| Public-key cryptosystems based on composite degree residuosity classes P Paillier International conference on the theory and applications of cryptographic …, 1999 | 10707 | 1999 |
| Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ... Annual international cryptology conference, 205-222, 2005 | 828 | 2005 |
| Fast homomorphic evaluation of deep discretized neural networks F Bourse, M Minelli, M Minihold, P Paillier Annual International Cryptology Conference, 483-512, 2018 | 508 | 2018 |
| Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ... Journal of cryptology 21 (3), 350-391, 2008 | 469 | 2008 |
| Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys C Delerablée, P Paillier, D Pointcheval International conference on pairing-based cryptography, 39-59, 2007 | 393 | 2007 |
| Stream ciphers: A practical solution for efficient homomorphic-ciphertext compression A Canteaut, S Carpov, C Fontaine, T Lepoint, M Naya-Plasencia, ... Journal of Cryptology 31 (3), 885-916, 2018 | 292 | 2018 |
| Programmable bootstrapping enables efficient homomorphic inference of deep neural networks I Chillotti, M Joye, P Paillier International Symposium on Cyber Security Cryptography and Machine Learning …, 2021 | 263 | 2021 |
| Discrete-log-based signatures may not be equivalent to discrete log P Paillier, D Vergnaud International conference on the theory and application of cryptology and …, 2005 | 249 | 2005 |
| Efficient public-key cryptosystems provably secure against active adversaries P Paillier, D Pointcheval International conference on the theory and application of cryptology and …, 1999 | 230 | 1999 |
| On second-order differential power analysis M Joye, P Paillier, B Schoenmakers International workshop on cryptographic hardware and embedded systems, 293-308, 2005 | 217 | 2005 |
| Efficient generation of prime numbers M Joye, P Paillier, S Vaudenay International Workshop on Cryptographic Hardware and Embedded Systems, 340-354, 2000 | 128 | 2000 |
| White-box security notions for symmetric encryption schemes C Delerablée, T Lepoint, P Paillier, M Rivain International Conference on Selected Areas in Cryptography, 247-264, 2013 | 113 | 2013 |
| Public-key cryptosystem based on discrete logarithm residues P Paillier EUROCRYPT 1999, 1999 | 113 | 1999 |
| Smart card crypto-coprocessors for public-key cryptography H Handschuh, P Paillier International Conference on Smart Card Research and Advanced Applications …, 1998 | 113 | 1998 |
| Decryptable searchable encryption T Fuhr, P Paillier International Conference on Provable Security, 228-236, 2007 | 110 | 2007 |
| Universal padding schemes for RSA JS Coron, M Joye, D Naccache, P Paillier Annual International Cryptology Conference, 226-241, 2002 | 106 | 2002 |
| Trapdooring discrete logarithms on elliptic curves over rings P Paillier International Conference on the Theory and Application of Cryptology and …, 2000 | 92 | 2000 |
| GEM: A Generic Chosen-Ciphertext Secure Encryption Method C Jean-Sébastien, H Handschuh, M Joye, P Paillier, D Pointcheval, ... Cryptographers’ Track at the RSA Conference, 263-276, 2002 | 91 | 2002 |
| Extended-precision accumulation of multiplier output M Stribaek, P Paillier US Patent 7,181,484, 2007 | 86 | 2007 |
| Probing attacks on tamper-resistant devices H Handschuh, P Paillier, J Stern International Workshop on Cryptographic Hardware and Embedded Systems, 303-315, 1999 | 86 | 1999 |