|
||
---|---|---|
hal-01377995v1
Directions of work or proceedings
8th International Conference on Cryptology in Africa - Africacrypt 2016 David Pointcheval; Abderrahmane Nitaj; Tajjeeddine Rachidi. Africacrypt 2016, Apr 2016, Fes, Morocco. LNCS (9646), Springer Verlag, 2016, Africacrypt 2016, 978-3-319-31517-1. ⟨10.1007/978-3-319-31517-1⟩ |
||
inria-00539538v1
Directions of work or proceedings
Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS '09) Abdalla, Michel and Pointcheval, David and Fouque, Pierre-Alain and Vergnaud, Damien. 5536, Springer, pp.534, 2009, LNCS, 978-3-642-01957-9. ⟨10.1007/978-3-642-01957-9⟩ |
||
inria-00419154v1
Conference papers
Dynamic Threshold Public-Key Encryption Advances in Cryptology -- Proceedings of CRYPTO '08, 2008, Santa-Barbara, Californie, United States. pp.317--334 |
||
hal-00764863v1
Conference papers
Compact Round-Optimal Partially-Blind Signatures SCN 2012 - 8th International Conference Security and Cryptography for Networks, Sep 2012, Amalfi, Italy. pp.95-112, ⟨10.1007/978-3-642-32928-9_6⟩ ![]() |
||
inria-00419158v1
Conference papers
HMAC is a Randomness Extractor and Applications to TLS Proceedings of the 3rd ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS '08), 2008, Tokyo, Japon, Japan. pp.21--32 |
||
inria-00419149v1
Conference papers
Distributed Public-Key Cryptography from Weak Secrets Conference on Practice and Theory in Public-Key Cryptography (PKC '09), 2009, Irvine, California, USA, United States. pp.139--159 |
||
inria-00565272v1
Conference papers
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, 2001, Gold Coast, Australia. pp.351-368, ⟨10.1007/3-540-45682-1_21⟩ |
||
inria-00542643v1
Conference papers
Signatures on Randomizable Ciphertexts PKC 2011 - Proceedings of the 2011 International Conference on Practice and Theory in Public Key Cryptography, Mar 2011, Taormina, Italy. pp.403-422, ⟨10.1007/978-3-642-19379-8_25⟩ ![]() |
||
inria-00419143v1
Book sections
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures V. Cortier and C. Kirchner and M. Okada and H. Sakurada. Formal to Practical Security, LNCS 5458, Springer-Verlag, pp.95--116, 2009, Lecture notes in computer science |
||
inria-00419157v1
Conference papers
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework The Cryptographers' Track at RSA Conference '08 (CT-RSA '08), 2008, San Francisco, Californie, Germany. pp.335--351 |
||
inria-00539541v1
Conference papers
Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys Third African International Conference on Cryptology (AfricaCrypt '10), 2010, Stellenbosch, South Africa. pp.351--368 |
||
inria-00419147v1
Conference papers
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness Second African International Conference on Cryptology (AfricaCrypt '09), 2009, Gammarth - Tunisie, Tunisia. pp.254--271 |
||
hal-00918396v1
Journal articles
Strong Password-Based Authentication in TLS using the Three-Party Group Diffie-Hellman Protocol International Journal of Security and Networks, Inderscience, 2007, 2 (3/4), pp.284-296. ⟨10.1504/IJSN.2007.013181⟩ |
||
inria-00419148v1
Conference papers
Optimal Randomness Extraction from a Diffie-Hellman Element Advances in Cryptology -- Proceedings of EUROCRYPT '09, 2009, Cologne, Allemagne, Germany. pp.572--589 |
||
inria-00539539v1
Book sections
On Some Incompatible Properties of Voting Schemes D. Chaum, R. Rivest, M. Jakobsson, B. Schoenmakers, P. Ryan, and J. Benaloh. Towards Trustworthy Elections, 6000, springer, pp.191--199, 2010, lncs |
||
hal-01089001v1
Conference papers
Forward Secure Non-Interactive Key Exchange SCN '14, Sep 2014, Amalfi, Italy. pp.21-39, ⟨10.1007/978-3-319-10879-7_2⟩ ![]() |
||
hal-00864357v1
Journal articles
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts International Journal of Information Security, Springer Verlag, 2013, 12 (4), pp.251-265. ⟨10.1007/s10207-013-0190-0⟩ ![]() |
||
inria-00539537v1
Directions of work or proceedings
Proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography (PKC '10) Nguyen, Phong Q. and Pointcheval, David. 6056, Springer, pp.519, 2010, LNCS |
||
inria-00419151v1
Conference papers
An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication The 3rd International Workshop on Security (IWSEC '08), 2008, Kagawa, Japon, Japan. pp.219--230 |
||
inria-00419152v1
Conference papers
New Anonymity Notions for Identity-Based Encryption SCN '08, 2008, Amalfi, Italie, Italy. pp.375--391 |
||
inria-00419145v1
Conference papers
Smooth Projective Hashing for Conditionally Extractable Commitments Advances in Cryptology -- Proceedings of CRYPTO '09, 2009, Santa-Barbara, Californie, United States. pp.671--689 |
||
hal-02357181v1
Conference papers
Partially Encrypted Machine Learning using Functional Encryption NeurIPS 2019 - Thirty-third Conference on Neural Information Processing Systems, Dec 2019, Vancouver, Canada ![]() |
||
inria-00419153v1
Conference papers
Anonymous Proxy Signatures SCN '08, 2008, Amalfi, Italie, Italy. pp.201--217 |
||
inria-00419155v1
Conference papers
Multi-Factor Authenticated Key Exchange Conference on Applied Cryptography and Network Security (ACNS '08), 2008, New-York, Etats-Unis, United States. pp.277--295 |
||
hal-01402517v1
Reports
Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms [Research Report] Cryptology ePrint Archive: Report 2016/1089, IACR Cryptology ePrint Archive. 2016 |
||
hal-01350367v1
Journal articles
Protéger ses données sur le cloud : utopie ou réalité ? Interstices, INRIA, 2014 |
||
hal-01378005v1
Conference papers
The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs SCN 2016 - 10th International Conference Security and Cryptography for Networks, Aug 2016, Amalfi, Italy. pp.273 - 291, ⟨10.1007/978-3-319-44618-9_15⟩ |
||
inria-00539544v1
Conference papers
Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures Third International Conference on Pairing-based Cryptography (Pairing 2009), 2009, Palo Alto, California, United States. pp.132-149, ⟨10.1007/978-3-642-03298-1_10⟩ |
||
inria-00539540v1
Conference papers
Mediated Traceable Anonymous Encryption First International Conference on Cryptology and Information Security (LatinCrypt '10), Aug 2010, Puebla, Mexico. pp.40--60 |
||
hal-00918401v1
Journal articles
Password-Based Authenticated Key Exchange in the Three-Party Setting IEE Proceedings - Information Security, Institution of Electrical Engineers (IEE), 2006, 153 (1), pp.27-39. ⟨10.1049/ip-ifs:20055073⟩ ![]() |
||
|