Filtrer vos résultats
- 55
- 2
- 46
- 8
- 3
- 57
- 6
- 1
- 5
- 3
- 4
- 5
- 11
- 3
- 3
- 1
- 4
- 4
- 3
- 3
- 1
- 57
- 42
- 36
- 11
- 11
- 9
- 6
- 5
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 57
- 10
- 10
- 9
- 8
- 7
- 6
- 6
- 5
- 4
- 4
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
57 résultats
|
|
triés par
|
|
Unidirectional Chosen-Ciphertext Secure Proxy Re-EncryptionIEEE Transactions on Information Theory, 2011, 57 (3), pp.1786 - 1802. ⟨10.1109/TIT.2011.2104470⟩
Article dans une revue
hal-01110041v1
|
||
Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext securityASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Jul 2011, Dakar, Senegal. pp.70-88
Communication dans un congrès
hal-01110204v1
|
|||
|
One-Shot Fiat-Shamir-based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Signatures in the Standard ModelEurocrypt 2022, May 2022, Trondheim, Norway. pp.488-519, ⟨10.1007/978-3-031-07085-3_17⟩
Communication dans un congrès
hal-03726185v1
|
||
|
Lattice-Based E-Cash, RevisitedAsiacrypt 2020 - 26th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2020, Corée (devenu virtuel pour cause de COVID), South Korea. pp.1-47
Communication dans un congrès
hal-02993620v1
|
||
|
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple AssumptionsAdvances in Cryptology - Crypto 2015, Aug 2015, Santa Barbara, United States. ⟨10.1007/978-3-662-48000-7_15⟩
Communication dans un congrès
hal-01225353v1
|
||
|
Efficient Cryptosystems From $2^k$ -th Power Residue SymbolsJournal of Cryptology, 2016, ⟨10.1007/s00145-016-9229-5⟩
Article dans une revue
hal-01394400v1
|
||
|
Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-CashAsiacrypt 2017, Dec 2017, Hong Kong, China
Communication dans un congrès
hal-01621027v1
|
||
|
Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group EncryptionAsiacrypt 2016, IACR, Dec 2016, Hanoi, Vietnam. pp.101 - 131, ⟨10.1007/978-3-662-53890-6_4⟩
Communication dans un congrès
hal-01394087v1
|
||
|
Logarithmic-Size Ring Signatures With Tight Security from the DDH AssumptionESORICS 2018 - 23rd European Symposium on Research in Computer Security, Sep 2018, Barcelone, Spain. pp.288-308, ⟨10.1007/978-3-319-98989-1_15⟩
Communication dans un congrès
hal-01848134v1
|
||
|
Lattice-Based Zero-Knowledge Arguments for Integer RelationsCRYPTO 2018 - Annual International Cryptology Conference, Aug 2018, Santa Barbara, United States. pp.700-732, ⟨10.1007/978-3-319-96881-0_24⟩
Communication dans un congrès
hal-01911886v1
|
||
|
Multi-Client Functional Encryption for Linear Functions in the Standard Model from LWEASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2019, Kobe, Japan. pp.1-54, ⟨10.1007/978-3-030-34618-8_18⟩
Communication dans un congrès
hal-02352139v1
|
||
|
Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight SecurityAsiacrypt 2014, Dec 2014, Kaohsiung, Taiwan. pp.1 - 21, ⟨10.1007/978-3-662-45608-8_1⟩
Communication dans un congrès
hal-01088108v1
|
||
|
Hierarchical Identity-Based Lossy Trapdoor Functions2012
Pré-publication, Document de travail
hal-00674148v4
|
||
|
Cumulatively All-Lossy-But-One Trapdoor Functions from Standard AssumptionsSCN 2022 - Proceedings of the 13th Conference on Security in Communication Networks, Sep 2022, Amalfi, Italy
Communication dans un congrès
hal-03820072v1
|
||
|
A New Framework for Privacy-Preserving Aggregation of Time-Series DataACM Transactions on Information and System Security, 2016, 18 (3), pp.21. ⟨10.1145/2873069⟩
Article dans une revue
hal-01181321v3
|
||
|
Non-Zero Inner Product Encryption with Short Ciphertexts and Private Keys 10th Conference on Security and Cryptography for Networks (SCN 2016), Aug 2016, Amalfi, Italy
Communication dans un congrès
hal-01309562v3
|
||
|
Practical “Signatures with Efficient Protocols” from Simple AssumptionsAsiaCCS 2016, Xiaofeng Chen, May 2016, Xi'an, China. ⟨10.1145/2897845.2897898⟩
Communication dans un congrès
hal-01303696v2
|
||
|
Encoding-Free ElGamal-Type Encryption Schemes on Elliptic CurvesCT-RSA 2017 - RSA Conference 2017 -- Cryptographers' Track, Feb 2017, San Francisco, United States. pp.19 - 35, ⟨10.1007/978-3-540-72738-5_21⟩
Communication dans un congrès
hal-01621014v1
|
||
|
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice AssumptionsAsiacrypt 2016, IACR, Dec 2016, Hanoi, Vietnam
Communication dans un congrès
hal-01267123v1
|
||
|
Updatable Public Key Encryption from DCR: Efficient Constructions With Stronger SecurityACM Conference on Computer and Communications Security (ACM-CCS) 2022, Nov 2022, Los Angeles, United States
Communication dans un congrès
hal-03738749v1
|
||
|
Adaptive-ID Secure Revocable Identity-Based EncryptionTopics in cryptology - CT-RSA 2009, 2009, San Francisco, United States. pp.1-15, ⟨10.1007/978-3-642-00862-7_1⟩
Communication dans un congrès
inria-00417807v1
|
||
|
New and Improved Constructions for Partially Equivocable Public Key EncryptionSCN 2022 - 13th Conference on security and cryptography for networks, Sep 2022, Amalfi, Italy. pp.1-31
Communication dans un congrès
hal-03830141v1
|
||
|
Adaptive Oblivious Transfer with Access Control from Lattice AssumptionsASIACRYPT 2017 - Advances in Cryptology, Dec 2017, Hong Kong, China. pp.533-563, ⟨10.1007/978-3-319-70694-8_19⟩
Communication dans un congrès
hal-01622197v3
|
||
|
Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic SignaturesEurocrypt 2014, May 2014, Copenhagen, Denmark
Communication dans un congrès
hal-00983147v1
|
||
|
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys12th International Conference on Practice and Theory in Public-Key Cryptography - PKC 2009, 2009, Irvine, United States. pp.235-255
Communication dans un congrès
inria-00356999v1
|
||
|
Compact IBBE and Fuzzy IBE from Simple AssumptionsSCN 2018 - 11th Conference on Security and Cryptography for Networks, Sep 2018, Amalfi, Italy. pp.1-29
Communication dans un congrès
hal-01686690v2
|
||
|
Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable CiphertextsPKC 2017 - Public Key Cryptography, Mar 2017, Amsterdam, Netherlands. pp.247 - 276, ⟨10.1007/BFb0054113⟩
Communication dans un congrès
hal-01621022v1
|
||
|
Zero-Knowledge Elementary Databases with More Expressive QueriesPKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Apr 2019, Beijing, China. pp.255-285, ⟨10.1007/978-3-030-17253-4_9⟩
Communication dans un congrès
hal-02151645v1
|
||
|
Adaptively Secure Distributed PRFs from LWETCC 2018 - 16th International Conference on Theory of Cryptography, Nov 2018, Panaji, India. pp.391-421, ⟨10.1007/978-3-030-03810-6_15⟩
Communication dans un congrès
hal-01911887v1
|
||
|
Universal Designated Verifier Signatures Without Random Oracles or Non-Black Box AssumptionsFifth Conference on Security and Cryptography for Networks, Sep 2006, Maiori/Italie
Communication dans un congrès
inria-00080396v1
|
- 1
- 2