User menu

Search

Displaying 9 results.
    • Speech
    Efficient intrusion-resilient signatures without random oracles
    Libert, Benoît[UCL] Quisquater, Jean-Jacques[UCL] Yung, M. (2006) Information Security and Cryptology. Second SKLOIS Conference, Inscrypt 2006. Proceedings — Beijing, China
    • Speech
    Parallel key-insulated public key encryption without random oracles
    Libert, Benoît[UCL] Quisquater, Jean-Jacques[UCL] Yung, M. (2007) Public Key Cryptography-PKC 2007. 10th International Conference on Practice and Theory in Public-Key Cryptography. Proceedings — Beijing, China
    • Speech
    On the power of misbehaving adversaries and security analysis of the original EPOC
    Joye, M. Quisquater, Jean-Jacques[UCL] Yung, M. (2001) Cryptographers Track held at the RSA Conference (CT-RSA) — SAN FRANCISCO(California)
    • Speech
    A unified framework for the analysis of side-channel key recovery attacks
    Standaert, François-Xavier[UCL] Malkin, T.G. Yung, M. (2009) Advances in Cryptology-EUROCRYPT 2009. 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques — Cologne, Germany
    • Speech
    Efficient Completely Non-Malleable Public Key Encryption
    Libert, Benoît[UCL] Yung, M. (2010) Automata, Languages and Programming. 37th International Colloquium, ICALP 2010 — Bordeaux, France
    • Speech
    Practical Leakage-Resilient Pseudorandom Generators
    Yu, Yu[UCL] Standaert, François-Xavier[UCL] Pereira, Olivier[UCL] Yung, M. (2010) Proceedings of ACM CCS 2010, the 17th ACM conference on Computer and Communication Security — Chicago/Illinois/USA
    • Speech
    Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs
    Libert, Benoît[UCL] Yung, M. (2010) Theory of Cryptography. 7th Theory of Cryptography Conference, TCC 2010 — Zurich, Switzerland
    • Speech
    Scramble all, encrypt small
    Jakobsson, M Stern, JP Yung, M. (1999) 6th International Workshop on Fast Software Encryption — ROME(Italy)