What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Xavier Bultel
Google Scholar
19
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurosp
Cryptographic Commitments on Anonymizable Data.
Xavier Bultel
Céline Chevalier
Charlène Jojon
Diandian Liu
Benjamin Nguyen
2024
conf/cans
On the Anonymity of Linkable Ring Signatures.
Xavier Bultel
Charles Olivier-Anclin
2024
conf/cans
Taming Delegations in Anonymous Signatures: k-Times Anonymity for Proxy and Sanitizable Signature.
Xavier Bultel
Charles Olivier-Anclin
2024
conf/cans
Cryptographic Cryptid Protocols - How to Play Cryptid with Cheaters.
Xavier Bultel
Charlène Jojon
Pascal Lafourcade
2023
conf/fc
Practical Construction for Secure Trick-Taking Games Even with Cards Set Aside.
Rohann Bella
Xavier Bultel
Céline Chevalier
Pascal Lafourcade
Charles Olivier-Anclin
2022
conf/ctrsa
CCA Secure A Posteriori Openable Encryption in the Standard Model.
Xavier Bultel
2021
conf/fc
Generic Plaintext Equality and Inequality Proofs.
Olivier Blazy
Xavier Bultel
Pascal Lafourcade
Octavio Perez-Kempner
2021
conf/acns
Unlinkable and Invisible γ-Sanitizable Signatures.
Angèle Bossuat
Xavier Bultel
2021
conf/esorics
How to (Legally) Keep Secrets from Mobile Operators.
Ghada Arfaoui
Olivier Blazy
Xavier Bultel
Pierre-Alain Fouque
Thibaut Jacques
Adina Nedelcu
Cristina Onete
2020
conf/esorics
Designing Reverse Firewalls for the Real World.
Angèle Bossuat
Xavier Bultel
Pierre-Alain Fouque
Cristina Onete
Thyla van der Merwe
2019
journals/popets
The privacy of the TLS 1.3 protocol.
Ghada Arfaoui
Xavier Bultel
Pierre-Alain Fouque
Adina Nedelcu
Cristina Onete
2019
conf/fc
Secure Trick-Taking Game Protocols - How to Play Online Spades with Cheaters.
Xavier Bultel
Pascal Lafourcade
2019
conf/eurosp
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting.
Olivier Blazy
Angèle Bossuat
Xavier Bultel
Pierre-Alain Fouque
Cristina Onete
Elena Pagnin
2019
conf/pkc
Efficient Invisible and Unlinkable Sanitizable Signatures.
Xavier Bultel
Pascal Lafourcade
Russell W. F. Lai
Giulio Malavolta
Dominique Schröder
Sri Aravinda Krishnan Thyagarajan
2017
conf/ccs
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol.
Gildas Avoine
Xavier Bultel
Sébastien Gambs
David Gérault
Pascal Lafourcade
Cristina Onete
Jean-Marc Robert
2017
conf/provsec
Verifiable Private Polynomial Evaluation.
Xavier Bultel
Manik Lal Das
Hardik Gajera
David Gérault
Matthieu Giraud
Pascal Lafourcade
2017
conf/cans
Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures.
Xavier Bultel
Pascal Lafourcade
2016
conf/sec
A Posteriori Openable Public Key Encryption.
Xavier Bultel
Pascal Lafourcade
2016
conf/wisec
A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol.
Xavier Bultel
Sébastien Gambs
David Gérault
Pascal Lafourcade
Cristina Onete
Jean-Marc Robert
Coauthors
Adina Nedelcu
(2)
Angèle Bossuat
(3)
Benjamin Nguyen
(1)
Céline Chevalier
(2)
Charlène Jojon
(2)
Charles Olivier-Anclin
(3)
Cristina Onete
(6)
David Gérault
(3)
Diandian Liu
(1)
Dominique Schröder
(1)
Elena Pagnin
(1)
Ghada Arfaoui
(2)
Gildas Avoine
(1)
Giulio Malavolta
(1)
Hardik Gajera
(1)
Jean-Marc Robert
(2)
Manik Lal Das
(1)
Matthieu Giraud
(1)
Octavio Perez-Kempner
(1)
Olivier Blazy
(3)
Pascal Lafourcade
(10)
Pierre-Alain Fouque
(4)
Rohann Bella
(1)
Russell W. F. Lai
(1)
Sébastien Gambs
(2)
Sri Aravinda Krishnan Thyagarajan
(1)
Thibaut Jacques
(1)
Thyla van der Merwe
(1)
Xavier Bultel
(19)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to