|
[7] | CCA-Secure ABE using Tag and Pair Encoding (Olivier Blazy, Sayantan Mukherjee), In Progress in Cryptology - INDOCRYPT 2020 - 21st International Conference on Cryptology in India, Virtual Conference, December 13-16, 2020, Proceedings (Karthikeyan Bhargavan, Elisabeth Oswald, Manoj Prabhakaran, eds.), Springer, volume 12578, 2020.
|
[6] | Skipping the q in Group Signatures (Olivier Blazy, Saqib A. Kakvi), In Progress in Cryptology - INDOCRYPT 2020 - 21st International Conference on Cryptology in India, Virtual Conference, December 13-16, 2020, Proceedings (Karthikeyan Bhargavan, Elisabeth Oswald, Manoj Prabhakaran, eds.), Springer, volume 12578, 2020.
|
[5] | Public-Key Generation with Verifiable Randomness (Olivier Blazy, Patrick Towa, Damien Vergnaud), In Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I (Shiho Moriai, Huaxiong Wang, eds.), Springer, volume 12491, 2020.
|
[4] | CROOT: Code-based Round-Optimal Oblivious Transfer (Nicolas Aragon, Olivier Blazy, Neals Fournaise, Philippe Gaborit), In Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020 (Pierangela Samarati, Sabrina De Capitani di Vimercati, Mohammad S. Obaidat, Jalel Ben-Othman, eds.), ScitePress, 2020.
|
[3] | Round-Optimal Constant-Size Blind Signatures (Olivier Blazy, Laura Brouilhet, Céline Chevalier, Neals Fournaise), In Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020 (Pierangela Samarati, Sabrina De Capitani di Vimercati, Mohammad S. Obaidat, Jalel Ben-Othman, eds.), ScitePress, 2020.
|
[2] | New efficient M2C and M2M mutual authentication protocols for IoT-based healthcare applications (Fatma Merabet, Amina Cherif, Malika Belkadi, Olivier Blazy, Emmanuel Conchon, Damien Sauveron), In Peer-to-Peer Networking and Applications, volume 13, 2020.
|
[1] | Cryptanalysis of a rank-based signature with short public keys (Nicolas Aragon, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Terry Shue Chien Lau, Chik How Tan, Keita Xagawa), In Des. Codes Cryptogr., volume 88, 2020.
|