Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Malika Izabachène
@inproceedings{DBLP:conf/acisp/IzabachenePR23, author = {Malika Izabach{\`{e}}ne and Lucas Prabel and Adeline Roux{-}Langlois}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Identity-Based Encryption from Lattices Using Approximate Trapdoors}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {270--290}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_13}, doi = {10.1007/978-3-031-35486-1\_13}, timestamp = {Wed, 21 Jun 2023 16:37:47 +0200}, biburl = {https://dblp.org/rec/conf/acisp/IzabachenePR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/IliashenkoIMP22, author = {Ilia Iliashenko and Malika Izabach{\`{e}}ne and Axel Mertens and Hilder V. L. Pereira}, title = {Homomorphically counting elements with the same property}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {4}, pages = {670--683}, year = {2022}, url = {https://doi.org/10.56553/popets-2022-0127}, doi = {10.56553/POPETS-2022-0127}, timestamp = {Fri, 30 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/IliashenkoIMP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/IzabacheneNPP22, author = {Malika Izabach{\`{e}}ne and Anca Nitulescu and Paola de Perthuis and David Pointcheval}, editor = {Clemente Galdi and Stanislaw Jarecki}, title = {MyOPE: Malicious SecuritY for Oblivious Polynomial Evaluation}, booktitle = {Security and Cryptography for Networks - 13th International Conference, {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13409}, pages = {663--686}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-14791-3\_29}, doi = {10.1007/978-3-031-14791-3\_29}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/IzabacheneNPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IliashenkoIMP22, author = {Ilia Iliashenko and Malika Izabach{\`{e}}ne and Axel Mertens and Hilder V. L. Pereira}, title = {Homomorphically counting elements with the same property}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {572}, year = {2022}, url = {https://eprint.iacr.org/2022/572}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IliashenkoIMP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BourseI22, author = {Florian Bourse and Malika Izabach{\`{e}}ne}, title = {Plug-and-play sanitization for {TFHE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1438}, year = {2022}, url = {https://eprint.iacr.org/2022/1438}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BourseI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/BoyenIL21, author = {Xavier Boyen and Malika Izabach{\`{e}}ne and Qinyi Li}, editor = {Jung Hee Cheon and Jean{-}Pierre Tillich}, title = {Secure Hybrid Encryption in the Standard Model from Hard Learning Problems}, booktitle = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12841}, pages = {399--418}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-81293-5\_21}, doi = {10.1007/978-3-030-81293-5\_21}, timestamp = {Wed, 21 Jul 2021 15:51:05 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/BoyenIL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IzabacheneNPP21, author = {Malika Izabach{\`{e}}ne and Anca Nitulescu and Paola de Perthuis and David Pointcheval}, title = {MyOPE: Malicious securitY for Oblivious Polynomial Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1291}, year = {2021}, url = {https://eprint.iacr.org/2021/1291}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IzabacheneNPP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/ChillottiGGI20, author = {Ilaria Chillotti and Nicolas Gama and Mariya Georgieva and Malika Izabach{\`{e}}ne}, title = {{TFHE:} Fast Fully Homomorphic Encryption Over the Torus}, journal = {J. Cryptol.}, volume = {33}, number = {1}, pages = {34--91}, year = {2020}, url = {https://doi.org/10.1007/s00145-019-09319-x}, doi = {10.1007/S00145-019-09319-X}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/ChillottiGGI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BoyenIL20, author = {Xavier Boyen and Malika Izabach{\`{e}}ne and Qinyi Li}, editor = {Clemente Galdi and Vladimir Kolesnikov}, title = {A Simple and Efficient CCA-Secure Lattice {KEM} in the Standard Model}, booktitle = {Security and Cryptography for Networks - 12th International Conference, {SCN} 2020, Amalfi, Italy, September 14-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12238}, pages = {321--337}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57990-6\_16}, doi = {10.1007/978-3-030-57990-6\_16}, timestamp = {Tue, 08 Sep 2020 19:15:32 +0200}, biburl = {https://dblp.org/rec/conf/scn/BoyenIL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/IzabacheneSZ19, author = {Malika Izabach{\`{e}}ne and Renaud Sirdey and Martin Zuber}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Practical Fully Homomorphic Encryption for Fully Masked Neural Networks}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {24--36}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_2}, doi = {10.1007/978-3-030-31578-8\_2}, timestamp = {Thu, 17 Mar 2022 14:41:28 +0100}, biburl = {https://dblp.org/rec/conf/cans/IzabacheneSZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/CarpovIM19, author = {Sergiu Carpov and Malika Izabach{\`{e}}ne and Victor Mollimard}, editor = {Mitsuru Matsui}, title = {New Techniques for Multi-value Input Homomorphic Evaluation and Applications}, booktitle = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11405}, pages = {106--126}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12612-4\_6}, doi = {10.1007/978-3-030-12612-4\_6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/CarpovIM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/OmriBIK19, author = {Othmane El Omri and Aymen Boudguiga and Malika Izabach{\`{e}}ne and Witold Klaudel}, editor = {Joseph K. Liu and Xinyi Huang}, title = {Privacy-Preserving k-means Clustering: an Application to Driving Style Recognition}, booktitle = {Network and System Security - 13th International Conference, {NSS} 2019, Sapporo, Japan, December 15-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11928}, pages = {685--696}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36938-5\_43}, doi = {10.1007/978-3-030-36938-5\_43}, timestamp = {Wed, 17 Aug 2022 14:30:35 +0200}, biburl = {https://dblp.org/rec/conf/nss/OmriBIK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChillottiGGI18, author = {Ilaria Chillotti and Nicolas Gama and Mariya Georgieva and Malika Izabach{\`{e}}ne}, title = {{TFHE:} Fast Fully Homomorphic Encryption over the Torus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {421}, year = {2018}, url = {https://eprint.iacr.org/2018/421}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChillottiGGI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarpovIM18, author = {Sergiu Carpov and Malika Izabach{\`{e}}ne and Victor Mollimard}, title = {New techniques for multi-value homomorphic evaluation and applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {622}, year = {2018}, url = {https://eprint.iacr.org/2018/622}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarpovIM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChillottiGGI17, author = {Ilaria Chillotti and Nicolas Gama and Mariya Georgieva and Malika Izabach{\`{e}}ne}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Faster Packed Homomorphic Operations and Efficient Circuit Bootstrapping for {TFHE}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10624}, pages = {377--408}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70694-8\_14}, doi = {10.1007/978-3-319-70694-8\_14}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChillottiGGI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChillottiGGI17, author = {Ilaria Chillotti and Nicolas Gama and Mariya Georgieva and Malika Izabach{\`{e}}ne}, title = {Improving {TFHE:} faster packed homomorphic operations and efficient circuit bootstrapping}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {430}, year = {2017}, url = {http://eprint.iacr.org/2017/430}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChillottiGGI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChillottiGGI16, author = {Ilaria Chillotti and Nicolas Gama and Mariya Georgieva and Malika Izabach{\`{e}}ne}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {3--33}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_1}, doi = {10.1007/978-3-662-53887-6\_1}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChillottiGGI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GamaINX16, author = {Nicolas Gama and Malika Izabach{\`{e}}ne and Phong Q. Nguyen and Xiang Xie}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {528--558}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_19}, doi = {10.1007/978-3-662-49896-5\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GamaINX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/ChillottiGGI16, author = {Ilaria Chillotti and Nicolas Gama and Mariya Georgieva and Malika Izabach{\`{e}}ne}, editor = {Tsuyoshi Takagi}, title = {A Homomorphic {LWE} Based E-voting Scheme}, booktitle = {Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9606}, pages = {245--265}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29360-8\_16}, doi = {10.1007/978-3-319-29360-8\_16}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pqcrypto/ChillottiGGI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChillottiGGI16, author = {Ilaria Chillotti and Nicolas Gama and Mariya Georgieva and Malika Izabach{\`{e}}ne}, title = {Faster Fully Homomorphic Encryption: Bootstrapping in less than 0.1 Seconds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {870}, year = {2016}, url = {http://eprint.iacr.org/2016/870}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChillottiGGI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CortierGGI14, author = {V{\'{e}}ronique Cortier and David Galindo and St{\'{e}}phane Glondu and Malika Izabach{\`{e}}ne}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Election Verifiability for Helios under Weaker Trust Assumptions}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {327--344}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_19}, doi = {10.1007/978-3-319-11212-1\_19}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/CortierGGI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IonicaI14, author = {Sorina Ionica and Malika Izabach{\`{e}}ne}, title = {Weak instances of composite order protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {274}, year = {2014}, url = {http://eprint.iacr.org/2014/274}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IonicaI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GamaINX14, author = {Nicolas Gama and Malika Izabach{\`{e}}ne and Phong Q. Nguyen and Xiang Xie}, title = {Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {283}, year = {2014}, url = {http://eprint.iacr.org/2014/283}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GamaINX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/CortierGGI13, author = {V{\'{e}}ronique Cortier and David Galindo and St{\'{e}}phane Glondu and Malika Izabach{\`{e}}ne}, editor = {Ahmad{-}Reza Sadeghi and Sara Foresti}, title = {Distributed ElGamal {\`{a}} la Pedersen: Application to Helios}, booktitle = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2013, Berlin, Germany, November 4, 2013}, pages = {131--142}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517840.2517852}, doi = {10.1145/2517840.2517852}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wpes/CortierGGI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CortierGGI13, author = {V{\'{e}}ronique Cortier and David Galindo and St{\'{e}}phane Glondu and Malika Izabach{\`{e}}ne}, title = {A generic construction for voting correctness at minimum cost - Application to Helios}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {177}, year = {2013}, url = {http://eprint.iacr.org/2013/177}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CortierGGI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/IzabacheneL12, author = {Malika Izabach{\`{e}}ne and Beno{\^{\i}}t Libert}, editor = {Michel Abdalla and Tanja Lange}, title = {Divisible E-Cash in the Standard Model}, booktitle = {Pairing-Based Cryptography - Pairing 2012 - 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7708}, pages = {314--332}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36334-4\_20}, doi = {10.1007/978-3-642-36334-4\_20}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/IzabacheneL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/IzabacheneLV11, author = {Malika Izabach{\`{e}}ne and Beno{\^{\i}}t Libert and Damien Vergnaud}, editor = {Liqun Chen}, title = {Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes}, booktitle = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC} 2011, Oxford, UK, December 12-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7089}, pages = {431--450}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25516-8\_26}, doi = {10.1007/978-3-642-25516-8\_26}, timestamp = {Wed, 18 Mar 2020 16:00:56 +0100}, biburl = {https://dblp.org/rec/conf/ima/IzabacheneLV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BlazyFIJSV10, author = {Olivier Blazy and Georg Fuchsbauer and Malika Izabach{\`{e}}ne and Amandine Jambert and Herv{\'{e}} Sibert and Damien Vergnaud}, editor = {Jianying Zhou and Moti Yung}, title = {Batch Groth-Sahai}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {218--235}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_14}, doi = {10.1007/978-3-642-13708-2\_14}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BlazyFIJSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/IzabachenePV10, author = {Malika Izabach{\`{e}}ne and David Pointcheval and Damien Vergnaud}, editor = {Michel Abdalla and Paulo S. L. M. Barreto}, title = {Mediated Traceable Anonymous Encryption}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6212}, pages = {40--60}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14712-8\_3}, doi = {10.1007/978-3-642-14712-8\_3}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/IzabachenePV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlazyFIJSV10, author = {Olivier Blazy and Georg Fuchsbauer and Malika Izabach{\`{e}}ne and Amandine Jambert and Herv{\'{e}} Sibert and Damien Vergnaud}, title = {Batch Groth-Sahai}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {40}, year = {2010}, url = {http://eprint.iacr.org/2010/040}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlazyFIJSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/psec/IzabacheneP09, author = {Malika Izabach{\`{e}}ne and David Pointcheval}, editor = {V{\'{e}}ronique Cortier and Claude Kirchner and Mitsuhiro Okada and Hideki Sakurada}, title = {New Anonymity Notions for Identity-Based Encryption}, booktitle = {Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese Collaboration}, series = {Lecture Notes in Computer Science}, volume = {5458}, pages = {138--157}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02002-5\_8}, doi = {10.1007/978-3-642-02002-5\_8}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/psec/IzabacheneP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/AbdallaIP08, author = {Michel Abdalla and Malika Izabach{\`{e}}ne and David Pointcheval}, editor = {Matthew K. Franklin and Lucas Chi Kwong Hui and Duncan S. Wong}, title = {Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange}, booktitle = {Cryptology and Network Security, 7th International Conference, {CANS} 2008, Hong-Kong, China, December 2-4, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5339}, pages = {133--148}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89641-8\_10}, doi = {10.1007/978-3-540-89641-8\_10}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/AbdallaIP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/IzabacheneP08, author = {Malika Izabach{\`{e}}ne and David Pointcheval}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {New Anonymity Notions for Identity-Based Encryption}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {375--391}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_25}, doi = {10.1007/978-3-540-85855-3\_25}, timestamp = {Tue, 25 Feb 2020 11:33:46 +0100}, biburl = {https://dblp.org/rec/conf/scn/IzabacheneP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BringerCIPTZ07, author = {Julien Bringer and Herv{\'{e}} Chabanne and Malika Izabach{\`{e}}ne and David Pointcheval and Qiang Tang and S{\'{e}}bastien Zimmer}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {96--106}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_8}, doi = {10.1007/978-3-540-73458-1\_8}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BringerCIPTZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.