# Emmanuel Bresson

According to our database

Collaborative distances:

^{1}, Emmanuel Bresson authored at least 32 papers between 2001 and 2013.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Dataset Other## Links

#### On csauthors.net:

## Bibliography

2013

Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results.

Int. J. Inf. Sec., 2013

2011

Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011

2009

Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers.

IACR Cryptol. ePrint Arch., 2009

Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008

Securing group key exchange against strong corruptions and key registration attacks.

Int. J. Appl. Cryptogr., 2008

IET Inf. Secur., 2008

How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions.

Proceedings of the Provable Security, Second International Conference, 2008

Proceedings of the Topics in Cryptology, 2008

Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007

ACM Trans. Inf. Syst. Secur., 2007

A security solution for IEEE 802.11's ad hoc mode: password-authentication and group DiffieHellman key exchange.

Int. J. Wirel. Mob. Comput., 2007

Strong password-based authentication in TLS using the three-party group Diffie?Hellman protocol.

Int. J. Secur. Networks, 2007

Proceedings of the Public Key Cryptography, 2007

A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness.

Proceedings of the Advances in Cryptology, 2007

Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.

Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006

SIGMETRICS Perform. Evaluation Rev., 2006

IACR Cryptol. ePrint Arch., 2006

Proceedings of the Public Key Cryptography, 2006

Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2004

Comput. Commun., 2004

Proceedings of the Public Key Cryptography, 2004

Proceedings of the Public Key Cryptography, 2004

2003

A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications.

Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

2002

IACR Cryptol. ePrint Arch., 2002

Proceedings of the Selected Areas in Cryptography, 2002

Proceedings of the Information Security, 5th International Conference, 2002

Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

Proceedings of the Advances in Cryptology, 2002

Proceedings of the Advances in Cryptology, 2002

2001

Proceedings of the Public Key Cryptography, 2001

Proceedings of the CCS 2001, 2001

Proceedings of the Advances in Cryptology, 2001