BibTeX records: Pascal Paillier

download as .bib file

@proceedings{DBLP:conf/cscml/2023,
  editor       = {Shlomi Dolev and
                  Ehud Gudes and
                  Pascal Paillier},
  title        = {Cyber Security, Cryptology, and Machine Learning - 7th International
                  Symposium, {CSCML} 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13914},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-34671-2},
  doi          = {10.1007/978-3-031-34671-2},
  isbn         = {978-3-031-34670-5},
  timestamp    = {Thu, 29 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/JoyeP22,
  author       = {Marc Joye and
                  Pascal Paillier},
  editor       = {Shlomi Dolev and
                  Jonathan Katz and
                  Amnon Meisels},
  title        = {Blind Rotation in Fully Homomorphic Encryption with Extended Keys},
  booktitle    = {Cyber Security, Cryptology, and Machine Learning - 6th International
                  Symposium, {CSCML} 2022, Be'er Sheva, Israel, June 30 - July 1, 2022,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13301},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07689-3\_1},
  doi          = {10.1007/978-3-031-07689-3\_1},
  timestamp    = {Fri, 24 Jun 2022 18:23:22 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/JoyeP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/ChillottiJP21,
  author       = {Ilaria Chillotti and
                  Marc Joye and
                  Pascal Paillier},
  editor       = {Shlomi Dolev and
                  Oded Margalit and
                  Benny Pinkas and
                  Alexander A. Schwarzmann},
  title        = {Programmable Bootstrapping Enables Efficient Homomorphic Inference
                  of Deep Neural Networks},
  booktitle    = {Cyber Security Cryptography and Machine Learning - 5th International
                  Symposium, {CSCML} 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12716},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78086-9\_1},
  doi          = {10.1007/978-3-030-78086-9\_1},
  timestamp    = {Mon, 03 Jan 2022 22:32:47 +0100},
  biburl       = {https://dblp.org/rec/conf/cscml/ChillottiJP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChillottiJP21,
  author       = {Ilaria Chillotti and
                  Marc Joye and
                  Pascal Paillier},
  title        = {Programmable Bootstrapping Enables Efficient Homomorphic Inference
                  of Deep Neural Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/091},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChillottiJP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GoubinPRW20,
  author       = {Louis Goubin and
                  Pascal Paillier and
                  Matthieu Rivain and
                  Junwei Wang},
  title        = {How to reveal the secrets of an obscure white-box implementation},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {1},
  pages        = {49--66},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-019-00207-5},
  doi          = {10.1007/S13389-019-00207-5},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GoubinPRW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CanteautCFLNPS18,
  author       = {Anne Canteaut and
                  Sergiu Carpov and
                  Caroline Fontaine and
                  Tancr{\`{e}}de Lepoint and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Pascal Paillier and
                  Renaud Sirdey},
  title        = {Stream Ciphers: {A} Practical Solution for Efficient Homomorphic-Ciphertext
                  Compression},
  journal      = {J. Cryptol.},
  volume       = {31},
  number       = {3},
  pages        = {885--916},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00145-017-9273-9},
  doi          = {10.1007/S00145-017-9273-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CanteautCFLNPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BourseMMP18,
  author       = {Florian Bourse and
                  Michele Minelli and
                  Matthias Minihold and
                  Pascal Paillier},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Fast Homomorphic Evaluation of Deep Discretized Neural Networks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {483--512},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_17},
  doi          = {10.1007/978-3-319-96878-0\_17},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BourseMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoubinPRW18,
  author       = {Louis Goubin and
                  Pascal Paillier and
                  Matthieu Rivain and
                  Junwei Wang},
  title        = {How to Reveal the Secrets of an Obscure White-Box Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {98},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/098},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoubinPRW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BourseMMP17,
  author       = {Florian Bourse and
                  Michele Minelli and
                  Matthias Minihold and
                  Pascal Paillier},
  title        = {Fast Homomorphic Evaluation of Deep Discretized Neural Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1114},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1114},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BourseMMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CanteautCFLNPS16,
  author       = {Anne Canteaut and
                  Sergiu Carpov and
                  Caroline Fontaine and
                  Tancr{\`{e}}de Lepoint and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Pascal Paillier and
                  Renaud Sirdey},
  editor       = {Thomas Peyrin},
  title        = {Stream Ciphers: {A} Practical Solution for Efficient Homomorphic-Ciphertext
                  Compression},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {313--333},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_16},
  doi          = {10.1007/978-3-662-52993-5\_16},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CanteautCFLNPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/MikkelsenDGJGNPPSSZ15,
  author       = {Gert L{\ae}ss{\o}e Mikkelsen and
                  Kasper Damg{\aa}rd and
                  Hans Guldager and
                  Jonas Lindstr{\o}m Jensen and
                  Jesus Luna Garcia and
                  Janus Dam Nielsen and
                  Pascal Paillier and
                  Giancarlo Pellegrino and
                  Michael Bladt Stausholm and
                  Neeraj Suri and
                  Heng Zhang},
  editor       = {Kai Rannenberg and
                  Jan Camenisch and
                  Ahmad Sabouri},
  title        = {Technical Implementation and Feasibility},
  booktitle    = {Attribute-based Credentials for Trust: Identity in the Information
                  Society},
  pages        = {255--317},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14439-9\_9},
  doi          = {10.1007/978-3-319-14439-9\_9},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/MikkelsenDGJGNPPSSZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautCFLNPS15,
  author       = {Anne Canteaut and
                  Sergiu Carpov and
                  Caroline Fontaine and
                  Tancr{\`{e}}de Lepoint and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Pascal Paillier and
                  Renaud Sirdey},
  title        = {How to Compress Homomorphic Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {113},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/113},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanteautCFLNPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/LepointP13,
  author       = {Tancr{\`{e}}de Lepoint and
                  Pascal Paillier},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {On the Minimal Number of Bootstrappings in Homomorphic Circuits},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {189--200},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_13},
  doi          = {10.1007/978-3-642-41320-9\_13},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/LepointP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/DelerableeLPR13,
  author       = {C{\'{e}}cile Delerabl{\'{e}}e and
                  Tancr{\`{e}}de Lepoint and
                  Pascal Paillier and
                  Matthieu Rivain},
  editor       = {Tanja Lange and
                  Kristin E. Lauter and
                  Petr Lisonek},
  title        = {White-Box Security Notions for Symmetric Encryption Schemes},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
                  Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8282},
  pages        = {247--264},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43414-7\_13},
  doi          = {10.1007/978-3-662-43414-7\_13},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/DelerableeLPR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DelerableeLPR13,
  author       = {C{\'{e}}cile Delerabl{\'{e}}e and
                  Tancr{\`{e}}de Lepoint and
                  Pascal Paillier and
                  Matthieu Rivain},
  title        = {White-Box Security Notions for Symmetric Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {523},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/523},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DelerableeLPR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apf/BjonesKPR12,
  author       = {Ronny Bjones and
                  Ioannis Krontiris and
                  Pascal Paillier and
                  Kai Rannenberg},
  editor       = {Bart Preneel and
                  Demosthenes Ikonomou},
  title        = {Integrating Anonymous Credentials with eIDs for Privacy-Respecting
                  Online Authentication},
  booktitle    = {Privacy Technologies and Policy - First Annual Privacy Forum, {APF}
                  2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8319},
  pages        = {111--124},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-54069-1\_7},
  doi          = {10.1007/978-3-642-54069-1\_7},
  timestamp    = {Sat, 19 Oct 2019 20:10:28 +0200},
  biburl       = {https://dblp.org/rec/conf/apf/BjonesKPR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/CoronGIP12,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Aline Gouget and
                  Thomas Icart and
                  Pascal Paillier},
  editor       = {David Naccache},
  title        = {Supplemental Access Control {(PACE} v2): Security Analysis of {PACE}
                  Integrated Mapping},
  booktitle    = {Cryptography and Security: From Theory to Applications - Essays Dedicated
                  to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {6805},
  pages        = {207--232},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28368-0\_15},
  doi          = {10.1007/978-3-642-28368-0\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/CoronGIP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ClavierFTP12,
  author       = {Christophe Clavier and
                  Benoit Feix and
                  Lo{\"{\i}}c Thierry and
                  Pascal Paillier},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Generating Provable Primes Efficiently on Embedded Devices},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {372--389},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_22},
  doi          = {10.1007/978-3-642-30057-8\_22},
  timestamp    = {Mon, 16 Nov 2020 15:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/ClavierFTP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautFNPRV12,
  author       = {Anne Canteaut and
                  Thomas Fuhr and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Pascal Paillier and
                  Jean{-}Ren{\'{e}} Reinhard and
                  Marion Videau},
  title        = {A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based
                  Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/363},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanteautFNPRV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Paillier11,
  author       = {Pascal Paillier},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Paillier Encryption and Signature Schemes},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {902--903},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_488},
  doi          = {10.1007/978-1-4419-5906-5\_488},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Paillier11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronGIP11,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Aline Gouget and
                  Thomas Icart and
                  Pascal Paillier},
  title        = {Supplemental Access Control {(PACE} v2): Security Analysis of {PACE}
                  Integrated Mapping},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {58},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronGIP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CoronGPV10,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Aline Gouget and
                  Pascal Paillier and
                  Karine Villegas},
  editor       = {Radu Sion and
                  Reza Curtmola and
                  Sven Dietrich and
                  Aggelos Kiayias and
                  Josep M. Miret and
                  Kazue Sako and
                  Francesc Seb{\'{e}}},
  title        = {{SPAKE:} {A} Single-Party Public-Key Authenticated Key Exchange Protocol
                  for Contact-Less Applications},
  booktitle    = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS,
                  WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6054},
  pages        = {107--122},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14992-4\_11},
  doi          = {10.1007/978-3-642-14992-4\_11},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/CoronGPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CoronJKNP09,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Antoine Joux and
                  Ilya Kizhvatov and
                  David Naccache and
                  Pascal Paillier},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Fault Attacks on {RSA} Signatures with Partially Unknown Messages},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {444--456},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_31},
  doi          = {10.1007/978-3-642-04138-9\_31},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CoronJKNP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/CastagnosBCDGGPS09,
  author       = {Guilhem Castagnos and
                  Alexandre Berzati and
                  C{\'{e}}cile Canovas and
                  Blandine Debraize and
                  Louis Goubin and
                  Aline Gouget and
                  Pascal Paillier and
                  Stephanie Salgado},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {Fault Analysis of Grain-128},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2009, San Francisco, CA, USA, July 27, 2009. Proceedings},
  pages        = {7--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/HST.2009.5225030},
  doi          = {10.1109/HST.2009.5225030},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/CastagnosBCDGGPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BressonCCCFGIMNPPRTV09,
  author       = {Emmanuel Bresson and
                  Anne Canteaut and
                  Beno{\^{\i}}t Chevallier{-}Mames and
                  Christophe Clavier and
                  Thomas Fuhr and
                  Aline Gouget and
                  Thomas Icart and
                  Jean{-}Fran{\c{c}}ois Misarsky and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Pascal Paillier and
                  Thomas Pornin and
                  Jean{-}Ren{\'{e}} Reinhard and
                  C{\'{e}}line Thuillet and
                  Marion Videau},
  title        = {Indifferentiability with Distinguishers: Why Shabal Does Not Require
                  Ideal Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {199},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/199},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BressonCCCFGIMNPPRTV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronJKNP09,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Antoine Joux and
                  Ilya Kizhvatov and
                  David Naccache and
                  Pascal Paillier},
  title        = {Fault Attacks on {RSA} Signatures with Partially Unknown Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {309},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/309},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronJKNP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbdallaBCKKLMNPS08,
  author       = {Michel Abdalla and
                  Mihir Bellare and
                  Dario Catalano and
                  Eike Kiltz and
                  Tadayoshi Kohno and
                  Tanja Lange and
                  John Malone{-}Lee and
                  Gregory Neven and
                  Pascal Paillier and
                  Haixia Shi},
  title        = {Searchable Encryption Revisited: Consistency Properties, Relation
                  to Anonymous IBE, and Extensions},
  journal      = {J. Cryptol.},
  volume       = {21},
  number       = {3},
  pages        = {350--391},
  year         = {2008},
  url          = {https://doi.org/10.1007/s00145-007-9006-6},
  doi          = {10.1007/S00145-007-9006-6},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbdallaBCKKLMNPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/BressonCCGPP08,
  author       = {Emmanuel Bresson and
                  Beno{\^{\i}}t Chevallier{-}Mames and
                  Christophe Clavier and
                  Aline Gouget and
                  Pascal Paillier and
                  Thomas Peyrin},
  editor       = {Joonsang Baek and
                  Feng Bao and
                  Kefei Chen and
                  Xuejia Lai},
  title        = {How to Use Merkle-Damg{\aa}rd - On the Security Relations between
                  Signature Schemes and Their Inner Hash Functions},
  booktitle    = {Provable Security, Second International Conference, ProvSec 2008,
                  Shanghai, China, October 30 - November 1, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5324},
  pages        = {241--253},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88733-1\_17},
  doi          = {10.1007/978-3-540-88733-1\_17},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/BressonCCGPP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Paillier07,
  author       = {Pascal Paillier},
  editor       = {Masayuki Abe},
  title        = {Impossibility Proofs for {RSA} Signatures in the Standard Model},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at
                  the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4377},
  pages        = {31--48},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/11967668\_3},
  doi          = {10.1007/11967668\_3},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Paillier07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/DelerableePP07,
  author       = {C{\'{e}}cile Delerabl{\'{e}}e and
                  Pascal Paillier and
                  David Pointcheval},
  editor       = {Tsuyoshi Takagi and
                  Tatsuaki Okamoto and
                  Eiji Okamoto and
                  Takeshi Okamoto},
  title        = {Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size
                  Ciphertexts or Decryption Keys},
  booktitle    = {Pairing-Based Cryptography - Pairing 2007, First International Conference,
                  Tokyo, Japan, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4575},
  pages        = {39--59},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73489-5\_4},
  doi          = {10.1007/978-3-540-73489-5\_4},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/DelerableePP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/FuhrP07,
  author       = {Thomas Fuhr and
                  Pascal Paillier},
  editor       = {Willy Susilo and
                  Joseph K. Liu and
                  Yi Mu},
  title        = {Decryptable Searchable Encryption},
  booktitle    = {Provable Security, First International Conference, ProvSec 2007, Wollongong,
                  Australia, November 1-2, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4784},
  pages        = {228--236},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75670-5\_17},
  doi          = {10.1007/978-3-540-75670-5\_17},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/FuhrP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2007,
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2},
  doi          = {10.1007/978-3-540-74735-2},
  isbn         = {978-3-540-74734-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PaillierV06,
  author       = {Pascal Paillier and
                  Jorge Luis Villar},
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based
                  Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  pages        = {252--266},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230\_17},
  doi          = {10.1007/11935230\_17},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PaillierV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JoyeP06,
  author       = {Marc Joye and
                  Pascal Paillier},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Fast Generation of Prime Numbers on Portable Devices: An Update},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {160--173},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_13},
  doi          = {10.1007/11894063\_13},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/JoyeP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Chevallier-MamesPP06,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Pascal Paillier and
                  David Pointcheval},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Encoding-Free ElGamal Encryption Without Random Oracles},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {91--104},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_7},
  doi          = {10.1007/11745853\_7},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Chevallier-MamesPP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PaillierV05,
  author       = {Pascal Paillier and
                  Damien Vergnaud},
  editor       = {Bimal K. Roy},
  title        = {Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Chennai, India, December 4-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3788},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593447\_1},
  doi          = {10.1007/11593447\_1},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PaillierV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LaguillaumiePV05,
  author       = {Fabien Laguillaumie and
                  Pascal Paillier and
                  Damien Vergnaud},
  editor       = {Bimal K. Roy},
  title        = {Universally Convertible Directed Signatures},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Chennai, India, December 4-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3788},
  pages        = {682--701},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593447\_37},
  doi          = {10.1007/11593447\_37},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LaguillaumiePV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JoyePS05,
  author       = {Marc Joye and
                  Pascal Paillier and
                  Berry Schoenmakers},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {On Second-Order Differential Power Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {293--308},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_22},
  doi          = {10.1007/11545262\_22},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/JoyePS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbdallaBCKKLMNPS05,
  author       = {Michel Abdalla and
                  Mihir Bellare and
                  Dario Catalano and
                  Eike Kiltz and
                  Tadayoshi Kohno and
                  Tanja Lange and
                  John Malone{-}Lee and
                  Gregory Neven and
                  Pascal Paillier and
                  Haixia Shi},
  editor       = {Victor Shoup},
  title        = {Searchable Encryption Revisited: Consistency Properties, Relation
                  to Anonymous IBE, and Extensions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {205--222},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_13},
  doi          = {10.1007/11535218\_13},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AbdallaBCKKLMNPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Paillier05,
  author       = {Pascal Paillier},
  editor       = {Henk C. A. van Tilborg},
  title        = {Paillier Encryption and Signature Schemes},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_293},
  doi          = {10.1007/0-387-23483-7\_293},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Paillier05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBCKKLMNPS05,
  author       = {Michel Abdalla and
                  Mihir Bellare and
                  Dario Catalano and
                  Eike Kiltz and
                  Tadayoshi Kohno and
                  Tanja Lange and
                  John Malone{-}Lee and
                  Gregory Neven and
                  Pascal Paillier and
                  Haixia Shi},
  title        = {Searchable Encryption Revisited: Consistency Properties, Relation
                  to Anonymous IBE, and Extensions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {254},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/254},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBCKKLMNPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Chevallier-MamesNPP04,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  David Naccache and
                  Pascal Paillier and
                  David Pointcheval},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {How to Disembed a Program?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {441--454},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_32},
  doi          = {10.1007/978-3-540-28632-5\_32},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Chevallier-MamesNPP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chevallier-MamesNPP04,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  David Naccache and
                  Pascal Paillier and
                  David Pointcheval},
  title        = {How to Disembed a Program?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {138},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/138},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chevallier-MamesNPP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Chevallier-MamesJP03,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Marc Joye and
                  Pascal Paillier},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Faster Double-Size Modular Multiplication from Euclidean Multipliers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {214--227},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10931455\_18},
  doi          = {10.1007/10931455\_18},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Chevallier-MamesJP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JoyeP03,
  author       = {Marc Joye and
                  Pascal Paillier},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {GCD-Free Algorithms for Computing Modular Inverses},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {243--253},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_20},
  doi          = {10.1007/978-3-540-45238-6\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/JoyeP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrierNP03,
  author       = {Eric Brier and
                  David Naccache and
                  Pascal Paillier},
  title        = {Chemical Combinatorial Attacks on Keyboards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {217},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/217},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrierNP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/HandschuhNPT02,
  author       = {Helena Handschuh and
                  David Naccache and
                  Pascal Paillier and
                  Christophe Tymen},
  editor       = {Peter Honeyman},
  title        = {Provably Secure Chipcard Personalization, or, How to Fool Malicious
                  Insiders},
  booktitle    = {Proceedings of the Fifth Smart Card Research and Advanced Application
                  Conference, {CARDIS} '02, November 21-22, 2002, San Jose, CA, {USA}},
  publisher    = {{USENIX}},
  year         = {2002},
  url          = {http://www.usenix.org/publications/library/proceedings/cardis02/handschuh.html},
  timestamp    = {Wed, 04 Jul 2018 13:06:35 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/HandschuhNPT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronJNP02,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Marc Joye and
                  David Naccache and
                  Pascal Paillier},
  editor       = {Moti Yung},
  title        = {Universal Padding Schemes for {RSA}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 18-22,
                  2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2442},
  pages        = {226--241},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45708-9\_15},
  doi          = {10.1007/3-540-45708-9\_15},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CoronJNP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/CoronHJPPT02,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Helena Handschuh and
                  Marc Joye and
                  Pascal Paillier and
                  David Pointcheval and
                  Christophe Tymen},
  editor       = {Bart Preneel},
  title        = {{GEM:} {A} Generic Chosen-Ciphertext Secure Encryption Method},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
                  the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2271},
  pages        = {263--276},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45760-7\_18},
  doi          = {10.1007/3-540-45760-7\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/CoronHJPPT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CoronHJPPT02,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Helena Handschuh and
                  Marc Joye and
                  Pascal Paillier and
                  David Pointcheval and
                  Christophe Tymen},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {17--33},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_2},
  doi          = {10.1007/3-540-45664-3\_2},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CoronHJPPT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2002,
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3},
  doi          = {10.1007/3-540-45664-3},
  isbn         = {3-540-43168-3},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronHJPPT02,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Helena Handschuh and
                  Marc Joye and
                  Pascal Paillier and
                  David Pointcheval and
                  Christophe Tymen},
  title        = {Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronHJPPT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronJNP02,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Marc Joye and
                  David Naccache and
                  Pascal Paillier},
  title        = {Universal Padding Schemes for {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {115},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronJNP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Paillier00,
  author       = {Pascal Paillier},
  editor       = {Tatsuaki Okamoto},
  title        = {Trapdooring Discrete Logarithms on Elliptic Curves over Rings},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {573--584},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_44},
  doi          = {10.1007/3-540-44448-3\_44},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Paillier00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JoyePV00,
  author       = {Marc Joye and
                  Pascal Paillier and
                  Serge Vaudenay},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Efficient Generation of Prime Numbers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {340--354},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_27},
  doi          = {10.1007/3-540-44499-8\_27},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/JoyePV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CoronJNP00,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Marc Joye and
                  David Naccache and
                  Pascal Paillier},
  editor       = {Bart Preneel},
  title        = {New Attacks on PKCS{\#}1 v1.5 Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
                  on the Theory and Application of Cryptographic Techniques, Bruges,
                  Belgium, May 14-18, 2000, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1807},
  pages        = {369--381},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45539-6\_25},
  doi          = {10.1007/3-540-45539-6\_25},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CoronJNP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PaillierP99,
  author       = {Pascal Paillier and
                  David Pointcheval},
  editor       = {Kwok{-}Yan Lam and
                  Eiji Okamoto and
                  Chaoping Xing},
  title        = {Efficient Public-Key Cryptosystems Provably Secure Against Active
                  Adversaries},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '99, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Singapore, November 14-18, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1716},
  pages        = {165--179},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-48000-6\_14},
  doi          = {10.1007/978-3-540-48000-6\_14},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PaillierP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HandschuhPS99,
  author       = {Helena Handschuh and
                  Pascal Paillier and
                  Jacques Stern},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Probing Attacks on Tamper-Resistant Devices},
  booktitle    = {Cryptographic Hardware and Embedded Systems, First International Workshop,
                  CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1717},
  pages        = {303--315},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48059-5\_26},
  doi          = {10.1007/3-540-48059-5\_26},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HandschuhPS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Paillier99,
  author       = {Pascal Paillier},
  editor       = {Jacques Stern},
  title        = {Public-Key Cryptosystems Based on Composite Degree Residuosity Classes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {223--238},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_16},
  doi          = {10.1007/3-540-48910-X\_16},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Paillier99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PaillierY99,
  author       = {Pascal Paillier and
                  Moti Yung},
  editor       = {JooSeok Song},
  title        = {Self-Escrowed Public-Key Infrastructures},
  booktitle    = {Information Security and Cryptology - ICISC'99, Second International
                  Conference, Seoul, Korea, December 9-10, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1787},
  pages        = {257--268},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10719994\_20},
  doi          = {10.1007/10719994\_20},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/PaillierY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Paillier99,
  author       = {Pascal Paillier},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {A Trapdoor Permutation Equivalent to Factoring},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {219--222},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_17},
  doi          = {10.1007/3-540-49162-7\_17},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Paillier99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Paillier99a,
  author       = {Pascal Paillier},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Low-Cost Double-Size Modular Exponentiation or How to Stretch Your
                  Cryptoprocessor},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {223--234},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_18},
  doi          = {10.1007/3-540-49162-7\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Paillier99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Paillier99b,
  author       = {Pascal Paillier},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Evaluating Differential Fault Analysis of Unknown Cryptosystems},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {235--244},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_19},
  doi          = {10.1007/3-540-49162-7\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Paillier99b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/HandschuhP98,
  author       = {Helena Handschuh and
                  Pascal Paillier},
  editor       = {Jean{-}Jacques Quisquater and
                  Bruce Schneier},
  title        = {Reducing the Collision Probability of Alleged Comp128},
  booktitle    = {Smart Card Research and Applications, This International Conference,
                  {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1820},
  pages        = {366--371},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/10721064\_34},
  doi          = {10.1007/10721064\_34},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/HandschuhP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/HandschuhP98a,
  author       = {Helena Handschuh and
                  Pascal Paillier},
  editor       = {Jean{-}Jacques Quisquater and
                  Bruce Schneier},
  title        = {Smart Card Crypto-Coprocessors for Public-Key Cryptography},
  booktitle    = {Smart Card Research and Applications, This International Conference,
                  {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1820},
  pages        = {372--379},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/10721064\_35},
  doi          = {10.1007/10721064\_35},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/HandschuhP98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Paillier97,
  author       = {Pascal Paillier},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {On Ideal Non-perfect Secret Sharing Schemes},
  booktitle    = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  pages        = {207--216},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028171},
  doi          = {10.1007/BFB0028171},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Paillier97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}