|
||
---|---|---|
hal-01093876v1
Reports
Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions [Technical Report] Cryptology ePrint Archive: Report 2013/833, IACR. 2014 |
||
hal-01108287v1
Reports
Simple Functional Encryption Schemes for Inner Products [Technical Report] Cryptology ePrint Archive: Report 2015/017, IACR. 2015 |
||
hal-01139400v1
Reports
Scalable Divisible E-cash [Research Report] Cryptology ePrint Archive: Report 2015/300, IACR. 2015 |
||
hal-01668008v1
Reports
Fuzzy Authenticated Key Exchange [Research Report] 2017/1111, IACR Cryptology ePrint Archive. 2017 |
||
hal-01245235v1
Reports
Secure Distributed Computation on Private Inputs [Research Report] Cryptology ePrint Archive: Report 2015/1196, IACR Cryptology ePrint Archive. 2015 |
||
|
||
hal-01380726v1
Reports
Better Security for Functional Encryption for Inner Product Evaluations [Technical Report] Cryptology ePrint Archive: Report 2016/011, IACR. 2016 |
||
hal-01380730v1
Reports
Robust Password-Protected Secret Sharing [Technical Report] Cryptology ePrint Archive: Report 2016/123, IACR. 2016 |
||
hal-01402517v1
Reports
Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms [Research Report] Cryptology ePrint Archive: Report 2016/1089, IACR Cryptology ePrint Archive. 2016 |
||
hal-01139320v1
Reports
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting [Technical Report] Cryptology ePrint Archive: Report 2015/246, IACR. 2015 |
||
hal-01068442v1
Reports
Removing Erasures with Explainable Hash Proof Systems [Technical Report] Cryptology ePrint Archive: Report 2014/125, IACR. 2014 |
||
hal-01068420v1
Reports
Disjunctions for Hash Proof Systems: New Constructions and Applications [Technical Report] Cryptology ePrint Archive: Report 2014/483, IACR. 2014 |
||
hal-01139395v1
Reports
New Techniques for SPHFs and Efficient One-Round PAKE Protocols [Research Report] Cryptology ePrint Archive: Report 2015/188, IACR. 2015 |
||
hal-01068416v1
Reports
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks [Technical Report] Cryptology ePrint Archive: Report 2014/609, IACR. 2014 |
||
hal-01667150v1
Reports
On the Tightness of Forward-Secure Signature Reductions [Research Report] Report 2017/746, IACR Cryptology ePrint Archive. 2017 |
||
hal-01139397v1
Reports
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting [Research Report] Cryptology ePrint Archive: Report 2015/278, IACR. 2015 |
||
hal-01088999v1
Reports
Divisible E-Cash Made Practical [Technical Report] Cryptology ePrint Archive: Report 2014/785, IACR. 2014 |
||
hal-01132190v1
Reports
Tighter Reductions for Forward-Secure Signature Schemes [Technical Report] Cryptology ePrint Archive: Report 2015/196, IACR. 2015 |
||
|