Skip to Main content Skip to Navigation


hal-00881076v1  Conference papers
Véronique CortierDavid GalindoStéphane GlonduMalika Izabachène. Distributed ElGamal à la Pedersen - Application to Helios
WPES 2013 - Proceedings of the 12th ACM workshop on privacy in the electronic society - 2013, Nov 2013, Berlin, Germany. pp.131-142, ⟨10.1145/2517840.2517852⟩
hal-02920663v1  Conference papers
Othmane El OmriAymen BoudguigaMalika IzabachèneWitold Klaudel. Privacy-Preserving k-means Clustering: an Application to Driving Style Recognition
13th International Conference on Network and System Security, Dec 2018, Saporo, Japan. pp.685-696, ⟨10.1007/978-3-030-36938-5_43⟩
hal-01080292v1  Conference papers
Véronique CortierDavid GalindoStéphane GlonduMalika Izabachène. Election Verifiability for Helios under Weaker Trust Assumptions
Proceedings of the 19th European Symposium on Research in Computer Security (ESORICS'14), Sep 2014, Wroclaw, Poland
...
inria-00419152v1  Conference papers
Malika IzabachèneDavid Pointcheval. New Anonymity Notions for Identity-Based Encryption
SCN '08, 2008, Amalfi, Italie, Italy. pp.375--391
...
inria-00419144v1  Book sections
Malika IzabachèneDavid Pointcheval. New Anonymity Notions for Identity-Based Encryption
V. Cortier and C. Kirchner and M. Okada and H. Sakurada. Formal to Practical Security, LNCS 5458, Springer-Verlag, pp.138--157, 2009, Lecture notes in computer science
...
inria-00419150v1  Conference papers
Michel AbdallaMalika IzabachèneDavid Pointcheval. Anonymous and Transparent Gateway-based Password-Authenticated Key Exchange
The 7th International Workshop on Cryptology and Network Security (CANS '08), 2008, Hong-Kong, China. pp.133--148
...
inria-00539540v1  Conference papers
Malika IzabachèneDavid PointchevalDamien Vergnaud. Mediated Traceable Anonymous Encryption
First International Conference on Cryptology and Information Security (LatinCrypt '10), Aug 2010, Puebla, Mexico. pp.40--60
...
inria-00577167v1  Conference papers
Olivier BlazyGeorg FuchsbauerMalika IzabachèneAmandine JambertHervé Sibert et al.  Batch Groth-Sahai
Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Jun 2010, Beijing, China. pp.218-235, ⟨10.1007/978-3-642-13708-14⟩
hal-01382384v1  Conference papers
Nicolas GamaMalika IzabachènePhong Q. NguyenXiang Xie. Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems
35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Part II - EUROCRYPT 2016, IACR, May 2016, Vienna, Austria. pp.528-558, ⟨10.1007/978-3-662-49896-5_19⟩
...
hal-01110210v1  Conference papers
Malika IzabachèneBenoît LibertDamien Vergnaud. Block-wise p-signatures and non-interactive anonymous credentials with efficient attributes
IMACC'11 - 13th IMA international conference on Cryptography and Coding, Dec 2011, Oxford, UK, United Kingdom. pp.431-450