Pascal Paillier
Pascal Paillier
CryptoExperts
Adresse e-mail validée de cryptoexperts.com - Page d'accueil
Titre
Citée par
Citée par
Année
Public-key cryptosystems based on composite degree residuosity classes
P Paillier
International conference on the theory and applications of cryptographic …, 1999
69481999
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Annual international cryptology conference, 205-222, 2005
6512005
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Journal of cryptology 21 (3), 350-391, 2008
3932008
Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys
C Delerablée, P Paillier, D Pointcheval
International Conference on Pairing-Based Cryptography, 39-59, 2007
3422007
On second-order differential power analysis
M Joye, P Paillier, B Schoenmakers
International workshop on cryptographic hardware and embedded systems, 293-308, 2005
1862005
Efficient public-key cryptosystems provably secure against active adversaries
P Paillier, D Pointcheval
International Conference on the Theory and Application of Cryptology and …, 1999
1761999
Discrete-log-based signatures may not be equivalent to discrete log
P Paillier, D Vergnaud
International Conference on the Theory and Application of Cryptology and …, 2005
1622005
Fast homomorphic evaluation of deep discretized neural networks
F Bourse, M Minelli, M Minihold, P Paillier
Annual International Cryptology Conference, 483-512, 2018
1202018
Stream ciphers: A practical solution for efficient homomorphic-ciphertext compression
A Canteaut, S Carpov, C Fontaine, T Lepoint, M Naya-Plasencia, ...
Journal of Cryptology 31 (3), 885-916, 2018
1162018
Efficient generation of prime numbers
M Joye, P Paillier, S Vaudenay
International Workshop on Cryptographic Hardware and Embedded Systems, 340-354, 2000
1072000
Smart card crypto-coprocessors for public-key cryptography
H Handschuh, P Paillier
International Conference on Smart Card Research and Advanced Applications …, 1998
1051998
Public-key cryptosystem based on discrete logarithm residues
P Paillier
EUROCRYPT 1999, 1999
961999
Universal padding schemes for RSA
JS Coron, M Joye, D Naccache, P Paillier
Annual International Cryptology Conference, 226-241, 2002
922002
Decryptable searchable encryption
T Fuhr, P Paillier
International Conference on Provable Security, 228-236, 2007
832007
Trapdooring discrete logarithms on elliptic curves over rings
P Paillier
International Conference on the Theory and Application of Cryptology and …, 2000
782000
Probing attacks on tamper-resistant devices
H Handschuh, P Paillier, J Stern
International Workshop on Cryptographic Hardware and Embedded Systems, 303-315, 1999
691999
Extended-precision accumulation of multiplier output
M Stribaek, P Paillier
US Patent 7,181,484, 2007
682007
GEM: A Generic Chosen-Ciphertext Secure Encryption Method
C Jean-Sébastien, H Handschuh, M Joye, P Paillier, D Pointcheval, ...
Cryptographers’ Track at the RSA Conference, 263-276, 2002
672002
Shabal, a submission to NIST’s cryptographic hash algorithm competition
E Bresson, A Canteaut, B Chevallier-Mames, C Clavier, T Fuhr, A Gouget, ...
Submission to NIST, 2008
572008
Fault analysis of GRAIN-128
A Berzati, C Canovas, G Castagnos, B Debraize, L Goubin, A Gouget, ...
2009 IEEE International Workshop on Hardware-Oriented Security and Trust, 7-14, 2009
562009
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20