52 results on '"Blazy, Olivier"'
Search Results
2. Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption
3. Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey Zone
4. (Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard
5. Identity-Based Encryption in DDH Hard Groups
6. A Correction to a Code-Based Blind Signature Scheme
7. A Rank Metric Code-Based Group Signature Scheme
8. An Anonymous Trace-and-Revoke Broadcast Encryption Scheme
9. Generic Plaintext Equality and Inequality Proofs
10. How to (Legally) Keep Secrets from Mobile Operators
11. CCA-Secure ABE Using Tag and Pair Encoding
12. Skipping the q in Group Signatures
13. Public-Key Generation with Verifiable Randomness
14. Durandal: A Rank Metric Based Signature Scheme
15. Downgradable Identity-Based Encryption and Applications
16. Hash Proof Systems over Lattices Revisited
17. Almost Optimal Oblivious Transfer from QA-NIZK
18. Anonymizable Ring Signature Without Pairing
19. Adaptive Oblivious Transfer and Generalization
20. Structure-Preserving Smooth Projective Hashing
21. Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability
22. Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions
23. A Practical Group Signature Scheme Based on Rank Metric
24. Tightly-Secure Signatures from Chameleon Hash Functions
25. Generic Construction of UC-Secure Oblivious Transfer
26. Non-Interactive Zero-Knowledge Proofs of Non-Membership
27. (Hierarchical) Identity-Based Encryption from Affine Message Authentication
28. SPHF-Friendly Non-interactive Commitments
29. New Techniques for SPHFs and Efficient One-Round PAKE Protocols
30. Analysis and Improvement of Lindell’s UC-Secure Commitment Schemes
31. Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
32. Compact Round-Optimal Partially-Blind Signatures
33. Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions
34. Traceable Signature with Stepping Capabilities
35. Achieving Optimal Anonymity in Transferable E-Cash with a Judge
36. Signatures on Randomizable Ciphertexts
37. Batch Groth–Sahai
38. A Family of Lightweight Twisted Edwards Curves for the Internet of Things
39. Detection of Bitcoin-Based Botnets Using a One-Class Classifier
40. A Generic Lightweight and Scalable Access Control Framework for IoT Gateways
41. Remote Credential Management with Mutual Attestation for Trusted Execution Environments
42. Cybersecurity Behaviour: A Conceptual Taxonomy
43. Prediction-Based Intrusion Detection System for In-Vehicle Networks Using Supervised Learning and Outlier-Detection
44. Deep Learning Application in Security and Privacy – Theory and Practice: A Position Paper
45. Linear Depth Integer-Wise Homomorphic Division
46. Efficient Information Theoretic Multi-party Computation from Oblivious Linear Evaluation
47. Generic Architecture for Lightweight Block Ciphers: A First Step Towards Agile Implementation of Multiple Ciphers
48. Generating a Real-Time Constraint Engine for Network Protocols
49. Bringing Kleptography to Real-World TLS
50. On the Non-repudiation of Isogeny Based Signature Scheme
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.