关注
Xavier Bultel
Xavier Bultel
在 insa-cvl.fr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Physical zero-knowledge proof for Makaro
X Bultel, J Dreier, JG Dumas, P Lafourcade, D Miyahara, T Mizuki, ...
Stabilization, Safety, and Security of Distributed Systems: 20th …, 2018
582018
Physical zero-knowledge proofs for Akari, Takuzu, Kakuro and KenKen
X Bultel, J Dreier, JG Dumas, P Lafourcade
arXiv preprint arXiv:1606.01045, 2016
542016
The privacy of the TLS 1.3 protocol
G Arfaoui, X Bultel, PA Fouque, A Nedelcu, C Onete
Cryptology ePrint Archive, 2019
482019
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol
G Avoine, X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, ...
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
462017
Efficient invisible and unlinkable sanitizable signatures
X Bultel, P Lafourcade, RWF Lai, G Malavolta, D Schröder, ...
Public-Key Cryptography–PKC 2019: 22nd IACR International Conference on …, 2019
282019
A prover-anonymous and terrorist-fraud resistant distance-bounding protocol
X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, JM Robert
9th ACM Conference on Security & Privacy in Wireless and Mobile Networks …, 2016
262016
Security analysis and psychological study of authentication methods with PIN codes
X Bultel, J Dreier, M Giraud, M Izaute, T Kheyrkhah, P Lafourcade, ...
2018 12th International Conference on Research Challenges in Information …, 2018
222018
Verifiable private polynomial evaluation
X Bultel, ML Das, H Gajera, D Gérault, M Giraud, P Lafourcade
International Conference on Provable Security, 487-506, 2017
182017
Secure matrix multiplication with MapReduce
X Bultel, R Ciucanu, M Giraud, P Lafourcade
Proceedings of the 12th International Conference on Availability …, 2017
182017
SAID: reshaping signal into an identity-based asynchronous messaging protocol with authenticated ratcheting
O Blazy, A Bossuat, X Bultel, PA Fouque, C Onete, E Pagnin
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 294-309, 2019
162019
Unlinkable and strongly accountable sanitizable signatures from verifiable ring signatures
X Bultel, P Lafourcade
International Conference on Cryptology and Network Security, 203-226, 2017
132017
Designing reverse firewalls for the real world
A Bossuat, X Bultel, PA Fouque, C Onete, T van Der Merwe
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
102020
A posteriori openable public key encryption
X Bultel, P Lafourcade
ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International …, 2016
102016
Two secure anonymous proxy-based data storages
O Blazy, X Bultel, P Lafourcade
13th International Joint Conference on e-Business and Telecommunications …, 2016
102016
Unlinkable and Invisible -Sanitizable Signatures
A Bossuat, X Bultel
International Conference on Applied Cryptography and Network Security, 251-283, 2021
82021
How to (Legally) keep secrets from mobile operators
G Arfaoui, O Blazy, X Bultel, PA Fouque, T Jacques, A Nedelcu, C Onete
Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021
72021
How to explain modern security concepts to your children
X Bultel, J Dreier, P Lafourcade, M More
Cryptologia 41 (5), 422-447, 2017
62017
The privacy of the TLS 1.3 protocol. PoPETs 2019 (4), 190–210 (2019)
G Arfaoui, X Bultel, PA Fouque, A Nedelcu, C Onete
6
Generic construction for identity-based proxy blind signature
X Bultel, P Lafourcade, C Olivier-Anclin, L Robert
International Symposium on Foundations and Practice of Security, 34-52, 2021
52021
Secure joins with MapReduce
X Bultel, R Ciucanu, M Giraud, P Lafourcade, L Ye
Foundations and Practice of Security: 11th International Symposium, FPS 2018 …, 2019
52019
系统目前无法执行此操作,请稍后再试。
文章 1–20