Brier, Éric; Ferradi, Houda; Joye, Marc; Naccache, David New number-theoretic cryptographic primitives. (English) Zbl 1465.94059 J. Math. Cryptol. 14, 224-235 (2020). Reviewer: Jaak Henno (Tallinn) MSC: 94A60 11T71 11A15 11R18 PDFBibTeX XMLCite \textit{É. Brier} et al., J. Math. Cryptol. 14, 224--235 (2020; Zbl 1465.94059) Full Text: DOI
Ferradi, Houda; Géraud, Rémi; Guilley, Sylvain; Naccache, David; Tibouchi, Mehdi Recovering secrets from prefix-dependent leakage. (English) Zbl 1448.94243 J. Math. Cryptol. 14, 15-24 (2020). MSC: 94A62 11T71 PDFBibTeX XMLCite \textit{H. Ferradi} et al., J. Math. Cryptol. 14, 15--24 (2020; Zbl 1448.94243) Full Text: DOI
Ferradi, Houda; Naccache, David Integer reconstruction public-key encryption. (English) Zbl 1457.94128 Mu, Yi (ed.) et al., Cryptology and network security. 18th international conference, CANS 2019, Fuzhou, China, October 25–27, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11829, 412-433 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Ferradi} and \textit{D. Naccache}, Lect. Notes Comput. Sci. 11829, 412--433 (2019; Zbl 1457.94128) Full Text: DOI
Liu, Weiran; Liu, Jianwei; Wu, Qianhong; Qin, Bo; Naccache, David; Ferradi, Houda Efficient subtree-based encryption for fuzzy-entity data sharing. (English) Zbl 1402.68056 Soft Comput. 22, No. 23, 7961-7976 (2018). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{W. Liu} et al., Soft Comput. 22, No. 23, 7961--7976 (2018; Zbl 1402.68056) Full Text: DOI
Ferradi, Houda; Géraud, Rémi; Maimuţ, Diana; Naccache, David; Zhou, Hang Backtracking-assisted multiplication. (English) Zbl 1384.68008 Cryptogr. Commun. 10, No. 1, 17-26 (2018). MSC: 68M07 68W40 94A60 PDFBibTeX XMLCite \textit{H. Ferradi} et al., Cryptogr. Commun. 10, No. 1, 17--26 (2018; Zbl 1384.68008) Full Text: DOI
Beunardeau, Marc; Connolly, Aisling; Ferradi, Houda; Géraud, Rémi; Naccache, David; Vergnaud, Damien Reusing nonces in Schnorr signatures (and keeping it secure...). (English) Zbl 1500.94065 Foley, Simon N. (ed.) et al., Computer security – ESORICS 2017. 22nd European symposium on research in computer security, Oslo, Norway, September 11–15, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10492, 224-241 (2017). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{M. Beunardeau} et al., Lect. Notes Comput. Sci. 10492, 224--241 (2017; Zbl 1500.94065) Full Text: DOI
Benhamouda, Fabrice; Ferradi, Houda; Géraud, Rémi; Naccache, David Non-interactive provably secure attestations for arbitrary RSA prime generation algorithms. (English) Zbl 1500.94018 Foley, Simon N. (ed.) et al., Computer security – ESORICS 2017. 22nd European symposium on research in computer security, Oslo, Norway, September 11–15, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10492, 206-223 (2017). MSC: 94A60 68Q10 PDFBibTeX XMLCite \textit{F. Benhamouda} et al., Lect. Notes Comput. Sci. 10492, 206--223 (2017; Zbl 1500.94018) Full Text: DOI
Ferradi, Houda; Géraud, Rémi; Naccache, David Human public-key encryption. (English) Zbl 1410.94066 Phan, Raphael C.-W. (ed.) et al., Paradigms in cryptology – Mycrypt 2016. Malicious and exploratory cryptology. Second international conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1–2, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10311, 494-505 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Ferradi} et al., Lect. Notes Comput. Sci. 10311, 494--505 (2017; Zbl 1410.94066) Full Text: DOI
Beunardeau, Marc; Ferradi, Houda; Géraud, Rémi; Naccache, David Honey encryption for language. Robbing Shannon to pay Turing? (English) Zbl 1410.94046 Phan, Raphael C.-W. (ed.) et al., Paradigms in cryptology – Mycrypt 2016. Malicious and exploratory cryptology. Second international conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1–2, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10311, 127-144 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Beunardeau} et al., Lect. Notes Comput. Sci. 10311, 127--144 (2017; Zbl 1410.94046) Full Text: DOI
Ferradi, Houda; Géraud, Rémi; Maimut, Diana; Naccache, David; Pointcheval, David Legally fair contract signing without keystones. (English) Zbl 1346.94142 Manulis, Mark (ed.) et al., Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19–22, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). Lecture Notes in Computer Science 9696, 175-190 (2016). MSC: 94A62 PDFBibTeX XMLCite \textit{H. Ferradi} et al., Lect. Notes Comput. Sci. 9696, 175--190 (2016; Zbl 1346.94142) Full Text: DOI Link
Ferradi, Houda; Géraud, Rémi; Naccache, David Slow motion zero knowledge identifying with colliding commitments. (English) Zbl 1409.94872 Lin, Dongdai (ed.) et al., Information security and cryptology. 11th international conference, Inscrypt 2015, Beijing, China, November 1–3, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9589, 381-396 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Ferradi} et al., Lect. Notes Comput. Sci. 9589, 381--396 (2016; Zbl 1409.94872) Full Text: DOI