Search

Your search keyword '"Blazy, Olivier"' showing total 52 results

Search Constraints

Start Over You searched for: Author "Blazy, Olivier" Remove constraint Author: "Blazy, Olivier" Publication Type eBooks Remove constraint Publication Type: eBooks
52 results on '"Blazy, Olivier"'

Search Results

2. Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption

3. Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey Zone

4. (Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard

5. Identity-Based Encryption in DDH Hard Groups

6. A Correction to a Code-Based Blind Signature Scheme

7. A Rank Metric Code-Based Group Signature Scheme

8. An Anonymous Trace-and-Revoke Broadcast Encryption Scheme

9. Generic Plaintext Equality and Inequality Proofs

10. How to (Legally) Keep Secrets from Mobile Operators

11. CCA-Secure ABE Using Tag and Pair Encoding

12. Skipping the q in Group Signatures

13. Public-Key Generation with Verifiable Randomness

14. Durandal: A Rank Metric Based Signature Scheme

15. Downgradable Identity-Based Encryption and Applications

16. Hash Proof Systems over Lattices Revisited

17. Almost Optimal Oblivious Transfer from QA-NIZK

18. Anonymizable Ring Signature Without Pairing

19. Adaptive Oblivious Transfer and Generalization

20. Structure-Preserving Smooth Projective Hashing

21. Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability

22. Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions

23. A Practical Group Signature Scheme Based on Rank Metric

24. Tightly-Secure Signatures from Chameleon Hash Functions

25. Generic Construction of UC-Secure Oblivious Transfer

26. Non-Interactive Zero-Knowledge Proofs of Non-Membership

27. (Hierarchical) Identity-Based Encryption from Affine Message Authentication

28. SPHF-Friendly Non-interactive Commitments

29. New Techniques for SPHFs and Efficient One-Round PAKE Protocols

30. Analysis and Improvement of Lindell’s UC-Secure Commitment Schemes

31. Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages

32. Compact Round-Optimal Partially-Blind Signatures

33. Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions

34. Traceable Signature with Stepping Capabilities

35. Achieving Optimal Anonymity in Transferable E-Cash with a Judge

36. Signatures on Randomizable Ciphertexts

37. Batch Groth–Sahai

38. A Family of Lightweight Twisted Edwards Curves for the Internet of Things

39. Detection of Bitcoin-Based Botnets Using a One-Class Classifier

40. A Generic Lightweight and Scalable Access Control Framework for IoT Gateways

41. Remote Credential Management with Mutual Attestation for Trusted Execution Environments

42. Cybersecurity Behaviour: A Conceptual Taxonomy

43. Prediction-Based Intrusion Detection System for In-Vehicle Networks Using Supervised Learning and Outlier-Detection

44. Deep Learning Application in Security and Privacy – Theory and Practice: A Position Paper

45. Linear Depth Integer-Wise Homomorphic Division

46. Efficient Information Theoretic Multi-party Computation from Oblivious Linear Evaluation

47. Generic Architecture for Lightweight Block Ciphers: A First Step Towards Agile Implementation of Multiple Ciphers

48. Generating a Real-Time Constraint Engine for Network Protocols

49. Bringing Kleptography to Real-World TLS

50. On the Non-repudiation of Isogeny Based Signature Scheme

Catalog

Books, media, physical & digital resources