79 2.6.1 Limitations L0 et L1 ou le manque d'attributs diversifiés, p.82 ,
99 3.4.1 Une solution basée sur les Fuzzy, p.107 ,
118 3.7.1 Limitations L4 et L5 ou un manque de pratique, p.120 ,
?t(y) = ?} 3. b ? TVerif gs (m ,
?t(y) = ?} 4. For i = 1 . . . N b ? TestWit gs (m, skO ,
Open(skO, gpk, m, ?) = j ,
l ? Generate rsp[l] according to ch[l] and Figure 3 ,
A concrete security treatment of symmetric encryption, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.394-403, 1997. ,
DOI : 10.1109/SFCS.1997.646128
Method and system for authentication, p.787705, 2013. ,
Assessment of a confidence level in the collection by a communication terminal of information relative to fingerprints, p.306675, 2016. ,
Authentification Numérique bassée sur les Fuzzy Extractors, Atelier sur la Protection pour la Vie Privée, 2014. ,
Pseudoentropic isometries: A new framework for fuzzy extractor reusability, Cryptology ePrint Archive, 1100. ,
A code-based group signature scheme, The 9th International Workshop on Coding and Cryptography 2015 WCC2015, ser. Proceedings of the 9th International Workshop on Coding and Cryptography 2015 WCC2015, J.-P. T. Pascale Charpin, 2015. ,
DOI : 10.1007/978-3-642-10366-7_6
Mathématiques L3-Mathématiques appliquées: Cours complet avec 500 tests et exercices corrigés, 2009. ,
On a class of error correcting binary group codes, Information and Control, vol.3, issue.1, pp.68-79, 1960. ,
DOI : 10.1016/S0019-9958(60)90287-4
Codes correcteurs d'erreurs, pp.147-156, 1959. ,
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, Advances in Cryptology -EUROCRYPT 2004, ser. Lecture Notes in Computer Science ,
DOI : 10.1007/978-3-540-24676-3_31
URL : http://arxiv.org/pdf/cs/0602007
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, SIAM Journal on Computing, vol.38, issue.1, pp.97-139, 2008. ,
DOI : 10.1137/060651380
URL : http://arxiv.org/pdf/cs/0602007
Error correction of algebraic block codes ,
A Fuzzy Vault Scheme, Designs, Codes and Cryptography, vol.22, issue.1, pp.237-257, 2006. ,
DOI : 10.1007/s10623-005-6343-z
A distinguisher for high rate mceliece cryptosystems, pp.282-286, 2011. ,
A new class of linear correcting codes, Problemy Peredachi Informatsii, vol.6, issue.3, pp.24-30, 1970. ,
Theory of codes with maximum rank distance, Probl. Peredachi Inf, vol.21, issue.1, pp.3-16, 1985. ,
Properties of codes in rank metric, 2006. ,
URL : https://hal.archives-ouvertes.fr/hal-00459620
Low Rank Parity Check codes and their application to cryptography, WCC 13, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00913719
La cryptographie militaire, Journal des sciences militaires, pp.5-83, 1883. ,
Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984. ,
DOI : 10.1016/0022-0000(84)90070-9
URL : https://doi.org/10.1016/0022-0000(84)90070-9
Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993. ,
DOI : 10.1145/168588.168596
On the (In)security of the Fiat-Shamir paradigm, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings., pp.102-113, 2003. ,
DOI : 10.1109/SFCS.2003.1238185
The random oracle methodology, revisited, Journal of the ACM, vol.51, issue.4, pp.557-594, 2004. ,
DOI : 10.1145/1008731.1008734
URL : http://arxiv.org/pdf/cs/0010019
The random oracle model: a twenty-year retrospective, Designs, Codes and Cryptography, vol.77, issue.2-3, pp.587-610, 2015. ,
DOI : 10.1007/978-3-662-46803-6_15
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342
Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer, SIAM Review, vol.41, issue.2, pp.303-332, 1999. ,
DOI : 10.1137/S0036144598347011
URL : http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.144.6148&rep=rep1&type=pdf
Computers and intractability: a guide to the theory of np-completeness, 1979. ,
Protocoles cryptographiques pour l'authentification et l'anonymat dans les groupes, 2002. ,
Foundations of cryptography: volume 1, Basic Tools, 2001. ,
How to construct random functions, Journal of the ACM, vol.33, issue.4, pp.792-807, 1986. ,
DOI : 10.1145/6490.6503
URL : http://dl.acm.org/ft_gateway.cfm?id=6503&type=pdf
Randomness is Linear in Space, Journal of Computer and System Sciences, vol.52, issue.1, pp.43-52, 1996. ,
DOI : 10.1006/jcss.1996.0004
URL : https://doi.org/10.1006/jcss.1996.0004
Extractors and pseudorandom generators, Journal of the ACM, vol.48, issue.4, pp.860-879, 2001. ,
DOI : 10.1145/502090.502099
URL : http://www.cs.berkeley.edu/~luca/pubs/extractor-full.pdf
RECENT DEVELOPMENTS IN EXPLICIT CONSTRUCTIONS OF EXTRACTORS, Bulletin of the EATCS, vol.77, pp.67-95, 2002. ,
DOI : 10.1142/9789812562494_0013
Cryptographic Extraction and Key Derivation: The HKDF Scheme, Annual Cryptology Conference, pp.631-648, 2010. ,
DOI : 10.1007/978-3-642-14623-7_34
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.593.5659
Computational Extractors and Pseudorandomness, Theory of Cryptography Conference, pp.383-403, 2012. ,
DOI : 10.1007/978-3-642-28914-9_22
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.5844
Hmac: Keyed-hashing for message authentication, 1997. ,
DOI : 10.17487/rfc2104
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.383.2086
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 2006. ,
DOI : 10.1109/TIT.1976.1055638
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.37.9720
The design of Rijndael: AES-the advanced encryption standard, 2013. ,
DOI : 10.1007/978-3-662-04722-4
Relations among notions of security for public-key encryption schemes, pp.26-45, 1998. ,
DOI : 10.1007/BFb0055718
Nist special publication 800-38b recommendation for block cipher modes of operation: The cmac mode for authentication, 2005. ,
The galois/counter mode of operation (gcm), " Submission to NIST Modes of Operation Process, 2004. ,
The aes-cmac algorithm, Tech. Rep, 2006. ,
How To Prove Yourself: Practical Solutions to Identification and Signature Problems, Advances in Cryptology -CRYPTO '86, pp.186-194, 1986. ,
DOI : 10.1007/3-540-47721-7_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.8796
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, SIAM Journal on Computing, vol.17, issue.2, pp.281-308, 1988. ,
DOI : 10.1137/0217017
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.8353
Group Signatures, Advances in Cryptology ? EUROCRYPT '91 ,
DOI : 10.1007/3-540-46416-6_22
Minimum disclosure proofs of knowledge, Journal of Computer and System Sciences, vol.37, issue.2, pp.156-189, 1988. ,
DOI : 10.1016/0022-0000(88)90005-0
Zero knowledge proofs of identity, Proceedings of the nineteenth annual ACM conference on Theory of computing , STOC '87, pp.210-217, 1987. ,
DOI : 10.1145/28395.28419
Zero Knowledge Proofs of Knowledge in Two Rounds, pp.526-544, 1990. ,
DOI : 10.1007/0-387-34805-0_46
The knowledge complexity of interactive proof-systems, Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing, pp.291-304, 1985. ,
On the complexity of constant round ZKIP of possession of knowledge, Proceedings of the International Conference on the Theory and Applications of Cryptology: Advances in Cryptology, ser. ASIACRYPT '91, pp.331-345, 1993. ,
DOI : 10.1007/3-540-57332-1_28
On the inherent intractability of certain coding problems (Corresp.), IEEE Transactions on Information Theory, vol.24, issue.3, pp.384-386, 1978. ,
DOI : 10.1109/TIT.1978.1055873
How to Achieve a McEliece-Based Digital Signature Scheme, Advances in Cryptology -ASIACRYPT 2001, pp.157-174, 2001. ,
DOI : 10.1007/3-540-45682-1_10
URL : https://hal.archives-ouvertes.fr/inria-00072511
The intractability of computing the minimum distance of a code Information Theory, IEEE Transactions on, vol.43, issue.6, pp.1757-1766, 1997. ,
A public-key cryptosystem based on algebraic, Coding Thv, vol.4244, pp.114-116, 1978. ,
Cryptanalysis of the Original McEliece Cryptosystem, 1998. ,
DOI : 10.1007/3-540-49649-1_16
Attacking and Defending the McEliece Cryptosystem, 2008. ,
DOI : 10.1007/0-387-34799-2_10
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.139.3548
Security Bounds for the Design of Code-Based Cryptosystems, International Conference on the Theory and Application of Cryptology and Information Security, pp.88-105, 2009. ,
DOI : 10.1007/978-3-642-10366-7_6
Smaller Decoding Exponents: Ball-Collision Decoding, Annual Cryptology Conference, pp.743-760, 2011. ,
DOI : 10.1007/978-3-642-22792-9_42
Knapsack-type cryptosystems and algebraic coding theory, Problems of Control and Information Theory, pp.159-166, 1986. ,
On the equivalence of mceliece's and niederreiter's public-key cryptosystems, IEEE Transactions on Information Theory, vol.40, issue.1, pp.271-273, 1994. ,
A new paradigm for public key identification, IEEE Transactions on Information Theory, vol.42, issue.6, pp.1757-1768, 1996. ,
DOI : 10.1109/18.556672
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.751
A Generalized Birthday Problem, Annual International Cryptology Conference, pp.288-304, 2002. ,
DOI : 10.1007/3-540-45708-9_19
Privacy Amplification by Public Discussion, SIAM Journal on Computing, vol.17, issue.2, pp.210-229, 1988. ,
DOI : 10.1137/0217014
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.205.7470
Physical one-way functions Zoom sur le capteur d'iris du samsung galaxy note 7 ,
DOI : 10.1126/science.1074376
La reconnaissance de l'iris déverrouillera 300 millions de smartphones en 2021 ,
A fuzzy commitment scheme, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.28-36, 1999. ,
DOI : 10.1145/319709.319714
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.763
On enabling secure applications through off-line biometric identification, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), pp.148-157, 1998. ,
DOI : 10.1109/SECPRI.1998.674831
On the relation of error correction and cryptography to an off line biometric based identification scheme, 1999. ,
Optimal Iris Fuzzy Sketches, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems, pp.1-6, 2007. ,
DOI : 10.1109/BTAS.2007.4401904
URL : https://hal.archives-ouvertes.fr/hal-00269913
New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates, pp.393-402, 2003. ,
DOI : 10.1007/3-540-44887-X_47
Computational Fuzzy Extractors, pp.174-193, 2013. ,
DOI : 10.1007/978-3-642-42033-7_10
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.310.5704
The wiretap channel applied to biometrics Available: https, ISITA, pp.1-5, 2004. ,
Reusable cryptographic fuzzy extractors, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.82-91, 2004. ,
DOI : 10.1145/1030083.1030096
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.7298
Secure Remote Authentication Using Biometric Data, pp.147-163, 2005. ,
DOI : 10.1007/11426639_9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.115.8800
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets, pp.232-250, 2006. ,
DOI : 10.1007/11818175_14
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.228.6309
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors ,
DOI : 10.1007/978-3-540-78967-3_27
Robust Fuzzy Extractors and Authenticated Key Agreement From Close Secrets, IEEE Transactions on Information Theory, vol.58, issue.9, pp.6207-6222, 2012. ,
DOI : 10.1109/TIT.2012.2200290
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.228.6309
Privacy Weaknesses in Biometric Sketches, 2009 30th IEEE Symposium on Security and Privacy, pp.188-203, 2009. ,
DOI : 10.1109/SP.2009.24
On the (non-)reusability of fuzzy sketches and extractors and security improvements in the computational setting, IACR Cryptology ePrint Archive, vol.2012, p.608, 2012. ,
On lattices, learning with errors, random linear codes, and cryptography, Journal of the ACM (JACM), vol.56, issue.6, p.34, 2009. ,
DOI : 10.1145/1060590.1060603
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.106.5202
Fuzzy extractors for continuous distributions, Proceedings of the 2nd ACM symposium on Information, computer and communications security , ASIACCS '07, pp.353-355, 2007. ,
DOI : 10.1145/1229285.1229325
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.2298
A Practical Fuzzy Extractor for Continuous Features, pp.241-258, 2016. ,
DOI : 10.1109/ICPR.2006.423
Cryptographic key generation from voice, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, p.202, 2001. ,
DOI : 10.1109/SECPRI.2001.924299
Biometrics-based cryptographic key generation, IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat, pp.2203-2206, 2004. ,
Optimal thresholding for key generation based on biometrics, Image Processing International Conference on, pp.3451-3454, 2004. ,
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs, 2012. ,
DOI : 10.1007/978-3-642-32946-3_27
How Unique Is Your Web Browser?, Privacy Enhancing Technologies, 10th International Symposium, PETS 2010, pp.1-18, 2010. ,
DOI : 10.1109/TDSC.2005.26
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.381.1264
Abstract, Proceedings on Privacy Enhancing Technologies, pp.4-19, 2016. ,
DOI : 10.1515/popets-2015-0027
A comparative study of white box, black box and grey box testing techniques, International Journal of Advanced Computer Science and Applications (IJACSA), vol.3, issue.6, 2012. ,
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, 1996. ,
DOI : 10.1007/3-540-68697-5_9
White-Box Cryptography and an AES Implementation, 2003. ,
DOI : 10.1007/3-540-36492-7_17
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.7710
Shorter Circuit Obfuscation in Challenging Security Models, Security and Cryptography for Networks -10th International Conference, pp.551-570, 2016. ,
DOI : 10.1007/978-3-662-46803-6_15
White-box cryptography. analysis of white-box aes implementations, 2014. ,
Two Attacks on a White-Box AES Implementation, Selected Areas in Cryptography -SAC 2013 - 20th International Conference, pp.265-285, 2013. ,
DOI : 10.1007/978-3-662-43414-7_14
URL : https://hal.archives-ouvertes.fr/hal-00872844
Modeling attacks on physical unclonable functions, Proceedings of the 17th ACM Conference on Computer and Communications Security, ser. CCS '10, pp.237-249, 2010. ,
PUFs in Security Protocols: Attack Models and Security Evaluations, 2013 IEEE Symposium on Security and Privacy, pp.286-300, 2013. ,
DOI : 10.1109/SP.2013.27
URL : http://doi.org/10.1109/sp.2013.27
User Tracking on the Web via Cross-Browser Fingerprinting, Proceedings of the 16th Nordic Conference on Information Security Technology for Applications, ser. NordSec'11, pp.31-46, 2012. ,
DOI : 10.1007/978-3-642-29615-4_4
Pixel perfect: Fingerprinting canvas in HTML5, Proceedings of W2SP 2012, 2012. ,
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting, 2013 IEEE Symposium on Security and Privacy ,
DOI : 10.1109/SP.2013.43
The Web Never Forgets, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.674-689, 2014. ,
DOI : 10.1007/978-3-642-31284-7_25
Evercookie-virtually irrevocable persistent cookies, His Blog, vol.9, 2010. ,
Flash Cookies and Privacy, AAAI spring symposium: intelligent information privacy management, pp.158-163, 2010. ,
DOI : 10.2139/ssrn.1446862
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.401.7830
Privacy diffusion on the web, Proceedings of the 18th international conference on World wide web, WWW '09, pp.541-550, 2009. ,
DOI : 10.1145/1526709.1526782
Third-Party Web Tracking: Policy and Technology, 2012 IEEE Symposium on Security and Privacy, pp.413-427, 2012. ,
DOI : 10.1109/SP.2012.47
URL : http://doi.org/10.1109/sp.2012.47
Digital Camera Identification From Sensor Pattern Noise, IEEE Transactions on Information Forensics and Security, vol.1, issue.2, pp.205-214, 2006. ,
DOI : 10.1109/TIFS.2006.873602
Determining Image Origin and Integrity Using Sensor Noise, IEEE Transactions on Information Forensics and Security, vol.3, issue.1, pp.74-90, 2008. ,
DOI : 10.1109/TIFS.2007.916285
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.186.6468
Mobile device identification via sensor fingerprinting, 2014. ,
Do You Hear What I Hear?, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.441-452, 2014. ,
DOI : 10.1007/978-3-642-21599-5_7
Acoustic Fingerprinting Revisited, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.429-440, 2014. ,
DOI : 10.1109/MSP.2007.914237
AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable, Proceedings 2014 Network and Distributed System Security Symposium, 2014. ,
DOI : 10.14722/ndss.2014.23059
Predicting user traits from a snapshot of apps installed on a smartphone, ACM SIGMOBILE Mobile Computing and Communications Review, vol.18, issue.2, pp.1-8, 2014. ,
DOI : 10.1145/2636242.2636244
On the Unicity of Smartphone Applications, Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, WPES '15, pp.27-36, 2015. ,
DOI : 10.1007/s12243-013-0392-5
URL : https://hal.archives-ouvertes.fr/hal-01181040
50 years of biometric research: Accomplishments, challenges, and opportunities, Pattern Recognition Letters, vol.79, 2016. ,
DOI : 10.1016/j.patrec.2015.12.013
Lecture 4 -Computational Indistinguishability, Pseudorandom Generators ,
How Iris Recognition Works, IEEE Transactions on Circuits and Systems for Video Technology, vol.14, issue.1, pp.21-30, 2002. ,
DOI : 10.1109/TCSVT.2003.818350
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.570.8548
Fingerprint-Based Fuzzy Vault: Implementation and Performance, IEEE Transactions on Information Forensics and Security, vol.2, issue.4, pp.744-757, 2007. ,
DOI : 10.1109/TIFS.2007.908165
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.188.4945
Biometric Template Security, EURASIP Journal on Advances in Signal Processing, vol.6, issue.2, pp.1-11317, 2008. ,
DOI : 10.1109/TIFS.2007.908165
Biometric cryptosystems: issues and challenges, Proceedings of the IEEE, vol.92, issue.6, pp.948-960, 2004. ,
DOI : 10.1109/JPROC.2004.827372
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.1307
Biometric template selection and update: a case study in fingerprints, Pattern Recognition, vol.37, issue.7, pp.1533-1542, 2004. ,
DOI : 10.1016/j.patcog.2003.11.012
A Pseudorandom Generator from any One-way Function, SIAM Journal on Computing, vol.28, issue.4, pp.1364-1396, 1999. ,
DOI : 10.1137/S0097539793244708
Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.169-186, 2007. ,
DOI : 10.1007/978-3-540-72540-4_10
A concrete security treatment of symmetric encryption, Proceedings 38th Annual Symposium on Foundations of Computer Science, p.394, 1997. ,
DOI : 10.1109/SFCS.1997.646128
Foundations of Group Signatures: The Case of Dynamic Groups, Topics in Cryptology ? CT-RSA 2005, ser. Lecture Notes in Computer Science, A. Menezes, pp.136-153, 2005. ,
DOI : 10.1007/978-3-540-30574-3_11
A new identification scheme based on syndrome decoding, Lecture Notes in Computer Science, vol.773, pp.13-21, 1994. ,
DOI : 10.1007/3-540-48329-2_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.9243
Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions, Advances in Cryptology ? EUROCRYPT 2003, pp.614-629, 2003. ,
DOI : 10.1007/3-540-39200-9_38
Short Group Signatures, Lecture Notes in Computer Science, M. Franklin, vol.3152, pp.41-55, 2004. ,
DOI : 10.1007/978-3-540-28628-8_3
Group signatures with verifier-local revocation, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.168-177, 2004. ,
DOI : 10.1145/1030083.1030106
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.8033
Signature Schemes and Anonymous Credentials from Bilinear Maps, Advances in Cryptology -CRYPTO 2004, 24th Annual International CryptologyConference, pp.56-72, 2004. ,
DOI : 10.1007/978-3-540-28628-8_4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.64.2381
Dynamic Fully Anonymous Short Group Signatures, Progressin Cryptology -VIETCRYPT 2006, First International Conference on Cryptology in Vietnam, pp.193-210, 2006. ,
DOI : 10.1007/11958239_13
Fully Anonymous Group Signatures Without Random Oracles, Advances in Cryptology -ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, pp.164-180, 2007. ,
DOI : 10.1007/978-3-540-76900-2_10
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.304.6315
Traceable Signatures, Lecture Notes in Computer Science, vol.3027, pp.571-589, 2004. ,
DOI : 10.1007/978-3-540-24676-3_34
Efficient Traceable Signatures in the Standard Model, Lecture Notes in Computer Science, vol.51, issue.4, pp.187-205, 2009. ,
DOI : 10.1007/11426639_7
A Group Signature Scheme from Lattice Assumptions, Advances in Cryptology -ASIACRYPT 2010, ser. Lecture Notes in Computer Science, pp.395-412, 2010. ,
DOI : 10.1007/978-3-642-17373-8_23
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.180.1522
Lattice-Based Group Signatures with Logarithmic Signature Size, Advances in Cryptology - ASIACRYPT 2013, ser. Lecture Notes in Computer Science, pp.41-61 ,
DOI : 10.1007/978-3-642-42045-0_3
URL : https://hal.archives-ouvertes.fr/hal-00920420
Lattice-Based Group Signature Scheme with Verifier-Local Revocation, PKC 2014, ser. Lecture Notes in Computer Science, H. Krawczyk, pp.345-361 ,
DOI : 10.1007/978-3-642-54631-0_20
URL : https://hal.archives-ouvertes.fr/hal-00983084
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based, PKC 2015, ser. Lecture Notes in Computer Science, pp.427-449, 2015. ,
DOI : 10.1007/978-3-662-46447-2_19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.691.2753
Simpler Efficient Group Signatures from Lattices, Public-Key Cryptography -PKC 2015 -18th IACR International Conference on Practice and Theory in Public-Key Cryptography, pp.401-426, 2015. ,
DOI : 10.1007/978-3-662-46447-2_18
URL : https://hal.archives-ouvertes.fr/hal-01256013
A Provably Secure Group Signature Scheme from Code-Based Assumptions, Advances in Cryptology - ASIACRYPT 2015 -21st International Conference on the Theory and Application of Cryptology and Information Security Proceedings, Part I, pp.260-285, 2015. ,
DOI : 10.1007/978-3-662-48797-6_12
A Lattice-Based Group Signature Scheme with Message-Dependent Opening, Applied Cryptography and Network Security -14th International Conference, ACNS 2016, pp.137-155, 2016. ,
DOI : 10.1109/18.556672
URL : https://hal.archives-ouvertes.fr/hal-01302790
The hardness of approximate optimia in lattices, codes, and systems of linear equations, 34th Annual Symposium on Foundations of Computer Science, pp.3-5, 1993. ,
The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme, Journal of Cryptology, vol.16, issue.3, pp.185-215, 2003. ,
DOI : 10.1007/s00145-002-0120-1
A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory, pp.342-362, 2014. ,
DOI : 10.1007/978-3-319-12160-4_21
Decoding Random Binary Linear Codes in 2 n/20: How 1???+???1???=???0 Improves Information Set Decoding, Advances in Cryptology -EUROCRYPT 2012 -31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.520-536, 2012. ,
DOI : 10.1007/978-3-642-29011-4_31
RankSign: An Efficient Signature Algorithm Based on the Rank Metric, Post-Quantum Cryptography, ser, pp.88-107, 2014. ,
DOI : 10.1007/978-3-319-11659-4_6
URL : https://hal.archives-ouvertes.fr/hal-01261425
RankSign: An Efficient Signature Algorithm Based on the Rank Metric, 1606. ,
DOI : 10.1007/978-3-319-11659-4_6
URL : https://hal.archives-ouvertes.fr/hal-01261425
Full Cryptanalysis of the Chen Identification Protocol, Lecture Notes in Computer Science, vol.8, issue.1, pp.35-50, 2011. ,
DOI : 10.1007/s002000050053
URL : https://hal.archives-ouvertes.fr/hal-00776245
An Efficient Pseudo-Random Generator Provably as Secure as Syndrome Decoding, Advances in Cryptology -EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, pp.245-255, 1996. ,
DOI : 10.1007/3-540-68339-9_22
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.8163
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors, 2016. ,
DOI : 10.1007/978-3-662-49896-5_1
URL : https://hal.archives-ouvertes.fr/hal-01314642
New Results for Rank-Based Cryptography, Progress in Cryptology -AFRICACRYPT 2014 -7th International Conference on Cryptology in Africa, pp.1-12, 2014. ,
DOI : 10.1007/978-3-319-06734-6_1
URL : https://hal.archives-ouvertes.fr/hal-01261421
On the Hardness of the Decoding and the Minimum Distance Problems for Rank Codes, IEEE Transactions on Information Theory, vol.62, issue.12, pp.7245-7252, 2016. ,
DOI : 10.1109/TIT.2016.2616127
URL : https://hal.archives-ouvertes.fr/hal-01443111
On the complexity of the rank syndrome decoding problem Information Theory, IEEE Transactions on, vol.62, issue.2, pp.1006-1019, 2016. ,
RankSynd a PRNG Based on Rank Metric, Post-Quantum Cryptography -7th International Workshop, pp.18-28, 2016. ,
DOI : 10.1007/978-3-319-29360-8_2
URL : https://hal.archives-ouvertes.fr/hal-01289338
A new identification algorithm, Cryptography: Policy and Algorithms, International Conference, pp.244-249, 1995. ,
DOI : 10.1007/BFb0032363