<?xml version="1.0"?>
<dblpperson name="Pascal Paillier" pid="32/167" n="70">
<person key="homepages/32/167" mdate="2009-06-08">
<author pid="32/167">Pascal Paillier</author>
</person>
<r><article key="journals/tches/BergeratBCOPT25" mdate="2025-10-14">
<author pid="322/3493">Loris Bergerat</author>
<author pid="200/2066">Charlotte Bonte</author>
<author orcid="0009-0005-6377-0234" pid="208/8539">Benjamin R. Curtis</author>
<author pid="154/6414">Jean-Baptiste Orfila</author>
<author pid="32/167">Pascal Paillier</author>
<author pid="294/0685">Samuel Tap</author>
<title>Sharing the Mask: TFHE Bootstrapping on Packed Messages.</title>
<pages>925-971</pages>
<year>2025</year>
<volume>2025</volume>
<journal>IACR Trans. Cryptogr. Hardw. Embed. Syst.</journal>
<number>4</number>
<ee>https://doi.org/10.46586/tches.v2025.i4.925-971</ee>
<url>db/journals/tches/tches2025.html#BergeratBCOPT25</url>
<stream>streams/journals/tches</stream>
</article>
</r>
<r><inproceedings key="conf/crypto/BaudrinBBBCLPPRRT25" mdate="2026-01-07">
<author pid="337/2519">Jules Baudrin</author>
<author pid="130/9405">Sonia Bela&#239;d</author>
<author pid="136/3332-1">Nicolas Bon 0001</author>
<author pid="02/9245">Christina Boura</author>
<author pid="56/3453">Anne Canteaut</author>
<author pid="30/1133">Ga&#235;tan Leurent</author>
<author pid="32/167">Pascal Paillier</author>
<author pid="145/1633">L&#233;o Perrin</author>
<author pid="33/2627">Matthieu Rivain</author>
<author pid="178/5237">Yann Rotella</author>
<author pid="294/0685">Samuel Tap</author>
<title>Transistor: a TFHE-Friendly Stream Cipher.</title>
<pages>530-565</pages>
<year>2025</year>
<booktitle>CRYPTO (5)</booktitle>
<ee>https://doi.org/10.1007/978-3-032-01901-1_17</ee>
<crossref>conf/crypto/2025-5</crossref>
<url>db/conf/crypto/crypto2025-5.html#BaudrinBBBCLPPRRT25</url>
<stream>streams/conf/crypto</stream>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/BaudrinBBBCLPPRRT25" mdate="2026-01-07">
<author pid="337/2519">Jules Baudrin</author>
<author pid="130/9405">Sonia Bela&#239;d</author>
<author pid="136/3332-1">Nicolas Bon 0001</author>
<author pid="02/9245">Christina Boura</author>
<author pid="56/3453">Anne Canteaut</author>
<author pid="30/1133">Ga&#235;tan Leurent</author>
<author pid="32/167">Pascal Paillier</author>
<author pid="145/1633">L&#233;o Perrin</author>
<author pid="33/2627">Matthieu Rivain</author>
<author pid="178/5237">Yann Rotella</author>
<author pid="294/0685">Samuel Tap</author>
<title>Transistor: a TFHE-friendly Stream Cipher.</title>
<pages>282</pages>
<year>2025</year>
<volume>2025</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2025/282</ee>
<url>db/journals/iacr/iacr2025.html#BaudrinBBBCLPPRRT25</url>
<stream>streams/journals/iacr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BergeratBCOPT25" mdate="2026-01-01">
<author pid="322/3493">Loris Bergerat</author>
<author pid="200/2066">Charlotte Bonte</author>
<author pid="208/8539">Benjamin R. Curtis</author>
<author pid="154/6414">Jean-Baptiste Orfila</author>
<author pid="32/167">Pascal Paillier</author>
<author pid="294/0685">Samuel Tap</author>
<title>Sharing the Mask: TFHE bootstrapping on Packed Messages.</title>
<pages>2112</pages>
<year>2025</year>
<volume>2025</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2025/2112</ee>
<url>db/journals/iacr/iacr2025.html#BergeratBCOPT25</url>
<stream>streams/journals/iacr</stream>
</article>
</r>
<r><proceedings key="conf/cscml/2023" mdate="2023-06-29">
<editor orcid="0000-0001-5418-6670" pid="d/ShlomiDolev">Shlomi Dolev</editor>
<editor orcid="0000-0003-0687-086X" pid="g/EhudGudes">Ehud Gudes</editor>
<editor pid="32/167">Pascal Paillier</editor>
<title>Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings</title>
<booktitle>CSCML</booktitle>
<publisher>Springer</publisher>
<year>2023</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>13914</volume>
<isbn>978-3-031-34670-5</isbn>
<isbn>978-3-031-34671-2</isbn>
<ee>https://doi.org/10.1007/978-3-031-34671-2</ee>
<url>db/conf/cscml/cscml2023.html</url>
</proceedings>
</r>
<r><inproceedings key="conf/cscml/JoyeP22" mdate="2022-06-24">
<author pid="j/MarcJoye">Marc Joye</author>
<author pid="32/167">Pascal Paillier</author>
<title>Blind Rotation in Fully Homomorphic Encryption with Extended Keys.</title>
<pages>1-18</pages>
<year>2022</year>
<booktitle>CSCML</booktitle>
<ee>https://doi.org/10.1007/978-3-031-07689-3_1</ee>
<crossref>conf/cscml/2022</crossref>
<url>db/conf/cscml/cscml2022.html#JoyeP22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cscml/ChillottiJP21" mdate="2021-07-13">
<author pid="175/5881">Ilaria Chillotti</author>
<author pid="j/MarcJoye">Marc Joye</author>
<author pid="32/167">Pascal Paillier</author>
<title>Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks.</title>
<pages>1-19</pages>
<year>2021</year>
<booktitle>CSCML</booktitle>
<ee>https://doi.org/10.1007/978-3-030-78086-9_1</ee>
<crossref>conf/cscml/2021</crossref>
<url>db/conf/cscml/cscml2021.html#ChillottiJP21</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/ChillottiJP21" mdate="2021-02-02">
<author pid="175/5881">Ilaria Chillotti</author>
<author pid="j/MarcJoye">Marc Joye</author>
<author pid="32/167">Pascal Paillier</author>
<title>Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks.</title>
<pages>91</pages>
<year>2021</year>
<volume>2021</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2021/091</ee>
<url>db/journals/iacr/iacr2021.html#ChillottiJP21</url>
</article>
</r>
<r><article key="journals/jce/GoubinPRW20" mdate="2020-07-09">
<author pid="64/5615">Louis Goubin</author>
<author pid="32/167">Pascal Paillier</author>
<author pid="33/2627">Matthieu Rivain</author>
<author orcid="0000-0002-8478-5065" pid="81/4816-3">Junwei Wang 0003</author>
<title>How to reveal the secrets of an obscure white-box implementation.</title>
<pages>49-66</pages>
<year>2020</year>
<volume>10</volume>
<journal>J. Cryptogr. Eng.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s13389-019-00207-5</ee>
<url>db/journals/jce/jce10.html#GoubinPRW20</url>
</article>
</r>
<r><article key="journals/joc/CanteautCFLNPS18" mdate="2023-08-28">
<author pid="56/3453">Anne Canteaut</author>
<author orcid="0000-0003-1724-1591" pid="57/8724">Sergiu Carpov</author>
<author pid="22/2665">Caroline Fontaine</author>
<author pid="08/11136">Tancr&#232;de Lepoint</author>
<author pid="24/1241">Mar&#237;a Naya-Plasencia</author>
<author pid="32/167">Pascal Paillier</author>
<author orcid="0000-0003-4720-9269" pid="43/138">Renaud Sirdey</author>
<title>Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression.</title>
<pages>885-916</pages>
<year>2018</year>
<volume>31</volume>
<journal>J. Cryptol.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s00145-017-9273-9</ee>
<ee>https://www.wikidata.org/entity/Q121656641</ee>
<url>db/journals/joc/joc31.html#CanteautCFLNPS18</url>
</article>
</r>
<r><inproceedings key="conf/crypto/BourseMMP18" mdate="2018-08-13">
<author pid="134/0544">Florian Bourse</author>
<author pid="179/6839">Michele Minelli</author>
<author pid="216/6261">Matthias Minihold</author>
<author pid="32/167">Pascal Paillier</author>
<title>Fast Homomorphic Evaluation of Deep Discretized Neural Networks.</title>
<pages>483-512</pages>
<year>2018</year>
<booktitle>CRYPTO (3)</booktitle>
<ee>https://doi.org/10.1007/978-3-319-96878-0_17</ee>
<crossref>conf/crypto/2018-3</crossref>
<url>db/conf/crypto/crypto2018-3.html#BourseMMP18</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/GoubinPRW18" mdate="2020-05-11">
<author pid="64/5615">Louis Goubin</author>
<author pid="32/167">Pascal Paillier</author>
<author pid="33/2627">Matthieu Rivain</author>
<author pid="81/4816-3">Junwei Wang 0003</author>
<title>How to Reveal the Secrets of an Obscure White-Box Implementation.</title>
<pages>98</pages>
<year>2018</year>
<volume>2018</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2018/098</ee>
<url>db/journals/iacr/iacr2018.html#GoubinPRW18</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BourseMMP17" mdate="2020-05-11">
<author pid="134/0544">Florian Bourse</author>
<author pid="179/6839">Michele Minelli</author>
<author pid="216/6261">Matthias Minihold</author>
<author pid="32/167">Pascal Paillier</author>
<title>Fast Homomorphic Evaluation of Deep Discretized Neural Networks.</title>
<pages>1114</pages>
<year>2017</year>
<volume>2017</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2017/1114</ee>
<url>db/journals/iacr/iacr2017.html#BourseMMP17</url>
</article>
</r>
<r><inproceedings key="conf/fse/CanteautCFLNPS16" mdate="2020-10-25">
<author pid="56/3453">Anne Canteaut</author>
<author orcid="0000-0003-1724-1591" pid="57/8724">Sergiu Carpov</author>
<author pid="22/2665">Caroline Fontaine</author>
<author orcid="0000-0003-3796-042X" pid="08/11136">Tancr&#232;de Lepoint</author>
<author pid="24/1241">Mar&#237;a Naya-Plasencia</author>
<author pid="32/167">Pascal Paillier</author>
<author orcid="0000-0003-4720-9269" pid="43/138">Renaud Sirdey</author>
<title>Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression.</title>
<pages>313-333</pages>
<year>2016</year>
<booktitle>FSE</booktitle>
<ee>https://doi.org/10.1007/978-3-662-52993-5_16</ee>
<crossref>conf/fse/2016</crossref>
<url>db/conf/fse/fse2016.html#CanteautCFLNPS16</url>
</inproceedings>
</r>
<r><incollection key="books/daglib/p/MikkelsenDGJGNPPSSZ15" mdate="2025-03-03">
<author pid="77/2323">Gert L&#230;ss&#248;e Mikkelsen</author>
<author pid="170/3696">Kasper Damg&#229;rd</author>
<author pid="196/1469">Hans Guldager</author>
<author pid="196/1474">Jonas Lindstr&#248;m Jensen</author>
<author pid="07/1919">Jesus Luna Garcia</author>
<author pid="79/122">Janus Dam Nielsen</author>
<author pid="32/167">Pascal Paillier</author>
<author orcid="0009-0007-6223-8945" pid="35/9056">Giancarlo Pellegrino</author>
<author pid="90/11345">Michael Bladt Stausholm</author>
<author orcid="0000-0003-1688-1167" pid="s/NeerajSuri">Neeraj Suri</author>
<author pid="55/826-9">Heng Zhang 0009</author>
<title>Technical Implementation and Feasibility.</title>
<pages>255-317</pages>
<year>2015</year>
<booktitle>Attribute-based Credentials for Trust</booktitle>
<ee>https://doi.org/10.1007/978-3-319-14439-9_9</ee>
<crossref>books/daglib/0039026</crossref>
<url>db/books/collections/RCS2015.html#MikkelsenDGJGNPPSSZ15</url>
</incollection>
</r>
<r><article publtype="informal" key="journals/iacr/CanteautCFLNPS15" mdate="2020-05-11">
<author pid="56/3453">Anne Canteaut</author>
<author pid="57/8724">Sergiu Carpov</author>
<author pid="22/2665">Caroline Fontaine</author>
<author pid="08/11136">Tancr&#232;de Lepoint</author>
<author pid="24/1241">Mar&#237;a Naya-Plasencia</author>
<author pid="32/167">Pascal Paillier</author>
<author pid="43/138">Renaud Sirdey</author>
<title>How to Compress Homomorphic Ciphertexts.</title>
<pages>113</pages>
<year>2015</year>
<volume>2015</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2015/113</ee>
<url>db/journals/iacr/iacr2015.html#CanteautCFLNPS15</url>
</article>
</r>
<r><inproceedings key="conf/fc/LepointP13" mdate="2018-11-02">
<author orcid="0000-0003-3796-042X" pid="08/11136">Tancr&#232;de Lepoint</author>
<author pid="32/167">Pascal Paillier</author>
<title>On the Minimal Number of Bootstrappings in Homomorphic Circuits.</title>
<pages>189-200</pages>
<year>2013</year>
<booktitle>Financial Cryptography Workshops</booktitle>
<ee>https://doi.org/10.1007/978-3-642-41320-9_13</ee>
<crossref>conf/fc/2013w</crossref>
<url>db/conf/fc/fc2013w.html#LepointP13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacrypt/DelerableeLPR13" mdate="2018-11-02">
<author pid="23/514">C&#233;cile Delerabl&#233;e</author>
<author orcid="0000-0003-3796-042X" pid="08/11136">Tancr&#232;de Lepoint</author>
<author pid="32/167">Pascal Paillier</author>
<author pid="33/2627">Matthieu Rivain</author>
<title>White-Box Security Notions for Symmetric Encryption Schemes.</title>
<pages>247-264</pages>
<year>2013</year>
<booktitle>Selected Areas in Cryptography</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-662-43414-7_13</ee>
<crossref>conf/sacrypt/2013</crossref>
<url>db/conf/sacrypt/sacrypt2013.html#DelerableeLPR13</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/DelerableeLPR13" mdate="2020-05-11">
<author pid="23/514">C&#233;cile Delerabl&#233;e</author>
<author pid="08/11136">Tancr&#232;de Lepoint</author>
<author pid="32/167">Pascal Paillier</author>
<author pid="33/2627">Matthieu Rivain</author>
<title>White-Box Security Notions for Symmetric Encryption Schemes.</title>
<pages>523</pages>
<year>2013</year>
<volume>2013</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2013/523</ee>
<url>db/journals/iacr/iacr2013.html#DelerableeLPR13</url>
</article>
</r>
<r><inproceedings key="conf/apf/BjonesKPR12" mdate="2017-05-23">
<author pid="35/1504">Ronny Bjones</author>
<author pid="32/1264">Ioannis Krontiris</author>
<author pid="32/167">Pascal Paillier</author>
<author pid="r/KRannenberg">Kai Rannenberg</author>
<title>Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication.</title>
<pages>111-124</pages>
<year>2012</year>
<booktitle>APF</booktitle>
<ee>https://doi.org/10.1007/978-3-642-54069-1_7</ee>
<crossref>conf/apf/2012</crossref>
<url>db/conf/apf/apf2012.html#BjonesKPR12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/birthday/CoronGIP12" mdate="2017-05-23">
<author pid="61/1318">Jean-S&#233;bastien Coron</author>
<author pid="77/2379">Aline Gouget</author>
<author pid="90/2605">Thomas Icart</author>
<author pid="32/167">Pascal Paillier</author>
<title>Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping.</title>
<pages>207-232</pages>
<year>2012</year>
<booktitle>Cryptography and Security</booktitle>
<ee>https://doi.org/10.1007/978-3-642-28368-0_15</ee>
<crossref>conf/birthday/2012quisquater</crossref>
<url>db/conf/birthday/quisquater2012.html#CoronGIP12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pkc/ClavierFTP12" mdate="2018-06-26">
<author pid="75/5410">Christophe Clavier</author>
<author pid="61/4337">Benoit Feix</author>
<author pid="87/11389">Lo&#239;c Thierry</author>
<author pid="32/167">Pascal Paillier</author>
<title>Generating Provable Primes Efficiently on Embedded Devices.</title>
<pages>372-389</pages>
<year>2012</year>
<booktitle>Public Key Cryptography</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-30057-8_22</ee>
<crossref>conf/pkc/2012</crossref>
<url>db/conf/pkc/pkc2012.html#ClavierFTP12</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/CanteautFNPRV12" mdate="2020-05-11">
<author pid="56/3453">Anne Canteaut</author>
<author pid="89/2637-1">Thomas Fuhr 0001</author>
<author pid="24/1241">Mar&#237;a Naya-Plasencia</author>
<author pid="32/167">Pascal Paillier</author>
<author pid="42/3758">Jean-Ren&#233; Reinhard</author>
<author pid="44/1487">Marion Videau</author>
<title>A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions.</title>
<pages>363</pages>
<year>2012</year>
<volume>2012</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2012/363</ee>
<url>db/journals/iacr/iacr2012.html#CanteautFNPRV12</url>
</article>
</r>
<r><incollection publtype="encyclopedia" key="reference/crypt/Paillier11" mdate="2017-07-12">
<author pid="32/167">Pascal Paillier</author>
<title>Paillier Encryption and Signature Schemes.</title>
<pages>902-903</pages>
<year>2011</year>
<booktitle>Encyclopedia of Cryptography and Security (2nd Ed.)</booktitle>
<ee>https://doi.org/10.1007/978-1-4419-5906-5_488</ee>
<crossref>reference/crypt/2011</crossref>
<url>db/reference/crypt/crypt2011.html#Paillier11</url>
</incollection>
</r>
<r><article publtype="informal" key="journals/iacr/CoronGIP11" mdate="2020-05-11">
<author pid="61/1318">Jean-S&#233;bastien Coron</author>
<author pid="77/2379">Aline Gouget</author>
<author pid="90/2605">Thomas Icart</author>
<author pid="32/167">Pascal Paillier</author>
<title>Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping.</title>
<pages>58</pages>
<year>2011</year>
<volume>2011</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2011/058</ee>
<url>db/journals/iacr/iacr2011.html#CoronGIP11</url>
</article>
</r>
<r><inproceedings key="conf/fc/CoronGPV10" mdate="2017-05-26">
<author pid="61/1318">Jean-S&#233;bastien Coron</author>
<author pid="77/2379">Aline Gouget</author>
<author pid="32/167">Pascal Paillier</author>
<author pid="35/4800">Karine Villegas</author>
<title>SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications.</title>
<pages>107-122</pages>
<year>2010</year>
<booktitle>Financial Cryptography Workshops</booktitle>
<ee>https://doi.org/10.1007/978-3-642-14992-4_11</ee>
<crossref>conf/fc/2010w</crossref>
<url>db/conf/fc/fc2010w.html#CoronGPV10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ches/CoronJKNP09" mdate="2018-06-26">
<author pid="61/1318">Jean-S&#233;bastien Coron</author>
<author pid="j/AntoineJoux">Antoine Joux</author>
<author pid="77/4750">Ilya Kizhvatov</author>
<author pid="41/6833">David Naccache</author>
<author pid="32/167">Pascal Paillier</author>
<title>Fault Attacks on RSA Signatures with Partially Unknown Messages.</title>
<pages>444-456</pages>
<year>2009</year>
<booktitle>CHES</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-04138-9_31</ee>
<crossref>conf/ches/2009</crossref>
<url>db/conf/ches/ches2009.html#CoronJKNP09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/host/CastagnosBCDGGPS09" mdate="2023-03-24">
<author pid="42/6955">Guilhem Castagnos</author>
<author pid="66/6816">Alexandre Berzati</author>
<author orcid="0000-0002-9117-5302" pid="07/5955">C&#233;cile Canovas</author>
<author pid="23/1841">Blandine Debraize</author>
<author pid="64/5615">Louis Goubin</author>
<author pid="77/2379">Aline Gouget</author>
<author pid="32/167">Pascal Paillier</author>
<author pid="95/7837">Stephanie Salgado</author>
<title>Fault Analysis of Grain-128.</title>
<pages>7-14</pages>
<year>2009</year>
<booktitle>HOST</booktitle>
<ee>https://doi.org/10.1109/HST.2009.5225030</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/HST.2009.5225030</ee>
<crossref>conf/host/2009</crossref>
<url>db/conf/host/host2009.html#CastagnosBCDGGPS09</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/BressonCCCFGIMNPPRTV09" mdate="2020-05-11">
<author pid="68/2531">Emmanuel Bresson</author>
<author pid="56/3453">Anne Canteaut</author>
<author pid="50/3410">Beno&#238;t Chevallier-Mames</author>
<author pid="75/5410">Christophe Clavier</author>
<author pid="89/2637-1">Thomas Fuhr 0001</author>
<author pid="77/2379">Aline Gouget</author>
<author pid="90/2605">Thomas Icart</author>
<author pid="48/3559">Jean-Fran&#231;ois Misarsky</author>
<author pid="24/1241">Mar&#237;a Naya-Plasencia</author>
<author pid="32/167">Pascal Paillier</author>
<author pid="07/4667">Thomas Pornin</author>
<author pid="42/3758">Jean-Ren&#233; Reinhard</author>
<author pid="40/7561">C&#233;line Thuillet</author>
<author pid="44/1487">Marion Videau</author>
<title>Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers.</title>
<pages>199</pages>
<year>2009</year>
<volume>2009</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2009/199</ee>
<url>db/journals/iacr/iacr2009.html#BressonCCCFGIMNPPRTV09</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/CoronJKNP09" mdate="2020-05-11">
<author pid="61/1318">Jean-S&#233;bastien Coron</author>
<author pid="j/AntoineJoux">Antoine Joux</author>
<author pid="77/4750">Ilya Kizhvatov</author>
<author pid="41/6833">David Naccache</author>
<author pid="32/167">Pascal Paillier</author>
<title>Fault Attacks on RSA Signatures with Partially Unknown Messages.</title>
<pages>309</pages>
<year>2009</year>
<volume>2009</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2009/309</ee>
<url>db/journals/iacr/iacr2009.html#CoronJKNP09</url>
</article>
</r>
<r><article key="journals/joc/AbdallaBCKKLMNPS08" mdate="2020-09-18">
<author orcid="0000-0002-2447-4329" pid="67/2285">Michel Abdalla</author>
<author pid="b/MBellare">Mihir Bellare</author>
<author pid="37/3188">Dario Catalano</author>
<author orcid="0000-0003-1178-048X" pid="k/EikeKiltz">Eike Kiltz</author>
<author pid="k/TadayoshiKohno">Tadayoshi Kohno</author>
<author pid="56/2224">Tanja Lange 0001</author>
<author pid="85/3045">John Malone-Lee</author>
<author pid="30/3210">Gregory Neven</author>
<author pid="32/167">Pascal Paillier</author>
<author pid="80/1652">Haixia Shi</author>
<title>Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.</title>
<pages>350-391</pages>
<year>2008</year>
<volume>21</volume>
<journal>J. Cryptol.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s00145-007-9006-6</ee>
<ee>https://www.wikidata.org/entity/Q59163750</ee>
<url>db/journals/joc/joc21.html#AbdallaBCKKLMNPS08</url>
</article>
</r>
<r><inproceedings key="conf/provsec/BressonCCGPP08" mdate="2017-05-21">
<author pid="68/2531">Emmanuel Bresson</author>
<author pid="50/3410">Beno&#238;t Chevallier-Mames</author>
<author pid="75/5410">Christophe Clavier</author>
<author pid="77/2379">Aline Gouget</author>
<author pid="32/167">Pascal Paillier</author>
<author pid="p/ThomasPeyrin">Thomas Peyrin</author>
<title>How to Use Merkle-Damg&#229;rd - On the Security Relations between Signature Schemes and Their Inner Hash Functions.</title>
<pages>241-253</pages>
<year>2008</year>
<booktitle>ProvSec</booktitle>
<ee>https://doi.org/10.1007/978-3-540-88733-1_17</ee>
<crossref>conf/provsec/2008</crossref>
<url>db/conf/provsec/provsec2008.html#BressonCCGPP08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ctrsa/Paillier07" mdate="2017-05-21">
<author pid="32/167">Pascal Paillier</author>
<title>Impossibility Proofs for RSA Signatures in the Standard Model.</title>
<pages>31-48</pages>
<year>2007</year>
<crossref>conf/ctrsa/2007</crossref>
<booktitle>CT-RSA</booktitle>
<ee>https://doi.org/10.1007/11967668_3</ee>
<url>db/conf/ctrsa/ctrsa2007.html#Paillier07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pairing/DelerableePP07" mdate="2018-11-14">
<author pid="23/514">C&#233;cile Delerabl&#233;e</author>
<author pid="32/167">Pascal Paillier</author>
<author orcid="0000-0002-6668-683X" pid="p/DPointcheval">David Pointcheval</author>
<title>Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys.</title>
<pages>39-59</pages>
<year>2007</year>
<crossref>conf/pairing/2007</crossref>
<booktitle>Pairing</booktitle>
<ee>https://doi.org/10.1007/978-3-540-73489-5_4</ee>
<ee>https://www.wikidata.org/entity/Q56921595</ee>
<url>db/conf/pairing/pairing2007.html#DelerableePP07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/provsec/FuhrP07" mdate="2017-05-21">
<author pid="89/2637-1">Thomas Fuhr 0001</author>
<author pid="32/167">Pascal Paillier</author>
<title>Decryptable Searchable Encryption.</title>
<pages>228-236</pages>
<year>2007</year>
<crossref>conf/provsec/2007</crossref>
<booktitle>ProvSec</booktitle>
<ee>https://doi.org/10.1007/978-3-540-75670-5_17</ee>
<url>db/conf/provsec/provsec2007.html#FuhrP07</url>
</inproceedings>
</r>
<r><proceedings key="conf/ches/2007" mdate="2019-05-14">
<editor pid="32/167">Pascal Paillier</editor>
<editor orcid="0000-0002-0879-076X" pid="92/16">Ingrid Verbauwhede</editor>
<title>Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings</title>
<booktitle>CHES</booktitle>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>4727</volume>
<publisher>Springer</publisher>
<year>2007</year>
<isbn>978-3-540-74734-5</isbn>
<ee>https://doi.org/10.1007/978-3-540-74735-2</ee>
<url>db/conf/ches/ches2007.html</url>
</proceedings>
</r>
<r><inproceedings key="conf/asiacrypt/PaillierV06" mdate="2017-06-01">
<author pid="32/167">Pascal Paillier</author>
<author orcid="0000-0003-1607-3792" pid="v/JorgesLuisVillar">Jorge Luis Villar</author>
<title>Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption.</title>
<pages>252-266</pages>
<year>2006</year>
<crossref>conf/asiacrypt/2006</crossref>
<booktitle>ASIACRYPT</booktitle>
<ee>https://doi.org/10.1007/11935230_17</ee>
<url>db/conf/asiacrypt/asiacrypt2006.html#PaillierV06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ches/JoyeP06" mdate="2017-05-21">
<author pid="j/MarcJoye">Marc Joye</author>
<author pid="32/167">Pascal Paillier</author>
<title>Fast Generation of Prime Numbers on Portable Devices: An Update.</title>
<pages>160-173</pages>
<year>2006</year>
<crossref>conf/ches/2006</crossref>
<booktitle>CHES</booktitle>
<ee>https://doi.org/10.1007/11894063_13</ee>
<url>db/conf/ches/ches2006.html#JoyeP06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pkc/Chevallier-MamesPP06" mdate="2018-11-14">
<author pid="50/3410">Beno&#238;t Chevallier-Mames</author>
<author pid="32/167">Pascal Paillier</author>
<author orcid="0000-0002-6668-683X" pid="p/DPointcheval">David Pointcheval</author>
<title>Encoding-Free ElGamal Encryption Without Random Oracles.</title>
<pages>91-104</pages>
<year>2006</year>
<crossref>conf/pkc/2006</crossref>
<booktitle>Public Key Cryptography</booktitle>
<ee type="oa">https://doi.org/10.1007/11745853_7</ee>
<ee>https://www.wikidata.org/entity/Q56921226</ee>
<url>db/conf/pkc/pkc2006.html#Chevallier-MamesPP06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/asiacrypt/PaillierV05" mdate="2018-11-02">
<author pid="32/167">Pascal Paillier</author>
<author orcid="0000-0002-2113-3967" pid="04/4983">Damien Vergnaud</author>
<title>Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log.</title>
<pages>1-20</pages>
<year>2005</year>
<crossref>conf/asiacrypt/2005</crossref>
<booktitle>ASIACRYPT</booktitle>
<ee>https://doi.org/10.1007/11593447_1</ee>
<url>db/conf/asiacrypt/asiacrypt2005.html#PaillierV05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/asiacrypt/LaguillaumiePV05" mdate="2018-11-02">
<author pid="51/5010">Fabien Laguillaumie</author>
<author pid="32/167">Pascal Paillier</author>
<author orcid="0000-0002-2113-3967" pid="04/4983">Damien Vergnaud</author>
<title>Universally Convertible Directed Signatures.</title>
<pages>682-701</pages>
<year>2005</year>
<crossref>conf/asiacrypt/2005</crossref>
<booktitle>ASIACRYPT</booktitle>
<ee>https://doi.org/10.1007/11593447_37</ee>
<url>db/conf/asiacrypt/asiacrypt2005.html#LaguillaumiePV05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ches/JoyePS05" mdate="2017-05-21">
<author pid="j/MarcJoye">Marc Joye</author>
<author pid="32/167">Pascal Paillier</author>
<author pid="10/4165">Berry Schoenmakers</author>
<title>On Second-Order Differential Power Analysis.</title>
<pages>293-308</pages>
<year>2005</year>
<crossref>conf/ches/2005</crossref>
<booktitle>CHES</booktitle>
<ee>https://doi.org/10.1007/11545262_22</ee>
<url>db/conf/ches/ches2005.html#JoyePS05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/crypto/AbdallaBCKKLMNPS05" mdate="2019-12-27">
<author orcid="0000-0002-2447-4329" pid="67/2285">Michel Abdalla</author>
<author pid="b/MBellare">Mihir Bellare</author>
<author pid="37/3188">Dario Catalano</author>
<author orcid="0000-0003-1178-048X" pid="k/EikeKiltz">Eike Kiltz</author>
<author pid="k/TadayoshiKohno">Tadayoshi Kohno</author>
<author pid="56/2224">Tanja Lange 0001</author>
<author pid="85/3045">John Malone-Lee</author>
<author pid="30/3210">Gregory Neven</author>
<author pid="32/167">Pascal Paillier</author>
<author pid="80/1652">Haixia Shi</author>
<title>Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.</title>
<pages>205-222</pages>
<year>2005</year>
<crossref>conf/crypto/2005</crossref>
<booktitle>CRYPTO</booktitle>
<ee>https://doi.org/10.1007/11535218_13</ee>
<ee>https://www.wikidata.org/entity/Q59163782</ee>
<url>db/conf/crypto/crypto2005.html#AbdallaBCKKLMNPS05</url>
</inproceedings>
</r>
<r><incollection publtype="encyclopedia" key="reference/crypt/Paillier05" mdate="2017-07-12">
<author pid="32/167">Pascal Paillier</author>
<title>Paillier Encryption and Signature Schemes.</title>
<year>2005</year>
<booktitle>Encyclopedia of Cryptography and Security</booktitle>
<ee>https://doi.org/10.1007/0-387-23483-7_293</ee>
<crossref>reference/crypt/2005</crossref>
<url>db/reference/crypt/crypt2005.html#Paillier05</url>
</incollection>
</r>
<r><article publtype="informal" key="journals/iacr/AbdallaBCKKLMNPS05" mdate="2020-05-11">
<author pid="67/2285">Michel Abdalla</author>
<author pid="b/MBellare">Mihir Bellare</author>
<author pid="37/3188">Dario Catalano</author>
<author pid="k/EikeKiltz">Eike Kiltz</author>
<author pid="k/TadayoshiKohno">Tadayoshi Kohno</author>
<author pid="56/2224">Tanja Lange 0001</author>
<author pid="85/3045">John Malone-Lee</author>
<author pid="30/3210">Gregory Neven</author>
<author pid="32/167">Pascal Paillier</author>
<author pid="80/1652">Haixia Shi</author>
<title>Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.</title>
<pages>254</pages>
<year>2005</year>
<volume>2005</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2005/254</ee>
<url>db/journals/iacr/iacr2005.html#AbdallaBCKKLMNPS05</url>
</article>
</r>
<r><inproceedings key="conf/ches/Chevallier-MamesNPP04" mdate="2018-11-14">
<author pid="50/3410">Beno&#238;t Chevallier-Mames</author>
<author pid="41/6833">David Naccache</author>
<author pid="32/167">Pascal Paillier</author>
<author orcid="0000-0002-6668-683X" pid="p/DPointcheval">David Pointcheval</author>
<title>How to Disembed a Program?</title>
<pages>441-454</pages>
<ee>https://doi.org/10.1007/978-3-540-28632-5_32</ee>
<ee>https://www.wikidata.org/entity/Q56921322</ee>
<year>2004</year>
<crossref>conf/ches/2004</crossref>
<booktitle>CHES</booktitle>
<url>db/conf/ches/ches2004.html#Chevallier-MamesNPP04</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/Chevallier-MamesNPP04" mdate="2020-05-11">
<author pid="50/3410">Beno&#238;t Chevallier-Mames</author>
<author pid="41/6833">David Naccache</author>
<author pid="32/167">Pascal Paillier</author>
<author pid="p/DPointcheval">David Pointcheval</author>
<title>How to Disembed a Program?</title>
<pages>138</pages>
<year>2004</year>
<volume>2004</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2004/138</ee>
<url>db/journals/iacr/iacr2004.html#Chevallier-MamesNPP04</url>
</article>
</r>
<r><inproceedings key="conf/ches/Chevallier-MamesJP03" mdate="2017-05-21">
<author pid="50/3410">Beno&#238;t Chevallier-Mames</author>
<author pid="j/MarcJoye">Marc Joye</author>
<author pid="32/167">Pascal Paillier</author>
<title>Faster Double-Size Modular Multiplication from Euclidean Multipliers.</title>
<pages>214-227</pages>
<ee>https://doi.org/10.1007/10931455_18</ee>
<year>2003</year>
<crossref>conf/ches/2003</crossref>
<booktitle>CHES</booktitle>
<url>db/conf/ches/ches2003.html#Chevallier-MamesJP03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ches/JoyeP03" mdate="2017-05-21">
<author pid="j/MarcJoye">Marc Joye</author>
<author pid="32/167">Pascal Paillier</author>
<title>GCD-Free Algorithms for Computing Modular Inverses.</title>
<pages>243-253</pages>
<ee>https://doi.org/10.1007/978-3-540-45238-6_20</ee>
<year>2003</year>
<crossref>conf/ches/2003</crossref>
<booktitle>CHES</booktitle>
<url>db/conf/ches/ches2003.html#JoyeP03</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/BrierNP03" mdate="2020-05-11">
<author pid="09/4921">Eric Brier</author>
<author pid="41/6833">David Naccache</author>
<author pid="32/167">Pascal Paillier</author>
<title>Chemical Combinatorial Attacks on Keyboards.</title>
<pages>217</pages>
<year>2003</year>
<volume>2003</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2003/217</ee>
<url>db/journals/iacr/iacr2003.html#BrierNP03</url>
</article>
</r>
<r><inproceedings key="conf/cardis/HandschuhNPT02" mdate="2004-09-14">
<author pid="28/6334">Helena Handschuh</author>
<author pid="41/6833">David Naccache</author>
<author pid="32/167">Pascal Paillier</author>
<author pid="28/2329">Christophe Tymen</author>
<title>Provably Secure Chipcard Personalization, or, How to Fool Malicious Insiders.</title>
<year>2002</year>
<crossref>conf/cardis/2002</crossref>
<booktitle>CARDIS</booktitle>
<ee>http://www.usenix.org/publications/library/proceedings/cardis02/handschuh.html</ee>
<url>db/conf/cardis/cardis2002.html#HandschuhNPT02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/crypto/CoronJNP02" mdate="2017-05-26">
<author pid="61/1318">Jean-S&#233;bastien Coron</author>
<author pid="j/MarcJoye">Marc Joye</author>
<author pid="41/6833">David Naccache</author>
<author pid="32/167">Pascal Paillier</author>
<title>Universal Padding Schemes for RSA.</title>
<pages>226-241</pages>
<year>2002</year>
<crossref>conf/crypto/2002</crossref>
<booktitle>CRYPTO</booktitle>
<ee>https://doi.org/10.1007/3-540-45708-9_15</ee>
<url>db/conf/crypto/crypto2002.html#CoronJNP02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ctrsa/CoronHJPPT02" mdate="2018-11-14">
<author pid="61/1318">Jean-S&#233;bastien Coron</author>
<author pid="28/6334">Helena Handschuh</author>
<author pid="j/MarcJoye">Marc Joye</author>
<author pid="32/167">Pascal Paillier</author>
<author orcid="0000-0002-6668-683X" pid="p/DPointcheval">David Pointcheval</author>
<author pid="28/2329">Christophe Tymen</author>
<title>GEM: A Generic Chosen-Ciphertext Secure Encryption Method.</title>
<pages>263-276</pages>
<year>2002</year>
<crossref>conf/ctrsa/2002</crossref>
<booktitle>CT-RSA</booktitle>
<ee>https://doi.org/10.1007/3-540-45760-7_18</ee>
<ee>https://www.wikidata.org/entity/Q56921396</ee>
<url>db/conf/ctrsa/ctrsa2002.html#CoronHJPPT02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pkc/CoronHJPPT02" mdate="2018-11-14">
<author pid="61/1318">Jean-S&#233;bastien Coron</author>
<author pid="28/6334">Helena Handschuh</author>
<author pid="j/MarcJoye">Marc Joye</author>
<author pid="32/167">Pascal Paillier</author>
<author orcid="0000-0002-6668-683X" pid="p/DPointcheval">David Pointcheval</author>
<author pid="28/2329">Christophe Tymen</author>
<title>Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages.</title>
<pages>17-33</pages>
<year>2002</year>
<crossref>conf/pkc/2002</crossref>
<booktitle>Public Key Cryptography</booktitle>
<ee>https://doi.org/10.1007/3-540-45664-3_2</ee>
<ee>https://www.wikidata.org/entity/Q56921419</ee>
<url>db/conf/pkc/pkc2002.html#CoronHJPPT02</url>
</inproceedings>
</r>
<r><proceedings key="conf/pkc/2002" mdate="2020-05-01">
<editor pid="41/6833">David Naccache</editor>
<editor pid="32/167">Pascal Paillier</editor>
<title>Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002, Proceedings</title>
<booktitle>Public Key Cryptography</booktitle>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>2274</volume>
<publisher>Springer</publisher>
<year>2002</year>
<isbn>3-540-43168-3</isbn>
<ee>https://doi.org/10.1007/3-540-45664-3</ee>
<url>db/conf/pkc/pkc2002.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/iacr/CoronHJPPT02" mdate="2020-05-11">
<author pid="61/1318">Jean-S&#233;bastien Coron</author>
<author pid="28/6334">Helena Handschuh</author>
<author pid="j/MarcJoye">Marc Joye</author>
<author pid="32/167">Pascal Paillier</author>
<author pid="p/DPointcheval">David Pointcheval</author>
<author pid="28/2329">Christophe Tymen</author>
<title>Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages.</title>
<pages>11</pages>
<year>2002</year>
<volume>2002</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2002/011</ee>
<url>db/journals/iacr/iacr2002.html#CoronHJPPT02</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/CoronJNP02" mdate="2020-05-11">
<author pid="61/1318">Jean-S&#233;bastien Coron</author>
<author pid="j/MarcJoye">Marc Joye</author>
<author pid="41/6833">David Naccache</author>
<author pid="32/167">Pascal Paillier</author>
<title>Universal Padding Schemes for RSA.</title>
<pages>115</pages>
<year>2002</year>
<volume>2002</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2002/115</ee>
<url>db/journals/iacr/iacr2002.html#CoronJNP02</url>
</article>
</r>
<r><inproceedings key="conf/asiacrypt/Paillier00" mdate="2017-05-19">
<author pid="32/167">Pascal Paillier</author>
<title>Trapdooring Discrete Logarithms on Elliptic Curves over Rings.</title>
<pages>573-584</pages>
<year>2000</year>
<crossref>conf/asiacrypt/2000</crossref>
<booktitle>ASIACRYPT</booktitle>
<ee>https://doi.org/10.1007/3-540-44448-3_44</ee>
<url>db/conf/asiacrypt/asiacrypt2000.html#Paillier00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ches/JoyePV00" mdate="2017-05-21">
<author pid="j/MarcJoye">Marc Joye</author>
<author pid="32/167">Pascal Paillier</author>
<author pid="v/SergeVaudenay">Serge Vaudenay</author>
<title>Efficient Generation of Prime Numbers.</title>
<pages>340-354</pages>
<ee>https://doi.org/10.1007/3-540-44499-8_27</ee>
<year>2000</year>
<crossref>conf/ches/2000</crossref>
<booktitle>CHES</booktitle>
<url>db/conf/ches/ches2000.html#JoyePV00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/CoronJNP00" mdate="2017-05-24">
<author pid="61/1318">Jean-S&#233;bastien Coron</author>
<author pid="j/MarcJoye">Marc Joye</author>
<author pid="41/6833">David Naccache</author>
<author pid="32/167">Pascal Paillier</author>
<title>New Attacks on PKCS#1 v1.5 Encryption.</title>
<pages>369-381</pages>
<year>2000</year>
<crossref>conf/eurocrypt/2000</crossref>
<booktitle>EUROCRYPT</booktitle>
<ee>https://doi.org/10.1007/3-540-45539-6_25</ee>
<url>db/conf/eurocrypt/eurocrypt2000.html#CoronJNP00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/asiacrypt/PaillierP99" mdate="2018-11-14">
<author pid="32/167">Pascal Paillier</author>
<author orcid="0000-0002-6668-683X" pid="p/DPointcheval">David Pointcheval</author>
<title>Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries.</title>
<pages>165-179</pages>
<year>1999</year>
<crossref>conf/asiacrypt/1999</crossref>
<booktitle>ASIACRYPT</booktitle>
<url>db/conf/asiacrypt/asiacrypt99.html#PaillierP99</url>
<ee>https://doi.org/10.1007/978-3-540-48000-6_14</ee>
<ee>https://www.wikidata.org/entity/Q56287506</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/ches/HandschuhPS99" mdate="2017-05-21">
<author pid="28/6334">Helena Handschuh</author>
<author pid="32/167">Pascal Paillier</author>
<author pid="57/570">Jacques Stern</author>
<title>Probing Attacks on Tamper-Resistant Devices.</title>
<pages>303-315</pages>
<ee>https://doi.org/10.1007/3-540-48059-5_26</ee>
<year>1999</year>
<crossref>conf/ches/1999</crossref>
<booktitle>CHES</booktitle>
<url>db/conf/ches/ches1999.html#HandschuhPS99</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/Paillier99" mdate="2018-11-14">
<author pid="32/167">Pascal Paillier</author>
<title>Public-Key Cryptosystems Based on Composite Degree Residuosity Classes.</title>
<pages>223-238</pages>
<year>1999</year>
<crossref>conf/eurocrypt/99</crossref>
<booktitle>EUROCRYPT</booktitle>
<ee>https://doi.org/10.1007/3-540-48910-X_16</ee>
<ee>https://www.wikidata.org/entity/Q56287504</ee>
<url>db/conf/eurocrypt/eurocrypt99.html#Paillier99</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icisc/PaillierY99" mdate="2017-05-24">
<author pid="32/167">Pascal Paillier</author>
<author pid="y/MotiYung">Moti Yung</author>
<title>Self-Escrowed Public-Key Infrastructures.</title>
<pages>257-268</pages>
<year>1999</year>
<crossref>conf/icisc/1999</crossref>
<booktitle>ICISC</booktitle>
<url>db/conf/icisc/icisc1999.html#PaillierY99</url>
<ee>https://doi.org/10.1007/10719994_20</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/pkc/Paillier99" mdate="2017-05-23">
<author pid="32/167">Pascal Paillier</author>
<title>A Trapdoor Permutation Equivalent to Factoring.</title>
<pages>219-222</pages>
<ee>https://doi.org/10.1007/3-540-49162-7_17</ee>
<year>1999</year>
<crossref>conf/pkc/1999</crossref>
<booktitle>Public Key Cryptography</booktitle>
<url>db/conf/pkc/pkc99.html#Paillier99</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pkc/Paillier99a" mdate="2017-05-23">
<author pid="32/167">Pascal Paillier</author>
<title>Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor.</title>
<pages>223-234</pages>
<ee>https://doi.org/10.1007/3-540-49162-7_18</ee>
<year>1999</year>
<crossref>conf/pkc/1999</crossref>
<booktitle>Public Key Cryptography</booktitle>
<url>db/conf/pkc/pkc99.html#Paillier99a</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pkc/Paillier99b" mdate="2017-05-23">
<author pid="32/167">Pascal Paillier</author>
<title>Evaluating Differential Fault Analysis of Unknown Cryptosystems.</title>
<pages>235-244</pages>
<ee>https://doi.org/10.1007/3-540-49162-7_19</ee>
<year>1999</year>
<crossref>conf/pkc/1999</crossref>
<booktitle>Public Key Cryptography</booktitle>
<url>db/conf/pkc/pkc99.html#Paillier99b</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cardis/HandschuhP98" mdate="2017-05-23">
<author pid="28/6334">Helena Handschuh</author>
<author pid="32/167">Pascal Paillier</author>
<title>Reducing the Collision Probability of Alleged Comp128.</title>
<pages>366-371</pages>
<year>1998</year>
<crossref>conf/cardis/1998</crossref>
<booktitle>CARDIS</booktitle>
<url>db/conf/cardis/cardis1998.html#HandschuhP98</url>
<ee>https://doi.org/10.1007/10721064_34</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/cardis/HandschuhP98a" mdate="2017-05-23">
<author pid="28/6334">Helena Handschuh</author>
<author pid="32/167">Pascal Paillier</author>
<title>Smart Card Crypto-Coprocessors for Public-Key Cryptography.</title>
<pages>372-379</pages>
<year>1998</year>
<crossref>conf/cardis/1998</crossref>
<booktitle>CARDIS</booktitle>
<url>db/conf/cardis/cardis1998.html#HandschuhP98a</url>
<ee>https://doi.org/10.1007/10721064_35</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/Paillier97" mdate="2017-05-23">
<author pid="32/167">Pascal Paillier</author>
<title>On Ideal Non-perfect Secret Sharing Schemes.</title>
<pages>207-216</pages>
<year>1997</year>
<crossref>conf/spw/1997</crossref>
<booktitle>Security Protocols Workshop</booktitle>
<url>db/conf/spw/spw1997.html#Paillier97</url>
<ee>https://doi.org/10.1007/BFb0028171</ee>
</inproceedings>
</r>
<coauthors n="87" nc="1">
<co c="0"><na f="a/Abdalla:Michel" pid="67/2285">Michel Abdalla</na></co>
<co c="0"><na f="b/Baudrin:Jules" pid="337/2519">Jules Baudrin</na></co>
<co c="0"><na f="b/Bela=iuml=d:Sonia" pid="130/9405">Sonia Bela&#239;d</na></co>
<co c="0"><na f="b/Bellare:Mihir" pid="b/MBellare">Mihir Bellare</na></co>
<co c="0"><na f="b/Bergerat:Loris" pid="322/3493">Loris Bergerat</na></co>
<co c="0"><na f="b/Berzati:Alexandre" pid="66/6816">Alexandre Berzati</na></co>
<co c="0"><na f="b/Bjones:Ronny" pid="35/1504">Ronny Bjones</na></co>
<co c="0"><na f="b/Bon_0001:Nicolas" pid="136/3332-1">Nicolas Bon 0001</na></co>
<co c="0"><na f="b/Bonte:Charlotte" pid="200/2066">Charlotte Bonte</na></co>
<co c="0"><na f="b/Boura:Christina" pid="02/9245">Christina Boura</na></co>
<co c="0"><na f="b/Bourse:Florian" pid="134/0544">Florian Bourse</na></co>
<co c="0"><na f="b/Bresson:Emmanuel" pid="68/2531">Emmanuel Bresson</na></co>
<co c="0"><na f="b/Brier:Eric" pid="09/4921">Eric Brier</na></co>
<co c="0"><na f="c/Canovas:C=eacute=cile" pid="07/5955">C&#233;cile Canovas</na></co>
<co c="0"><na f="c/Canteaut:Anne" pid="56/3453">Anne Canteaut</na></co>
<co c="0"><na f="c/Carpov:Sergiu" pid="57/8724">Sergiu Carpov</na></co>
<co c="0"><na f="c/Castagnos:Guilhem" pid="42/6955">Guilhem Castagnos</na></co>
<co c="0"><na f="c/Catalano:Dario" pid="37/3188">Dario Catalano</na></co>
<co c="0"><na f="c/Chevallier=Mames:Beno=icirc=t" pid="50/3410">Beno&#238;t Chevallier-Mames</na></co>
<co c="0"><na f="c/Chillotti:Ilaria" pid="175/5881">Ilaria Chillotti</na></co>
<co c="0"><na f="c/Clavier:Christophe" pid="75/5410">Christophe Clavier</na></co>
<co c="0"><na f="c/Coron:Jean=S=eacute=bastien" pid="61/1318">Jean-S&#233;bastien Coron</na></co>
<co c="0"><na f="c/Curtis:Benjamin_R=" pid="208/8539">Benjamin R. Curtis</na></co>
<co c="0"><na f="d/Damg=aring=rd:Kasper" pid="170/3696">Kasper Damg&#229;rd</na></co>
<co c="0"><na f="d/Debraize:Blandine" pid="23/1841">Blandine Debraize</na></co>
<co c="0"><na f="d/Delerabl=eacute=e:C=eacute=cile" pid="23/514">C&#233;cile Delerabl&#233;e</na></co>
<co c="0"><na f="d/Dolev:Shlomi" pid="d/ShlomiDolev">Shlomi Dolev</na></co>
<co c="0"><na f="f/Feix:Benoit" pid="61/4337">Benoit Feix</na></co>
<co c="0"><na f="f/Fontaine:Caroline" pid="22/2665">Caroline Fontaine</na></co>
<co c="0"><na f="f/Fuhr_0001:Thomas" pid="89/2637-1">Thomas Fuhr 0001</na></co>
<co c="0"><na f="g/Goubin:Louis" pid="64/5615">Louis Goubin</na></co>
<co c="0"><na f="g/Gouget:Aline" pid="77/2379">Aline Gouget</na></co>
<co c="0"><na f="g/Gudes:Ehud" pid="g/EhudGudes">Ehud Gudes</na></co>
<co c="0"><na f="g/Guldager:Hans" pid="196/1469">Hans Guldager</na></co>
<co c="0"><na f="h/Handschuh:Helena" pid="28/6334">Helena Handschuh</na></co>
<co c="0"><na f="i/Icart:Thomas" pid="90/2605">Thomas Icart</na></co>
<co c="0"><na f="j/Jensen:Jonas_Lindstr=oslash=m" pid="196/1474">Jonas Lindstr&#248;m Jensen</na></co>
<co c="0"><na f="j/Joux:Antoine" pid="j/AntoineJoux">Antoine Joux</na></co>
<co c="0"><na f="j/Joye:Marc" pid="j/MarcJoye">Marc Joye</na></co>
<co c="0"><na f="k/Kiltz:Eike" pid="k/EikeKiltz">Eike Kiltz</na></co>
<co c="0"><na f="k/Kizhvatov:Ilya" pid="77/4750">Ilya Kizhvatov</na></co>
<co c="0"><na f="k/Kohno:Tadayoshi" pid="k/TadayoshiKohno">Tadayoshi Kohno</na></co>
<co c="0"><na f="k/Krontiris:Ioannis" pid="32/1264">Ioannis Krontiris</na></co>
<co c="0"><na f="l/Laguillaumie:Fabien" pid="51/5010">Fabien Laguillaumie</na></co>
<co c="0"><na f="l/Lange_0001:Tanja" pid="56/2224">Tanja Lange 0001</na></co>
<co c="0"><na f="l/Lepoint:Tancr=egrave=de" pid="08/11136">Tancr&#232;de Lepoint</na></co>
<co c="0"><na f="l/Leurent:Ga=euml=tan" pid="30/1133">Ga&#235;tan Leurent</na></co>
<co c="0" n="2"><na f="l/Luna:Jesus" pid="07/1919">Jesus Luna</na><na>Jesus Luna Garcia</na></co>
<co c="0"><na f="m/Malone=Lee:John" pid="85/3045">John Malone-Lee</na></co>
<co c="0"><na f="m/Mikkelsen:Gert_L=aelig=ss=oslash=e" pid="77/2323">Gert L&#230;ss&#248;e Mikkelsen</na></co>
<co c="0"><na f="m/Minelli:Michele" pid="179/6839">Michele Minelli</na></co>
<co c="0"><na f="m/Minihold:Matthias" pid="216/6261">Matthias Minihold</na></co>
<co c="0"><na f="m/Misarsky:Jean=Fran=ccedil=ois" pid="48/3559">Jean-Fran&#231;ois Misarsky</na></co>
<co c="0"><na f="n/Naccache:David" pid="41/6833">David Naccache</na></co>
<co c="0"><na f="n/Naya=Plasencia:Mar=iacute=a" pid="24/1241">Mar&#237;a Naya-Plasencia</na></co>
<co c="0"><na f="n/Neven:Gregory" pid="30/3210">Gregory Neven</na></co>
<co c="0"><na f="n/Nielsen:Janus_Dam" pid="79/122">Janus Dam Nielsen</na></co>
<co c="0"><na f="o/Orfila:Jean=Baptiste" pid="154/6414">Jean-Baptiste Orfila</na></co>
<co c="0"><na f="p/Pellegrino:Giancarlo" pid="35/9056">Giancarlo Pellegrino</na></co>
<co c="0"><na f="p/Perrin:L=eacute=o" pid="145/1633">L&#233;o Perrin</na></co>
<co c="0"><na f="p/Peyrin:Thomas" pid="p/ThomasPeyrin">Thomas Peyrin</na></co>
<co c="0"><na f="p/Pointcheval:David" pid="p/DPointcheval">David Pointcheval</na></co>
<co c="0"><na f="p/Pornin:Thomas" pid="07/4667">Thomas Pornin</na></co>
<co c="0"><na f="r/Rannenberg:Kai" pid="r/KRannenberg">Kai Rannenberg</na></co>
<co c="0"><na f="r/Reinhard:Jean=Ren=eacute=" pid="42/3758">Jean-Ren&#233; Reinhard</na></co>
<co c="0"><na f="r/Rivain:Matthieu" pid="33/2627">Matthieu Rivain</na></co>
<co c="0"><na f="r/Rotella:Yann" pid="178/5237">Yann Rotella</na></co>
<co c="0"><na f="s/Salgado:Stephanie" pid="95/7837">Stephanie Salgado</na></co>
<co c="0"><na f="s/Schoenmakers:Berry" pid="10/4165">Berry Schoenmakers</na></co>
<co c="0"><na f="s/Shi:Haixia" pid="80/1652">Haixia Shi</na></co>
<co c="0"><na f="s/Sirdey:Renaud" pid="43/138">Renaud Sirdey</na></co>
<co c="0"><na f="s/Stausholm:Michael_Bladt" pid="90/11345">Michael Bladt Stausholm</na></co>
<co c="0"><na f="s/Stern:Jacques" pid="57/570">Jacques Stern</na></co>
<co c="0"><na f="s/Suri:Neeraj" pid="s/NeerajSuri">Neeraj Suri</na></co>
<co c="0"><na f="t/Tap:Samuel" pid="294/0685">Samuel Tap</na></co>
<co c="0"><na f="t/Thierry:Lo=iuml=c" pid="87/11389">Lo&#239;c Thierry</na></co>
<co c="0"><na f="t/Thuillet:C=eacute=line" pid="40/7561">C&#233;line Thuillet</na></co>
<co c="0"><na f="t/Tymen:Christophe" pid="28/2329">Christophe Tymen</na></co>
<co c="0"><na f="v/Vaudenay:Serge" pid="v/SergeVaudenay">Serge Vaudenay</na></co>
<co c="0"><na f="v/Verbauwhede:Ingrid" pid="92/16">Ingrid Verbauwhede</na></co>
<co c="0"><na f="v/Vergnaud:Damien" pid="04/4983">Damien Vergnaud</na></co>
<co c="0"><na f="v/Videau:Marion" pid="44/1487">Marion Videau</na></co>
<co c="0"><na f="v/Villar:Jorge_Luis" pid="v/JorgesLuisVillar">Jorge Luis Villar</na></co>
<co c="0"><na f="v/Villegas:Karine" pid="35/4800">Karine Villegas</na></co>
<co c="0"><na f="w/Wang_0003:Junwei" pid="81/4816-3">Junwei Wang 0003</na></co>
<co c="0"><na f="y/Yung:Moti" pid="y/MotiYung">Moti Yung</na></co>
<co c="0"><na f="z/Zhang_0009:Heng" pid="55/826-9">Heng Zhang 0009</na></co>
</coauthors>
</dblpperson>

