Jacques Traoré

According to our database1, Jacques Traoré authored at least 60 papers between 1997 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Efficient Issuer-Hiding Authentication, Application to Anonymous Credential.
IACR Cryptol. ePrint Arch., 2023

Towards Scalable Resilient Federated Learning: A Fully Decentralised Approach.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2023

2022
ICRP: Internet-Friendly Cryptographic Relay-Detection Protocol.
Cryptogr., 2022

2021
Post-quantum Online Voting Scheme.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

How Distance-Bounding Can Detect Internet Traffic Hijacking.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

Pass-As-You-Go: A Direct Anonymous Attestation-Based Untraceable Contactless Transit Pass.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
EPID with Malicious Revocation.
IACR Cryptol. ePrint Arch., 2020

Lattice-based (Partially) Blind Signature without Restart.
IACR Cryptol. ePrint Arch., 2020

Constant-Size Lattice-Based Group Signature with Forward Security in the Standard Model.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020

How colored passwords can improve the usability of coercion-resistant internet voting systems.
Proceedings of the IHC '20: XIX Brazilian Symposium on Human Factors in Computing Systems, 2020

CoRA: A Scalable Collective Remote Attestation Protocol for Sensor Networks.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2019
Improved Secure Integer Comparison via Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2019

Practical Anonymous Attestation-based Pseudonym Schemes for Vehicular Networks.
Proceedings of the 2019 IEEE Vehicular Networking Conference, 2019

2018
Practical Strategy-Resistant Privacy-Preserving Elections.
IACR Cryptol. ePrint Arch., 2018

Questioning the security and efficiency of the ESIoT approach.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Usability Considerations For Coercion-Resistant Election Systems.
Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems, 2018

Privacy-Preserving Plaintext-Equality of Low-Entropy Inputs.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
Cryptanalysis of GlobalPlatform Secure Channel Protocols.
IACR Cryptol. ePrint Arch., 2017

Anonymous attestations made practical.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Designing and Proving an EMV-Compliant Payment Protocol for Mobile Devices.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

2016
Divisible e-cash made practical.
IET Inf. Secur., 2016

Breaking Into the KeyStore: A Practical Forgery Attack Against Android KeyStore.
IACR Cryptol. ePrint Arch., 2016

M2M Security: Challenges and Solutions.
IEEE Commun. Surv. Tutorials, 2016

Improved Algebraic MACs and Practical Keyed-Verification Anonymous Credentials.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Private eCash in Practice (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

Remote Electronic Voting Can Be Efficient, Verifiable and Coercion-Resistant.
Proceedings of the Financial Cryptography and Data Security, 2016

2015
A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing.
Proc. Priv. Enhancing Technol., 2015

Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash.
IACR Cryptol. ePrint Arch., 2015

Scalable Divisible E-cash.
IACR Cryptol. ePrint Arch., 2015

Practical and Privacy-Preserving TEE Migration.
Proceedings of the Information Security Theory and Practice, 2015

2014
Trusted Execution Environments: A Look under the Hood.
Proceedings of the 2nd IEEE International Conference on Mobile Cloud Computing, 2014

Direct Anonymous Attestations with Dependent Basename Opening.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

2013
A Practical Coercion Resistant Voting Scheme Revisited.
Proceedings of the E-Voting and Identify - 4th International Conference, 2013

New Results for the Practical Use of Range Proofs.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013

2012
On the Implementation of a Pairing-Based Cryptographic Protocol in a Constrained Device.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

2011
Multi-show Anonymous Credentials with Encrypted Attributes in the Standard Model.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

Achieving Optimal Anonymity in Transferable E-Cash with a Judge.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011

2010
On Some Incompatible Properties of Voting Schemes.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

A Practical and Secure Coercion-Resistant Scheme for Internet Voting.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

Towards Practical and Secure Coercion-Resistant Electronic Elections.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

2009
Fair E-Cash: Be Compact, Spend Faster.
Proceedings of the Information Security, 12th International Conference, 2009

2008
Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

Improvement of Efficiency in (Unconditional) Anonymous Transferable E-Cash.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Identity federation and privacy: one step beyond.
Proceedings of the 4th Workshop on Digital Identity Management, 2008

2007
Threat Analysis of a Practical Voting Scheme with Receipts.
Proceedings of the E-Voting and Identity, First International Conference, 2007

Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use.
Proceedings of the Provable Security, 2007

Fair Blind Signatures Revisited.
Proceedings of the Pairing-Based Cryptography, 2007

A practical and secure coercion-resistant scheme for remote elections.
Proceedings of the Frontiers of Electronic Voting, 29.07. - 03.08.2007, 2007

2006
List signature schemes.
Discret. Appl. Math., 2006

Defeating Malicious Servers in a Blind Signatures Based Voting System.
Proceedings of the Financial Cryptography and Data Security, 2006

2004
Universal forgery on Sekhar's signature scheme with message recovery.
Int. J. Comput. Math., 2004

Anonymous Services using Smart Cards and Cryptography.
Proceedings of the Smart Card Research and Advanced Applications VI, 2004

2003
On the Anonymity of Fair Offline E-cash Systems.
Proceedings of the Financial Cryptography, 2003

On Fair E-cash Systems Based on Group Signature Schemes.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2001
A fair and efficient solution to the socialist millionaires' problem.
Discret. Appl. Math., 2001

2000
An Online Public Auction Protocol Protecting Bidder Privacy.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed Recovery.
Proceedings of the Information and Communication Security, Second International Conference, 1999

Group Signatures and Their Relevance to Privacy-Protecting Off-Line Electronic Cash Systems.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1998
An Efficient Fair Off-Line Electronic Cash System with Extensions to Checks and Wallets with Observers.
Proceedings of the Financial Cryptography, 1998

1997
Making unfair a "fair" blind signature scheme.
Proceedings of the Information and Communication Security, First International Conference, 1997


  Loading...