Bandwidth-efficient threshold EC-DSA G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker IACR International Conference on Public-Key Cryptography, 266-296, 2020 | 100 | 2020 |
Two-party ECDSA from hash proof systems and efficient instantiations G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 92 | 2019 |
Practical Fully Secure Unrestricted Inner Product Functional Encryption Modulo p G Castagnos, F Laguillaumie, I Tucker International Conference on the Theory and Application of Cryptology and …, 2018 | 67 | 2018 |
Bandwidth-efficient threshold EC-DSA revisited: Online/offline extensions, identifiable aborts proactive and adaptive security G Castagnos, D Catalano, F Laguillaumie, F Savasta, I Tucker Theoretical Computer Science 939, 78-104, 2023 | 25 | 2023 |
Additive-homomorphic functional commitments and applications to homomorphic signatures D Catalano, D Fiore, I Tucker International Conference on the Theory and Application of Cryptology and …, 2022 | 20 | 2022 |
Threshold Linearly Homomorphic Encryption on G Castagnos, F Laguillaumie, I Tucker International Conference on the Theory and Application of Cryptology and …, 2022 | 14 | 2022 |
Functional encryption and distributed signatures based on projective hash functions, the benefit of class groups I Tucker Université de Lyon, 2020 | 5 | 2020 |
Efficient zero-knowledge proofs on signed data with applications to verifiable computation on data streams D Fiore, I Tucker Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 4 | 2022 |
Ring signatures with user-controlled linkability D Fiore, L Garms, D Kolonelos, C Soriente, I Tucker European Symposium on Research in Computer Security, 405-426, 2022 | 4 | 2022 |
A tighter proof for CCA secure inner product functional encryption: Genericity meets efficiency G Castagnos, F Laguillaumie, I Tucker Theoretical Computer Science 914, 84-113, 2022 | 2 | 2022 |
Hardware security without secure hardware: How to decrypt with a password and a server O Blazy, L Brouilhet, C Chevalier, P Towa, I Tucker, D Vergnaud Theoretical Computer Science 895, 178-211, 2021 | 2 | 2021 |
An Improved Threshold Homomorphic Cryptosystem Based on Class Groups L Braun, G Castagnos, I Damgård, F Laguillaumie, K Melissaris, C Orlandi, ... International Conference on Security and Cryptography for Networks, 24-46, 2024 | 1 | 2024 |
Chiffrement fonctionnel et signatures distribuées fondés sur des fonctions de hachage à projection, l'apport des groupes de classe| Theses. fr I Tucker Lyon, 2020 | 1 | 2020 |