|
||
---|---|---|
hal-01613794v1
Conference papers
Reusing Nonces in Schnorr Signatures Computer Security - ESORICS 2017, Sep 2017, Oslo, Norway. pp.224-241, ⟨10.1007/978-3-319-66402-6_14⟩ |
||
hal-01668213v1
Conference papers
Twisting Lattice and Graph Techniques to Compress Transactional Ledgers SecureComm 2017 - 13th EAI International Conference on Security and Privacy in Communication Networks, Oct 2017, Niagara Falls, Canada. pp.1-20 |
||
hal-01854506v1
Conference papers
Cyberspace and Time: A Light through the Fog? CIST2018 - Représenter les territoires / Representing territories, CIST, Mar 2018, Rouen, France |
||
emse-01222610v1
Journal articles
When organized crime applies academic results: a forensic analysis of an in-card listening device Journal of Cryptographic Engineering, Springer, 2015, pp 1-11. ⟨10.1007/s13389-015-0112-3⟩ ![]() |
||
tel-01831270v1
Theses
Advances in public-key cryptology and computer exploitation Cryptography and Security [cs.CR]. Université Paris sciences et lettres, 2017. English. ⟨NNT : 2017PSLEE057⟩ |
||
hal-01377993v1
Conference papers
Legally Fair Contract Signing Without Keystones ACNS 2016 - 14th International Conference Applied Cryptography and Network Security, Jun 2016, Guildford, United Kingdom. pp.175 - 190, ⟨10.1007/978-3-319-39555-5_10⟩ |
||
|