Olivier Markowitch
According to our database1,
Olivier Markowitch
authored at least 75 papers
between 2000 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
Comment on "Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption With Verifiable Delegation in Cloud Computing".
IEEE Trans. Parallel Distributed Syst., 2021
Comment on "Efficient Secure Outsourcing of Large-Scale Sparse Linear Systems of Equations".
IEEE Trans. Big Data, 2021
Quantum Inf. Process., 2021
Microprocess. Microsystems, 2021
Proceedings of the 11th IFIP International Conference on New Technologies, 2021
2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
Proceedings of the IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Trans. Cloud Comput., 2019
Trans. Emerg. Telecommun. Technol., 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the 22nd Euromicro Conference on Digital System Design, 2019
2018
Start Simple and then Refine: Bias-Variance Decomposition as a Diagnosis Tool for Leakage Profiling.
IEEE Trans. Computers, 2018
Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version.
J. Cryptogr. Eng., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the Fifth International Conference on Software Defined Systems, 2018
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the Information Security - 21st International Conference, 2018
Fully Homomorphic Distributed Identity-based Encryption Resilient to Continual Auxiliary Input Leakage.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Reducing Data Complexity in Feature Extraction and Feature Selection for Big Data Security Analytics.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018
Proceedings of the Artificial Intelligence and Soft Computing, 2018
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018
2017
Analysis of One Scheme for Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates.
Int. J. Netw. Secur., 2017
IET Inf. Secur., 2017
Feature Extraction and Feature Selection: Reducing Data Complexity with Apache Spark.
CoRR, 2017
Proceedings of the Advances in Information and Computer Security, 2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017
Multi-party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017
2016
Int. J. Netw. Secur., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016
Proceedings of the 20th Pan-Hellenic Conference on Informatics, 2016
Multi-authority Distributed Attribute-Based Encryption with Application to Searchable Encryption on Lattices.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016
Identity-Based Threshold Encryption on Lattices with Application to Searchable Encryption.
Proceedings of the Applications and Techniques in Information Security, 2016
2015
A machine learning approach against a masked AES - Reaching the limit of side-channel attacks with a learning model.
J. Cryptogr. Eng., 2015
Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis).
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015
2014
Int. J. Appl. Cryptogr., 2014
2013
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
A Note on a Signature Building Block and Relevant Security Reduction in the Green-Hohenberger OT Scheme.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Proceedings of the Smart Card Research and Advanced Applications, 2013
2012
Key Management as a Service.
Proceedings of the SECRYPT 2012, 2012
Vertical Handover Security in 4G Heterogeneous Networks: Threat Analysis and Open Challenges.
Proceedings of the Future Generation Information Technology - 4th International Conference, 2012
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012
2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
A Tripartite Strong Designated Verifier Scheme Based On Threshold RSA Signatures.
Proceedings of the 2009 International Conference on Security & Management, 2009
Proceedings of the Complex Sciences, 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
2007
Electron. Commer. Res. Appl., 2007
2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Voting with Designated Verifier Signature-Like Protocol.
Proceedings of the IADIS International Conference WWW/Internet 2004, 2004
2003
Inf. Process. Lett., 2003
Proceedings of the Information Security and Cryptology, 2003
2002
Proceedings of the Information Security, 5th International Conference, 2002
Proceedings of the Information Security and Cryptology, 2002
2001
Proceedings of the Information Security, 4th International Conference, 2001
Proceedings of the Progress in Cryptology, 2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Financial Cryptography, 2001
2000
A Multi-Party Non-Repudiation Protocol.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Proceedings of the Information Security and Cryptology, 2000