Filter your results
- 4
- 4
- 4
- 1
- 1
- 1
- 1
- 4
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
On the Design and Implementation of an Efficient DAA Scheme9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.223-237, ⟨10.1007/978-3-642-12510-2_16⟩
Conference papers
hal-01056104v1
|
||
|
Fair Private Set Intersection with a Semi-trusted Arbiter27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.128-144, ⟨10.1007/978-3-642-39256-6_9⟩
Conference papers
hal-01490721v1
|
||
|
A Lattice-Based Enhanced Privacy ID13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.15-31, ⟨10.1007/978-3-030-41702-4_2⟩
Conference papers
hal-03173905v1
|
||
|
Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.189-207, ⟨10.1007/978-3-642-30955-7_17⟩
Conference papers
hal-01534311v1
|