Filtrer vos résultats
- 87
- 24
- 60
- 23
- 18
- 4
- 3
- 2
- 1
- 13
- 10
- 109
- 2
- 6
- 6
- 8
- 5
- 5
- 5
- 13
- 11
- 6
- 5
- 3
- 3
- 5
- 6
- 5
- 6
- 5
- 1
- 1
- 2
- 3
- 1
- 108
- 3
- 99
- 53
- 35
- 12
- 7
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 111
- 37
- 27
- 11
- 11
- 10
- 8
- 7
- 7
- 5
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
111 résultats
|
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying TechniquesAdvances in Cryptology - ASIACRYPT 2000, Dec 2000, Kyoto, Japan. pp.546-559, ⟨10.1007/3-540-44448-3_42⟩
Communication dans un congrès
hal-02391570v1
|
||
|
From Single-Input to Multi-client Inner-Product Functional EncryptionASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2019, Kobe, Japan. pp.552-582, ⟨10.1007/978-3-030-34618-8_19⟩
Communication dans un congrès
hal-02375577v1
|
||
|
A Simple Threshold Authenticated Key Exchange from Short SecretsAdvances in Cryptology - ASIACRYPT 2005, Dec 2005, Chennai, India. pp.566-584, ⟨10.1007/11593447_31⟩
Communication dans un congrès
hal-02391437v1
|
||
Forward-Secure Threshold Signature SchemesTopics in Cryptology - {CT-RSA} 2001, Apr 2001, San Francisco, United States. pp.441-456, ⟨10.1007/3-540-45353-9_32⟩
Communication dans un congrès
istex
hal-02391547v1
|
|||
|
On the (Im)possibility of Blind Message Authentication CodesTopics in Cryptology - CT-RSA 2006, Feb 2006, San Jose, United States. pp.262-279, ⟨10.1007/11605805_17⟩
Communication dans un congrès
hal-02391396v1
|
||
Leakage-Resilient Spatial EncryptionLATINCRYPT 2012, Oct 2012, Santiago, Chile. pp.78-99, ⟨10.1007/978-3-642-33481-8_5⟩
Communication dans un congrès
hal-00915816v1
|
|||
|
Algebraic Adversaries in the Universal Composability Framework[Research Report] IACR Cryptology ePrint Archive. 2021
Rapport
hal-03442093v1
|
||
Pairing-Based Cryptography - PAIRING 2012Michel Abdalla and Tanja Lange. Springer, 7708, pp.333, 2013, Lecture Notes in Computer Science, 978-3-642-36334-4. ⟨10.1007/978-3-642-36334-4⟩
Ouvrages
hal-00915796v1
|
|||
|
Public-Key Cryptography – PKC 2018Michel Abdalla; Ricardo Dahab. Public-Key Cryptography – PKC 2018, Mar 2018, Rio de Janeiro, Brazil. 10769, Springer, 2018, Lecture Notes in Computer Science, ⟨10.1007/978-3-319-76578-5⟩
Proceedings/Recueil des communications
hal-02293208v1
|
||
|
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and ExtensionsJournal of Cryptology, 2008, 21 (3), pp.350-391. ⟨10.1007/s00145-007-9006-6⟩
Article dans une revue
hal-00918362v1
|
||
|
Removing Erasures with Explainable Hash Proof SystemsPublic-Key Cryptography - PKC 2017 - 20th International Conference on Practice and Theory in Public-Key Cryptography, Mar 2017, Amsterdam, Netherlands. pp.151-174, ⟨10.1007/978-3-662-54365-8_7⟩
Communication dans un congrès
hal-01471896v1
|
||
|
Password-Based Group Key Exchange in a Constant Number of RoundsPublic Key Cryptography - PKC 2006, Apr 2009, New York, United States. pp.427-442, ⟨10.1007/11745853_28⟩
Communication dans un congrès
hal-02391427v1
|
||
|
Distributed Public-Key Cryptography from Weak SecretsConference on Practice and Theory in Public-Key Cryptography (PKC '09), 2009, Irvine, California, USA, United States. pp.139--159
Communication dans un congrès
inria-00419149v1
|
||
|
Simple Password-Based Encrypted Key Exchange ProtocolsTopics in Cryptology - CT-RSA 2005, Feb 2005, San Francisco, United States. pp.191-208, ⟨10.1007/978-3-540-30574-3_14⟩
Communication dans un congrès
hal-02391456v1
|
||
Removing Erasures with Explainable Hash Proof Systems[Technical Report] Cryptology ePrint Archive: Report 2014/125, IACR. 2014
Rapport
hal-01068442v1
|
|||
|
Password-Based Authenticated Key Exchange in the Three-Party SettingIEE Proceedings - Information Security, 2006, 153 (1), pp.27-39. ⟨10.1049/ip-ifs:20055073⟩
Article dans une revue
hal-00918401v1
|
||
|
Flexible Group Key Exchange with On-Demand Computation of Subgroup KeysThird African International Conference on Cryptology (AfricaCrypt '10), 2010, Stellenbosch, South Africa. pp.351--368
Communication dans un congrès
inria-00539541v1
|
||
|
Generalised Key Delegation for Hierarchical Identity-Based EncryptionIET Information Security, 2008, 2 (3), pp.67-78. ⟨10.1049/iet-ifs:20070124⟩
Article dans une revue
hal-00918539v1
|
||
|
Robust EncryptionTCC 2010, Feb 2010, Zurich, Switzerland. pp.480-497, ⟨10.1007/978-3-642-11799-2_28⟩
Communication dans un congrès
hal-00915836v1
|
||
From Identification to Signatures Via the Fiat-Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-SecurityIEEE Transactions on Information Theory, 2008, 54 (8), pp.3631-3646. ⟨10.1109/TIT.2008.926303⟩
Article dans une revue
hal-00917092v1
|
|||
Robust Password-Protected Secret Sharing[Technical Report] Cryptology ePrint Archive: Report 2016/123, IACR. 2016
Rapport
hal-01380730v1
|
|||
|
Tightly-Secure Signatures from Lossy Identification SchemesAdvances in Cryptology - {EUROCRYPT} 2012, Apr 2012, Cambridge, United Kingdom. pp.19, ⟨10.1007/978-3-642-29011-4_34⟩
Communication dans un congrès
hal-01094318v1
|
||
|
SPHF-Friendly Non-Interactive CommitmentsASIACRYPT 2013, Dec 2013, Bangalore, India. pp.214-234, ⟨10.1007/978-3-642-42033-7_12⟩
Communication dans un congrès
hal-00915542v1
|
||
|
Multi-Client Inner-Product Functional Encryption in the Random-Oracle ModelSCN 2020 - 12th International Conference Security and Cryptography for Networks., Sep 2020, Amalfi / Virtual, Italy. pp.525-545, ⟨10.1007/978-3-030-57990-6_26⟩
Communication dans un congrès
hal-02948657v1
|
||
|
Leakage-Resilient Symmetric Encryption via Re-keyingCryptographic Hardware and Embedded Systems - {CHES} 2013, Aug 2013, Santa Barbara, United States. pp.18, ⟨10.1007/978-3-642-40349-1_27⟩
Communication dans un congrès
istex
hal-01094306v1
|
||
Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps[Technical Report] Report 2017/500, IACR Cryptology ePrint Archive. 2017
Rapport
hal-01667132v1
|
|||
|
Provably secure password-based authentication in TLSThe 2006 ACM Symposium - ASIACCS 2006, Mar 2006, Taipei, Taiwan. pp.35, ⟨10.1145/1128817.1128827⟩
Communication dans un congrès
hal-02391374v1
|
||
|
Practical Dynamic Group Signatures Without Knowledge Extractors[Research Report] Report 2021/351, IACR Cryptology ePrint Archive. 2021
Rapport
hal-03442108v1
|
||
Simple Functional Encryption Schemes for Inner Products[Technical Report] Cryptology ePrint Archive: Report 2015/017, IACR. 2015
Rapport
hal-01108287v1
|
|||
The Oracle Diffie-Hellman Assumptions and an Analysis of DHIESTopics in Cryptology - CT-RSA 2001, Apr 2001, San Francisco, United States. pp.143-158, ⟨10.1007/3-540-45353-9_12⟩
Communication dans un congrès
istex
hal-02391537v1
|