Skip to Main content Skip to Navigation

inria-00556688v1  Conference papers
Pierre-Alain FouqueGilles Macario-RatLudovic PerretJacques Stern. Total Break of the l-IC Signature Scheme
Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Mar 2008, Barcelona, Spain. pp.1-17, ⟨10.1007/978-3-540-78440-1_1⟩
inria-00638289v1  Conference papers
Anne BouillardSidney RosarioAlbert BenvenisteStefan Haar. Monotonicity in Service Orchestrations
Proceedings of the 30th International Conference on Applications and Theory of Petri Nets (ICATPN'09), 2009, Paris, France, France. pp.263-282, ⟨10.1007/978-3-642-02424-5_16⟩
hal-00817961v1  Conference papers
Jose LezamaKarteek AlahariJosef SivicIvan Laptev. Track to the Future: Spatio-temporal Video Segmentation with Long-range Motion Cues
CVPR - IEEE Conference on Computer Vision and Pattern Recognition, Jun 2011, Colorado Springs, United States. pp.3369 - 3376, ⟨10.1109/CVPR.2011.6044588⟩
inria-00638288v1  Conference papers
Anne BouillardStefan HaarSidney Rosario. Critical paths in the Partial Order Unfolding of a Stochastic Petri Net
Proceedings of the 7th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'09), 2009, Budapest, Hungary, Hungary. pp.43-57, ⟨10.1007/978-3-642-04368-0_6⟩
hal-01377993v1  Conference papers
Houda FerradiRémi GéraudDiana MaimutDavid NaccacheDavid Pointcheval. Legally Fair Contract Signing Without Keystones
ACNS 2016 - 14th International Conference Applied Cryptography and Network Security, Jun 2016, Guildford, United Kingdom. pp.175 - 190, ⟨10.1007/978-3-319-39555-5_10⟩
hal-01220355v1  Conference papers
Romain GayIordanis KerenidisHoeteck Wee. Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption
CRYPTO 2015 - Advances in Cryptology, Aug 2015, Santa Barbara, United States. pp.485-502, ⟨10.1007/978-3-662-48000-7_24⟩
hal-01270322v1  Conference papers
Marc Lelarge. A new approach to the orientation of random hypergraphs
SODA, Jan 2012, kyoto, Japan
tel-02137987v1  Theses
Romain Gay. Public-Key Encryption, Revisited: Tight Security and Richer Functionalities
Cryptography and Security [cs.CR]. PSL Research University, 2019. English
hal-01093876v1  Reports
Fabrice BenhamoudaDavid Pointcheval. Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions
[Technical Report] Cryptology ePrint Archive: Report 2013/833, IACR. 2014
inria-00356999v1  Conference papers
Benoît LibertDamien Vergnaud. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
12th International Conference on Practice and Theory in Public-Key Cryptography - PKC 2009, 2009, Irvine, United States. pp.235-255
inria-00577255v1  Conference papers
Benoît LibertDamien Vergnaud. Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model
International Conference on Cryptology And Network Security, CANS 2009, Dec 2009, Kanazawa, Japan. pp.498-517, ⟨10.1007/978-3-642-10433-6_34⟩
hal-01094685v1  Reports
Romain GayPierrick MéauxHoeteck Wee. Predicate Encryption for Multi-Dimensional Range Queries from Lattices
[Technical Report] Cryptology ePrint Archive: Report 2014/965, IACR. 2014
hal-01152482v1  Conference papers
Stefan LeeNicolas MaisonneuveDavid CrandallAlexei A. EfrosJosef Sivic. Linking Past to Present: Discovering Style in Two Centuries of Architecture
IEEE International Conference on Computational Photography, Apr 2015, Houston, United States
hal-00915848v1  Journal articles
Michel AbdallaJames BirkettDario CatalanoAlexander W. DentJohn Malone-Lee et al.  Wildcarded Identity-Based Encryption
Journal of Cryptology, Springer Verlag, 2011, 24 (1), pp.42-82. ⟨10.1007/s00145-010-9060-3⟩
hal-01220353v1  Conference papers
Romain GayPierrick MéauxHoeteck Wee. Predicate Encryption for Multi-dimensional Range Queries from Lattices
PKC 2015 - Public-Key Cryptography, Apr 2015, Gaithersburg, United States. pp.752-776, ⟨10.1007/978-3-662-46447-2_34⟩
inria-00577145v1  Conference papers
Georg FuchsbauerDamien Vergnaud. Fair Blind Signatures without Random Oracles
Africacrypt 2010, May 2010, Stellenbosch, South Africa. pp.16-33, ⟨10.1007/978-3-642-12678-9_2⟩
hal-01385178v1  Journal articles
Michel AbdallaFabrice BenhamoudaDavid Pointcheval. Public-key encryption indistinguishable under plaintext-checkable attacks
IET Information Security, Institution of Engineering and Technology, 2016, 10 (6), pp.288-303. ⟨10.1049/iet-ifs.2015.0500⟩
inria-00577140v1  Conference papers
Marc JoyeMehdi TibouchiDamien Vergnaud. Huff's Model for Elliptic Curves
Algorithmic Number Theory, 9th International Symposium, ANTS-IX, Jul 2010, Nancy, France. pp.234-250, ⟨10.1007/978-3-642-14518-6_20⟩
hal-01108287v1  Reports
Michel AbdallaFlorian BourseAngelo de CaroDavid Pointcheval. Simple Functional Encryption Schemes for Inner Products
[Technical Report] Cryptology ePrint Archive: Report 2015/017, IACR. 2015
hal-01270327v1  Conference papers
Marc Lelarge. Coordination in network security games
INFOCOM, Mar 2012, orlando, United States. ⟨10.1109/INFCOM.2012.6195715⟩
hal-01235177v1  Conference papers
Vadim LyubashevskyDaniel Wichs. Simple Lattice Trapdoor Sampling from a Broad Class of Distributions
Public Key Cryptography 2015, IACR, Mar 2015, Gaithersburgh, United States. ⟨10.1007/978-3-662-46447-2_32⟩