Filtrer vos résultats
- 318
- 206
- 2
- 346
- 71
- 40
- 27
- 13
- 10
- 7
- 5
- 3
- 3
- 1
- 21
- 19
- 509
- 10
- 5
- 3
- 2
- 2
- 1
- 1
- 1
- 22
- 16
- 14
- 27
- 28
- 35
- 37
- 43
- 49
- 52
- 51
- 47
- 39
- 21
- 20
- 22
- 1
- 1
- 514
- 11
- 1
- 315
- 217
- 216
- 18
- 16
- 14
- 14
- 14
- 13
- 12
- 12
- 12
- 11
- 9
- 9
- 8
- 8
- 7
- 7
- 7
- 7
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 128
- 87
- 61
- 42
- 35
- 33
- 32
- 21
- 21
- 21
- 19
- 18
- 16
- 14
- 14
- 14
- 13
- 13
- 13
- 13
- 12
- 12
- 10
- 10
- 9
- 9
- 9
- 9
- 9
- 9
- 8
- 8
- 7
- 7
- 7
- 7
- 7
- 7
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
526 résultats
|
Security Analysis of SIMDSelected Areas in Cryptography, 10th Annual International Workshop, SAC 2010, 2010, Ontario, Canada
Communication dans un congrès
inria-00556680v1
|
||
Proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography (PKC '10)Nguyen, Phong Q. and Pointcheval, David. Springer, 6056, pp.519, 2010, LNCS
Ouvrages
inria-00539537v1
|
|||
2011 Workshop on Fault Diagnosis and Tolerance in Cryptography2011 Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC, Sep 2011, Nara, Japan. IEEE, 2011
Proceedings/Recueil des communications
hal-01110262v1
|
|||
|
Masking the GLP Lattice-Based Signature Scheme at Any OrderEurocrypt 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Apr 2018, Tel Aviv, Israel. pp.354-384, ⟨10.1007/978-3-319-78375-8_12⟩
Communication dans un congrès
hal-01900708v1
|
||
Leakage-Resilient Symmetric Encryption via Re-keying[Technical Report] Cryptology ePrint Archive: Report 2015/204, IACR. 2015
Rapport
hal-01132195v1
|
|||
|
Differential Power Analysis of HMAC SHA-2 in the Hamming Weight ModelSECRYPT 2013 - 10th International Conference on Security and Cryptography, Jul 2013, Reykjavik, Iceland
Communication dans un congrès
hal-00872410v1
|
||
|
Progress in Cryptology - LATINCRYPT 2010Michel Abdalla and Paulo Barreto. Springer, 6212, pp.323, 2010, Lecture Notes in Computer Science, 978-3-642-14711-1. ⟨10.1007/978-3-642-14712-8⟩
Ouvrages
hal-00915803v1
|
||
|
Practical lattice-based cryptography: A signature scheme for embedded systemsCHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings, Sep 2012, Leuven, Belgium. pp.530-547, ⟨10.1007/978-3-642-33027-8_31⟩
Communication dans un congrès
hal-00864302v1
|
||
|
Hardware security without secure hardware: How to decrypt with a password and a serverTheoretical Computer Science, 2021, 895, pp.178-211. ⟨10.1016/j.tcs.2021.09.042⟩
Article dans une revue
hal-03378464v1
|
||
|
Sharp: Short Relaxed Range ProofsCCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security, Nov 2022, Los Angeles CA USA, United States. pp.609-622, ⟨10.1145/3548606.3560628⟩
Communication dans un congrès
hal-03860720v1
|
||
|
Decentralizing Inner-Product Functional EncryptionPublic-Key Cryptography – PKC 2019, Apr 2019, Beijing, China. pp.128-157, ⟨10.1007/978-3-030-17259-6_5⟩
Communication dans un congrès
hal-02135871v1
|
||
|
Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash FunctionsTCC 2012 - Ninth IACR Theory of Cryptography Conference, Mar 2012, Taormina, Italy. pp.94-112, ⟨10.1007/978-3-642-28914-9_6⟩
Communication dans un congrès
hal-00672939v1
|
||
|
Compact Round-Optimal Partially-Blind SignaturesSCN 2012 - 8th International Conference Security and Cryptography for Networks, Sep 2012, Amalfi, Italy. pp.95-112, ⟨10.1007/978-3-642-32928-9_6⟩
Communication dans un congrès
hal-00764863v1
|
||
|
Efficient Signatures on Randomizable CiphertextsSCN 2020 - 12th International Conference Security and Cryptography for Networks., Sep 2020, Amalfi / Virtual, Italy. pp.359-381, ⟨10.1007/978-3-030-57990-6_18⟩
Communication dans un congrès
hal-02968280v1
|
||
|
Ring-LWE in polynomial ringsPKC 2012 - International Conference on Practice and Theory in Public Key Cryptography, May 2012, Darmstadt, Germany. pp.34-51, ⟨10.1007/978-3-642-30057-8_3⟩
Communication dans un congrès
hal-01111627v1
|
||
Security Analysis of CPaceASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2021, Singapour, Singapore. pp.711-741, ⟨10.1007/978-3-030-92068-5_24⟩
Communication dans un congrès
hal-03517563v1
|
|||
|
Short Randomizable SignaturesThe Cryptographers' Track at the RSA Conference 2016, Feb 2016, San Francisco, United States. pp.111 - 126, ⟨10.1007/978-3-319-29485-8_7⟩
Communication dans un congrès
hal-01377997v1
|
||
|
Graded Encoding Schemes from ObfuscationPKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Mar 2018, Rio De Janeiro, Brazil. ⟨10.1007/978-3-319-76581-5_13⟩
Communication dans un congrès
hal-01904151v1
|
||
Lattice-Based Hierarchical Inner Product EncryptionLATINCRYPT 2012, Oct 2012, Santiago, Chile. pp.121-138, ⟨10.1007/978-3-642-33481-8_7⟩
Communication dans un congrès
hal-00915812v1
|
|||
Secure Distributed Computation on Private Inputs8th International Symposium on Foundations & Practice of Security, Oct 2015, Clermont-Ferrand, France
Communication dans un congrès
hal-01243278v1
|
|||
Predicate Encryption for Multi-Dimensional Range Queries from Lattices[Technical Report] Cryptology ePrint Archive: Report 2014/965, IACR. 2014
Rapport
hal-01094685v1
|
|||
|
A toolkit for Ring-LWE cryptographyEUROCRYPT - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques - 2013, May 2013, Athens, Greece. pp.35-54, ⟨10.1007/978-3-642-38348-9_3⟩
Communication dans un congrès
hal-00864284v1
|
||
|
Dual System Encryption via Predicate EncodingsTheory of Cryptography (TCC 2014), Feb 2014, San Diego, United States. ⟨10.1007/978-3-642-54242-8_26⟩
Communication dans un congrès
hal-01094703v1
|
||
How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling[Research Report] IACR Cryptology ePrint Archive 2013: 432 (2013), 2013
Rapport
hal-00934338v1
|
|||
|
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128CRYPTO 2013, Aug 2013, Santa Barbara, United States
Communication dans un congrès
hal-00870453v1
|
||
Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New ConstructionsACM Conference on Computer and Communications Security (CCS) 2017, Oct 2017, Dallas, United States
Communication dans un congrès
hal-01599851v1
|
|||
|
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression FunctionFast Software Encryption, 18th International Workshop : FSE 2011, Feb 2011, Lyngby, Denmark. pp.107-127, ⟨10.1007/978-3-642-21702-9_7⟩
Communication dans un congrès
inria-00556673v1
|
||
|
Algebraic Adversaries in the Universal Composability FrameworkASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2021, Singapour, Singapore. pp.311-341, ⟨10.1007/978-3-030-92078-4_11⟩
Communication dans un congrès
hal-03517558v1
|
||
|
Contribution à la cryptographie interactiveCryptographie et sécurité [cs.CR]. Ecole Normale Superieure de Paris - ENS Paris, 2023. Français. ⟨NNT : ⟩
Thèse
tel-04253249v1
|
||
Tighter Reductions for Forward-Secure Signature Schemes[Technical Report] Cryptology ePrint Archive: Report 2015/196, IACR. 2015
Rapport
hal-01132190v1
|