Aisling Connolly

Orcid: 0000-0002-7485-387X

Affiliations:
  • Ingenico Group, Paris, France
  • Université Paris Sciences et Lettres (PSL), DIENS, France


According to our database1, Aisling Connolly authored at least 16 papers between 2016 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
vetKeys: How a Blockchain Can Keep Many Secrets.
IACR Cryptol. ePrint Arch., 2023

2022
Protego: A Credential Scheme for Permissioned Blockchains (Extended Version).
IACR Cryptol. ePrint Arch., 2022

Protego: Efficient, Revocable and Auditable Anonymous Credentials with Applications to Hyperledger Fabric.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

2021
Improved Constructions of Anonymous Credentials From Structure-Preserving Signatures on Equivalence Classes.
IACR Cryptol. ePrint Arch., 2021

2020
Optimal Covid-19 Pool Testing with a priori Information.
CoRR, 2020

2019
Try Again. Fail Again. Fail Better : New notions of security, broken assumptions, and increased efficiency in cryptography. (Essaie encore. Echoue encore. Echoue mieux : Nouvelles notions de sécurité, d'hypothèses brisées et d'efficacité accrue de la cryptographie).
PhD thesis, 2019

Security of Symmetric Primitives against Key-Correlated Attacks.
IACR Cryptol. ePrint Arch., 2019

2018
Freedom of Encryption.
IEEE Secur. Priv., 2018

Reusing Nonces in Schnorr Signatures.
IACR Cryptol. ePrint Arch., 2018

From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions.
CoRR, 2018

2017
On the Hardness of the Mersenne Low Hamming Ratio Assumption.
IACR Cryptol. ePrint Arch., 2017

Reusing Nonces in Schnorr Signatures - (and Keeping It Secure...).
Proceedings of the Computer Security - ESORICS 2017, 2017

The Case for System Command Encryption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
White-Box Cryptography: Security in an Insecure Environment.
IEEE Secur. Priv., 2016

Cdoe Obofsucaitn: Securing Software from Within.
IEEE Secur. Priv., 2016

Fully Homomorphic Encryption: Computations with a Blindfold.
IEEE Secur. Priv., 2016


  Loading...