Fabien Laguillaumie
Orcid: 0000-0001-6464-1139
According to our database1,
Fabien Laguillaumie
authored at least 50 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Computational Differential Privacy for Encrypted Databases Supporting Linear Queries.
Proc. Priv. Enhancing Technol., 2024
Fast Secure Computations on Shared Polynomials and Applications to Private Set Operations.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
2023
J. Cryptol., July, 2023
Bandwidth-efficient threshold EC-DSA revisited: Online/offline extensions, identifiable aborts proactive and adaptive security.
Theor. Comput. Sci., 2023
2022
A tighter proof for CCA secure inner product functional encryption: Genericity meets efficiency.
Theor. Comput. Sci., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2021
Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts, Proactivity and Adaptive Security.
IACR Cryptol. ePrint Arch., 2021
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions.
Algorithmica, 2021
2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
2019
IACR Cryptol. ePrint Arch., 2019
2018
IACR Cryptol. ePrint Arch., 2018
2017
IACR Cryptol. ePrint Arch., 2017
2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
Proceedings of the Topics in Cryptology, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
Improved Parameters and an Implementation of Graded Encoding Schemes from Ideal Lattices.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
2012
Theor. Comput. Sci., 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
2011
IEEE Trans. Inf. Theory, 2011
J. Internet Serv. Inf. Secur., 2011
Inf. Process. Lett., 2011
Public-Key Cryptography: Design and Algorithmic. (Cryptographie à clé publique: Conception et algorithmique).
, 2011
2010
Inf. Sci., 2010
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
2009
Proceedings of the Information Security, 12th International Conference, 2009
On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis.
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
Inf. Process. Lett., 2007
Int. J. Secur. Networks, 2007
On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures.
Proceedings of the Information Security, 10th International Conference, 2007
2006
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
2005
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Topics in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
2004
Int. J. Comput. Math., 2004
Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004