|
||
---|---|---|
hal-02948657v1
Conference papers
Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model SCN 2020 - 12th International Conference Security and Cryptography for Networks., Sep 2020, Amalfi / Virtual, Italy. pp.525-545, ⟨10.1007/978-3-030-57990-6_26⟩ |
||
inria-00419145v1
Conference papers
Smooth Projective Hashing for Conditionally Extractable Commitments Advances in Cryptology -- Proceedings of CRYPTO '09, 2009, Santa-Barbara, Californie, United States. pp.671--689 |
||
inria-00539541v1
Conference papers
Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys Third African International Conference on Cryptology (AfricaCrypt '10), 2010, Stellenbosch, South Africa. pp.351--368 |
||
inria-00419150v1
Conference papers
Anonymous and Transparent Gateway-based Password-Authenticated Key Exchange The 7th International Workshop on Cryptology and Network Security (CANS '08), 2008, Hong-Kong, China. pp.133--148 |
||
inria-00419147v1
Conference papers
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness Second African International Conference on Cryptology (AfricaCrypt '09), 2009, Gammarth - Tunisie, Tunisia. pp.254--271 |
||
inria-00419157v1
Conference papers
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework The Cryptographers' Track at RSA Conference '08 (CT-RSA '08), 2008, San Francisco, Californie, Germany. pp.335--351 |
||
inria-00419149v1
Conference papers
Distributed Public-Key Cryptography from Weak Secrets Conference on Practice and Theory in Public-Key Cryptography (PKC '09), 2009, Irvine, California, USA, United States. pp.139--159 |
||
|
||
hal-00672939v1
Conference papers
Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions TCC 2012 - Ninth IACR Theory of Cryptography Conference, Mar 2012, Taormina, Italy. pp.94-112, ⟨10.1007/978-3-642-28914-9_6⟩ |
||
hal-01628797v1
Conference papers
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange CSF 2017 - 30th IEEE Computer Security Foundations Symposium, Aug 2017, Santa Barbara, CA, United States. pp.159 - 175, ⟨10.1109/CSF.2017.31⟩ |
||
hal-02357173v1
Conference papers
Divisible E-Cash from Constrained Pseudo-Random Functions ASIACRYPT 2019 - 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2019, Kobe, Japan. ⟨10.1007/978-3-030-34578-5_24⟩ |
||
inria-00539542v1
Conference papers
Strong Cryptography from Weak Secrets - Building Efficient PKE and IBE from Distributed Passwords Third African International Conference on Cryptology (AfricaCrypt '10), May 2010, Stellenbosch, South Africa. pp.297--315 |
||
inria-00419151v1
Conference papers
An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication The 3rd International Workshop on Security (IWSEC '08), 2008, Kagawa, Japon, Japan. pp.219--230 |
||
inria-00419148v1
Conference papers
Optimal Randomness Extraction from a Diffie-Hellman Element Advances in Cryptology -- Proceedings of EUROCRYPT '09, 2009, Cologne, Allemagne, Germany. pp.572--589 |
||
inria-00103433v1
Conference papers
The Twist-AUgmented technique for key exchange 9th International Conference on Theory and Practice of Public Key Cryptology - PKC 2006, Apr 2006, New York, USA, pp.410-426 |
||
hal-01609278v1
Conference papers
Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms 20th International Conference on Information Security (ISC '17), Nov 2017, Ho Chi Minh, Vietnam. ⟨10.1007/978-3-319-69659-1_9⟩ |
||
hal-02947359v1
Conference papers
Dynamic Decentralized Functional Encryption CRYPTO 2020 - 40th Annual International Cryptology Conference, Aug 2020, Santa Barbara / Virtual, United States. pp.747-775, ⟨10.1007/978-3-030-56784-2_25⟩ |
||
hal-01378005v1
Conference papers
The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs SCN 2016 - 10th International Conference Security and Cryptography for Networks, Aug 2016, Amalfi, Italy. pp.273 - 291, ⟨10.1007/978-3-319-44618-9_15⟩ |
||
inria-00419154v1
Conference papers
Dynamic Threshold Public-Key Encryption Advances in Cryptology -- Proceedings of CRYPTO '08, 2008, Santa-Barbara, Californie, United States. pp.317--334 |
||
hal-02894483v1
Conference papers
Traceable Inner Product Functional Encryption CT-RSA 2020 - Topics in Cryptology, Feb 2020, San Francisco, United States. pp.564-585, ⟨10.1007/978-3-030-40186-3_24⟩ |
||
hal-01377993v1
Conference papers
Legally Fair Contract Signing Without Keystones ACNS 2016 - 14th International Conference Applied Cryptography and Network Security, Jun 2016, Guildford, United Kingdom. pp.175 - 190, ⟨10.1007/978-3-319-39555-5_10⟩ |
||
hal-02894482v1
Conference papers
Boosting Verifiable Computation on Encrypted Data PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Jun 2020, Edinburgh / Virtual, United Kingdom. pp.124-154, ⟨10.1007/978-3-030-45388-6_5⟩ |
||
inria-00419158v1
Conference papers
HMAC is a Randomness Extractor and Applications to TLS Proceedings of the 3rd ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS '08), 2008, Tokyo, Japon, Japan. pp.21--32 |
||
inria-00539543v1
Conference papers
Transferable Constant-Size Fair E-Cash Proceedings of the 8th International Workshop on Cryptology and Network Security (CANS '09), 2009, Kanazawa, Ishikawa, Japan. pp.226--247, ⟨10.1007/978-3-642-10433-6_15⟩ |
||
inria-00539544v1
Conference papers
Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures Third International Conference on Pairing-based Cryptography (Pairing 2009), 2009, Palo Alto, California, United States. pp.132-149, ⟨10.1007/978-3-642-03298-1_10⟩ |
||
inria-00419153v1
Conference papers
Anonymous Proxy Signatures SCN '08, 2008, Amalfi, Italie, Italy. pp.201--217 |
||
hal-02345627v1
Conference papers
Decentralized Evaluation of Quadratic Polynomials on Encrypted Data ISC 2019 - International Conference on Information Security, Sep 2019, New York, United States. pp.87-106, ⟨10.1007/978-3-030-30215-3_5⟩ |
||
hal-02947353v1
Conference papers
Linearly-Homomorphic Signatures and Scalable Mix-Nets PKC 2020 - IACR International Conference on Practice and Theory of Public-Key Cryptography, Jun 2020, Edinburgh / Virtual, United Kingdom. pp.597-627, ⟨10.1007/978-3-030-45388-6_21⟩ |
||
inria-00419152v1
Conference papers
New Anonymity Notions for Identity-Based Encryption SCN '08, 2008, Amalfi, Italie, Italy. pp.375--391 |
||
inria-00539540v1
Conference papers
Mediated Traceable Anonymous Encryption First International Conference on Cryptology and Information Security (LatinCrypt '10), Aug 2010, Puebla, Mexico. pp.40--60 |
||
|