The following pages link to Xavier Boyen (Q321306):
Displaying 50 items.
- Unconditionally anonymous ring and mesh signatures (Q321307) (← links)
- Efficient selective identity-based encryption without random oracles (Q656924) (← links)
- Almost tight multi-instance multi-ciphertext identity-based encryption on lattices (Q1656071) (← links)
- All-but-many lossy trapdoor functions from lattices and applications (Q1675206) (← links)
- Forward-secure linkable ring signatures (Q1784455) (← links)
- Signcryption schemes with insider security in an ideal permutation model (Q2003346) (← links)
- CCA-security from adaptive all-but-one lossy trapdoor functions (Q2049981) (← links)
- A simple and efficient CCA-secure lattice KEM in the standard model (Q2106649) (← links)
- Secure hybrid encryption in the standard model from hard learning problems (Q2118559) (← links)
- The complex shape of anonymity in cryptocurrencies: case studies from a systematic approach (Q2145387) (← links)
- Efficient public-key encryption with equality test from lattices (Q2235763) (← links)
- Direct CCA-secure KEM and deterministic PKE from plain LWE (Q2302129) (← links)
- A tapestry of identity-based encryption: practical frameworks compared (Q2379112) (← links)
- Key recovery: inert and public (Q2412219) (← links)
- Short signatures without random oracles and the SDH assumption in bilinear groups (Q2425530) (← links)
- Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions (Q2822675) (← links)
- Key-Private Proxy Re-encryption under LWE (Q2872038) (← links)
- Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices (Q2900223) (← links)
- Expressive Encryption Systems from Lattices (Q2901348) (← links)
- Sealing the Leak on Classical NTRU Signatures (Q2938670) (← links)
- Towards Tightly Secure Lattice Short Signature and Id-Based Encryption (Q2953784) (← links)
- Identity-Based Signcryption (Q3000037) (← links)
- Attribute-Based Encryption for Finite Automata from LWE (Q3464400) (← links)
- Miniature CCA2 PK Encryption: Tight Security Without Redundancy (Q3498395) (← links)
- New Paradigms for Password Security (Q3511147) (← links)
- Expressive Subgroup Signatures (Q3540045) (← links)
- Strong Cryptography from Weak Secrets (Q3558319) (← links)
- Preventing Pollution Attacks in Multi-source Network Coding (Q3562894) (← links)
- Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More (Q3562917) (← links)
- Efficient Lattice (H)IBE in the Standard Model (Q3563855) (← links)
- Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions (Q3575035) (← links)
- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE (Q3582750) (← links)
- Compact Group Signatures Without Random Oracles (Q3593110) (← links)
- The Uber-Assumption Family (Q3600492) (← links)
- (Q3615879) (← links)
- (Q3615880) (← links)
- Distributed Public-Key Cryptography from Weak Secrets (Q3617518) (← links)
- HPAKE : Password Authentication Secure against Cross-Site User Impersonation (Q3648469) (← links)
- Attribute-Based Functional Encryption on Lattices (Q4910275) (← links)
- Adapting Lyubashevsky’s Signature Schemes to the Ring Signature Setting (Q4924668) (← links)
- Expressive Cryptography: Lattice Perspectives (Q5300950) (← links)
- Advances in Cryptology - EUROCRYPT 2004 (Q5307246) (← links)
- Advances in Cryptology - EUROCRYPT 2004 (Q5307256) (← links)
- Advances in Cryptology – CRYPTO 2004 (Q5311549) (← links)
- Advances in Cryptology – CRYPTO 2004 (Q5311552) (← links)
- Hierarchical Identity Based Encryption with Constant Size Ciphertext (Q5385744) (← links)
- Advances in Cryptology - CRYPTO 2003 (Q5428132) (← links)
- Mesh Signatures (Q5429391) (← links)
- General Ad Hoc Encryption from Exponent Inversion IBE (Q5429403) (← links)
- Full-Domain Subgroup Hiding and Constant-Size Group Signatures (Q5756521) (← links)