2009 |
14 | EE | Guilhem Castagnos,
Fabien Laguillaumie:
On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis.
EUROCRYPT 2009: 260-277 |
2008 |
13 | EE | Sébastien Canard,
Fabien Laguillaumie,
Michel Milhau:
TrapdoorSanitizable Signatures and Their Application to Content Protection.
ACNS 2008: 258-276 |
2007 |
12 | EE | Fabien Laguillaumie,
Damien Vergnaud:
On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures.
ISC 2007: 175-188 |
11 | EE | Raghav Bhaskar,
Javier Herranz,
Fabien Laguillaumie:
Aggregate designated verifier signatures and application to secure routing.
IJSN 2(3/4): 192-201 (2007) |
10 | EE | Fabien Laguillaumie,
Damien Vergnaud:
Multi-designated verifiers signatures: anonymity without encryption.
Inf. Process. Lett. 102(2-3): 127-132 (2007) |
2006 |
9 | EE | Raghav Bhaskar,
Javier Herranz,
Fabien Laguillaumie:
Efficient Authentication for Reactive Routing Protocols.
AINA (2) 2006: 57-61 |
8 | EE | Javier Herranz,
Fabien Laguillaumie:
Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption.
ISC 2006: 117-130 |
7 | EE | Fabien Laguillaumie,
Benoît Libert,
Jean-Jacques Quisquater:
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions.
SCN 2006: 63-77 |
2005 |
6 | EE | Fabien Laguillaumie,
Pascal Paillier,
Damien Vergnaud:
Universally Convertible Directed Signatures.
ASIACRYPT 2005: 682-701 |
5 | EE | Fabien Laguillaumie,
Damien Vergnaud:
Time-Selective Convertible Undeniable Signatures.
CT-RSA 2005: 154-171 |
4 | EE | Fabien Laguillaumie,
Damien Vergnaud:
Short Undeniable Signatures Without Random Oracles: The Missing Link.
INDOCRYPT 2005: 283-296 |
2004 |
3 | EE | Fabien Laguillaumie,
Damien Vergnaud:
Multi-designated Verifiers Signatures.
ICICS 2004: 495-507 |
2 | EE | Fabien Laguillaumie,
Damien Vergnaud:
Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map.
SCN 2004: 105-119 |
1 | EE | Fabien Laguillaumie,
Jacques Traoré,
Damien Vergnaud:
Universal forgery on Sekhar's signature scheme with message recovery.
Int. J. Comput. Math. 81(12): 1493-1495 (2004) |