|
[14] | Hardware Security without Secure Hardware: How to Decrypt with a Password and a Server (Olivier Blazy, Laura Brouilhet, Céline Chevalier, Patrick Towa, Ida Tucker, Damien Vergnaud), In Theor. Comput. Sci., Elsevier, volume 895, 2021.
|
|
[13] | Public-Key Generation with Verifiable Randomness (Olivier Blazy, Patrick Towa, Damien Vergnaud), In Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I (Shiho Moriai, Huaxiong Wang, eds.), Springer, volume 12491, 2020.
|
|
[12] | Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions (Olivier Blazy, Céline Chevalier, Damien Vergnaud), In Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings (Kazue Sako, ed.), Springer, 2016. |
|
[11] | Non-Interactive Zero-Knowledge Proofs of Non-Membership (Olivier Blazy, Céline Chevalier, Damien Vergnaud), In Proceedings of CT-RSA (K. Nyberg, ed.), Springer, volume 9048, 2015. |
|
[10] | Short Blind Signatures (Olivier Blazy, Georg Fuchsbauer, David Pointcheval, Damien Vergnaud), In Journal of Computer Security, IOS Press, volume 21, 2013.
|
[9] | New Techniques for SPHFs and Efficient One-Round PAKE Protocols (Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud), In Advances in Cryptology - Proceedings of CRYPTO '13 (Ran Canetti, Juan Garay, eds.), Springer, volume 8042, 2013.
|
[8] | Analysis and Improvement of Lindell's UC-Secure Commitment Schemes (Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud), In Conference on Applied Cryptography and Network Security (ACNS '13) (Rei Safavi-Naini, Michael E. Locasto, eds.), Springer, volume 7954, 2013.
|
[7] | Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages (Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud), In Conference on Practice and Theory in Public-Key Cryptography (PKC '13) (Kaoru Kurosawa, Goichiro Hanaoka, eds.), Springer, volume 7778, 2013.
|
[6] | New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange (Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud), Technical report, IACR ePrint Archive, 2013.
|
|
[5] | Compact Round-Optimal Partially-Blind Signatures (Olivier Blazy, David Pointcheval, Damien Vergnaud), In The 8th Conference on Security in Communication Networks (SCN '12) (Ivan Visconti, Roberto De Prisco, eds.), Springer, volume 7485, 2012.
|
[4] | Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages (Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud), Technical report, IACR ePrint Archive, 2012.
|
[3] | Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions (Olivier Blazy, David Pointcheval, Damien Vergnaud), In 9th Theory of Cryptography Conference (TCC '12) (Ronald Cramer, ed.), Springer, volume 7194, 2012.
|
|
[2] | Signatures on Randomizable Ciphertexts (Olivier Blazy, Georg Fuchsbauer, David Pointcheval, Damien Vergnaud), In Conference on Practice and Theory in Public-Key Cryptography (PKC '11) (Dario Catalano, Nelly Fazio, Rosario Gennaro, Antonio Nicolosi, eds.), Springer, volume 6571, 2011.
|
|
[1] | Batch Groth-Sahai (Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert, Hervé Sibert, Damien Vergnaud), In Conference on Applied Cryptography and Network Security (ACNS '10) (Jianying Zhou, Moti Yung, eds.), Springer, volume 6123, 2010.
|