Publications

Note: in Cryptology, authors are listed in alphabetical order; in my case with a P for Perthuis.

Conference Articles

2025

  1. AC:DEP25
    Predicting Module-Lattice Reduction
    Léo Ducas, Lynn Engelberts, and  Paola de Perthuis
    In ASIACRYPT, Dec 2025
  2. ESOR:BHPP25
    Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies
    Théophile Brézot, Chloé Hébant,  Paola de Perthuis, and David Pointcheval
    In ESORICS, Sep 2025

2023

  1. AC:FKP23
    Cuckoo Commitments: Registration-Based Encryption and Key-Value Map Commitments for Large Spaces
    Dario FioreDimitris Kolonelos, and  Paola de Perthuis
    In ASIACRYPT, Dec 2023
  2. ESOR:BPP23
    Covercrypt: An Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE
    Théophile Brézot,  Paola de Perthuis, and David Pointcheval
    In ESORICS, Sep 2023

2022

  1. CCS:PP22
    Two-Client Inner-Product Functional Encryption with an Application to Money-Laundering Detection
    Paola de Perthuis, and David Pointcheval
    In ACM CCS, Nov 2022
  2. SCN:INPP22
    MyOPE: Malicious SecuritY for Oblivious Polynomial Evaluation
    In Security and Cryptography for Networks, Sep 2022

Unpublished

2025

  1. EPR:DEP25
    Predicting Module-Lattice Reduction
    Léo Ducas, Lynn Engelberts, and Paola Perthuis
    2025
  2. ARX:DEP25
    Predicting Module-Lattice Reduction
    Léo Ducas, Lynn Engelberts, and Paola Perthuis
    2025
  3. EPR:BHPP25
    Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies
    Théophile Brézot, Chloé Hébant,  Paola de Perthuis, and David Pointcheval
    2025

2024

  1. EPR:PP24
    Post-Quantum Privacy for Traceable Receipt-Free Encryption
    Paola de Perthuis, and Thomas Peters
    2024

2023

  1. EPR:FKP23
    Cuckoo Commitments: Registration-Based Encryption and Key-Value Map Commitments for Large Spaces
    Dario FioreDimitris Kolonelos, and  Paola de Perthuis
    2023
  2. EPR:BPP23
    Covercrypt: an Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE
    Théophile Brézot,  Paola de Perthuis, and David Pointcheval
    2023
  3. ARX:KHCPM23
    Catch Me If You Can: Semi-supervised Graph Learning for Spotting Money Laundering
    Md. Rezaul Karim, Felix Hermsen, Sisay Adugna Chala,  Paola de Perthuis, and Avikarsha Mandal
    2023

2022

  1. EPR:PP22
    Two-Client Inner-Product Functional Encryption, with an Application to Money-Laundering Detection
    Paola de Perthuis, and David Pointcheval
    2022

2021

  1. EPR:INPP21
    MyOPE: Malicious securitY for Oblivious Polynomial Evaluation
    Malika IzabachèneAnca Nitulescu,  Paola de Perthuis, and David Pointcheval
    2021

Journal Articles

2024

  1. IEEE:KHCPM24
    Scalable Semi-Supervised Graph Learning Techniques for Anti Money Laundering
    Md. Rezaul Karim, Felix Hermsen, Sisay Adugna Chala,  Paola de Perthuis, and Avikarsha Mandal
    IEEE Access, 2024