Physical zero-knowledge proof for Makaro X Bultel, J Dreier, JG Dumas, P Lafourcade, D Miyahara, T Mizuki, ... Stabilization, Safety, and Security of Distributed Systems: 20th …, 2018 | 45 | 2018 |
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol G Avoine, X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, ... Proceedings of the 2017 ACM on Asia conference on computer and …, 2017 | 42 | 2017 |
Physical zero-knowledge proofs for Akari, Takuzu, Kakuro and KenKen X Bultel, J Dreier, JG Dumas, P Lafourcade arXiv preprint arXiv:1606.01045, 2016 | 39 | 2016 |
The privacy of the TLS 1.3 protocol G Arfaoui, X Bultel, PA Fouque, A Nedelcu, C Onete Proceedings on Privacy Enhancing Technologies 2019 (4), 190-210, 2019 | 36 | 2019 |
A prover-anonymous and terrorist-fraud resistant distance-bounding protocol X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, JM Robert Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016 | 25 | 2016 |
Verifiable private polynomial evaluation X Bultel, ML Das, H Gajera, D Gérault, M Giraud, P Lafourcade Provable Security: 11th International Conference, ProvSec 2017, Xi'an, China …, 2017 | 18 | 2017 |
Secure matrix multiplication with MapReduce X Bultel, R Ciucanu, M Giraud, P Lafourcade Proceedings of the 12th International Conference on Availability …, 2017 | 18 | 2017 |
Security analysis and psychological study of authentication methods with PIN codes X Bultel, J Dreier, M Giraud, M Izaute, T Kheyrkhah, P Lafourcade, ... 2018 12th International Conference on Research Challenges in Information …, 2018 | 17 | 2018 |
Efficient invisible and unlinkable sanitizable signatures X Bultel, P Lafourcade, RWF Lai, G Malavolta, D Schröder, ... Public-Key Cryptography–PKC 2019: 22nd IACR International Conference on …, 2019 | 15 | 2019 |
SAID: reshaping signal into an identity-based asynchronous messaging protocol with authenticated ratcheting O Blazy, A Bossuat, X Bultel, PA Fouque, C Onete, E Pagnin 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 294-309, 2019 | 13 | 2019 |
Unlinkable and strongly accountable sanitizable signatures from verifiable ring signatures X Bultel, P Lafourcade Cryptology and Network Security: 16th International Conference, CANS 2017 …, 2018 | 13 | 2018 |
A posteriori openable public key encryption X Bultel, P Lafourcade ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International …, 2016 | 7 | 2016 |
Two secure anonymous proxy-based data storages O Blazy, X Bultel, P Lafourcade 13th International Joint Conference on e-Business and Telecommunications …, 2016 | 7 | 2016 |
The privacy of the TLS 1.3 protocol. PoPETs, 2019 (4), 190–210 (2019) G Arfaoui, X Bultel, PA Fouque, A Nedelcu, C Onete | 6 | |
Designing reverse firewalls for the real world A Bossuat, X Bultel, PA Fouque, C Onete, T van Der Merwe Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 5 | 2020 |
Secure joins with MapReduce X Bultel, R Ciucanu, M Giraud, P Lafourcade, L Ye Foundations and Practice of Security: 11th International Symposium, FPS 2018 …, 2019 | 5 | 2019 |
How to explain modern security concepts to your children X Bultel, J Dreier, P Lafourcade, M More Cryptologia 41 (5), 422-447, 2017 | 4 | 2017 |
Zero-knowledge proxy re-identification revisited X Bultel, P Lafourcade Cryptology ePrint Archive, 2017 | 4 | 2017 |
Unlinkable and Invisible -Sanitizable Signatures A Bossuat, X Bultel Applied Cryptography and Network Security: 19th International Conference …, 2021 | 3 | 2021 |
k-times full traceable ring signature X Bultel, P Lafourcade 2016 11th International Conference on Availability, Reliability and Security …, 2016 | 3 | 2016 |