Search

Your search keyword '"Lafourcade, Pascal"' showing total 492 results

Search Constraints

Start Over You searched for: Author "Lafourcade, Pascal" Remove constraint Author: "Lafourcade, Pascal"
492 results on '"Lafourcade, Pascal"'

Search Results

2. The Calissons Puzzle

3. Secure Keyless Multi-party Storage Scheme

5. Practical Construction for Secure Trick-Taking Games Even with Cards Set Aside

6. Conflict Optimization for Binary CSP Applied to Minimum Partition into Plane Subgraphs and Graph Coloring

7. Near-collisions and their Impact on Biometric Security

8. Authentication Attacks on Projection-based Cancelable Biometric Schemes

10. Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun

11. A Survey on Identity-Based Blind Signature

12. Shadoks Approach to Low-Makespan Coordinated Motion Planning

13. A Faster Cryptographer's Conspiracy Santa

14. Optimal Threshold Padlock Systems

20. Infinite Grid Exploration by Disoriented Robots

21. Protego: Efficient, Revocable and Auditable Anonymous Credentials with Applications to Hyperledger Fabric

22. Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models

23. Hide a Liar: Card-Based ZKP Protocol for Usowan

24. Card-Based ZKP Protocol for Nurimisaki

25. Perpetual Torus Exploration by Myopic Luminous Robots

26. A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking

27. Generic Construction for Identity-Based Proxy Blind Signature

28. Improved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence Classes

31. Optimal Exclusive Perpetual Grid Exploration by Luminous Myopic Robots Without Common Chirality

32. Generic Plaintext Equality and Inequality Proofs

33. Interactive Physical ZKP for Connectivity: Applications to Nurikabe and Hitori

34. Fast Short and Fast Linear Cramer-Shoup

35. Infinite Grid Exploration by Disoriented Robots

41. Secure and Efficient Matrix Multiplication with MapReduce

42. How to Teach the Undecidability of Malware Detection Problem and Halting Problem

43. Physical Zero-Knowledge Proof for Suguru Puzzle

44. Secure Cumulative Reward Maximization in Linear Stochastic Bandits

45. : A Secure Framework for Graph Outsourcing and SPARQL Evaluation

46. Get-your-ID: Decentralized Proof of Identity

47. Security Analysis of Auctionity: A Blockchain Based E-Auction

48. Towards Secure TMIS Protocols

49. Verifiable and Private Oblivious Polynomial Evaluation

50. Private Multi-party Matrix Multiplication and Trust Computations

Catalog

Books, media, physical & digital resources