Olivier Blazy
Orcid: 0000-0001-6205-8249
According to our database1,
Olivier Blazy
authored at least 74 papers
between 2010 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
Quantum-resistant secret handshakes with dynamic joining, leaving, and banishment: GCD revisited.
IACR Cryptol. ePrint Arch., 2025
Proceedings of the Progress in Cryptology - AFRICACRYPT 2025, 2025
2024
A Public Key Identity-Based Revocation Scheme: - Fully Attribute-Hiding and Function Private.
Proceedings of the Topics in Cryptology - CT-RSA 2024, 2024
Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2024, 2024
2023
J. Ambient Intell. Humaniz. Comput., October, 2023
How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment.
Proceedings of the 32nd USENIX Security Symposium, 2023
Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
IEEE Trans. Inf. Theory, 2022
Post-Quantum Oblivious Transfer from Smooth Projective Hash Functions with Grey Zone.
CoRR, 2022
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022
Proceedings of the Cryptology and Network Security - 21st International Conference, 2022
Proceedings of the Progress in Cryptology, 2022
2021
Hardware security without secure hardware: How to decrypt with a password and a server.
Theor. Comput. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IEEE Access, 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the Code-Based Cryptography - 9th International Workshop, 2021
Proceedings of the Code-Based Cryptography - 9th International Workshop, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
New efficient M2C and M2M mutual authentication protocols for IoT-based healthcare applications.
Peer-to-Peer Netw. Appl., 2020
Legally keeping secrets from mobile operators: Lawful Interception Key Exchange (LIKE).
IACR Cryptol. ePrint Arch., 2020
Des. Codes Cryptogr., 2020
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019
Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Arithmetic of Finite Fields - 6th International Workshop, 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016
Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
Proceedings of the Topics in Cryptology, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
2012
Preuves de connaissances interactives et non-interactives. ((Non-)Interactive Proofs of Knowledge).
PhD thesis, 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011
2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010