Tancrède Lepoint
he/him

applied scientist at AWS

director (2018-2023)
of the IACR

co-editor (since 2016)
of the Cryptology ePrint Archive

home • publications & preprints • phd 

    2022

  1. In-app cryptographically-enforced selective access control for Microsoft office and similar platforms
    Karim Eldefrawy, Tancrède Lepoint, and Laura Tam
    CSCML 2022pdf
  2. Communication-efficient proactive MPC for dynamic groups with dishonest majorities
    Karim Eldefrawy, Tancrède Lepoint, and Antonin Leroux
    ACNS 2022eprint
  3. Publicly Verifiable Anonymous Tokens with Private Metadata Bit
    Fabrice Benhamouda, Tancrède Lepoint, Michele Orrù, and Mariana Raykova
    Cryptology ePrint Archiveeprint
  4. Private Set Intersection and Compute (chapter)
    Flavio Bergamaschi, Tancrède Lepoint, Peter Leihn, and Sreekanth Kannepalli
    Protecting Privacy through Homomorphic Encryptionarticle
  5. 2021

  6. Private Join and Compute from PIR with Default
    Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Karn Seth, and Ni Trieu
    Asiacrypt 2021eprint
  7. On the (in)security of ROS
    Fabrice Benhamouda, Tancrède Lepoint, Julian Loss, Michele Orrù, and Mariana Raykova
    Eurocrypt 2021 (Best Paper award)eprint
  8. Communication--Computation Trade-offs in PIR
    Asra Ali, Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Phillipp Schoppmann, Karn Seth, and Kevin Yeo
    Usenix 2021eprint
  9. Advances and Open Problems in Federated Learning
    Peter Kairouz, H. Brendan McMahan, Brendan Avent, Aurélien Bellet, Mehdi Bennis, Arjun Nitin Bhagoji, Kallista A. Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, Rafael G. L. D'Oliveira, Hubert Eichner, Salim El Rouayheb, David Evans, Josh Gardner, Zachary Garrett, Adrià Gascón, Badih Ghazi, Phillip B. Gibbons, Marco Gruteser, Zaïd Harchaoui, Chaoyang He, Lie He, Zhouyuan Huo, Ben Hutchinson, Justin Hsu, Martin Jaggi, Tara Javidi, Gauri Joshi, Mikhail Khodak, Jakub Konecný, Aleksandra Korolova, Farinaz Koushanfar, Sanmi Koyejo, Tancrède Lepoint, Yang Liu, Prateek Mittal, Mehryar Mohri, Richard Nock, Ayfer Özgür, Rasmus Pagh, Hang Qi, Daniel Ramage, Ramesh Raskar, Mariana Raykova, Dawn Song, Weikang Song, Sebastian U. Stich, Ziteng Sun, Ananda Theertha Suresh, Florian Tramèr, Praneeth Vepakomma, Jianyu Wang, Li Xiong, Zheng Xu, Qiang Yang, Felix X. Yu, Han Yu, and Sen Zhao
    Foundations and Trends in Machine Learning, Volume 14pdf
  10. 2020

  11. Secure Single-Server Aggregation with (Poly)Logarithmic Overhead
    James Bell, K. A. Bonawitz, Adrià Gascón, Tancrède Lepoint, and Mariana Raykova
    ACM CCS 2020eprint
  12. Efficient Anonymous Tokens with Private Metadata Bit
    Ben Kreuter, Tancrède Lepoint, Michele Orrù, and Mariana Raykova
    Crypto 2020eprint
  13. Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities
    Karim Eldefrawy, Tancrède Lepoint, and Antonin Leroux
    ACNS 2020eprint
  14. 2019

  15. Public-Key Function-Private Hidden Vector Encryption (and More)
    James Bartusek, Brent Carmer, Abhishek Jain, Zhengzhong Jin, Tancrède Lepoint, Fermi Ma, Tal Malkin, Alex J. Malozemoff, and Mariana Raykova
    Asiacrypt 2019eprint
  16. SNUSE: A secure computation approach for large-scale user re-enrollment in biometric authentication systems
    Ivan De Oliveira Nunes, Karim Eldefrawy, and Tancrède Lepoint
    Future Generation Computer Systems 2019article
  17. New Techniques for Obfuscating Conjunctions
    James Bartusek, Tancrède Lepoint, Fermi Ma, and Mark Zhandry
    Eurocrypt 2019eprint
  18. 2018

  19. Toward an Internet of Battlefield Things: A Resilience Perspective
    Tarek F. Abdelzaher, Nora Ayanian, Tamer Basar, Suhas Diggavi, Jana Diesner, Deepak Ganesan, Ramesh Govindan, Susmit Jha, Tancrède Lepoint, Benjamin M. Marlin, Klara Nahrstedt, David M. Nicol, Raj Rajkumar, Stephen Russell, Sanjit A. Seshia, Fei Sha, Prashant J. Shenoy, Mani B. Srivastava, Gaurav S. Sukhatme, Ananthram Swami, Paulo Tabuada, Don Towsley, Nitin H. Vaidya, and Venugopal V. Veeravalli
    IEEE Computerarticle
  20. CRYSTALS -- Dilithium: Digital Signatures from Module Lattices
    Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, and Damien Stehlé
    TCHES 2018eprintgithubwebsite
  21. Will Distributed Computing Revolutionize War? The Emergency of Battlefield IoT
    Tarek F. Abdelzaher, Nora Ayanian, Tamer Basar, Suhas Diggavi, Jana Diesner, Deepak Ganesan, Ramesh Govindan, Susmit Jha, Tancrède Lepoint, Benjamin M. Marlin, Klara Nahrstedt, David M. Nicol, Raj Rajkumar, Stephen Russell, Sanjit A. Seshia, Fei Sha, Prashant J. Shenoy, Mani B. Srivastava, Gaurav S. Sukhatme, Ananthram Swami, Paulo Tabuada, Don Towsley, and Venugopal V. Veeravalli
    ICDCS 2018article
  22. Risks and Benefits of Side-Channels in Battlefields
    Ioannis Agadakos, Gabriela F. Ciocarlie, Bogdan Copos, Tancrède Lepoint, Ulf Lindqvist, and Michael Locasto
    Fusion 2018article
  23. Callisto: A Cryptographic Approach To Detect Serial Predators Of Sexual Misconduct
    Anjana Rajan, Lucy Qin, David W. Archer, Dan Boneh, Tancrède Lepoint, and Mayank Varia
    COMPASS (Best Note award)websitewhitepaper
  24. Secure Non-Interactive User Re-Enrollment in Biometrics-based Identification and Authentication Systems
    Ivan De Oliveira Nunes, Karim Eldefrawy, and Tancrède Lepoint
    CSCML 2018article
  25. Delegating Elliptic-Curve Operations with Homomorphic Encryption
    Carlos Aguilar-Melchor, Jean-Christophe Deneuville, Philippe Gaborit, Tancrède Lepoint, and Thomas Ricosset
    4th IEEE Workshop on Security and Privacy in the Cloudarticle
  26. BlockCIS---A Blockchain-based Cyber Insurance System
    Gabriela Ciocarlie, Karim Eldefrawy, and Tancrède Lepoint
    First IEEE Workshop on Blockchain Technologies and Applications 2018article
  27. CRYSTALS -- Kyber: a CCA-secure module-lattice-based KEM
    Joppe Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, and Damien Stehlé
    EuroS&P 2018eprintgithubwebsite
  28. Butterfly Effect: Causality from Chaos in the IoT
    Ioannis Agadakos, Gabriela F. Ciocarlie, Bogdan Copos, Tancrède Lepoint, Ulf Lindqvist, and Michael Locasto
    1st International Workshop on Security and Privacy for the Internet-of-Things (IoTSec) 2018
  29. Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance
    Shi Bai, Tancrède Lepoint, Adeline Roux-Langlois, Amin Sakzad, Damien Stehlé, and Ron Steinfeld
    Journal of Cryptology 2018eprint
  30. 2017

  31. Jumping the Air Gap: Modeling Cyber-Physical Attack Paths in the Internet-of-Things
    Ioannis Agadakos, Chien-Ying Chen, Matteo Campanelli, Prashant Anantharaman, Monowar Hasan, Bogdan Copos, Tancrède Lepoint, Michael Locasto, Gabriela F. Ciocarlie, and Ulf Lindqvist
    CPS-SPC 2017article
  32. Abduction by Non-Experts
    Nikolaj Bjørner, Dejan Jovanovíc, Tancrède Lepoint, Philipp Rümmer, and Martin Schäf
    LPAR 2017pdf
  33. Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
    Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, and Mehdi Tibouchi
    PKC 2017eprint
  34. FHE Over the Integers: Decomposed and Batched in the Post-Quantum Regime
    Daniel Benarroch, Zvika Brakerski, and Tancrède Lepoint
    PKC 2017eprint
  35. Optimization of Bootstrapping in Circuits
    Fabrice Benhamouda, Tancrède Lepoint, Claire Mathieu, and Hang Zhou
    SODA 2017eprint
  36. 2016

  37. Cryptanalysis of GGH15 Multilinear Maps
    Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, and Mehdi Tibouchi
    CRYPTO 2016eprint
  38. Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
    Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, and Renaud Sirdey
    FSE 2016eprint
  39. NFLlib: NTT-based Fast Lattice Library
    Carlos Aguilar-Melchor, Joris Barrier, Serge Guelton, Adrien Guinet, Marc-Olivier Killijian, and Tancrède Lepoint
    CT-RSA 2016pdfgithub
  40. 2015

  41. Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance
    Shi Bai, Adeline Langlois, Tancrède Lepoint, Damien Stehlé, and Ron Steinfeld
    ASIACRYPT 2015 (Best Paper award)eprint
  42. Trap Me If You Can—Million Dollar Curve
    Thomas Baignères, Cécile Delerablée, Matthieu Finiasz, Louis Goubin, Tancrède Lepoint, and Matthieu Rivain
    Eprint 2015eprintgithubwebsite
  43. Cryptanalysis of the Co-ACD Assumption
    Pierre-Alain Fouque, Moon Sung Lee, Tancrède Lepoint, and Mehdi Tibouchi
    CRYPTO 2015eprint
  44. New Multilinear Maps over the Integers
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi
    CRYPTO 2015eprintgithub
  45. Zeroizing Without Low-Level Zeroes: New Attacks on Multilinear Maps and Their Limitations
    Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, and Mehdi Tibouchi
    CRYPTO 2015eprint
  46. Cryptanalysis of the Quadratic Zero-Testing of GGH
    Zvika Brakerski, Craig Gentry, Shai Halevi, Tancrède Lepoint, Amit Sahai, and Mehdi Tibouchi
    Eprint 2015eprint
  47. (fr) Quatre millions d'échanges de clés par seconde
    Carlos Aguilar-Melchor, Serge Guelton, Adrien Guinet, and Tancrède Lepoint
    SSTIC 2015pdf
  48. Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR
    Tancrède Lepoint and Mehdi Tibouchi
    WAHC 2015eprint
  49. (jp) Co-ACD 仮定とそれを基にした準同型暗号方式の安全性評価
    Pierre-Alain Fouque, Tancrède Lepoint, and Mehdi Tibouchi
    SCIS 2015
  50. 2014

  51. Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi
    Eprint 2014eprint
  52. A Comparison of the Homomorphic Encryption Schemes FV and YASHE
    Tancrède Lepoint and Michael Naehrig
    AFRICACRYPT 2014eprintgithub
  53. Scale-Invariant Fully Homomorphic Encryption over the Integers
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi
    PKC 2014eprint
  54. 2013

  55. Lattice Signatures and Bimodal Gaussians
    Léo Ducas, Alain Durmus, Tancrède Lepoint, and Vadim Lyubashevsky
    CRYPTO 2013eprintwebsite
  56. Practical Multilinear Maps over the Integers
    Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi Tibouchi
    CRYPTO 2013eprintgithub
  57. Two Attacks on a White-Box AES Implementation
    Tancrède Lepoint, Matthieu Rivain, Yoni De Mulder, Peter Roelse, and Bart Preneel
    SAC 2013eprint
  58. White-Box Security Notions for Symmetric Encryption Schemes
    Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, and Matthieu Rivain
    SAC 2013eprint
  59. Batch Fully Homomorphic Encryption over the Integers
    Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, and Aaram Yun
    EUROCRYPT 2013eprint
  60. On the Minimal Number of Bootstrappings in Homomorphic Circuits
    Tancrède Lepoint and Pascal Paillier
    WAHC 2013
  61. 2012

  62. Partial key exposure on RSA with private exponents larger than N
    Marc Joye and Tancrède Lepoint
    ISPEC 2012
  63. 2011

  64. Traitor tracing schemes for protected software implementations
    Marc Joye and Tancrède Lepoint
    ACM DRM 2011