|
||
---|---|---|
hal-01377993v1
Conference papers
Legally Fair Contract Signing Without Keystones ACNS 2016 - 14th International Conference Applied Cryptography and Network Security, Jun 2016, Guildford, United Kingdom. pp.175 - 190, ⟨10.1007/978-3-319-39555-5_10⟩ |
||
hal-01247652v1
Conference papers
Scalable Divisible E-Cash ACNS 2015, Jun 2015, New York, United States. ⟨10.1007/978-3-319-28166-7_14⟩ |
||
hal-00940045v1
Conference papers
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting PKC '14, Mar 2014, Buenos Aires, Argentina. pp.167-183 |
||
hal-01134006v1
Conference papers
Divisible E-Cash Made Practical PKC 2015, Mar 2015, Maryland, United States. pp.77-100, ⟨10.1007/978-3-662-46447-2_4⟩ ![]() |
||
hal-01471876v1
Conference papers
Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash Public-Key Cryptography - PKC 2017 - 20th International Conference on Practice and Theory in Public-Key Cryptography, Mar 2017, Amsterdam, Netherlands. pp.61-90, ⟨10.1007/978-3-662-54365-8_4⟩ |
||
hal-01139400v1
Reports
Scalable Divisible E-cash [Research Report] Cryptology ePrint Archive: Report 2015/300, IACR. 2015 |
||
inria-00419152v1
Conference papers
New Anonymity Notions for Identity-Based Encryption SCN '08, 2008, Amalfi, Italie, Italy. pp.375--391 |
||
inria-00419151v1
Conference papers
An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication The 3rd International Workshop on Security (IWSEC '08), 2008, Kagawa, Japon, Japan. pp.219--230 |
||
hal-01628797v1
Conference papers
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange CSF 2017 - 30th IEEE Computer Security Foundations Symposium, Aug 2017, Santa Barbara, CA, United States. pp.159 - 175, ⟨10.1109/CSF.2017.31⟩ |
||
hal-01668008v1
Reports
Fuzzy Authenticated Key Exchange [Research Report] 2017/1111, IACR Cryptology ePrint Archive. 2017 |
||
hal-01377995v1
Directions of work or proceedings
8th International Conference on Cryptology in Africa - Africacrypt 2016 David Pointcheval; Abderrahmane Nitaj; Tajjeeddine Rachidi. Africacrypt 2016, Apr 2016, Fes, Morocco. LNCS (9646), Springer Verlag, 2016, Africacrypt 2016, 978-3-319-31517-1. ⟨10.1007/978-3-319-31517-1⟩ |
||
hal-02357181v1
Conference papers
Partially Encrypted Machine Learning using Functional Encryption NeurIPS 2019 - Thirty-third Conference on Neural Information Processing Systems, Dec 2019, Vancouver, Canada ![]() |
||
hal-01245235v1
Reports
Secure Distributed Computation on Private Inputs [Research Report] Cryptology ePrint Archive: Report 2015/1196, IACR Cryptology ePrint Archive. 2015 |
||
hal-01668020v1
Conference papers
Decentralized Multi-Client Functional Encryption for Inner Product ASIACRYPT '18 - 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2018, Brisbane, Australia. ⟨10.1007/978-3-030-03329-3_24⟩ ![]() |
||
hal-02948657v1
Conference papers
Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model SCN 2020 - 12th International Conference Security and Cryptography for Networks., Sep 2020, Amalfi / Virtual, Italy. pp.525-545, ⟨10.1007/978-3-030-57990-6_26⟩ |
||
hal-01471737v1
Conference papers
VTBPEKE: Verifier-based Two-Basis Password Exponential Key Exchange ASIA CCS'17, Apr 2017, Abu Dhabi, United Arab Emirates. ⟨10.1145/3052973.3053026⟩ |
||
hal-01471896v1
Conference papers
Removing Erasures with Explainable Hash Proof Systems Public-Key Cryptography - PKC 2017 - 20th International Conference on Practice and Theory in Public-Key Cryptography, Mar 2017, Amsterdam, Netherlands. pp.151-174, ⟨10.1007/978-3-662-54365-8_7⟩ ![]() |
||
hal-01471901v1
Conference papers
Removing the Strong RSA Assumption from Arguments over the Integers EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Apr 2017, Paris, France. ⟨10.1007/978-3-319-56614-6_11⟩ |
||
hal-00790626v1
Conference papers
Tighter Reductions for Forward-Secure Signature Scheme Public-Key Cryptography (PKC 2013), Feb 2013, Nara, Japan. pp.292-311, ⟨10.1007/978-3-642-36362-7_19⟩ ![]() |
||
hal-00763979v1
Journal articles
Black-Box Trace&Revoke Codes Algorithmica, Springer Verlag, 2013, 67 (3), pp.418-448. ⟨10.1007/s00453-012-9702-y⟩ ![]() |
||
hal-00764842v1
Conference papers
Message-Based Traitor Tracing with Optimal Ciphertext Rate LATINCRYPT 2012 - 2nd International Conference on Cryptology and Information Security in Latin America, Oct 2012, Santiago, Chile. pp.56-77, ⟨10.1007/978-3-642-33481-8_4⟩ ![]() |
||
hal-00764847v1
Conference papers
Decentralized Dynamic Broadcast Encryption SCN 2012 - 8th International Conference Security and Cryptography for Networks, Sep 2012, Amalfi, Italy. pp.166-183, ⟨10.1007/978-3-642-32928-9_10⟩ ![]() |
||
hal-00764852v1
Conference papers
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts ACISP 2012 - 17th Australasian Conference Information Security and Privacy, Jul 2012, Wollongong, Australia. pp.308-321, ⟨10.1007/978-3-642-31448-3_23⟩ |
||
hal-00764871v1
Conference papers
Verified security of redundancy-free encryption from Rabin and RSA CCS '12 - ACM conference on Computer and communications security, Oct 2012, Raleigh, NC, United States. pp.724-735, ⟨10.1145/2382196.2382272⟩ ![]() |
||
hal-00763543v1
Book sections
RSA Public-Key Encryption Henk C. A. van Tilborg and Sushil Jajodia. Encyclopedia of Cryptography and Security, Springer, pp.1069-1072, 2011, 978-1-4419-5905-8. ⟨10.1007/978-1-4419-5906-5_153⟩ |
||
hal-00764863v1
Conference papers
Compact Round-Optimal Partially-Blind Signatures SCN 2012 - 8th International Conference Security and Cryptography for Networks, Sep 2012, Amalfi, Italy. pp.95-112, ⟨10.1007/978-3-642-32928-9_6⟩ ![]() |
||
inria-00419145v1
Conference papers
Smooth Projective Hashing for Conditionally Extractable Commitments Advances in Cryptology -- Proceedings of CRYPTO '09, 2009, Santa-Barbara, Californie, United States. pp.671--689 |
||
inria-00419158v1
Conference papers
HMAC is a Randomness Extractor and Applications to TLS Proceedings of the 3rd ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS '08), 2008, Tokyo, Japon, Japan. pp.21--32 |
||
inria-00419144v1
Book sections
New Anonymity Notions for Identity-Based Encryption V. Cortier and C. Kirchner and M. Okada and H. Sakurada. Formal to Practical Security, LNCS 5458, Springer-Verlag, pp.138--157, 2009, Lecture notes in computer science |
||
inria-00539541v1
Conference papers
Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys Third African International Conference on Cryptology (AfricaCrypt '10), 2010, Stellenbosch, South Africa. pp.351--368 |
||
|