@INPROCEEDINGS{cgUCL-LPQ18,
 	AUTHOR={Libert, Benoit and Peters, Thomas and Qian, Chen},
	TITLE={{Logarithmic-Size Ring Signatures With Tight Security from the DDH Assumption}},
	BOOKTITLE={Esorics 2018},
	PUBLISHER={Springer},
	EDITOR={Javier Lopez, Jianying Zhou, Miguel Soriano},
	SERIES={Lecture Notes in Computer Science},
	PAGES={288--308},
	NOTE={To appear},
	MONTH={9},
	YEAR={2018},
}

@ARTICLE{cgUCL-PBPS17,
 	AUTHOR={Pereira, Olivier and Berti, Francesco and Peters, Thomas and Standaert, François-Xavier},
	TITLE={{On Leakage-Resilient Authenticated Encryption with Decryption Leakages}},
	PUBLISHER={IACR},
	JOURNAL={IACR Transactions on Symmetric Cryptology},
	VOLUME={3},
	PAGES={271-293},
	MONTH={9},
	YEAR={2017},
}

@INPROCEEDINGS{cgUCL-CPP17,
 	AUTHOR={Couteau, Geoffroy and Peters, Thomas and Pointcheval, David},
	TITLE={{Removing the Strong RSA Assumption from Arguments over the Integers}},
	BOOKTITLE={Eurocrypt'17},
	PUBLISHER={Springer},
	EDITOR={J.-S. Coron & J.B.Nielsen},
	SERIES={Lecture Notes in Computer Science},
	NOTE={To appear},
	MONTH={5},
	YEAR={2017},
}

@INPROCEEDINGS{cgUCL-LPQ17,
 	AUTHOR={Libert, Benoit and Peters, Thomas and Qian, Chen},
	TITLE={{Structure-Preserving Chosen-Ciphertext Security With Shorter Verifiable Ciphertexts}},
	BOOKTITLE={Public-Key Cryptography -- PKC'17},
	PUBLISHER={Spinger},
	EDITOR={Serge Fehr},
	SERIES={Lecture Notes in Computer Science},
	NOTE={To appear},
	MONTH={3},
	YEAR={2017},
}

@INPROCEEDINGS{cgUCL-CPP16,
 	AUTHOR={Couteau, Geoffroy and Peters, Thomas and Pointcheval, David},
	TITLE={{Encryption Switching Protocols}},
	BOOKTITLE={Crypto'16},
	PUBLISHER={Spinger},
	EDITOR={M. Robshow & J. Katz},
	SERIES={Lecture Notes in Computer Science},
	NOTE={To appear},
	MONTH={8},
	YEAR={2016},
}

@INPROCEEDINGS{cgUCL-LMPY16,
 	AUTHOR={Libert, Benoit and Mouhartem, Fabrice and Peters, Thomas and Yung, Moti},
	TITLE={{Practical ``Signatures with Efficient Protocols'' from Simple Assumptions}},
	BOOKTITLE={ASIACCS 2016},
	PUBLISHER={ACM},
	EDITOR={X.F. Wang & X. Huang},
	MONTH={5},
	YEAR={2016},
}

@INPROCEEDINGS{cgUCL-LPJY15,
 	AUTHOR={Libert, Benoit and Peters, Thomas and Joye, Marc and Yung, Moti},
	TITLE={{Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications}},
	BOOKTITLE={Asiacrypt'15},
	PUBLISHER={Spinger},
	EDITOR={T. Iwata & J. H. Cheon},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={9452},
	MONTH={12},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-LPY15,
 	AUTHOR={Libert, Benoit and Peters, Thomas and Yung, Moti},
	TITLE={{Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions}},
	BOOKTITLE={Crypto'15},
	PUBLISHER={Springer},
	EDITOR={R. Gennaro & M. Robshaw},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={9216},
	PAGES={296--316},
	MONTH={8},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-LJYP15,
 	AUTHOR={Libert, Benoit and Joye, Marc and Yung, Moti and Peters, Thomas},
	TITLE={{Secure Efficient History-Hiding Append-Only Signatures in the Standard Model}},
	BOOKTITLE={Public-Key Cryptography - PKC'15},
	PUBLISHER={Springer},
	EDITOR={Jonathan Katz},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={9020},
	PAGES={450--473},
	MONTH={3},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-LJPY14,
 	AUTHOR={Libert, Benoit and Joye, Marc and Peters, Thomas and Yung, Moti},
	TITLE={{Concise Multi-Challenge CCA-secure Encryption and Signatures with Almost Tight Security}},
	BOOKTITLE={Asiacrypt 2014},
	PUBLISHER={Spinger},
	EDITOR={Iwata and Sarkar},
	SERIES={Lecture Notes in Computer Science},
	MONTH={12},
	YEAR={2014},
}

@INPROCEEDINGS{cgUCL-LPJY14,
 	AUTHOR={Libert, Benoit and Peters, Thomas and Joye, Marc and Yung, Moti},
	TITLE={{Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure  Encryption  from Homomorphic Signatures}},
	BOOKTITLE={Eurocrypt 2014},
	PUBLISHER={Spinger},
	EDITOR={P.Q. Nguyen & E. Oswald},
	SERIES={Lecture Notes in Computer Science},
	MONTH={5},
	YEAR={2014},
}

@INPROCEEDINGS{cgUCL-LYJP14,
 	AUTHOR={Libert, Benoit and Yung, Moti and Joye, Marc and Peters, Thomas},
	TITLE={{Traceable Group Encryption}},
	BOOKTITLE={Public-Key Cryptography – PKC 2014},
	PUBLISHER={Spinger},
	EDITOR={H. Krawczyk & A. Waissbein},
	SERIES={Lecture Notes in Computer Science},
	MONTH={3},
	YEAR={2014},
}

@INPROCEEDINGS{cgUCL-CCDGPS13,
 	AUTHOR={Canard, Sébastien and Coisel, Iwen and Devigne, Julien and Gallais, Cécilia and Peters, Thomas and Sanders, Olivier},
	TITLE={{Toward Generic Method for Server-Aided Cryptography}},
	BOOKTITLE={International Conference on Information and Communications Security - ICICS 2013},
	PUBLISHER={Springer},
	EDITOR={S. Qing & J. Zhou},
	SERIES={Lecture Notes in Computer Science},
	MONTH={11},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-CPP13,
 	AUTHOR={Cuvelier, Édouard and Pereira, Olivier and Peters, Thomas},
	TITLE={{Election Verifiability or Ballot Privacy : Do We Need to Choose?}},
	BOOKTITLE={Computer Security – ESORICS 2013},
	PUBLISHER={Springer Berlin Heidelberg},
	EDITOR={Crampton, Jason and Jajodia, Sushil and Mayes, Keith},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={8134},
	PAGES={481-498},
	MONTH={9},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-LPJY13,
 	AUTHOR={Libert, Benoit and Peters, Thomas and Joye, Marc and Yung, Moti},
	TITLE={{Linearly Homomorphic Structure-Preserving Signatures and Their Applications}},
	BOOKTITLE={Crypto 2013},
	PUBLISHER={Springer},
	EDITOR={H. Handschuh & R. Canetti & J. Garay},
	SERIES={Lecture Notes in Computer Science},
	MONTH={8},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-ALP13,
 	AUTHOR={Attrapadung, Nuttapong and Libert, Benoit and Peters, Thomas},
	TITLE={{Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures}},
	BOOKTITLE={Public-Key Cryptography – PKC 2013},
	PUBLISHER={Springer},
	EDITOR={K. Kurosawa & G. Hanaoka},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={7778},
	MONTH={2},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-ALP12,
 	AUTHOR={Attrapadung, Nuttapong and Libert, Benoit and Peters, Thomas},
	TITLE={{Computing on Authenticated Data: New Privacy Definitions and Constructions}},
	BOOKTITLE={Asiacrypt 2012},
	PUBLISHER={Springer},
	EDITOR={X. Wang & K. Sako},
	SERIES={Lecture Notes on Computer Science},
	VOLUME={7658},
	PAGES={367-385},
	MONTH={12},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-LPY12,
 	AUTHOR={Libert, Benoit and Peters, Thomas and Yung, Moti},
	TITLE={{Group Signatures with Almost-for-free Revocation}},
	BOOKTITLE={Crypto 2012},
	PUBLISHER={Springer},
	EDITOR={R. Safavi-Naini & R. Canetti},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={7417},
	PAGES={571-589},
	MONTH={8},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-LPY12,
 	AUTHOR={Libert, Benoit and Peters, Thomas and Yung, Moti},
	TITLE={{Scalable Group Signatures with Revocation}},
	BOOKTITLE={Eurocrypt 2012},
	PUBLISHER={Springer},
	EDITOR={D. Pointcheval & T. Johansson},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={7237},
	PAGES={609-627},
	MONTH={4},
	YEAR={2012},
}