Sébastien Canard

From MaRDI portal
(Redirected from Person:785014)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Dually computable cryptographic accumulators and their application to attribute based encryption2024-06-05Paper
(Augmented) broadcast encryption from identity based encryption with wildcard
Cryptology and Network Security
2023-07-28Paper
Constant-size lattice-based group signature with forward security in the standard model2023-03-21Paper
Blind Functional Encryption
1511.68112
2022-12-21Paper
Post-quantum online voting scheme2022-06-01Paper
Symmetric-key authenticated key exchange (SAKE) with perfect forward secrecy2020-08-05Paper
Extended 3-party ACCE and application to LoRaWAN 1.12020-05-06Paper
Verifiable message-locked encryption2018-10-26Paper
A new technique for compacting secret key in attribute-based broadcast encryption2018-10-26Paper
Certificateless public key cryptography in the standard model
Fundamenta Informaticae
2018-09-21Paper
Privacy-preserving plaintext-equality of low-entropy inputs2018-08-10Paper
A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption
Theoretical Computer Science
2018-04-04Paper
Scalable Divisible E-cash
Applied Cryptography and Network Security
2016-03-10Paper
Low-cost cryptography for privacy in RFID systems
Smart Card Research and Advanced Applications
2015-11-11Paper
Combined Proxy Re-encryption
Information Security and Cryptology -- ICISC 2013
2015-10-16Paper
Divisible e-cash made practical
Lecture Notes in Computer Science
2015-08-27Paper
Toward generic method for server-aided cryptography
Information and Communications Security
2014-09-29Paper
Delegating a pairing can be both secure and efficient
Applied Cryptography and Network Security
2014-07-07Paper
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting
Public-Key Cryptography – PKC 2014
2014-03-25Paper
On the implementation of a pairing-based cryptographic protocol in a constrained device
Pairing-Based Cryptography – Pairing 2012
2013-04-04Paper
Sanitizable signatures with several signers and sanitizers
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
Plaintext-checkable encryption
Lecture Notes in Computer Science
2012-06-08Paper
Group signatures are suitable for constrained devices
Information Security and Cryptology - ICISC 2010
2011-10-27Paper
Achieving optimal anonymity in transferable e-cash with a judge
Lecture Notes in Computer Science
2011-06-29Paper
Lighten encryption schemes for secure and private RFID systems
Financial Cryptography and Data Security
2010-08-17Paper
On extended sanitizable signature schemes
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Group Key Management: From a Non-hierarchical to a Hierarchical Structure
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
Defeating Malicious Servers in a Blind Signatures Based Voting System
Financial Cryptography and Data Security
2008-09-09Paper
Trapdoor Sanitizable Signatures and Their Application to Content Protection
Applied Cryptography and Network Security
2008-06-13Paper
Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use
Provable Security
2008-06-10Paper
Divisible E-Cash Systems Can Be Truly Anonymous
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2007-05-02Paper
List signature schemes
Discrete Applied Mathematics
2006-04-28Paper
scientific article; zbMATH DE number 2043325 (Why is no real title available?)2004-02-16Paper


Research outcomes over time


This page was built for person: Sébastien Canard