dblp.uni-trier.dewww.uni-trier.de

Xavier Boyen

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
29EEXavier Boyen: Hidden credential retrieval from a reusable password. ASIACCS 2009: 228-238
28EEMichel Abdalla, Xavier Boyen, Céline Chevalier, David Pointcheval: Distributed Public-Key Cryptography from Weak Secrets. Public Key Cryptography 2009: 139-159
2008
27EEXavier Boyen: New Paradigms for Password Security. ACISP 2008: 1-5
26EEXavier Boyen: The Uber-Assumption Family. Pairing 2008: 39-56
25EEXavier Boyen, Cécile Delerablée: Expressive Subgroup Signatures. SCN 2008: 185-200
24EEXavier Boyen: A tapestry of identity-based encryption: practical frameworks compared. IJACT 1(1): 3-21 (2008)
23EEDan Boneh, Xavier Boyen: Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups. J. Cryptology 21(2): 149-177 (2008)
2007
22EEXavier Boyen: Miniature CCA2 PK Encryption: Tight Security Without Redundancy. ASIACRYPT 2007: 485-501
21EEXavier Boyen: Mesh Signatures. EUROCRYPT 2007: 210-227
20EEXavier Boyen: General Ad Hoc Encryption from Exponent Inversion IBE. EUROCRYPT 2007: 394-411
19EEXavier Boyen, Brent Waters: Full-Domain Subgroup Hiding and Constant-Size Group Signatures. Public Key Cryptography 2007: 1-15
2006
18EEXavier Boyen, Hovav Shacham, Emily Shen, Brent Waters: Forward-secure signatures with untrusted update. ACM Conference on Computer and Communications Security 2006: 191-200
17EEXavier Boyen, Brent Waters: Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). CRYPTO 2006: 290-307
16EEDan Boneh, Xavier Boyen: On the Impossibility of Efficiently Combining Collision Resistant Hash Functions. CRYPTO 2006: 570-583
15EEDan Boneh, Xavier Boyen, Shai Halevi: Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. CT-RSA 2006: 226-243
14EEXavier Boyen, Brent Waters: Compact Group Signatures Without Random Oracles. EUROCRYPT 2006: 427-444
2005
13EEXavier Boyen, Qixiang Mei, Brent Waters: Direct chosen ciphertext security from identity-based techniques. ACM Conference on Computer and Communications Security 2005: 320-329
12EEXavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, Adam Smith: Secure Remote Authentication Using Biometric Data. EUROCRYPT 2005: 147-163
11EEDan Boneh, Xavier Boyen, Eu-Jin Goh: Hierarchical Identity Based Encryption with Constant Size Ciphertext. EUROCRYPT 2005: 440-456
2004
10EEXavier Boyen: Reusable cryptographic fuzzy extractors. ACM Conference on Computer and Communications Security 2004: 82-91
9EEDan Boneh, Xavier Boyen, Hovav Shacham: Short Group Signatures. CRYPTO 2004: 41-55
8EEDan Boneh, Xavier Boyen: Secure Identity Based Encryption Without Random Oracles. CRYPTO 2004: 443-459
7EEDan Boneh, Xavier Boyen: Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. EUROCRYPT 2004: 223-238
6EEDan Boneh, Xavier Boyen: Short Signatures Without Random Oracles. EUROCRYPT 2004: 56-73
2003
5EEXavier Boyen: Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography). CRYPTO 2003: 383-399
1999
4 Xavier Boyen, Daphne Koller: Exploiting the Architecture of Dynamic Systems. AAAI/IAAI 1999: 313-320
3EEXavier Boyen, Nir Friedman, Daphne Koller: Discovering the Hidden Structure of Complex Dynamic Systems. UAI 1999: 91-100
1998
2EEXavier Boyen, Daphne Koller: Approximate Learning of Dynamic Models. NIPS 1998: 396-402
1EEXavier Boyen, Daphne Koller: Tractable Inference for Complex Stochastic Processes. UAI 1998: 33-42

Coauthor Index

1Michel Abdalla [28]
2Dan Boneh [6] [7] [8] [9] [11] [15] [16] [23]
3Céline Chevalier [28]
4Cécile Delerablée [25]
5Yevgeniy Dodis [12]
6Nir Friedman [3]
7Eu-Jin Goh [11]
8Shai Halevi [15]
9Jonathan Katz [12]
10Daphne Koller [1] [2] [3] [4]
11Qixiang Mei [13]
12Rafail Ostrovsky [12]
13David Pointcheval [28]
14Hovav Shacham [9] [18]
15Emily Shen [18]
16Adam Smith [12]
17Brent Waters (Brent R. Waters) [13] [14] [17] [18] [19]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)