Search

Your search keyword '"Vergnaud, Damien"' showing total 344 results

Search Constraints

Start Over You searched for: Author "Vergnaud, Damien" Remove constraint Author: "Vergnaud, Damien"
344 results on '"Vergnaud, Damien"'

Search Results

1. Towards the Impossibility of Quantum Public Key Encryption with Classical Keys from One-Way Functions

2. Quantum security of subset cover problems

4. Commitments with Efficient Zero-Knowledge Arguments from Subset Sum Problems

7. Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity

8. The Key-Dependent Message Security of Key-Alternating Feistel Ciphers

12. Succinct Diophantine-Satisfiability Arguments

13. Public-Key Generation with Verifiable Randomness

18. Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND

19. Secure Outsourcing in Discrete-Logarithm-Based and Pairing-Based Cryptography (Invited Talk)

20. Analysis and Improvement of an Authentication Scheme in Incremental Cryptography

22. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys

23. Multi-Use Unidirectional Proxy Re-Signatures

24. New Extensions of Pairing-based Signatures into Universal (Multi) Designated Verifier Signatures

25. Lattice Attacks on Pairing-Based Signatures

26. Lattice Attacks Against Elliptic-Curve Signatures with Blinded Scalar Multiplication

27. Security of Pseudo-Random Number Generators with Input : (Invited Talk)

28. Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures

29. Reusing Nonces in Schnorr Signatures : (and Keeping It Secure...)

30. Private Multiplication over Finite Fields

31. Full Disk Encryption: Bridging Theory and Practice

36. Lattice attacks on pairing-based signatures.

37. Randomness Complexity of Private Circuits for Multiplication

38. Easing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness

39. Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions

40. Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions

41. Distribution and Polynomial Interpolation of the Dodis-Yampolskiy Pseudo-Random Function

43. Practical Key Recovery for Discrete-Logarithm Based Authentication Schemes from Random Nonce Bits

44. Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks

45. Algorithms for Outsourcing Pairing Computation

46. Non-Interactive Zero-Knowledge Proofs of Non-Membership

50. Quantum Security of Subset Cover Problems

Catalog

Books, media, physical & digital resources