Sébastien Canard
According to our database1,
Sébastien Canard
authored at least 78 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
0
1
2
3
4
5
6
7
8
9
4
2
1
5
1
3
4
1
3
4
1
1
2
1
2
2
2
2
5
1
4
4
3
6
1
5
2
3
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Computational Differential Privacy for Encrypted Databases Supporting Linear Queries.
Proc. Priv. Enhancing Technol., 2024
Simulation Secure Multi-Input Quadratic Functional Encryption: Applications to Differential Privacy.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs.
IACR Cryptol. ePrint Arch., 2024
2023
IACR Cryptol. ePrint Arch., 2023
Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption.
IACR Cryptol. ePrint Arch., 2023
2022
IACR Cryptol. ePrint Arch., 2022
2021
IEEE Trans. Cloud Comput., 2021
IET Inf. Secur., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Constant-Size Lattice-Based Group Signature with Forward Security in the Standard Model.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Privacy and Identity Management. Data for Better Living: AI and Privacy, 2019
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019
2018
A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption.
Theor. Comput. Sci., 2018
IET Inf. Secur., 2018
IACR Cryptol. ePrint Arch., 2018
Fundam. Informaticae, 2018
Towards Video Compression in the Encrypted Domain: A Case-Study on the H264 and HEVC Macroblock Processing Pipeline.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018
Proceedings of the Applied Cryptography and Network Security, 2018
2017
Running compression algorithms in the encrypted domain: a case-study on the homomorphic execution of RLE.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Future Gener. Comput. Syst., 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Constant-Size Ciphertext Attribute-Based Encryption from Multi-channel Broadcast Encryption.
Proceedings of the Information Systems Security - 12th International Conference, 2016
Proceedings of the Information Systems Security - 12th International Conference, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
Private Ciphertext-Policy Attribute-based Encryption Schemes With Constant-Size Ciphertext Supporting CNF Access Policy.
IACR Cryptol. ePrint Arch., 2015
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Proceedings of the Public Key Infrastructures, Services and Applications, 2013
Protecting privacy by sanitizing personal data: a new approach to anonymous credentials.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
On the Implementation of a Pairing-Based Cryptographic Protocol in a Constrained Device.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Proceedings of the Smart Card Research and Advanced Applications, 2012
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
2011
J. Internet Serv. Inf. Secur., 2011
Proceedings of the DIM'11, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Chicago, IL, USA, 2011
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Trust, 2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the Financial Cryptography and Data Security, 2010
Proceedings of the Topics in Cryptology, 2010
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010
2009
Proceedings of the Information Security, 12th International Conference, 2009
2008
Proceedings of the Progress in Cryptology, 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Proceedings of the 4th Workshop on Digital Identity Management, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
Proceedings of the Provable Security, 2007
Proceedings of the Advances in Cryptology, 2007
2006
A Secure Universal Loyalty Card.
Proceedings of the Security in Information Systems, 2006
Proceedings of the Financial Cryptography and Data Security, 2006
Proceedings of the Smart Card Research and Advanced Applications, 2006
2004
Proceedings of the Smart Card Research and Advanced Applications VI, 2004
2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002