain, Yoni De Mulder, Peter Roelse, and Bart Preneel
    SAC 2013 eprint
  4. White-Box Security Notions for Symmetric Encryption Schemes
    Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, and Matthieu Rivain
    SAC 2013 eprint
  5. Batch Fully Homomorphic Encryption over the Integers
    Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, and Aaram Yun
    EUROCRYPT 2013 eprint
  6. On the Minimal Number of Bootstrappings in Homomorphic Circuits
    Tancrède Lepoint and Pascal Paillier
    WAHC 2013 pdf article

2012

  1. Partial key exposure on RSA with private exponents larger than N
    Marc Joye and Tancrède Lepoint
    ISPEC 2012 pdf article

2011

  1. Traitor tracing schemes for protected software implementations
    Marc Joye and Tancrède Lepoint
    ACM DRM 2011 pdf article