BibTeX records: Malika Izabachène

download as .bib file

@inproceedings{DBLP:conf/acisp/IzabachenePR23,
  author       = {Malika Izabach{\`{e}}ne and
                  Lucas Prabel and
                  Adeline Roux{-}Langlois},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Identity-Based Encryption from Lattices Using Approximate Trapdoors},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {270--290},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_13},
  doi          = {10.1007/978-3-031-35486-1\_13},
  timestamp    = {Wed, 21 Jun 2023 16:37:47 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/IzabachenePR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/IliashenkoIMP22,
  author       = {Ilia Iliashenko and
                  Malika Izabach{\`{e}}ne and
                  Axel Mertens and
                  Hilder V. L. Pereira},
  title        = {Homomorphically counting elements with the same property},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {4},
  pages        = {670--683},
  year         = {2022},
  url          = {https://doi.org/10.56553/popets-2022-0127},
  doi          = {10.56553/POPETS-2022-0127},
  timestamp    = {Fri, 30 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/IliashenkoIMP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/IzabacheneNPP22,
  author       = {Malika Izabach{\`{e}}ne and
                  Anca Nitulescu and
                  Paola de Perthuis and
                  David Pointcheval},
  editor       = {Clemente Galdi and
                  Stanislaw Jarecki},
  title        = {MyOPE: Malicious SecuritY for Oblivious Polynomial Evaluation},
  booktitle    = {Security and Cryptography for Networks - 13th International Conference,
                  {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13409},
  pages        = {663--686},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-14791-3\_29},
  doi          = {10.1007/978-3-031-14791-3\_29},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/IzabacheneNPP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IliashenkoIMP22,
  author       = {Ilia Iliashenko and
                  Malika Izabach{\`{e}}ne and
                  Axel Mertens and
                  Hilder V. L. Pereira},
  title        = {Homomorphically counting elements with the same property},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {572},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/572},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IliashenkoIMP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BourseI22,
  author       = {Florian Bourse and
                  Malika Izabach{\`{e}}ne},
  title        = {Plug-and-play sanitization for {TFHE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1438},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1438},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BourseI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BoyenIL21,
  author       = {Xavier Boyen and
                  Malika Izabach{\`{e}}ne and
                  Qinyi Li},
  editor       = {Jung Hee Cheon and
                  Jean{-}Pierre Tillich},
  title        = {Secure Hybrid Encryption in the Standard Model from Hard Learning
                  Problems},
  booktitle    = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto
                  2021, Daejeon, South Korea, July 20-22, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12841},
  pages        = {399--418},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-81293-5\_21},
  doi          = {10.1007/978-3-030-81293-5\_21},
  timestamp    = {Wed, 21 Jul 2021 15:51:05 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/BoyenIL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IzabacheneNPP21,
  author       = {Malika Izabach{\`{e}}ne and
                  Anca Nitulescu and
                  Paola de Perthuis and
                  David Pointcheval},
  title        = {MyOPE: Malicious securitY for Oblivious Polynomial Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1291},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1291},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IzabacheneNPP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/ChillottiGGI20,
  author       = {Ilaria Chillotti and
                  Nicolas Gama and
                  Mariya Georgieva and
                  Malika Izabach{\`{e}}ne},
  title        = {{TFHE:} Fast Fully Homomorphic Encryption Over the Torus},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {1},
  pages        = {34--91},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-019-09319-x},
  doi          = {10.1007/S00145-019-09319-X},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/ChillottiGGI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BoyenIL20,
  author       = {Xavier Boyen and
                  Malika Izabach{\`{e}}ne and
                  Qinyi Li},
  editor       = {Clemente Galdi and
                  Vladimir Kolesnikov},
  title        = {A Simple and Efficient CCA-Secure Lattice {KEM} in the Standard Model},
  booktitle    = {Security and Cryptography for Networks - 12th International Conference,
                  {SCN} 2020, Amalfi, Italy, September 14-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12238},
  pages        = {321--337},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57990-6\_16},
  doi          = {10.1007/978-3-030-57990-6\_16},
  timestamp    = {Tue, 08 Sep 2020 19:15:32 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BoyenIL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/IzabacheneSZ19,
  author       = {Malika Izabach{\`{e}}ne and
                  Renaud Sirdey and
                  Martin Zuber},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Practical Fully Homomorphic Encryption for Fully Masked Neural Networks},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {24--36},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_2},
  doi          = {10.1007/978-3-030-31578-8\_2},
  timestamp    = {Thu, 17 Mar 2022 14:41:28 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/IzabacheneSZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/CarpovIM19,
  author       = {Sergiu Carpov and
                  Malika Izabach{\`{e}}ne and
                  Victor Mollimard},
  editor       = {Mitsuru Matsui},
  title        = {New Techniques for Multi-value Input Homomorphic Evaluation and Applications},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at
                  the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11405},
  pages        = {106--126},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12612-4\_6},
  doi          = {10.1007/978-3-030-12612-4\_6},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/CarpovIM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/OmriBIK19,
  author       = {Othmane El Omri and
                  Aymen Boudguiga and
                  Malika Izabach{\`{e}}ne and
                  Witold Klaudel},
  editor       = {Joseph K. Liu and
                  Xinyi Huang},
  title        = {Privacy-Preserving k-means Clustering: an Application to Driving Style
                  Recognition},
  booktitle    = {Network and System Security - 13th International Conference, {NSS}
                  2019, Sapporo, Japan, December 15-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11928},
  pages        = {685--696},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36938-5\_43},
  doi          = {10.1007/978-3-030-36938-5\_43},
  timestamp    = {Wed, 17 Aug 2022 14:30:35 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/OmriBIK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChillottiGGI18,
  author       = {Ilaria Chillotti and
                  Nicolas Gama and
                  Mariya Georgieva and
                  Malika Izabach{\`{e}}ne},
  title        = {{TFHE:} Fast Fully Homomorphic Encryption over the Torus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {421},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/421},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChillottiGGI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarpovIM18,
  author       = {Sergiu Carpov and
                  Malika Izabach{\`{e}}ne and
                  Victor Mollimard},
  title        = {New techniques for multi-value homomorphic evaluation and applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {622},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/622},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarpovIM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChillottiGGI17,
  author       = {Ilaria Chillotti and
                  Nicolas Gama and
                  Mariya Georgieva and
                  Malika Izabach{\`{e}}ne},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Faster Packed Homomorphic Operations and Efficient Circuit Bootstrapping
                  for {TFHE}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10624},
  pages        = {377--408},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70694-8\_14},
  doi          = {10.1007/978-3-319-70694-8\_14},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChillottiGGI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChillottiGGI17,
  author       = {Ilaria Chillotti and
                  Nicolas Gama and
                  Mariya Georgieva and
                  Malika Izabach{\`{e}}ne},
  title        = {Improving {TFHE:} faster packed homomorphic operations and efficient
                  circuit bootstrapping},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {430},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/430},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChillottiGGI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChillottiGGI16,
  author       = {Ilaria Chillotti and
                  Nicolas Gama and
                  Mariya Georgieva and
                  Malika Izabach{\`{e}}ne},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1
                  Seconds},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {3--33},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_1},
  doi          = {10.1007/978-3-662-53887-6\_1},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChillottiGGI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GamaINX16,
  author       = {Nicolas Gama and
                  Malika Izabach{\`{e}}ne and
                  Phong Q. Nguyen and
                  Xiang Xie},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Structural Lattice Reduction: Generalized Worst-Case to Average-Case
                  Reductions and Homomorphic Cryptosystems},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9666},
  pages        = {528--558},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49896-5\_19},
  doi          = {10.1007/978-3-662-49896-5\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GamaINX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/ChillottiGGI16,
  author       = {Ilaria Chillotti and
                  Nicolas Gama and
                  Mariya Georgieva and
                  Malika Izabach{\`{e}}ne},
  editor       = {Tsuyoshi Takagi},
  title        = {A Homomorphic {LWE} Based E-voting Scheme},
  booktitle    = {Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016,
                  Fukuoka, Japan, February 24-26, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9606},
  pages        = {245--265},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29360-8\_16},
  doi          = {10.1007/978-3-319-29360-8\_16},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/ChillottiGGI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChillottiGGI16,
  author       = {Ilaria Chillotti and
                  Nicolas Gama and
                  Mariya Georgieva and
                  Malika Izabach{\`{e}}ne},
  title        = {Faster Fully Homomorphic Encryption: Bootstrapping in less than 0.1
                  Seconds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {870},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/870},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChillottiGGI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CortierGGI14,
  author       = {V{\'{e}}ronique Cortier and
                  David Galindo and
                  St{\'{e}}phane Glondu and
                  Malika Izabach{\`{e}}ne},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Election Verifiability for Helios under Weaker Trust Assumptions},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {327--344},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_19},
  doi          = {10.1007/978-3-319-11212-1\_19},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/CortierGGI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IonicaI14,
  author       = {Sorina Ionica and
                  Malika Izabach{\`{e}}ne},
  title        = {Weak instances of composite order protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {274},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/274},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IonicaI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GamaINX14,
  author       = {Nicolas Gama and
                  Malika Izabach{\`{e}}ne and
                  Phong Q. Nguyen and
                  Xiang Xie},
  title        = {Structural Lattice Reduction: Generalized Worst-Case to Average-Case
                  Reductions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {283},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/283},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GamaINX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/CortierGGI13,
  author       = {V{\'{e}}ronique Cortier and
                  David Galindo and
                  St{\'{e}}phane Glondu and
                  Malika Izabach{\`{e}}ne},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Sara Foresti},
  title        = {Distributed ElGamal {\`{a}} la Pedersen: Application to Helios},
  booktitle    = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2013, Berlin, Germany, November 4, 2013},
  pages        = {131--142},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517840.2517852},
  doi          = {10.1145/2517840.2517852},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/CortierGGI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierGGI13,
  author       = {V{\'{e}}ronique Cortier and
                  David Galindo and
                  St{\'{e}}phane Glondu and
                  Malika Izabach{\`{e}}ne},
  title        = {A generic construction for voting correctness at minimum cost - Application
                  to Helios},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {177},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/177},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CortierGGI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/IzabacheneL12,
  author       = {Malika Izabach{\`{e}}ne and
                  Beno{\^{\i}}t Libert},
  editor       = {Michel Abdalla and
                  Tanja Lange},
  title        = {Divisible E-Cash in the Standard Model},
  booktitle    = {Pairing-Based Cryptography - Pairing 2012 - 5th International Conference,
                  Cologne, Germany, May 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7708},
  pages        = {314--332},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36334-4\_20},
  doi          = {10.1007/978-3-642-36334-4\_20},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/IzabacheneL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/IzabacheneLV11,
  author       = {Malika Izabach{\`{e}}ne and
                  Beno{\^{\i}}t Libert and
                  Damien Vergnaud},
  editor       = {Liqun Chen},
  title        = {Block-Wise P-Signatures and Non-interactive Anonymous Credentials
                  with Efficient Attributes},
  booktitle    = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC}
                  2011, Oxford, UK, December 12-15, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7089},
  pages        = {431--450},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25516-8\_26},
  doi          = {10.1007/978-3-642-25516-8\_26},
  timestamp    = {Wed, 18 Mar 2020 16:00:56 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/IzabacheneLV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BlazyFIJSV10,
  author       = {Olivier Blazy and
                  Georg Fuchsbauer and
                  Malika Izabach{\`{e}}ne and
                  Amandine Jambert and
                  Herv{\'{e}} Sibert and
                  Damien Vergnaud},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Batch Groth-Sahai},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {218--235},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_14},
  doi          = {10.1007/978-3-642-13708-2\_14},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BlazyFIJSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/IzabachenePV10,
  author       = {Malika Izabach{\`{e}}ne and
                  David Pointcheval and
                  Damien Vergnaud},
  editor       = {Michel Abdalla and
                  Paulo S. L. M. Barreto},
  title        = {Mediated Traceable Anonymous Encryption},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2010, First International Conference
                  on Cryptology and Information Security in Latin America, Puebla, Mexico,
                  August 8-11, 2010, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6212},
  pages        = {40--60},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14712-8\_3},
  doi          = {10.1007/978-3-642-14712-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/IzabachenePV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlazyFIJSV10,
  author       = {Olivier Blazy and
                  Georg Fuchsbauer and
                  Malika Izabach{\`{e}}ne and
                  Amandine Jambert and
                  Herv{\'{e}} Sibert and
                  Damien Vergnaud},
  title        = {Batch Groth-Sahai},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {40},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/040},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlazyFIJSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/psec/IzabacheneP09,
  author       = {Malika Izabach{\`{e}}ne and
                  David Pointcheval},
  editor       = {V{\'{e}}ronique Cortier and
                  Claude Kirchner and
                  Mitsuhiro Okada and
                  Hideki Sakurada},
  title        = {New Anonymity Notions for Identity-Based Encryption},
  booktitle    = {Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese
                  Collaboration},
  series       = {Lecture Notes in Computer Science},
  volume       = {5458},
  pages        = {138--157},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02002-5\_8},
  doi          = {10.1007/978-3-642-02002-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/psec/IzabacheneP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/AbdallaIP08,
  author       = {Michel Abdalla and
                  Malika Izabach{\`{e}}ne and
                  David Pointcheval},
  editor       = {Matthew K. Franklin and
                  Lucas Chi Kwong Hui and
                  Duncan S. Wong},
  title        = {Anonymous and Transparent Gateway-Based Password-Authenticated Key
                  Exchange},
  booktitle    = {Cryptology and Network Security, 7th International Conference, {CANS}
                  2008, Hong-Kong, China, December 2-4, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5339},
  pages        = {133--148},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89641-8\_10},
  doi          = {10.1007/978-3-540-89641-8\_10},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/AbdallaIP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/IzabacheneP08,
  author       = {Malika Izabach{\`{e}}ne and
                  David Pointcheval},
  editor       = {Rafail Ostrovsky and
                  Roberto De Prisco and
                  Ivan Visconti},
  title        = {New Anonymity Notions for Identity-Based Encryption},
  booktitle    = {Security and Cryptography for Networks, 6th International Conference,
                  {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5229},
  pages        = {375--391},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85855-3\_25},
  doi          = {10.1007/978-3-540-85855-3\_25},
  timestamp    = {Tue, 25 Feb 2020 11:33:46 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/IzabacheneP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BringerCIPTZ07,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Malika Izabach{\`{e}}ne and
                  David Pointcheval and
                  Qiang Tang and
                  S{\'{e}}bastien Zimmer},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {An Application of the Goldwasser-Micali Cryptosystem to Biometric
                  Authentication},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {96--106},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_8},
  doi          = {10.1007/978-3-540-73458-1\_8},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BringerCIPTZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics