2021
[5]Legally keeping secrets from mobile operators: Lawful Interception Key Exchange (LIKE) (Ghada Arfaoui, Olivier Blazy, Xavier Bultel, Pierre-Alain Fouque, Thibaut Jacques, Adina Nedelcu, Cristina Onete), In Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security (Elisa Bertino Haya Shulman Michael Waidner, ed.), Springer, volume , 2021.
2019
[4] Durandal: A Rank Metric Based Signature Scheme (Nicolas Aragon, Olivier Blazy, Philippe Gaborit, Adrien Hauteville, Gilles Zémor), In Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part III (Yuval Ishai, Vincent Rijmen, eds.), Springer, volume 11478, 2019. doi
2018
[3] Spreading Alerts Quietly: New Insights from Theory and Practice (Olivier Blazy, Céline Chevalier), In Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany, August 27 - August 30, 2018, 2018. doi
[2] Non-Interactive Key Exchange from Identity-Based Encryption (Olivier Blazy, Céline Chevalier), In Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, ACM, 2018. doi
2017
[1] A code-based blind signature (Olivier Blazy, Philippe Gaborit, Julien Schrek, Nicolas Sendrier), In 2017 IEEE International Symposium on Information Theory, ISIT 2017, Aachen, Germany, June 25-30, 2017, 2017. doi