Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Blazy, Olivier
add a person with the name Blazy, Olivier
 

Other publications of authors with the same name

Efficient ID-based Designated Verifier Signature., , , and . ARES, page 44:1-44:8. ACM, (2017)Group Signatures Without q-Assumptions., and . IACR Cryptology ePrint Archive, (2015)Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages., , , and . IACR Cryptology ePrint Archive, (2012)Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions., , and . ARES, page 28:1-28:6. ACM, (2019)Traceable Signature with Stepping Capabilities., and . Cryptography and Security, volume 6805 of Lecture Notes in Computer Science, page 108-131. Springer, (2012)Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability., , , and . CT-RSA, volume 9610 of Lecture Notes in Computer Science, page 127-143. Springer, (2016)(Hierarchical) Identity-Based Encryption from Affine Message Authentication., , and . CRYPTO (1), volume 8616 of Lecture Notes in Computer Science, page 408-425. Springer, (2014)Tightly-Secure Signatures from Chameleon Hash Functions., , , and . IACR Cryptology ePrint Archive, (2014)Preuves de connaissances interactives et non-interactives. ((Non-)Interactive Proofs of Knowledge).. Paris Diderot University, France, (2012)Adaptive Oblivious Transfer and Generalization., , and . ASIACRYPT (2), volume 10032 of Lecture Notes in Computer Science, page 217-247. (2016)