BibTeX records: Benoît Chevallier-Mames

download as .bib file

@inproceedings{DBLP:conf/cscml/StoianFBMKC23,
  author       = {Andrei Stoian and
                  Jordan Fr{\'{e}}ry and
                  Roman Bredehoft and
                  Luis Montero and
                  Celia Kherfallah and
                  Beno{\^{\i}}t Chevallier{-}Mames},
  editor       = {Shlomi Dolev and
                  Ehud Gudes and
                  Pascal Paillier},
  title        = {Deep Neural Networks for Encrypted Inference with {TFHE}},
  booktitle    = {Cyber Security, Cryptology, and Machine Learning - 7th International
                  Symposium, {CSCML} 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13914},
  pages        = {493--500},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-34671-2\_34},
  doi          = {10.1007/978-3-031-34671-2\_34},
  timestamp    = {Thu, 29 Jun 2023 08:38:21 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/StoianFBMKC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mspn/FrerySBMKCM23,
  author       = {Jordan Fr{\'{e}}ry and
                  Andrei Stoian and
                  Roman Bredehoft and
                  Luis Montero and
                  Celia Kherfallah and
                  Beno{\^{\i}}t Chevallier{-}Mames and
                  Arthur Meyre},
  editor       = {Samia Bouzefrane and
                  Soumya Banerjee and
                  Fabrice Mourlin and
                  Selma Boumerdassi and
                  {\'{E}}ric Renault},
  title        = {Privacy-Preserving Tree-Based Inference with {TFHE}},
  booktitle    = {Mobile, Secure, and Programmable Networking - 9th International Conference,
                  {MSPN} 2023, Paris, France, October 26-27, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14482},
  pages        = {139--156},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-52426-4\_10},
  doi          = {10.1007/978-3-031-52426-4\_10},
  timestamp    = {Tue, 13 Feb 2024 21:48:08 +0100},
  biburl       = {https://dblp.org/rec/conf/mspn/FrerySBMKCM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-10906,
  author       = {Andrei Stoian and
                  Jordan Fr{\'{e}}ry and
                  Roman Bredehoft and
                  Luis Montero and
                  Celia Kherfallah and
                  Beno{\^{\i}}t Chevallier{-}Mames},
  title        = {Deep Neural Networks for Encrypted Inference with {TFHE}},
  journal      = {CoRR},
  volume       = {abs/2302.10906},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.10906},
  doi          = {10.48550/ARXIV.2302.10906},
  eprinttype    = {arXiv},
  eprint       = {2302.10906},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-10906.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-01254,
  author       = {Jordan Fr{\'{e}}ry and
                  Andrei Stoian and
                  Roman Bredehoft and
                  Luis Montero and
                  Celia Kherfallah and
                  Beno{\^{\i}}t Chevallier{-}Mames and
                  Arthur Meyre},
  title        = {Privacy-Preserving Tree-Based Inference with Fully Homomorphic Encryption},
  journal      = {CoRR},
  volume       = {abs/2303.01254},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.01254},
  doi          = {10.48550/ARXIV.2303.01254},
  eprinttype    = {arXiv},
  eprint       = {2303.01254},
  timestamp    = {Mon, 06 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-01254.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StoianFBMKC23,
  author       = {Andrei Stoian and
                  Jordan Fr{\'{e}}ry and
                  Roman Bredehoft and
                  Luis Montero and
                  Celia Kherfallah and
                  Beno{\^{\i}}t Chevallier{-}Mames},
  title        = {Deep Neural Networks for Encrypted Inference with {TFHE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {257},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/257},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/StoianFBMKC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrerySBMKCM23,
  author       = {Jordan Fr{\'{e}}ry and
                  Andrei Stoian and
                  Roman Bredehoft and
                  Luis Montero and
                  Celia Kherfallah and
                  Beno{\^{\i}}t Chevallier{-}Mames and
                  Arthur Meyre},
  title        = {Privacy-Preserving Tree-Based Inference with Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {258},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/258},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FrerySBMKCM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Chevallier-Mames22,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames},
  editor       = {Steven D. Galbraith},
  title        = {A Pairing-Free Signature Scheme from Correlation Intractable Hash
                  Function and Strong Diffie-Hellman Assumption},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2022 - Cryptographers' Track at the
                  {RSA} Conference 2022, Virtual Event, March 1-2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13161},
  pages        = {26--48},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-95312-6\_2},
  doi          = {10.1007/978-3-030-95312-6\_2},
  timestamp    = {Thu, 03 Feb 2022 09:28:38 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Chevallier-Mames22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chevallier-Mames22,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames},
  title        = {A Pairing-Free Signature Scheme from Correlation Intractable Hash
                  Function and Strong Diffie-Hellman Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1480},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1480},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Chevallier-Mames22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/Chevallier-MamesCMNS10,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Jean{-}S{\'{e}}bastien Coron and
                  Noel McCullagh and
                  David Naccache and
                  Michael Scott},
  editor       = {Dieter Gollmann and
                  Jean{-}Louis Lanet and
                  Julien Iguchi{-}Cartigny},
  title        = {Secure Delegation of Elliptic-Curve Pairing},
  booktitle    = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2010, Passau, Germany, April 14-16,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6035},
  pages        = {24--35},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12510-2\_3},
  doi          = {10.1007/978-3-642-12510-2\_3},
  timestamp    = {Sat, 30 May 2020 20:05:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/Chevallier-MamesCMNS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wote/Chevallier-MamesFPST10,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Pierre{-}Alain Fouque and
                  David Pointcheval and
                  Julien Stern and
                  Jacques Traor{\'{e}}},
  editor       = {David Chaum and
                  Markus Jakobsson and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Josh Benaloh and
                  Miroslaw Kutylowski and
                  Ben Adida},
  title        = {On Some Incompatible Properties of Voting Schemes},
  booktitle    = {Towards Trustworthy Elections, New Directions in Electronic Voting},
  series       = {Lecture Notes in Computer Science},
  volume       = {6000},
  pages        = {191--199},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12980-3\_11},
  doi          = {10.1007/978-3-642-12980-3\_11},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/wote/Chevallier-MamesFPST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Chevallier-MamesJ09,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Marc Joye},
  editor       = {Josef Pieprzyk and
                  Fangguo Zhang},
  title        = {Chosen-Ciphertext Secure RSA-Type Cryptosystems},
  booktitle    = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
                  China, November 11-13, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5848},
  pages        = {32--46},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04642-1\_5},
  doi          = {10.1007/978-3-642-04642-1\_5},
  timestamp    = {Sun, 02 Jun 2019 21:26:38 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Chevallier-MamesJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BressonCCCFGIMNPPRTV09,
  author       = {Emmanuel Bresson and
                  Anne Canteaut and
                  Beno{\^{\i}}t Chevallier{-}Mames and
                  Christophe Clavier and
                  Thomas Fuhr and
                  Aline Gouget and
                  Thomas Icart and
                  Jean{-}Fran{\c{c}}ois Misarsky and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Pascal Paillier and
                  Thomas Pornin and
                  Jean{-}Ren{\'{e}} Reinhard and
                  C{\'{e}}line Thuillet and
                  Marion Videau},
  title        = {Indifferentiability with Distinguishers: Why Shabal Does Not Require
                  Ideal Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {199},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/199},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BressonCCCFGIMNPPRTV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chevallier-MamesJ09,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Marc Joye},
  title        = {Chosen-Ciphertext Secure RSA-type Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {377},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/377},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chevallier-MamesJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/BressonCCGPP08,
  author       = {Emmanuel Bresson and
                  Beno{\^{\i}}t Chevallier{-}Mames and
                  Christophe Clavier and
                  Aline Gouget and
                  Pascal Paillier and
                  Thomas Peyrin},
  editor       = {Joonsang Baek and
                  Feng Bao and
                  Kefei Chen and
                  Xuejia Lai},
  title        = {How to Use Merkle-Damg{\aa}rd - On the Security Relations between
                  Signature Schemes and Their Inner Hash Functions},
  booktitle    = {Provable Security, Second International Conference, ProvSec 2008,
                  Shanghai, China, October 30 - November 1, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5324},
  pages        = {241--253},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88733-1\_17},
  doi          = {10.1007/978-3-540-88733-1\_17},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/BressonCCGPP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Chevallier-MamesNS08,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  David Naccache and
                  Jacques Stern},
  editor       = {Rafail Ostrovsky and
                  Roberto De Prisco and
                  Ivan Visconti},
  title        = {Linear Bandwidth Naccache-Stern Encryption},
  booktitle    = {Security and Cryptography for Networks, 6th International Conference,
                  {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5229},
  pages        = {327--339},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85855-3\_22},
  doi          = {10.1007/978-3-540-85855-3\_22},
  timestamp    = {Tue, 25 Feb 2020 11:33:46 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/Chevallier-MamesNS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chevallier-MamesNS08,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  David Naccache and
                  Jacques Stern},
  title        = {Linear Bandwidth Naccache-Stern Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {119},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/119},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chevallier-MamesNS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Chevallier-MamesJ07,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Marc Joye},
  editor       = {Masayuki Abe},
  title        = {A Practical and Tightly Secure Signature Scheme Without Hash Function},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at
                  the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4377},
  pages        = {339--356},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/11967668\_22},
  doi          = {10.1007/11967668\_22},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Chevallier-MamesJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/CastagnosC07,
  author       = {Guilhem Castagnos and
                  Beno{\^{\i}}t Chevallier{-}Mames},
  editor       = {Juan A. Garay and
                  Arjen K. Lenstra and
                  Masahiro Mambo and
                  Ren{\'{e}} Peralta},
  title        = {Towards a DL-Based Additively Homomorphic Encryption Scheme},
  booktitle    = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so,
                  Chile, October 9-12, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4779},
  pages        = {362--375},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75496-1\_24},
  doi          = {10.1007/978-3-540-75496-1\_24},
  timestamp    = {Fri, 03 Feb 2023 21:39:19 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/CastagnosC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BrierCCC06,
  author       = {Eric Brier and
                  Beno{\^{\i}}t Chevallier{-}Mames and
                  Mathieu Ciet and
                  Christophe Clavier},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Why One Should Also Secure {RSA} Public Key Elements},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {324--338},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_26},
  doi          = {10.1007/11894063\_26},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BrierCCC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Chevallier-MamesPP06,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Pascal Paillier and
                  David Pointcheval},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Encoding-Free ElGamal Encryption Without Random Oracles},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {91--104},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_7},
  doi          = {10.1007/11745853\_7},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Chevallier-MamesPP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Chevallier-MamesPP05,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Optimal Asymmetric Encryption and Signature Paddings},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {254--268},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_18},
  doi          = {10.1007/11496137\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Chevallier-MamesPP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Chevallier-Mames05,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {New Signature Schemes with Coupons and Tight Reduction},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {513--528},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_35},
  doi          = {10.1007/11496137\_35},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Chevallier-Mames05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Chevallier-Mames05,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames},
  editor       = {Victor Shoup},
  title        = {An Efficient CDH-Based Signature Scheme with a Tight Security Reduction},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {511--526},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_31},
  doi          = {10.1007/11535218\_31},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Chevallier-Mames05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chevallier-Mames05,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames},
  title        = {An Efficient CDH-based Signature Scheme With a Tight Security Reduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chevallier-Mames05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chevallier-MamesCMNS05,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Jean{-}S{\'{e}}bastien Coron and
                  Noel McCullagh and
                  David Naccache and
                  Michael Scott},
  title        = {Secure Delegation of Elliptic-Curve Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {150},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/150},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chevallier-MamesCMNS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AttrapadungCFGHI005,
  author       = {Nuttapong Attrapadung and
                  Beno{\^{\i}}t Chevallier{-}Mames and
                  Jun Furukawa and
                  Takeshi Gomi and
                  Goichiro Hanaoka and
                  Hideki Imai and
                  Rui Zhang},
  title        = {Efficient Identity-Based Encryption with Tight Security Reduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {320},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/320},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AttrapadungCFGHI005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Chevallier-MamesCJ04,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Mathieu Ciet and
                  Marc Joye},
  title        = {Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel
                  Atomicity},
  journal      = {{IEEE} Trans. Computers},
  volume       = {53},
  number       = {6},
  pages        = {760--768},
  year         = {2004},
  url          = {https://doi.org/10.1109/TC.2004.13},
  doi          = {10.1109/TC.2004.13},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/Chevallier-MamesCJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Chevallier-MamesNPP04,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  David Naccache and
                  Pascal Paillier and
                  David Pointcheval},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {How to Disembed a Program?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {441--454},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_32},
  doi          = {10.1007/978-3-540-28632-5\_32},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Chevallier-MamesNPP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Chevallier-Mames04,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames},
  editor       = {Tatsuaki Okamoto},
  title        = {Self-Randomized Exponentiation Algorithms},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
                  the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2964},
  pages        = {236--249},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24660-2\_19},
  doi          = {10.1007/978-3-540-24660-2\_19},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Chevallier-Mames04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chevallier-MamesNPP04,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  David Naccache and
                  Pascal Paillier and
                  David Pointcheval},
  title        = {How to Disembed a Program?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {138},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/138},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chevallier-MamesNPP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Chevallier-MamesJP03,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Marc Joye and
                  Pascal Paillier},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Faster Double-Size Modular Multiplication from Euclidean Multipliers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {214--227},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10931455\_18},
  doi          = {10.1007/10931455\_18},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Chevallier-MamesJP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chevallier-MamesCJ03,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Mathieu Ciet and
                  Marc Joye},
  title        = {Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel
                  Atomicity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {237},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/237},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chevallier-MamesCJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics