Filtrer vos résultats
- 55
- 2
- 46
- 8
- 3
- 57
- 6
- 1
- 5
- 3
- 4
- 5
- 11
- 3
- 3
- 1
- 4
- 4
- 3
- 3
- 1
- 57
- 42
- 36
- 11
- 11
- 9
- 6
- 5
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 57
- 10
- 10
- 9
- 8
- 7
- 6
- 6
- 5
- 4
- 4
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
57 résultats
|
|
triés par
|
|
Unidirectional Chosen-Ciphertext Secure Proxy Re-EncryptionIEEE Transactions on Information Theory, 2011, 57 (3), pp.1786 - 1802. ⟨10.1109/TIT.2011.2104470⟩
Article dans une revue
hal-01110041v1
|
||
Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext securityASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Jul 2011, Dakar, Senegal. pp.70-88
Communication dans un congrès
hal-01110204v1
|
|||
|
One-Shot Fiat-Shamir-based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Signatures in the Standard ModelEurocrypt 2022, May 2022, Trondheim, Norway. pp.488-519, ⟨10.1007/978-3-031-07085-3_17⟩
Communication dans un congrès
hal-03726185v1
|
||
|
Lattice-Based E-Cash, RevisitedAsiacrypt 2020 - 26th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2020, Corée (devenu virtuel pour cause de COVID), South Korea. pp.1-47
Communication dans un congrès
hal-02993620v1
|
||
|
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple AssumptionsAdvances in Cryptology - Crypto 2015, Aug 2015, Santa Barbara, United States. ⟨10.1007/978-3-662-48000-7_15⟩
Communication dans un congrès
hal-01225353v1
|
||
|
Efficient Cryptosystems From $2^k$ -th Power Residue SymbolsJournal of Cryptology, 2016, ⟨10.1007/s00145-016-9229-5⟩
Article dans une revue
hal-01394400v1
|
||
|
Non-Zero Inner Product Encryption with Short Ciphertexts and Private Keys 10th Conference on Security and Cryptography for Networks (SCN 2016), Aug 2016, Amalfi, Italy
Communication dans un congrès
hal-01309562v3
|
||
|
Practical “Signatures with Efficient Protocols” from Simple AssumptionsAsiaCCS 2016, Xiaofeng Chen, May 2016, Xi'an, China. ⟨10.1145/2897845.2897898⟩
Communication dans un congrès
hal-01303696v2
|
||
|
Encoding-Free ElGamal-Type Encryption Schemes on Elliptic CurvesCT-RSA 2017 - RSA Conference 2017 -- Cryptographers' Track, Feb 2017, San Francisco, United States. pp.19 - 35, ⟨10.1007/978-3-540-72738-5_21⟩
Communication dans un congrès
hal-01621014v1
|
||
|
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice AssumptionsAsiacrypt 2016, IACR, Dec 2016, Hanoi, Vietnam
Communication dans un congrès
hal-01267123v1
|
||
|
Updatable Public Key Encryption from DCR: Efficient Constructions With Stronger SecurityACM Conference on Computer and Communications Security (ACM-CCS) 2022, Nov 2022, Los Angeles, United States
Communication dans un congrès
hal-03738749v1
|
||
|
Adaptive-ID Secure Revocable Identity-Based EncryptionTopics in cryptology - CT-RSA 2009, 2009, San Francisco, United States. pp.1-15, ⟨10.1007/978-3-642-00862-7_1⟩
Communication dans un congrès
inria-00417807v1
|
||
|
Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable CiphertextsPKC 2017 - Public Key Cryptography, Mar 2017, Amsterdam, Netherlands. pp.247 - 276, ⟨10.1007/BFb0054113⟩
Communication dans un congrès
hal-01621022v1
|
||
|
Zero-Knowledge Elementary Databases with More Expressive QueriesPKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Apr 2019, Beijing, China. pp.255-285, ⟨10.1007/978-3-030-17253-4_9⟩
Communication dans un congrès
hal-02151645v1
|
||
|
Adaptively Secure Distributed PRFs from LWETCC 2018 - 16th International Conference on Theory of Cryptography, Nov 2018, Panaji, India. pp.391-421, ⟨10.1007/978-3-030-03810-6_15⟩
Communication dans un congrès
hal-01911887v1
|
||
|
Universal Designated Verifier Signatures Without Random Oracles or Non-Black Box AssumptionsFifth Conference on Security and Cryptography for Networks, Sep 2006, Maiori/Italie
Communication dans un congrès
inria-00080396v1
|
||
|
A Lattice-Based Group Signature Scheme with Message-Dependent Opening14th International Conference on Applied Cryptography and Network Security (ACNS 2016), Jun 2016, Guildford, United Kingdom
Communication dans un congrès
hal-01302790v1
|
||
|
Secure Efficient History-Hiding Append-Only Signatures in the Standard ModelPublic Key Cryptography 2015 (PKC 2015), Mar 2015, Washington DC, United States. ⟨10.1007/978-3-662-46447-2_20⟩
Communication dans un congrès
hal-01225344v1
|
||
|
Lattice-Based Group Signatures with Logarithmic Signature SizeASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2013, Bangaluru, India. ⟨10.1007/978-3-642-42045-0_3⟩
Communication dans un congrès
hal-00920420v1
|
||
|
All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWECrypto 2017 - 37th International Cryptology Conference, Aug 2017, Santa Barbara, United States. pp.332 - 364, ⟨10.1007/978-3-662-53018-4_18⟩
Communication dans un congrès
hal-01621025v1
|
||
|
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without TrapdoorsEurocrypt 2016, International Association for Cryptologic Research, May 2016, Vienne, Austria. ⟨10.1007/978-3-662-49896-5_1⟩
Communication dans un congrès
hal-01314642v1
|
||
|
PointProofs, RevisitedAsiacrypt 2022 - International Conference on the Theory and Application of Cryptology and Information Security, Dec 2022, Taipei, Taiwan
Communication dans un congrès
hal-03903981v1
|
||
|
Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and ConstructionsJournal of Cryptology, 2020, 33, pp.1405-1441. ⟨10.1007/s00145-020-09350-3⟩
Article dans une revue
hal-03116642v1
|
||
|
Multi-Use Unidirectional Proxy Re-Signatures2008 ACM Conference on Computer and Communications Security, CCS 2008, 2008, Alexandria, United States. pp.511-520, ⟨10.1145/1455770.1455835⟩
Communication dans un congrès
inria-00357568v1
|
||
|
Towards Practical Black-Box Accountable Authority IBE: Weak Black-Box Traceability With Short Ciphertexts and Private KeysIEEE Transactions on Information Theory, 2011, 57 (10), pp.7189-7204
Article dans une revue
hal-01110043v1
|
||
|
Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard ModelInternational Conference on Cryptology And Network Security, CANS 2009, Dec 2009, Kanazawa, Japan. pp.498-517, ⟨10.1007/978-3-642-10433-6_34⟩
Communication dans un congrès
inria-00577255v1
|
||
|
Attribute-Based Encryption Schemes with Constant-Size CiphertextsTheoretical Computer Science, 2012, 422, pp.15-38
Article dans une revue
hal-00763158v1
|
||
|
New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and MoreEurocrypt 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2020, Zagreb / Virtual, Croatia. pp.1-85
Communication dans un congrès
hal-02993608v1
|
||
|
Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and ApplicationsAdvances in Cryptology - Asiacrypt 2015, IACR, Nov 2015, Auckland, New Zealand
Communication dans un congrès
hal-01225363v1
|
||
|
Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 SecurityAsiacrypt 2020 - 26th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2020, Virtual, South Korea. pp.1-67
Communication dans un congrès
hal-02993617v1
|
- 1
- 2