Search

Your search keyword '"Pointcheval, David"' showing total 775 results

Search Constraints

Start Over You searched for: Author "Pointcheval, David" Remove constraint Author: "Pointcheval, David"
775 results on '"Pointcheval, David"'

Search Results

1. Covercrypt: An Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE

2. Post-Quantum Oblivious Transfer from Smooth Projective Hash Functions with Grey Zone

3. Security Analysis of the EDHOC protocol

4. Differential Privacy Guarantees for Stochastic Gradient Langevin Dynamics

5. Secure Decision Forest Evaluation

7. GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges

10. Security Analysis of Improved EDHOC Protocol

11. Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey Zone

12. ARIANN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing

19. Partially Encrypted Machine Learning using Functional Encryption

21. Multi-Client Functional Encryption with Fine-Grained Access Control

22. MyOPE: Malicious SecuritY for Oblivious Polynomial Evaluation

23. Traceable Constant-Size Multi-authority Credentials

24. Key-Policy ABE with Switchable Attributes

26. Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model

27. Dynamic Decentralized Functional Encryption

28. Linearly-Homomorphic Signatures and Scalable Mix-Nets

29. Boosting Verifiable Computation on Encrypted Data

30. Traceable Inner Product Functional Encryption

31. Divisible E-Cash from Constrained Pseudo-Random Functions

32. Decentralized Evaluation of Quadratic Polynomials on Encrypted Data

33. Unbounded Inner-Product Functional Encryption with Succinct Keys

34. Practical Strategy-Resistant Privacy-Preserving Elections

35. Privacy-Preserving Plaintext-Equality of Low-Entropy Inputs

36. Fuzzy Password-Authenticated Key Exchange

37. Reassessing Security of Randomizable Signatures

38. Decentralized Multi-Client Functional Encryption for Inner Product

39. On the Leakage of Corrupted Garbled Circuits

42. Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash

43. Removing Erasures with Explainable Hash Proof Systems

44. Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms

45. Removing the Strong RSA Assumption from Arguments over the Integers

48. Encryption Switching Protocols

49. Robust Password-Protected Secret Sharing

50. The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs

Catalog

Books, media, physical & digital resources