Xavier Bultel

Orcid: 0000-0002-8309-8984

According to our database1, Xavier Bultel authored at least 39 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Physical Ring Signature.
IACR Cryptol. ePrint Arch., 2024

On the Anonymity of Linkable Ring Signatures.
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024

Taming Delegations in Anonymous Signatures: k-Times Anonymity for Proxy and Sanitizable Signature.
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024

Cryptographic Cryptid Protocols - How to Play Cryptid with Cheaters.
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024

2023
Practical Construction for Secure Trick-Taking Games Even With Cards Set Aside.
IACR Cryptol. ePrint Arch., 2023

2022
Pairing-free secure-channel establishment in mobile networks with fine-grained lawful interception.
IACR Cryptol. ePrint Arch., 2022

Improving the Efficiency of Report and Trace Ring Signatures.
IACR Cryptol. ePrint Arch., 2022

Zero-Knowledge Proof of Knowledge for Peg Solitaire.
Proceedings of the 11th International Conference on Fun with Algorithms, 2022

CCA Secure A Posteriori Openable Encryption in the Standard Model.
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022

2021
CCA SecureA Posteriori Openable Encryption in the Standard Model.
IACR Cryptol. ePrint Arch., 2021

Generic Plaintext Equality and Inequality Proofs (Extended Version).
IACR Cryptol. ePrint Arch., 2021

Generic Construction for Identity-Based Proxy Blind Signature.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021

Generic Plaintext Equality and Inequality Proofs.
Proceedings of the Financial Cryptography and Data Security, 2021

How to (Legally) Keep Secrets from Mobile Operators.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
A faster cryptographer's Conspiracy Santa.
Theor. Comput. Sci., 2020

Designing Reverse Firewalls for the Real World.
IACR Cryptol. ePrint Arch., 2020

Unlinkable and Invisible γ-Sanitizable Signatures.
IACR Cryptol. ePrint Arch., 2020

Legally keeping secrets from mobile operators: Lawful Interception Key Exchange (LIKE).
IACR Cryptol. ePrint Arch., 2020

2019
The privacy of the TLS 1.3 protocol.
Proc. Priv. Enhancing Technol., 2019

Secure Trick-Taking Game Protocols: How to Play Online Spades with Cheaters.
IACR Cryptol. ePrint Arch., 2019

Efficient Invisible and Unlinkable Sanitizable Signatures.
IACR Cryptol. ePrint Arch., 2019

SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting.
IACR Cryptol. ePrint Arch., 2019

2018
Delegation mechanisms for public key cryptographic primitives. (Mécanismes de délégation pour les primitives de cryptographie à clé publique).
PhD thesis, 2018

Physical Zero-Knowledge Proof for Makaro.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2018

Security analysis and psychological study of authentication methods with PIN codes.
Proceedings of the 12th International Conference on Research Challenges in Information Science, 2018

A Cryptographer's Conspiracy Santa.
Proceedings of the 9th International Conference on Fun with Algorithms, 2018

Secure Joins with MapReduce.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

2017
Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures.
IACR Cryptol. ePrint Arch., 2017

Zero-Knowledge Proxy Re-Identification Revisited.
IACR Cryptol. ePrint Arch., 2017

Verifiable Private Polynomial Evaluation.
IACR Cryptol. ePrint Arch., 2017

A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol.
IACR Cryptol. ePrint Arch., 2017

How to explain modern security concepts to your children.
Cryptologia, 2017

Secure Matrix Multiplication with MapReduce.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Two Secure Anonymous Proxy-based Data Storages.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

A Posteriori Openable Public Key Encryption.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Physical Zero-Knowledge Proofs for Akari, Takuzu, Kakuro and KenKen.
Proceedings of the 8th International Conference on Fun with Algorithms, 2016

Anonymizable Ring Signature Without Pairing.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

k-Times Full Traceable Ring Signature.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016


  Loading...