Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sécurité et efficacité des schémas cryptographiques. (Security and Efficiency of Cryptographic Schemes).. École Polytechnique, Palaiseau, France, (2005)Efficient Public Trace and Revoke from Standard Assumptions., , , , and . IACR Cryptology ePrint Archive, (2017)Linearly-Homomorphic Signatures and Scalable Mix-Nets., , and . IACR Cryptology ePrint Archive, (2019)Decentralized Multi-Client Functional Encryption for Inner Product., , , , and . ASIACRYPT (2), volume 11273 of Lecture Notes in Computer Science, page 703-732. Springer, (2018)Identity-Based Traitor Tracing., , , , , and . Public Key Cryptography, volume 4450 of Lecture Notes in Computer Science, page 361-376. Springer, (2007)Downgradable Identity-Based Encryption and Applications., , and . CT-RSA, volume 11405 of Lecture Notes in Computer Science, page 44-61. Springer, (2019)Une comparaison entre deux méthodes de preuve de sécurité., and . RIVF, page 105-110. Editions Suger, Paris, (2003)Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption., , and . IEEE Trans. Information Forensics and Security, 7 (6): 1695-1706 (2012)Decentralized Evaluation of Quadratic Polynomials on Encrypted Data., , and . IACR Cryptology ePrint Archive, (2018)Cryptography during the French and American Wars in Vietnam., and . IACR Cryptology ePrint Archive, (2016)