2009 |
29 | EE | Xavier Boyen:
Hidden credential retrieval from a reusable password.
ASIACCS 2009: 228-238 |
28 | EE | Michel Abdalla,
Xavier Boyen,
Céline Chevalier,
David Pointcheval:
Distributed Public-Key Cryptography from Weak Secrets.
Public Key Cryptography 2009: 139-159 |
2008 |
27 | EE | Xavier Boyen:
New Paradigms for Password Security.
ACISP 2008: 1-5 |
26 | EE | Xavier Boyen:
The Uber-Assumption Family.
Pairing 2008: 39-56 |
25 | EE | Xavier Boyen,
Cécile Delerablée:
Expressive Subgroup Signatures.
SCN 2008: 185-200 |
24 | EE | Xavier Boyen:
A tapestry of identity-based encryption: practical frameworks compared.
IJACT 1(1): 3-21 (2008) |
23 | EE | Dan Boneh,
Xavier Boyen:
Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups.
J. Cryptology 21(2): 149-177 (2008) |
2007 |
22 | EE | Xavier Boyen:
Miniature CCA2 PK Encryption: Tight Security Without Redundancy.
ASIACRYPT 2007: 485-501 |
21 | EE | Xavier Boyen:
Mesh Signatures.
EUROCRYPT 2007: 210-227 |
20 | EE | Xavier Boyen:
General Ad Hoc Encryption from Exponent Inversion IBE.
EUROCRYPT 2007: 394-411 |
19 | EE | Xavier Boyen,
Brent Waters:
Full-Domain Subgroup Hiding and Constant-Size Group Signatures.
Public Key Cryptography 2007: 1-15 |
2006 |
18 | EE | Xavier Boyen,
Hovav Shacham,
Emily Shen,
Brent Waters:
Forward-secure signatures with untrusted update.
ACM Conference on Computer and Communications Security 2006: 191-200 |
17 | EE | Xavier Boyen,
Brent Waters:
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles).
CRYPTO 2006: 290-307 |
16 | EE | Dan Boneh,
Xavier Boyen:
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions.
CRYPTO 2006: 570-583 |
15 | EE | Dan Boneh,
Xavier Boyen,
Shai Halevi:
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles.
CT-RSA 2006: 226-243 |
14 | EE | Xavier Boyen,
Brent Waters:
Compact Group Signatures Without Random Oracles.
EUROCRYPT 2006: 427-444 |
2005 |
13 | EE | Xavier Boyen,
Qixiang Mei,
Brent Waters:
Direct chosen ciphertext security from identity-based techniques.
ACM Conference on Computer and Communications Security 2005: 320-329 |
12 | EE | Xavier Boyen,
Yevgeniy Dodis,
Jonathan Katz,
Rafail Ostrovsky,
Adam Smith:
Secure Remote Authentication Using Biometric Data.
EUROCRYPT 2005: 147-163 |
11 | EE | Dan Boneh,
Xavier Boyen,
Eu-Jin Goh:
Hierarchical Identity Based Encryption with Constant Size Ciphertext.
EUROCRYPT 2005: 440-456 |
2004 |
10 | EE | Xavier Boyen:
Reusable cryptographic fuzzy extractors.
ACM Conference on Computer and Communications Security 2004: 82-91 |
9 | EE | Dan Boneh,
Xavier Boyen,
Hovav Shacham:
Short Group Signatures.
CRYPTO 2004: 41-55 |
8 | EE | Dan Boneh,
Xavier Boyen:
Secure Identity Based Encryption Without Random Oracles.
CRYPTO 2004: 443-459 |
7 | EE | Dan Boneh,
Xavier Boyen:
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles.
EUROCRYPT 2004: 223-238 |
6 | EE | Dan Boneh,
Xavier Boyen:
Short Signatures Without Random Oracles.
EUROCRYPT 2004: 56-73 |
2003 |
5 | EE | Xavier Boyen:
Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography).
CRYPTO 2003: 383-399 |
1999 |
4 | | Xavier Boyen,
Daphne Koller:
Exploiting the Architecture of Dynamic Systems.
AAAI/IAAI 1999: 313-320 |
3 | EE | Xavier Boyen,
Nir Friedman,
Daphne Koller:
Discovering the Hidden Structure of Complex Dynamic Systems.
UAI 1999: 91-100 |
1998 |
2 | EE | Xavier Boyen,
Daphne Koller:
Approximate Learning of Dynamic Models.
NIPS 1998: 396-402 |
1 | EE | Xavier Boyen,
Daphne Koller:
Tractable Inference for Complex Stochastic Processes.
UAI 1998: 33-42 |