The following pages link to Céline Chevalier (Q2119941):
Displaying 31 items.
- Embedding the UC model into the IITM model (Q2170048) (← links)
- Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions (Q2223693) (← links)
- Composition of password-based protocols (Q2248082) (← links)
- Hardware security without secure hardware: how to decrypt with a password and a server (Q2664944) (← links)
- Correction to: ``Dispelling myths on superposition attacks: formal security model and attack analyses'' (Q2672307) (← links)
- Non-Interactive Zero-Knowledge Proofs of Non-Membership (Q2790035) (← links)
- Generic Construction of UC-Secure Oblivious Transfer (Q2794494) (← links)
- Easing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness (Q2798793) (← links)
- Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions (Q2799003) (← links)
- How to (Carefully) Breach a Service Contract? (Q2803627) (← links)
- New Techniques for SPHFs and Efficient One-Round PAKE Protocols (Q2845688) (← links)
- SPHF-Friendly Non-interactive Commitments (Q2867220) (← links)
- Analysis and Improvement of Lindell’s UC-Secure Commitment Schemes (Q2873657) (← links)
- (Q2911625) (← links)
- Adaptive Oblivious Transfer and Generalization (Q2953778) (← links)
- Structure-Preserving Smooth Projective Hashing (Q2953782) (← links)
- Contributory Password-Authenticated Group Key Exchange with Join Capability (Q3073704) (← links)
- Smooth Projective Hashing for Conditionally Extractable Commitments (Q3183591) (← links)
- Strong Cryptography from Weak Secrets (Q3558319) (← links)
- Flexible Group Key Exchange with On-demand Computation of Subgroup Keys (Q3558322) (← links)
- Distributed Public-Key Cryptography from Weak Secrets (Q3617518) (← links)
- Optimal Randomness Extraction from a Diffie-Hellman Element (Q3627458) (← links)
- Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness (Q3637144) (← links)
- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages (Q4916015) (← links)
- Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework (Q5458950) (← links)
- Dispelling myths on superposition attacks: formal security model and attack analyses (Q5918646) (← links)
- Dispelling myths on superposition attacks: formal security model and attack analyses (Q5925670) (← links)
- Shorter and faster identity-based signatures with tight security in the (Q)ROM from lattices (Q6535098) (← links)
- GeT a CAKE: \underline{Ge}neric \underline{T}ransformations from \underline{K}ey encaspulation mechanisms to password \underline{A}uthenticated \underline{K}ey \underline{E}xchanges (Q6535134) (← links)
- Practical construction for secure trick-taking games even with cards set aside (Q6573960) (← links)
- Semi-quantum copy-protection and more (Q6587951) (← links)