User menu

Accès à distance ? S'identifier sur le proxy UCLouvain

Search

Displaying 1 - 25 of 32 results.

Pages

    • Speech
    Efficient and non-interactive timed-release encryption
    Cathalo, Julien[UCL] Quisquater, Jean-Jacques[UCL] Libert, Benoît[UCL] (2005) 7th International Conference on Information and Communications Security — Beijing(Peoples R China)
    • Speech
    Identity based encryption without redundancy
    Libert, Benoît[UCL] Quisquater, Jean-Jacques[UCL] (2005) 3rd International Conference on Applied Cryptography and Network Security — Columbia Univ, New York (Ny)
    • Speech
    Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
    Barreto, PSLM Quisquater, Jean-Jacques[UCL] Libert, Benoît[UCL] McCullagh, N (2005) 11th International Conference on the Theory and Application of Cryptology and Information Security — Chennai(India)
    • Speech
    Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures
    Attrapadung, Nuttapong Libert, Benoît[UCL] Peters, Thomas[UCL] (2013) Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography — Nara (Japan)
    • Speech
    Certificateless encryption schemes strongly secure in the standard model
    Dent, A.W. Libert, Benoît[UCL] Paterson, K.G. (2008) Public Key Cryptography - PKC 2008. 11th International Workshop on Practice and Theory in Public Key Cryptography — Barcelona, Spain
    • Speech
    Compactly Hiding Linear Spans - Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications
    Libert, Benoît Peters, Thomas[Ecole Normale Supérieure Paris, France et UCL] Joye, Marc Yung, Moti (2015) 21th International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2015 — Auckland (New Zealand)
    • Speech
    Universal designated verifier signatures without random oracles or non-black box assumptions
    Laguillaumie, Fabien Libert, Benoît[UCL] Quisquater, Jean-Jacques[UCL] (2006) 5th International Conferencs on Security and Cryptography for Networks — Maiori(Italy)
    • Speech
    Secure Efficient History-Hiding Append-Only Signatures in the Standard Model
    Libert, Benoît Joye, Marc Yung, Moti Peters, Thomas[Ecole Normale Supérieure, Paris/France et UCL] (2015) 18th International Conference on Practice and Theory in Public-Key Cryptography - PKC 2015 — Gaithersburg (USA)
    • Speech
    Adaptively Secure Non-Interactive Threshold Cryptosystems
    Libert, Benoît[UCL] Yung, Moti (2011) 38th International Colloquium on Automata, Languages and Programming (ICALP 2011) — Zürich (Suisse)
    • Speech
    Practical time capsule signatures in the standard model from bilinear maps
    Libert, Benoît[UCL] Quisquater, Jean-Jacques[UCL] (2007) Pairing-Based Cryptography - Pairing 2007. First International Conference — Tokyo, Japan
    • Speech
    On constructing certificateless cryptosystems from identity based encryption
    Libert, Benoît[UCL] Quisquater, Jean-Jacques[UCL] (2006) 9th International Conference on Theory and Practice of Public Key Cryptography — New York(Ny)
    • Speech
    Efficient signcryption with key privacy from gap Diffie-Hellman groups
    Libert, Benoît[UCL] Quisquater, Jean-Jacques[UCL] (2004) 7th International Workshop on Theory and Practice in Public Key Cryptography — Singapore(Singapore)
    • Speech
    Traceable Group Encryption
    Libert, Benoît Yung, Moti Joye, Marc Peters, Thomas[UCL] (2014) Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography — Buenos Aires (Argentina)
    • Speech
    Group signatures with verifier-local revocation and backward unlinkability in the standard model
    Libert, Benoît[UCL] Vergnaud, D. (2009) Cryptology and Network Security. 8th International Conference, CANS 2009 — Kanazawa, Japan
    • Speech
    Key evolution systems in untrusted update environments
    Libert, Benoît[UCL] Moti Yung Quisquater, Jean-Jacques[UCL] (2009) Information Security and Cryptology. 4th International Conference, Inscrypt 2008 — Beijing, China
    • Speech
    Tracing malicious proxies in proxy re-encryption
    Libert, Benoît[UCL] Vergnaud, D. (2008) Pairing-Based Cryptography - Pairing 2008. Second International Conference — Egham, UK
    • Speech
    What is possible with identity based cryptography for PKIs and what still must be improved
    Libert, Benoît[UCL] Quisquater, Jean-Jacques[UCL] (2004) 1st European Public Key Infrastructure Workshop (EuroPKI 2004) — Univ Aegean, Samos Isl (Greece)
    • Speech
    Efficient Completely Non-Malleable Public Key Encryption
    Libert, Benoît[UCL] Yung, M. (2010) Automata, Languages and Programming. 37th International Colloquium, ICALP 2010 — Bordeaux, France
    • Speech
    Adaptive-ID secure revocable identity-based encryption
    Libert, Benoît[UCL] Vergnaud, D. (2009) Topics in Cryptology - CT-RSA 2009 — San Francisco, CA, USA
    • Speech
    Identity based undeniable signatures
    Libert, Benoît[UCL] Quisquater, Jean-Jacques[UCL] (2004) Cryptolograheres Track Research Conference held at the RSA Conference — San Francisco(Ca)
    • Speech
    Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs
    Libert, Benoît[UCL] Yung, M. (2010) Theory of Cryptography. 7th Theory of Cryptography Conference, TCC 2010 — Zurich, Switzerland
    • Speech
    Linearly Homomorphic Structure-Preserving Signatures and Their Applications
    Libert, Benoît[UCL] Peters, Thomas[UCL] Joye, Marc Yung, Moti (2013) Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference — Santa Barbara (USA)
    • Speech
    Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures
    Libert, Benoît Peters, Thomas[UCL] Joye, Marc Yung, Moti (2014) Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques — Copenhagen (Denmark)

Pages