Public-key cryptosystems based on composite degree residuosity classes P Paillier International conference on the theory and applications of cryptographic …, 1999 | 7928 | 1999 |
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ... Annual international cryptology conference, 205-222, 2005 | 731 | 2005 |
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ... Journal of cryptology 21 (3), 350-391, 2008 | 417 | 2008 |
Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys C Delerablée, P Paillier, D Pointcheval International Conference on Pairing-Based Cryptography, 39-59, 2007 | 366 | 2007 |
Fast homomorphic evaluation of deep discretized neural networks F Bourse, M Minelli, M Minihold, P Paillier Annual International Cryptology Conference, 483-512, 2018 | 241 | 2018 |
On second-order differential power analysis M Joye, P Paillier, B Schoenmakers International workshop on cryptographic hardware and embedded systems, 293-308, 2005 | 199 | 2005 |
Discrete-log-based signatures may not be equivalent to discrete log P Paillier, D Vergnaud International Conference on the Theory and Application of Cryptology and …, 2005 | 192 | 2005 |
Efficient public-key cryptosystems provably secure against active adversaries P Paillier, D Pointcheval International conference on the theory and application of cryptology and …, 1999 | 187 | 1999 |
Stream ciphers: A practical solution for efficient homomorphic-ciphertext compression A Canteaut, S Carpov, C Fontaine, T Lepoint, M Naya-Plasencia, ... Journal of Cryptology 31 (3), 885-916, 2018 | 166 | 2018 |
Efficient generation of prime numbers M Joye, P Paillier, S Vaudenay International Workshop on Cryptographic Hardware and Embedded Systems, 340-354, 2000 | 110 | 2000 |
Smart card crypto-coprocessors for public-key cryptography H Handschuh, P Paillier International Conference on Smart Card Research and Advanced Applications …, 1998 | 108 | 1998 |
Universal padding schemes for RSA JS Coron, M Joye, D Naccache, P Paillier Annual International Cryptology Conference, 226-241, 2002 | 96 | 2002 |
Public-key cryptosystem based on discrete logarithm residues P Paillier EUROCRYPT 1999, 1999 | 96 | 1999 |
Decryptable searchable encryption T Fuhr, P Paillier International Conference on Provable Security, 228-236, 2007 | 90 | 2007 |
Probing attacks on tamper-resistant devices H Handschuh, P Paillier, J Stern International Workshop on Cryptographic Hardware and Embedded Systems, 303-315, 1999 | 82 | 1999 |
Trapdooring discrete logarithms on elliptic curves over rings P Paillier International Conference on the Theory and Application of Cryptology and …, 2000 | 80 | 2000 |
White-box security notions for symmetric encryption schemes C Delerablée, T Lepoint, P Paillier, M Rivain International Conference on Selected Areas in Cryptography, 247-264, 2013 | 74 | 2013 |
GEM: A Generic Chosen-Ciphertext Secure Encryption Method C Jean-Sébastien, H Handschuh, M Joye, P Paillier, D Pointcheval, ... Cryptographers’ Track at the RSA Conference, 263-276, 2002 | 74 | 2002 |
Extended-precision accumulation of multiplier output M Stribaek, P Paillier US Patent 7,181,484, 2007 | 72 | 2007 |
Fault analysis of GRAIN-128 A Berzati, C Canovas, G Castagnos, B Debraize, L Goubin, A Gouget, ... 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, 7-14, 2009 | 59 | 2009 |