180 results on '"Blazy, Olivier"'
Search Results
2. Post-Quantum Oblivious Transfer from Smooth Projective Hash Functions with Grey Zone
3. Cryptographie à base de couplages
4. Anonymous attribute-based designated verifier signature
5. Secure Decision Forest Evaluation
6. Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption
7. Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey Zone
8. (Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard
9. Identity-Based Encryption in DDH Hard Groups
10. A Correction to a Code-Based Blind Signature Scheme
11. A Rank Metric Code-Based Group Signature Scheme
12. A gapless code-based hash proof system based on RQC and its applications
13. Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption
14. Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey Zone
15. An Anonymous Trace-and-Revoke Broadcast Encryption Scheme
16. Generic Plaintext Equality and Inequality Proofs
17. How to (Legally) Keep Secrets from Mobile Operators
18. Efficient Encryption from Random Quasi-Cyclic Codes
19. Hardware security without secure hardware: How to decrypt with a password and a server
20. A Correction to a Code-Based Blind Signature Scheme
21. (Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard
22. Identity-Based Encryption in DDH Hard Groups
23. A Rank Metric Code-Based Group Signature Scheme
24. CCA-Secure ABE Using Tag and Pair Encoding
25. Skipping the q in Group Signatures
26. Public-Key Generation with Verifiable Randomness
27. Cryptanalysis of a rank-based signature with short public keys
28. Durandal: A Rank Metric Based Signature Scheme
29. Downgradable Identity-Based Encryption and Applications
30. Generic Plaintext Equality and Inequality Proofs
31. An Anonymous Trace-and-Revoke Broadcast Encryption Scheme
32. How to (Legally) Keep Secrets from Mobile Operators
33. Hash Proof Systems over Lattices Revisited
34. New efficient M2C and M2M mutual authentication protocols for IoT-based healthcare applications
35. Almost Optimal Oblivious Transfer from QA-NIZK
36. Anonymizable Ring Signature Without Pairing
37. Skipping the q in Group Signatures
38. Public-Key Generation with Verifiable Randomness
39. CCA-Secure ABE Using Tag and Pair Encoding
40. Adaptive Oblivious Transfer and Generalization
41. Structure-Preserving Smooth Projective Hashing
42. Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability
43. Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions
44. A Practical Group Signature Scheme Based on Rank Metric
45. Efficient Implementation of a Post-Quantum Anonymous Credential Protocol
46. How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment
47. Tightly-Secure Signatures from Chameleon Hash Functions
48. Generic Construction of UC-Secure Oblivious Transfer
49. Non-Interactive Zero-Knowledge Proofs of Non-Membership
50. Durandal: A Rank Metric Based Signature Scheme
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.