What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Wouter Lueks
Google Scholar
14
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
A Low-Cost Privacy-Preserving Digital Wallet for Humanitarian Aid Distribution.
Eva Luvison
Sylvain Chatel
Justinas Sukaitis
Vincent Graf Narbel
Carmela Troncoso
Wouter Lueks
2024
conf/ccs
Poster: Multiparty Private Set Intersection from Multiparty Homomorphic Encryption.
Christian Mouchet
Sylvain Chatel
Lea Nürnberger
Wouter Lueks
2024
conf/sp
Janus: Safe Biometric Deduplication for Humanitarian Aid Distribution.
Kasra Edalatnejad
Wouter Lueks
Justinas Sukaitis
Vincent Graf Narbel
Massimo Marelli
Carmela Troncoso
2023
journals/popets
Private Collection Matching Protocols.
Kasra Edalatnejad
Mathilde Raynal
Wouter Lueks
Carmela Troncoso
2023
conf/sp
Not Yet Another Digital ID: Privacy-Preserving Humanitarian Aid Distribution.
Boya Wang
Wouter Lueks
Justinas Sukaitis
Vincent Graf Narbel
Carmela Troncoso
2021
journals/popets
CrowdNotifier: Decentralized Privacy-Preserving Presence Tracing.
Wouter Lueks
Seda F. Gürses
Michael Veale
Edouard Bugnion
Marcel Salathé
Kenneth G. Paterson
Carmela Troncoso
2020
journals/popets
Tandem: Securing Keys by Using a Central Server While Preserving Privacy.
Wouter Lueks
Brinda Hampiholi
Greg Alpár
Carmela Troncoso
2020
conf/ccs
19th Workshop on Privacy in the Electronic Society (WPES 2020).
Wouter Lueks
Paul Syverson
2020
conf/uss
DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists.
Kasra Edalatnejad
Wouter Lueks
Julien Pierre Martin
Soline Ledésert
Anne L'Hôte
Bruno Thomas
Laurent Girod
Carmela Troncoso
2020
conf/uss
VoteAgain: A scalable coercion-resistant voting system.
Wouter Lueks
Iñigo Querejeta-Azurmendi
Carmela Troncoso
2019
journals/popets
Reducing Metadata Leakage from Encrypted Files and Communication with PURBs.
Kirill Nikitin
Ludovic Barman
Wouter Lueks
Matthew Underwood
Jean-Pierre Hubaux
Bryan Ford
2017
journals/compsec
Fast revocation of attribute-based credentials for both users and verifiers.
Wouter Lueks
Gergely Alpár
Jaap-Henk Hoepman
Pim Vullers
2015
conf/sec
Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers.
Wouter Lueks
Gergely Alpár
Jaap-Henk Hoepman
Pim Vullers
2015
conf/fc
Sublinear Scaling for Multi-Client Private Information Retrieval.
Wouter Lueks
Ian Goldberg
Coauthors
Anne L'Hôte
(1)
Boya Wang
(1)
Brinda Hampiholi
(1)
Bruno Thomas
(1)
Bryan Ford
(1)
Carmela Troncoso
(8)
Christian Mouchet
(1)
Edouard Bugnion
(1)
Eva Luvison
(1)
Gergely Alpár
(2)
Greg Alpár
(1)
Ian Goldberg
(1)
Iñigo Querejeta-Azurmendi
(1)
Jaap-Henk Hoepman
(2)
Jean-Pierre Hubaux
(1)
Julien Pierre Martin
(1)
Justinas Sukaitis
(3)
Kasra Edalatnejad
(3)
Kenneth G. Paterson
(1)
Kirill Nikitin
(1)
Laurent Girod
(1)
Lea Nürnberger
(1)
Ludovic Barman
(1)
Marcel Salathé
(1)
Massimo Marelli
(1)
Mathilde Raynal
(1)
Matthew Underwood
(1)
Michael Veale
(1)
Paul Syverson
(1)
Pim Vullers
(2)
Seda F. Gürses
(1)
Soline Ledésert
(1)
Sylvain Chatel
(2)
Vincent Graf Narbel
(3)
Wouter Lueks
(14)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to