Filtrer vos résultats
- 4
- 3
- 4
- 3
- 7
- 1
- 2
- 4
- 7
- 7
- 5
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 4
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
7 résultats
|
|
triés par
|
|
Practical “Signatures with Efficient Protocols” from Simple AssumptionsAsiaCCS 2016, Xiaofeng Chen, May 2016, Xi'an, China. ⟨10.1145/2897845.2897898⟩
Communication dans un congrès
hal-01303696v2
|
||
|
Soft Analytical Side-Channel AttacksAdvances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Palash Sarkar, Tetsu Iwata, Dec 2014, Kaoshiung, Taiwan. pp.282 - 296, ⟨10.1007/978-3-662-45611-8_15⟩
Communication dans un congrès
hal-01096218v1
|
||
|
Block-wise p-signatures and non-interactive anonymous credentials with efficient attributesIMACC'11 - 13th IMA international conference on Cryptography and Coding, Dec 2011, Oxford, UK, United Kingdom. pp.431-450
Communication dans un congrès
hal-01110210v1
|
||
|
Towards Practical Black-Box Accountable Authority IBE: Weak Black-Box Traceability With Short Ciphertexts and Private KeysIEEE Transactions on Information Theory, 2011, 57 (10), pp.7189-7204
Article dans une revue
hal-01110043v1
|
||
|
Unidirectional Chosen-Ciphertext Secure Proxy Re-EncryptionIEEE Transactions on Information Theory, 2011, 57 (3), pp.1786 - 1802. ⟨10.1109/TIT.2011.2104470⟩
Article dans une revue
hal-01110041v1
|
||
Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext securityASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Jul 2011, Dakar, Senegal. pp.70-88
Communication dans un congrès
hal-01110204v1
|
|||
|
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysisJournal of Cryptographic Engineering, 2014, 4 (3), pp.15. ⟨10.1007/s13389-014-0079-5⟩
Article dans une revue
hal-01113984v1
|