Volgen
Pascal Paillier
Pascal Paillier
CryptoExperts
Geverifieerd e-mailadres voor cryptoexperts.com - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Public-key cryptosystems based on composite degree residuosity classes
P Paillier
Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999
86171999
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
7442005
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Journal of cryptology 21, 350-391, 2008
4252008
Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys
C Delerablée, P Paillier, D Pointcheval
Pairing-Based Cryptography–Pairing 2007: First International Conference …, 2007
3672007
Fast homomorphic evaluation of deep discretized neural networks
F Bourse, M Minelli, M Minihold, P Paillier
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
2942018
On second-order differential power analysis
M Joye, P Paillier, B Schoenmakers
Cryptographic Hardware and Embedded Systems–CHES 2005: 7th International …, 2005
2062005
Discrete-log-based signatures may not be equivalent to discrete log
P Paillier, D Vergnaud
Advances in Cryptology-ASIACRYPT 2005: 11th International Conference on the …, 2005
2042005
Efficient public-key cryptosystems provably secure against active adversaries
P Paillier, D Pointcheval
Advances in Cryptology-ASIACRYPT’99: International Conference on the Theory …, 1999
1971999
Stream ciphers: A practical solution for efficient homomorphic-ciphertext compression
A Canteaut, S Carpov, C Fontaine, T Lepoint, M Naya-Plasencia, ...
Journal of Cryptology 31, 885-916, 2018
1862018
Efficient generation of prime numbers
M Joye, P Paillier, S Vaudenay
Cryptographic Hardware and Embedded Systems—CHES 2000: Second International …, 2000
1182000
Smart card crypto-coprocessors for public-key cryptography
H Handschuh, P Paillier
Smart Card Research and Applications: Third International Conference, CARDIS …, 2000
1112000
Universal padding schemes for RSA
JS Coron, M Joye, D Naccache, P Paillier
Advances in Cryptology—CRYPTO 2002: 22nd Annual International Cryptology …, 2002
1022002
Public-key cryptosystem based on discrete logarithm residues
P Paillier
EUROCRYPT 1999, 1999
1011999
Decryptable searchable encryption
T Fuhr, P Paillier
Provable Security: First International Conference, ProvSec 2007, Wollongong …, 2007
992007
Probing attacks on tamper-resistant devices
H Handschuh, P Paillier, J Stern
Cryptographic Hardware and Embedded Systems: First InternationalWorkshop …, 1999
821999
Trapdooring discrete logarithms on elliptic curves over rings
P Paillier
Advances in Cryptology—ASIACRYPT 2000: 6th International Conference on the …, 2000
812000
GEM: A generic chosen-ciphertext secure encryption method
JS Coron, H Handschuh, M Joye, P Paillier, D Pointcheval, C Tymen
CT-RSA 2271, 263-276, 2002
802002
White-box security notions for symmetric encryption schemes
C Delerablée, T Lepoint, P Paillier, M Rivain
Selected Areas in Cryptography--SAC 2013: 20th International Conference …, 2014
792014
Programmable bootstrapping enables efficient homomorphic inference of deep neural networks
I Chillotti, M Joye, P Paillier
Cyber Security Cryptography and Machine Learning: 5th International …, 2021
772021
Extended-precision accumulation of multiplier output
M Stribaek, P Paillier
US Patent 7,181,484, 2007
732007
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20