default search action
BibTeX records: Pascal Paillier
@proceedings{DBLP:conf/cscml/2023, editor = {Shlomi Dolev and Ehud Gudes and Pascal Paillier}, title = {Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, {CSCML} 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13914}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-34671-2}, doi = {10.1007/978-3-031-34671-2}, isbn = {978-3-031-34670-5}, timestamp = {Thu, 29 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscml/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/JoyeP22, author = {Marc Joye and Pascal Paillier}, editor = {Shlomi Dolev and Jonathan Katz and Amnon Meisels}, title = {Blind Rotation in Fully Homomorphic Encryption with Extended Keys}, booktitle = {Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, {CSCML} 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13301}, pages = {1--18}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07689-3\_1}, doi = {10.1007/978-3-031-07689-3\_1}, timestamp = {Fri, 24 Jun 2022 18:23:22 +0200}, biburl = {https://dblp.org/rec/conf/cscml/JoyeP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/ChillottiJP21, author = {Ilaria Chillotti and Marc Joye and Pascal Paillier}, editor = {Shlomi Dolev and Oded Margalit and Benny Pinkas and Alexander A. Schwarzmann}, title = {Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks}, booktitle = {Cyber Security Cryptography and Machine Learning - 5th International Symposium, {CSCML} 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12716}, pages = {1--19}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78086-9\_1}, doi = {10.1007/978-3-030-78086-9\_1}, timestamp = {Mon, 03 Jan 2022 22:32:47 +0100}, biburl = {https://dblp.org/rec/conf/cscml/ChillottiJP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChillottiJP21, author = {Ilaria Chillotti and Marc Joye and Pascal Paillier}, title = {Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2021}, url = {https://eprint.iacr.org/2021/091}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChillottiJP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GoubinPRW20, author = {Louis Goubin and Pascal Paillier and Matthieu Rivain and Junwei Wang}, title = {How to reveal the secrets of an obscure white-box implementation}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {1}, pages = {49--66}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00207-5}, doi = {10.1007/S13389-019-00207-5}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GoubinPRW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CanteautCFLNPS18, author = {Anne Canteaut and Sergiu Carpov and Caroline Fontaine and Tancr{\`{e}}de Lepoint and Mar{\'{\i}}a Naya{-}Plasencia and Pascal Paillier and Renaud Sirdey}, title = {Stream Ciphers: {A} Practical Solution for Efficient Homomorphic-Ciphertext Compression}, journal = {J. Cryptol.}, volume = {31}, number = {3}, pages = {885--916}, year = {2018}, url = {https://doi.org/10.1007/s00145-017-9273-9}, doi = {10.1007/S00145-017-9273-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CanteautCFLNPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BourseMMP18, author = {Florian Bourse and Michele Minelli and Matthias Minihold and Pascal Paillier}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Fast Homomorphic Evaluation of Deep Discretized Neural Networks}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {483--512}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_17}, doi = {10.1007/978-3-319-96878-0\_17}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BourseMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoubinPRW18, author = {Louis Goubin and Pascal Paillier and Matthieu Rivain and Junwei Wang}, title = {How to Reveal the Secrets of an Obscure White-Box Implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {98}, year = {2018}, url = {http://eprint.iacr.org/2018/098}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoubinPRW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BourseMMP17, author = {Florian Bourse and Michele Minelli and Matthias Minihold and Pascal Paillier}, title = {Fast Homomorphic Evaluation of Deep Discretized Neural Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1114}, year = {2017}, url = {http://eprint.iacr.org/2017/1114}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BourseMMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CanteautCFLNPS16, author = {Anne Canteaut and Sergiu Carpov and Caroline Fontaine and Tancr{\`{e}}de Lepoint and Mar{\'{\i}}a Naya{-}Plasencia and Pascal Paillier and Renaud Sirdey}, editor = {Thomas Peyrin}, title = {Stream Ciphers: {A} Practical Solution for Efficient Homomorphic-Ciphertext Compression}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {313--333}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_16}, doi = {10.1007/978-3-662-52993-5\_16}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/CanteautCFLNPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/MikkelsenDGJGNPPSSZ15, author = {Gert L{\ae}ss{\o}e Mikkelsen and Kasper Damg{\aa}rd and Hans Guldager and Jonas Lindstr{\o}m Jensen and Jesus Luna Garcia and Janus Dam Nielsen and Pascal Paillier and Giancarlo Pellegrino and Michael Bladt Stausholm and Neeraj Suri and Heng Zhang}, editor = {Kai Rannenberg and Jan Camenisch and Ahmad Sabouri}, title = {Technical Implementation and Feasibility}, booktitle = {Attribute-based Credentials for Trust: Identity in the Information Society}, pages = {255--317}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14439-9\_9}, doi = {10.1007/978-3-319-14439-9\_9}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/MikkelsenDGJGNPPSSZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanteautCFLNPS15, author = {Anne Canteaut and Sergiu Carpov and Caroline Fontaine and Tancr{\`{e}}de Lepoint and Mar{\'{\i}}a Naya{-}Plasencia and Pascal Paillier and Renaud Sirdey}, title = {How to Compress Homomorphic Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {113}, year = {2015}, url = {http://eprint.iacr.org/2015/113}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanteautCFLNPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/LepointP13, author = {Tancr{\`{e}}de Lepoint and Pascal Paillier}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {On the Minimal Number of Bootstrappings in Homomorphic Circuits}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {189--200}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_13}, doi = {10.1007/978-3-642-41320-9\_13}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/LepointP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/DelerableeLPR13, author = {C{\'{e}}cile Delerabl{\'{e}}e and Tancr{\`{e}}de Lepoint and Pascal Paillier and Matthieu Rivain}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {White-Box Security Notions for Symmetric Encryption Schemes}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {247--264}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_13}, doi = {10.1007/978-3-662-43414-7\_13}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/DelerableeLPR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DelerableeLPR13, author = {C{\'{e}}cile Delerabl{\'{e}}e and Tancr{\`{e}}de Lepoint and Pascal Paillier and Matthieu Rivain}, title = {White-Box Security Notions for Symmetric Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {523}, year = {2013}, url = {http://eprint.iacr.org/2013/523}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DelerableeLPR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apf/BjonesKPR12, author = {Ronny Bjones and Ioannis Krontiris and Pascal Paillier and Kai Rannenberg}, editor = {Bart Preneel and Demosthenes Ikonomou}, title = {Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication}, booktitle = {Privacy Technologies and Policy - First Annual Privacy Forum, {APF} 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8319}, pages = {111--124}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-54069-1\_7}, doi = {10.1007/978-3-642-54069-1\_7}, timestamp = {Sat, 19 Oct 2019 20:10:28 +0200}, biburl = {https://dblp.org/rec/conf/apf/BjonesKPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/CoronGIP12, author = {Jean{-}S{\'{e}}bastien Coron and Aline Gouget and Thomas Icart and Pascal Paillier}, editor = {David Naccache}, title = {Supplemental Access Control {(PACE} v2): Security Analysis of {PACE} Integrated Mapping}, booktitle = {Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {6805}, pages = {207--232}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28368-0\_15}, doi = {10.1007/978-3-642-28368-0\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/CoronGIP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ClavierFTP12, author = {Christophe Clavier and Benoit Feix and Lo{\"{\i}}c Thierry and Pascal Paillier}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Generating Provable Primes Efficiently on Embedded Devices}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {372--389}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_22}, doi = {10.1007/978-3-642-30057-8\_22}, timestamp = {Mon, 16 Nov 2020 15:55:52 +0100}, biburl = {https://dblp.org/rec/conf/pkc/ClavierFTP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanteautFNPRV12, author = {Anne Canteaut and Thomas Fuhr and Mar{\'{\i}}a Naya{-}Plasencia and Pascal Paillier and Jean{-}Ren{\'{e}} Reinhard and Marion Videau}, title = {A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {363}, year = {2012}, url = {http://eprint.iacr.org/2012/363}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanteautFNPRV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Paillier11, author = {Pascal Paillier}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Paillier Encryption and Signature Schemes}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {902--903}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_488}, doi = {10.1007/978-1-4419-5906-5\_488}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Paillier11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronGIP11, author = {Jean{-}S{\'{e}}bastien Coron and Aline Gouget and Thomas Icart and Pascal Paillier}, title = {Supplemental Access Control {(PACE} v2): Security Analysis of {PACE} Integrated Mapping}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {58}, year = {2011}, url = {http://eprint.iacr.org/2011/058}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronGIP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/CoronGPV10, author = {Jean{-}S{\'{e}}bastien Coron and Aline Gouget and Pascal Paillier and Karine Villegas}, editor = {Radu Sion and Reza Curtmola and Sven Dietrich and Aggelos Kiayias and Josep M. Miret and Kazue Sako and Francesc Seb{\'{e}}}, title = {{SPAKE:} {A} Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications}, booktitle = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS, WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6054}, pages = {107--122}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14992-4\_11}, doi = {10.1007/978-3-642-14992-4\_11}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/CoronGPV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CoronJKNP09, author = {Jean{-}S{\'{e}}bastien Coron and Antoine Joux and Ilya Kizhvatov and David Naccache and Pascal Paillier}, editor = {Christophe Clavier and Kris Gaj}, title = {Fault Attacks on {RSA} Signatures with Partially Unknown Messages}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {444--456}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_31}, doi = {10.1007/978-3-642-04138-9\_31}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/CoronJKNP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/CastagnosBCDGGPS09, author = {Guilhem Castagnos and Alexandre Berzati and C{\'{e}}cile Canovas and Blandine Debraize and Louis Goubin and Aline Gouget and Pascal Paillier and Stephanie Salgado}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {Fault Analysis of Grain-128}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2009, San Francisco, CA, USA, July 27, 2009. Proceedings}, pages = {7--14}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/HST.2009.5225030}, doi = {10.1109/HST.2009.5225030}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/CastagnosBCDGGPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BressonCCCFGIMNPPRTV09, author = {Emmanuel Bresson and Anne Canteaut and Beno{\^{\i}}t Chevallier{-}Mames and Christophe Clavier and Thomas Fuhr and Aline Gouget and Thomas Icart and Jean{-}Fran{\c{c}}ois Misarsky and Mar{\'{\i}}a Naya{-}Plasencia and Pascal Paillier and Thomas Pornin and Jean{-}Ren{\'{e}} Reinhard and C{\'{e}}line Thuillet and Marion Videau}, title = {Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {199}, year = {2009}, url = {http://eprint.iacr.org/2009/199}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BressonCCCFGIMNPPRTV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronJKNP09, author = {Jean{-}S{\'{e}}bastien Coron and Antoine Joux and Ilya Kizhvatov and David Naccache and Pascal Paillier}, title = {Fault Attacks on {RSA} Signatures with Partially Unknown Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2009}, url = {http://eprint.iacr.org/2009/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronJKNP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbdallaBCKKLMNPS08, author = {Michel Abdalla and Mihir Bellare and Dario Catalano and Eike Kiltz and Tadayoshi Kohno and Tanja Lange and John Malone{-}Lee and Gregory Neven and Pascal Paillier and Haixia Shi}, title = {Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions}, journal = {J. Cryptol.}, volume = {21}, number = {3}, pages = {350--391}, year = {2008}, url = {https://doi.org/10.1007/s00145-007-9006-6}, doi = {10.1007/S00145-007-9006-6}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbdallaBCKKLMNPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/BressonCCGPP08, author = {Emmanuel Bresson and Beno{\^{\i}}t Chevallier{-}Mames and Christophe Clavier and Aline Gouget and Pascal Paillier and Thomas Peyrin}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {How to Use Merkle-Damg{\aa}rd - On the Security Relations between Signature Schemes and Their Inner Hash Functions}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {241--253}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_17}, doi = {10.1007/978-3-540-88733-1\_17}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/BressonCCGPP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Paillier07, author = {Pascal Paillier}, editor = {Masayuki Abe}, title = {Impossibility Proofs for {RSA} Signatures in the Standard Model}, booktitle = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4377}, pages = {31--48}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/11967668\_3}, doi = {10.1007/11967668\_3}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Paillier07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/DelerableePP07, author = {C{\'{e}}cile Delerabl{\'{e}}e and Pascal Paillier and David Pointcheval}, editor = {Tsuyoshi Takagi and Tatsuaki Okamoto and Eiji Okamoto and Takeshi Okamoto}, title = {Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys}, booktitle = {Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4575}, pages = {39--59}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73489-5\_4}, doi = {10.1007/978-3-540-73489-5\_4}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/DelerableePP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/FuhrP07, author = {Thomas Fuhr and Pascal Paillier}, editor = {Willy Susilo and Joseph K. Liu and Yi Mu}, title = {Decryptable Searchable Encryption}, booktitle = {Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4784}, pages = {228--236}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75670-5\_17}, doi = {10.1007/978-3-540-75670-5\_17}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/FuhrP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2007, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2}, doi = {10.1007/978-3-540-74735-2}, isbn = {978-3-540-74734-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PaillierV06, author = {Pascal Paillier and Jorge Luis Villar}, editor = {Xuejia Lai and Kefei Chen}, title = {Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4284}, pages = {252--266}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935230\_17}, doi = {10.1007/11935230\_17}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PaillierV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JoyeP06, author = {Marc Joye and Pascal Paillier}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Fast Generation of Prime Numbers on Portable Devices: An Update}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {160--173}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_13}, doi = {10.1007/11894063\_13}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/JoyeP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Chevallier-MamesPP06, author = {Beno{\^{\i}}t Chevallier{-}Mames and Pascal Paillier and David Pointcheval}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Encoding-Free ElGamal Encryption Without Random Oracles}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {91--104}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_7}, doi = {10.1007/11745853\_7}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Chevallier-MamesPP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PaillierV05, author = {Pascal Paillier and Damien Vergnaud}, editor = {Bimal K. Roy}, title = {Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3788}, pages = {1--20}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593447\_1}, doi = {10.1007/11593447\_1}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PaillierV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LaguillaumiePV05, author = {Fabien Laguillaumie and Pascal Paillier and Damien Vergnaud}, editor = {Bimal K. Roy}, title = {Universally Convertible Directed Signatures}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3788}, pages = {682--701}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593447\_37}, doi = {10.1007/11593447\_37}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LaguillaumiePV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JoyePS05, author = {Marc Joye and Pascal Paillier and Berry Schoenmakers}, editor = {Josyula R. Rao and Berk Sunar}, title = {On Second-Order Differential Power Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {293--308}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_22}, doi = {10.1007/11545262\_22}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/JoyePS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbdallaBCKKLMNPS05, author = {Michel Abdalla and Mihir Bellare and Dario Catalano and Eike Kiltz and Tadayoshi Kohno and Tanja Lange and John Malone{-}Lee and Gregory Neven and Pascal Paillier and Haixia Shi}, editor = {Victor Shoup}, title = {Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {205--222}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_13}, doi = {10.1007/11535218\_13}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AbdallaBCKKLMNPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Paillier05, author = {Pascal Paillier}, editor = {Henk C. A. van Tilborg}, title = {Paillier Encryption and Signature Schemes}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_293}, doi = {10.1007/0-387-23483-7\_293}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Paillier05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBCKKLMNPS05, author = {Michel Abdalla and Mihir Bellare and Dario Catalano and Eike Kiltz and Tadayoshi Kohno and Tanja Lange and John Malone{-}Lee and Gregory Neven and Pascal Paillier and Haixia Shi}, title = {Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {254}, year = {2005}, url = {http://eprint.iacr.org/2005/254}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBCKKLMNPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Chevallier-MamesNPP04, author = {Beno{\^{\i}}t Chevallier{-}Mames and David Naccache and Pascal Paillier and David Pointcheval}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {How to Disembed a Program?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {441--454}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_32}, doi = {10.1007/978-3-540-28632-5\_32}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/Chevallier-MamesNPP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chevallier-MamesNPP04, author = {Beno{\^{\i}}t Chevallier{-}Mames and David Naccache and Pascal Paillier and David Pointcheval}, title = {How to Disembed a Program?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {138}, year = {2004}, url = {http://eprint.iacr.org/2004/138}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chevallier-MamesNPP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Chevallier-MamesJP03, author = {Beno{\^{\i}}t Chevallier{-}Mames and Marc Joye and Pascal Paillier}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Faster Double-Size Modular Multiplication from Euclidean Multipliers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {214--227}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10931455\_18}, doi = {10.1007/10931455\_18}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/Chevallier-MamesJP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JoyeP03, author = {Marc Joye and Pascal Paillier}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {GCD-Free Algorithms for Computing Modular Inverses}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {243--253}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_20}, doi = {10.1007/978-3-540-45238-6\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/JoyeP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrierNP03, author = {Eric Brier and David Naccache and Pascal Paillier}, title = {Chemical Combinatorial Attacks on Keyboards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {217}, year = {2003}, url = {http://eprint.iacr.org/2003/217}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrierNP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/HandschuhNPT02, author = {Helena Handschuh and David Naccache and Pascal Paillier and Christophe Tymen}, editor = {Peter Honeyman}, title = {Provably Secure Chipcard Personalization, or, How to Fool Malicious Insiders}, booktitle = {Proceedings of the Fifth Smart Card Research and Advanced Application Conference, {CARDIS} '02, November 21-22, 2002, San Jose, CA, {USA}}, publisher = {{USENIX}}, year = {2002}, url = {http://www.usenix.org/publications/library/proceedings/cardis02/handschuh.html}, timestamp = {Wed, 04 Jul 2018 13:06:35 +0200}, biburl = {https://dblp.org/rec/conf/cardis/HandschuhNPT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoronJNP02, author = {Jean{-}S{\'{e}}bastien Coron and Marc Joye and David Naccache and Pascal Paillier}, editor = {Moti Yung}, title = {Universal Padding Schemes for {RSA}}, booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2442}, pages = {226--241}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45708-9\_15}, doi = {10.1007/3-540-45708-9\_15}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CoronJNP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/CoronHJPPT02, author = {Jean{-}S{\'{e}}bastien Coron and Helena Handschuh and Marc Joye and Pascal Paillier and David Pointcheval and Christophe Tymen}, editor = {Bart Preneel}, title = {{GEM:} {A} Generic Chosen-Ciphertext Secure Encryption Method}, booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2271}, pages = {263--276}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45760-7\_18}, doi = {10.1007/3-540-45760-7\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/CoronHJPPT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CoronHJPPT02, author = {Jean{-}S{\'{e}}bastien Coron and Helena Handschuh and Marc Joye and Pascal Paillier and David Pointcheval and Christophe Tymen}, editor = {David Naccache and Pascal Paillier}, title = {Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {17--33}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_2}, doi = {10.1007/3-540-45664-3\_2}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CoronHJPPT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2002, editor = {David Naccache and Pascal Paillier}, title = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3}, doi = {10.1007/3-540-45664-3}, isbn = {3-540-43168-3}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronHJPPT02, author = {Jean{-}S{\'{e}}bastien Coron and Helena Handschuh and Marc Joye and Pascal Paillier and David Pointcheval and Christophe Tymen}, title = {Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2002}, url = {http://eprint.iacr.org/2002/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronHJPPT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronJNP02, author = {Jean{-}S{\'{e}}bastien Coron and Marc Joye and David Naccache and Pascal Paillier}, title = {Universal Padding Schemes for {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {115}, year = {2002}, url = {http://eprint.iacr.org/2002/115}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronJNP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Paillier00, author = {Pascal Paillier}, editor = {Tatsuaki Okamoto}, title = {Trapdooring Discrete Logarithms on Elliptic Curves over Rings}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {573--584}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_44}, doi = {10.1007/3-540-44448-3\_44}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Paillier00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JoyePV00, author = {Marc Joye and Pascal Paillier and Serge Vaudenay}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Efficient Generation of Prime Numbers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {340--354}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_27}, doi = {10.1007/3-540-44499-8\_27}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/JoyePV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CoronJNP00, author = {Jean{-}S{\'{e}}bastien Coron and Marc Joye and David Naccache and Pascal Paillier}, editor = {Bart Preneel}, title = {New Attacks on PKCS{\#}1 v1.5 Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1807}, pages = {369--381}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45539-6\_25}, doi = {10.1007/3-540-45539-6\_25}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CoronJNP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PaillierP99, author = {Pascal Paillier and David Pointcheval}, editor = {Kwok{-}Yan Lam and Eiji Okamoto and Chaoping Xing}, title = {Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries}, booktitle = {Advances in Cryptology - {ASIACRYPT} '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1716}, pages = {165--179}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-48000-6\_14}, doi = {10.1007/978-3-540-48000-6\_14}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PaillierP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HandschuhPS99, author = {Helena Handschuh and Pascal Paillier and Jacques Stern}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Probing Attacks on Tamper-Resistant Devices}, booktitle = {Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1717}, pages = {303--315}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48059-5\_26}, doi = {10.1007/3-540-48059-5\_26}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/HandschuhPS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Paillier99, author = {Pascal Paillier}, editor = {Jacques Stern}, title = {Public-Key Cryptosystems Based on Composite Degree Residuosity Classes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {223--238}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_16}, doi = {10.1007/3-540-48910-X\_16}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Paillier99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/PaillierY99, author = {Pascal Paillier and Moti Yung}, editor = {JooSeok Song}, title = {Self-Escrowed Public-Key Infrastructures}, booktitle = {Information Security and Cryptology - ICISC'99, Second International Conference, Seoul, Korea, December 9-10, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1787}, pages = {257--268}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10719994\_20}, doi = {10.1007/10719994\_20}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/PaillierY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Paillier99, author = {Pascal Paillier}, editor = {Hideki Imai and Yuliang Zheng}, title = {A Trapdoor Permutation Equivalent to Factoring}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {219--222}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_17}, doi = {10.1007/3-540-49162-7\_17}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Paillier99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Paillier99a, author = {Pascal Paillier}, editor = {Hideki Imai and Yuliang Zheng}, title = {Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {223--234}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_18}, doi = {10.1007/3-540-49162-7\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Paillier99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Paillier99b, author = {Pascal Paillier}, editor = {Hideki Imai and Yuliang Zheng}, title = {Evaluating Differential Fault Analysis of Unknown Cryptosystems}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {235--244}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_19}, doi = {10.1007/3-540-49162-7\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Paillier99b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/HandschuhP98, author = {Helena Handschuh and Pascal Paillier}, editor = {Jean{-}Jacques Quisquater and Bruce Schneier}, title = {Reducing the Collision Probability of Alleged Comp128}, booktitle = {Smart Card Research and Applications, This International Conference, {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1820}, pages = {366--371}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/10721064\_34}, doi = {10.1007/10721064\_34}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/HandschuhP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/HandschuhP98a, author = {Helena Handschuh and Pascal Paillier}, editor = {Jean{-}Jacques Quisquater and Bruce Schneier}, title = {Smart Card Crypto-Coprocessors for Public-Key Cryptography}, booktitle = {Smart Card Research and Applications, This International Conference, {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1820}, pages = {372--379}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/10721064\_35}, doi = {10.1007/10721064\_35}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/HandschuhP98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Paillier97, author = {Pascal Paillier}, editor = {Bruce Christianson and Bruno Crispo and T. Mark A. Lomas and Michael Roe}, title = {On Ideal Non-perfect Secret Sharing Schemes}, booktitle = {Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1361}, pages = {207--216}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028171}, doi = {10.1007/BFB0028171}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Paillier97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.