Filter your results
- 3
- 1
- 3
- 1
- 4
- 2
- 2
- 2
- 4
- 1
- 1
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Optimal Parameters for Efficient Two-Party Computation Protocols6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.128-143, ⟨10.1007/978-3-642-30955-7_12⟩
Conference papers
hal-01534312v1
|
||
|
Advances in Software Engineering TechniquesSpringer, LNCS-7054, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-28038-2⟩
Books
hal-01527391v1
|
||
|
Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.564-575, ⟨10.1007/978-3-642-55032-4_58⟩
Conference papers
hal-01397271v1
|
||
|
Efficient Lattice HIBE in the Standard Model with Shorter Public Parameters2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.542-553, ⟨10.1007/978-3-642-55032-4_56⟩
Conference papers
hal-01397268v1
|