|
||
---|---|---|
hal-00881076v1
Conference papers
Distributed ElGamal à la Pedersen - Application to Helios WPES 2013 - Proceedings of the 12th ACM workshop on privacy in the electronic society - 2013, Nov 2013, Berlin, Germany. pp.131-142, ⟨10.1145/2517840.2517852⟩ |
||
hal-00881079v1
Other publications
A generic construction for voting correctness at minimum cost - Application to Helios 2013 |
||
hal-01011294v2
Reports
Election Verifiability for Helios under Weaker Trust Assumptions [Research Report] RR-8555, INRIA. 2014, pp.20 |
||
hal-02920663v1
Conference papers
Privacy-Preserving k-means Clustering: an Application to Driving Style Recognition 13th International Conference on Network and System Security, Dec 2018, Saporo, Japan. pp.685-696, ⟨10.1007/978-3-030-36938-5_43⟩ |
||
hal-01080292v1
Conference papers
Election Verifiability for Helios under Weaker Trust Assumptions Proceedings of the 19th European Symposium on Research in Computer Security (ESORICS'14), Sep 2014, Wroclaw, Poland |
||
inria-00419152v1
Conference papers
New Anonymity Notions for Identity-Based Encryption SCN '08, 2008, Amalfi, Italie, Italy. pp.375--391 |
||
inria-00419144v1
Book sections
New Anonymity Notions for Identity-Based Encryption V. Cortier and C. Kirchner and M. Okada and H. Sakurada. Formal to Practical Security, LNCS 5458, Springer-Verlag, pp.138--157, 2009, Lecture notes in computer science |
||
inria-00419150v1
Conference papers
Anonymous and Transparent Gateway-based Password-Authenticated Key Exchange The 7th International Workshop on Cryptology and Network Security (CANS '08), 2008, Hong-Kong, China. pp.133--148 |
||
inria-00539540v1
Conference papers
Mediated Traceable Anonymous Encryption First International Conference on Cryptology and Information Security (LatinCrypt '10), Aug 2010, Puebla, Mexico. pp.40--60 |
||
hal-02177632v1
Book sections
Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems Advances in Cryptology – EUROCRYPT 2016, pp.528-558, 2016, ⟨10.1007/978-3-662-49896-5_19⟩ |
||
hal-01323885v1
Reports
Weak instances on composite order protocols [Research Report] INRIA. 2014, pp.1--13 |
||
inria-00577167v1
Conference papers
Batch Groth-Sahai Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Jun 2010, Beijing, China. pp.218-235, ⟨10.1007/978-3-642-13708-14⟩ |
||
hal-01382384v1
Conference papers
Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Part II - EUROCRYPT 2016, IACR, May 2016, Vienna, Austria. pp.528-558, ⟨10.1007/978-3-662-49896-5_19⟩ |
||
hal-01110210v1
Conference papers
Block-wise p-signatures and non-interactive anonymous credentials with efficient attributes IMACC'11 - 13th IMA international conference on Cryptography and Coding, Dec 2011, Oxford, UK, United Kingdom. pp.431-450 |
||
|