| The privacy of the TLS 1.3 protocol G Arfaoui, X Bultel, PA Fouque, A Nedelcu, C Onete Cryptology ePrint Archive, 2019 | 71 | 2019 |
| Physical zero-knowledge proof for Makaro X Bultel, J Dreier, JG Dumas, P Lafourcade, D Miyahara, T Mizuki, ... International Symposium on Stabilizing, Safety, and Security of Distributed …, 2018 | 67 | 2018 |
| Physical zero-knowledge proofs for Akari, Takuzu, Kakuro and KenKen X Bultel, J Dreier, JG Dumas, P Lafourcade arXiv preprint arXiv:1606.01045, 2016 | 62 | 2016 |
| A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol G Avoine, X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, ... Proceedings of the 2017 ACM on Asia conference on computer and …, 2017 | 54 | 2017 |
| Efficient invisible and unlinkable sanitizable signatures X Bultel, P Lafourcade, RWF Lai, G Malavolta, D Schröder, ... IACR International Workshop on Public Key Cryptography, 159-189, 2019 | 37 | 2019 |
| A prover-anonymous and terrorist-fraud resistant distance-bounding protocol X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, JM Robert Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016 | 28 | 2016 |
| Designing reverse firewalls for the real world A Bossuat, X Bultel, PA Fouque, C Onete, T van Der Merwe European Symposium on Research in Computer Security, 193-213, 2020 | 26 | 2020 |
| Security analysis and psychological study of authentication methods with PIN codes X Bultel, J Dreier, M Giraud, M Izaute, T Kheyrkhah, P Lafourcade, ... 2018 12th International Conference on Research Challenges in Information …, 2018 | 26 | 2018 |
| SAID: reshaping signal into an identity-based asynchronous messaging protocol with authenticated ratcheting O Blazy, A Bossuat, X Bultel, PA Fouque, C Onete, E Pagnin 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 294-309, 2019 | 21 | 2019 |
| Unlinkable and strongly accountable sanitizable signatures from verifiable ring signatures X Bultel, P Lafourcade International Conference on Cryptology and Network Security, 203-226, 2017 | 20 | 2017 |
| Verifiable private polynomial evaluation X Bultel, ML Das, H Gajera, D Gérault, M Giraud, P Lafourcade International Conference on Provable Security, 487-506, 2017 | 20 | 2017 |
| Secure matrix multiplication with MapReduce X Bultel, R Ciucanu, M Giraud, P Lafourcade Proceedings of the 12th International Conference on Availability …, 2017 | 20 | 2017 |
| Unlinkable and Invisible -Sanitizable Signatures A Bossuat, X Bultel International Conference on Applied Cryptography and Network Security, 251-283, 2021 | 16 | 2021 |
| How to (legally) keep secrets from mobile operators G Arfaoui, O Blazy, X Bultel, PA Fouque, T Jacques, A Nedelcu, C Onete European Symposium on Research in Computer Security, 23-43, 2021 | 10 | 2021 |
| Generic construction for identity-based proxy blind signature X Bultel, P Lafourcade, C Olivier-Anclin, L Robert International Symposium on Foundations and Practice of Security, 34-52, 2021 | 9 | 2021 |
| A posteriori openable public key encryption X Bultel, P Lafourcade IFIP International Conference on ICT Systems Security and Privacy Protection …, 2016 | 9 | 2016 |
| Two secure anonymous proxy-based data storages O Blazy, X Bultel, P Lafourcade 13th International Joint Conference on e-Business and Telecommunications …, 2016 | 9 | 2016 |
| Generic plaintext equality and inequality proofs O Blazy, X Bultel, P Lafourcade, OP Kempner International Conference on Financial Cryptography and Data Security, 415-435, 2021 | 5 | 2021 |
| Secure joins with MapReduce X Bultel, R Ciucanu, M Giraud, P Lafourcade, L Ye International Symposium on Foundations and Practice of Security, 78-94, 2018 | 5 | 2018 |
| How to explain modern security concepts to your children X Bultel, J Dreier, P Lafourcade, M More Cryptologia 41 (5), 422-447, 2017 | 5 | 2017 |