Public-key cryptosystems based on composite degree residuosity classes P Paillier Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999 | 8617 | 1999 |
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ... Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005 | 744 | 2005 |
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ... Journal of cryptology 21, 350-391, 2008 | 425 | 2008 |
Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys C Delerablée, P Paillier, D Pointcheval Pairing-Based Cryptography–Pairing 2007: First International Conference …, 2007 | 367 | 2007 |
Fast homomorphic evaluation of deep discretized neural networks F Bourse, M Minelli, M Minihold, P Paillier Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 294 | 2018 |
On second-order differential power analysis M Joye, P Paillier, B Schoenmakers Cryptographic Hardware and Embedded Systems–CHES 2005: 7th International …, 2005 | 206 | 2005 |
Discrete-log-based signatures may not be equivalent to discrete log P Paillier, D Vergnaud Advances in Cryptology-ASIACRYPT 2005: 11th International Conference on the …, 2005 | 204 | 2005 |
Efficient public-key cryptosystems provably secure against active adversaries P Paillier, D Pointcheval Advances in Cryptology-ASIACRYPT’99: International Conference on the Theory …, 1999 | 197 | 1999 |
Stream ciphers: A practical solution for efficient homomorphic-ciphertext compression A Canteaut, S Carpov, C Fontaine, T Lepoint, M Naya-Plasencia, ... Journal of Cryptology 31, 885-916, 2018 | 186 | 2018 |
Efficient generation of prime numbers M Joye, P Paillier, S Vaudenay Cryptographic Hardware and Embedded Systems—CHES 2000: Second International …, 2000 | 118 | 2000 |
Smart card crypto-coprocessors for public-key cryptography H Handschuh, P Paillier Smart Card Research and Applications: Third International Conference, CARDIS …, 2000 | 111 | 2000 |
Universal padding schemes for RSA JS Coron, M Joye, D Naccache, P Paillier Advances in Cryptology—CRYPTO 2002: 22nd Annual International Cryptology …, 2002 | 102 | 2002 |
Public-key cryptosystem based on discrete logarithm residues P Paillier EUROCRYPT 1999, 1999 | 101 | 1999 |
Decryptable searchable encryption T Fuhr, P Paillier Provable Security: First International Conference, ProvSec 2007, Wollongong …, 2007 | 99 | 2007 |
Probing attacks on tamper-resistant devices H Handschuh, P Paillier, J Stern Cryptographic Hardware and Embedded Systems: First InternationalWorkshop …, 1999 | 82 | 1999 |
Trapdooring discrete logarithms on elliptic curves over rings P Paillier Advances in Cryptology—ASIACRYPT 2000: 6th International Conference on the …, 2000 | 81 | 2000 |
GEM: A generic chosen-ciphertext secure encryption method JS Coron, H Handschuh, M Joye, P Paillier, D Pointcheval, C Tymen CT-RSA 2271, 263-276, 2002 | 80 | 2002 |
White-box security notions for symmetric encryption schemes C Delerablée, T Lepoint, P Paillier, M Rivain Selected Areas in Cryptography--SAC 2013: 20th International Conference …, 2014 | 79 | 2014 |
Programmable bootstrapping enables efficient homomorphic inference of deep neural networks I Chillotti, M Joye, P Paillier Cyber Security Cryptography and Machine Learning: 5th International …, 2021 | 77 | 2021 |
Extended-precision accumulation of multiplier output M Stribaek, P Paillier US Patent 7,181,484, 2007 | 73 | 2007 |