Olivier Blazy
Olivier Blazy
Verified email at unilim.fr - Homepage
Title
Cited by
Cited by
Year
New techniques for SPHFs and efficient one-round PAKE protocols
F Benhamouda, O Blazy, C Chevalier, D Pointcheval, D Vergnaud
Annual Cryptology Conference, 449-475, 2013
942013
Signatures on randomizable ciphertexts
O Blazy, G Fuchsbauer, D Pointcheval, D Vergnaud
Public Key Cryptography–PKC 2011, 403-422, 2011
672011
Batch groth–sahai
O Blazy, G Fuchsbauer, M Izabachene, A Jambert, H Sibert, D Vergnaud
International Conference on Applied Cryptography and Network Security, 218-235, 2010
622010
SPHF-friendly non-interactive commitments
M Abdalla, F Benhamouda, O Blazy, C Chevalier, D Pointcheval
International Conference on the Theory and Application of Cryptology and …, 2013
542013
Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions
O Blazy, D Pointcheval, D Vergnaud
TCC 2012, 2012
422012
Achieving optimal anonymity in transferable e-cash with a judge
O Blazy, S Canard, G Fuchsbauer, A Gouget, H Sibert, J Traoré
International Conference on Cryptology in Africa, 206-223, 2011
422011
Tightly-secure signatures from chameleon hash functions
O Blazy, SA Kakvi, E Kiltz, J Pan
IACR International Workshop on Public Key Cryptography, 256-279, 2015
412015
(Hierarchical) identity-based encryption from affine message authentication
O Blazy, E Kiltz, J Pan
Annual Cryptology Conference, 408-425, 2014
372014
Efficient UC-secure authenticated key-exchange for algebraic languages
FB Hamouda, O Blazy, C Chevalier, D Pointcheval, D Vergnaud
International Workshop on Public Key Cryptography, 272-291, 2013
332013
Efficient encryption from random quasi-cyclic codes
C Aguilar-Melchor, O Blazy, JC Deneuville, P Gaborit, G Zémor
IEEE Transactions on Information Theory 64 (5), 3927-3943, 2018
302018
Analysis and improvement of Lindell’s UC-secure commitment schemes
O Blazy, C Chevalier, D Pointcheval, D Vergnaud
International Conference on Applied Cryptography and Network Security, 534-551, 2013
302013
BIKE: bit flipping key encapsulation
N Aragon, P Barreto, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ...
272017
Efficient encryption from random quasi-cyclic codes
C Aguilar, O Blazy, JC Deneuville, P Gaborit, G Zémor
arXiv preprint arXiv:1612.05572, 2016
212016
A code-based group signature scheme
Q Alamélou, O Blazy, S Cauchie, P Gaborit
Designs, Codes and Cryptography 82 (1-2), 469-493, 2017
182017
Structure-preserving smooth projective hashing
O Blazy, C Chevalier
International Conference on the Theory and Application of Cryptology and …, 2016
162016
New smooth projective hash functions and one-round authenticated key exchange
F Benhamouda, O Blazy, C Chevalier, D Pointcheval, D Vergnaud
Cryptology ePrint Archive, Report 2013/034, 2013. http://eprint. iacr. org …, 2013
152013
Hash proof systems over lattices revisited
F Benhamouda, O Blazy, L Ducas, W Quach
IACR International Workshop on Public Key Cryptography, 644-674, 2018
14*2018
BIKE: bit flipping key encapsulation (2017)
N Aragon, P Barreto, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ...
NIST Post-Quantum Cryptography Project: First Round Candidate Algorithms …, 2018
142018
Rank Quasi-Cyclic (RQC)
CA Melchor, N Aragon, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ...
142017
Short blind signatures
O Blazy, G Fuchsbauer, D Pointcheval, D Vergnaud
Journal of computer security 21 (5), 627-661, 2013
132013
The system can't perform the operation now. Try again later.
Articles 1–20