Filtrer vos résultats
- 5
- 4
- 1
- 5
- 1
- 1
- 1
- 1
- 1
- 5
- 5
- 5
- 3
- 3
- 2
- 2
- 5
- 5
- 3
- 2
- 2
- 2
- 1
- 1
5 résultats
|
|
triés par
|
|
Threshold Linearly Homomorphic Encryption on $\mathbf{Z}/2^k\mathbf{Z}$ASIACRYPT 2022 - International Conference on the Theory and Application of Cryptology and Information Security, Dec 2022, Taipei, Taiwan. pp.99-129, ⟨10.1007/978-3-031-22966-4_4⟩
Communication dans un congrès
hal-03936038v1
|
||
|
Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts Proactive and Adaptive SecurityTheoretical Computer Science, 2023, 939, pp.78-104. ⟨10.1016/j.tcs.2022.10.016⟩
Article dans une revue
hal-03927198v1
|
||
|
Practical Fully Secure Unrestricted Inner Product Functional Encryption modulo pASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2018, Brisbane, Australia. pp.733-764
Communication dans un congrès
hal-01934296v1
|
||
|
Bandwidth-Efficient Threshold EC-DSAPKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Jun 2020, Edinburgh / Virtual, United Kingdom. pp.266-296, ⟨10.1007/978-3-030-45388-6_10⟩
Communication dans un congrès
hal-02944825v1
|
||
|
Two-Party ECDSA from Hash Proof Systems and Efficient InstantiationsCRYPTO 2019 - 39th Annual International Cryptology Conference, Aug 2019, Santa Barbara, United States. pp.191-221, ⟨10.1007/978-3-030-26954-8_7⟩
Communication dans un congrès
hal-02281931v1
|