[go: up one dir, main page]

Follow
Pascal Paillier
Pascal Paillier
CryptoExperts
Verified email at cryptoexperts.com - Homepage
Title
Cited by
Cited by
Year
Public-key cryptosystems based on composite degree residuosity classes
P Paillier
International conference on the theory and applications of cryptographic …, 1999
107071999
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Annual international cryptology conference, 205-222, 2005
8282005
Fast homomorphic evaluation of deep discretized neural networks
F Bourse, M Minelli, M Minihold, P Paillier
Annual International Cryptology Conference, 483-512, 2018
5082018
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Journal of cryptology 21 (3), 350-391, 2008
4692008
Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys
C Delerablée, P Paillier, D Pointcheval
International conference on pairing-based cryptography, 39-59, 2007
3932007
Stream ciphers: A practical solution for efficient homomorphic-ciphertext compression
A Canteaut, S Carpov, C Fontaine, T Lepoint, M Naya-Plasencia, ...
Journal of Cryptology 31 (3), 885-916, 2018
2922018
Programmable bootstrapping enables efficient homomorphic inference of deep neural networks
I Chillotti, M Joye, P Paillier
International Symposium on Cyber Security Cryptography and Machine Learning …, 2021
2632021
Discrete-log-based signatures may not be equivalent to discrete log
P Paillier, D Vergnaud
International conference on the theory and application of cryptology and …, 2005
2492005
Efficient public-key cryptosystems provably secure against active adversaries
P Paillier, D Pointcheval
International conference on the theory and application of cryptology and …, 1999
2301999
On second-order differential power analysis
M Joye, P Paillier, B Schoenmakers
International workshop on cryptographic hardware and embedded systems, 293-308, 2005
2172005
Efficient generation of prime numbers
M Joye, P Paillier, S Vaudenay
International Workshop on Cryptographic Hardware and Embedded Systems, 340-354, 2000
1282000
White-box security notions for symmetric encryption schemes
C Delerablée, T Lepoint, P Paillier, M Rivain
International Conference on Selected Areas in Cryptography, 247-264, 2013
1132013
Public-key cryptosystem based on discrete logarithm residues
P Paillier
EUROCRYPT 1999, 1999
1131999
Smart card crypto-coprocessors for public-key cryptography
H Handschuh, P Paillier
International Conference on Smart Card Research and Advanced Applications …, 1998
1131998
Decryptable searchable encryption
T Fuhr, P Paillier
International Conference on Provable Security, 228-236, 2007
1102007
Universal padding schemes for RSA
JS Coron, M Joye, D Naccache, P Paillier
Annual International Cryptology Conference, 226-241, 2002
1062002
Trapdooring discrete logarithms on elliptic curves over rings
P Paillier
International Conference on the Theory and Application of Cryptology and …, 2000
922000
GEM: A Generic Chosen-Ciphertext Secure Encryption Method
C Jean-Sébastien, H Handschuh, M Joye, P Paillier, D Pointcheval, ...
Cryptographers’ Track at the RSA Conference, 263-276, 2002
912002
Extended-precision accumulation of multiplier output
M Stribaek, P Paillier
US Patent 7,181,484, 2007
862007
Probing attacks on tamper-resistant devices
H Handschuh, P Paillier, J Stern
International Workshop on Cryptographic Hardware and Embedded Systems, 303-315, 1999
861999
The system can't perform the operation now. Try again later.
Articles 1–20