Active Bibliography

37 Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack – Yevgeniy Dodis, Nelly Fazio - 2003
12 Optimal communication complexity of generic multicast key distribution – Daniele Micciancio, Saurabh Panjwani - 2004
A Security Analysis of Some Physical Content Distribution Systems – Jiayuan Sui
39 Public-key broadcast encryption for stateless receivers – Yevgeniy Dodis, Nelly Fazio - 2002
1 How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext attack – Yitao Duan, John Canny - 2006
68 Efficient Communication-Storage Tradeoffs for Multicast Encryption – Ran Canetti, Tal Malkin, Kobbi Nissim - 1999
1 Multi-Recipient Encryption Schemes: Efficient Constructions and their Security – M. Bellare, A. Boldyreva, K. Kurosawa, J. Staddon
Computational Security for Cryptography – David Pointcheval - 2009
93 Key-privacy in public-key encryption – Mihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval - 2001
17 Lecture Notes on Cryptography – Shafi Goldwasser, Mihir Bellare - 2001
1 New Tools in Cryptography: Mutually Indepent Commitments, Tweakable Block Ciphers, and Plaintext Awareness via Key Registration – Silvio M. Micali - 2004
1 A Convex Optimization Approach for Addressing Storage-Communication Tradeoffs in Multicast Encryption – Radha Poovendran
119 Collusion resistant broadcast encryption with short ciphertexts and private keys. Cryptology ePrint Archive, Report 2005/018, 2005. Full version of current paper – Dan Boneh, Craig Gentry, Brent Waters
Protecting Cryptographic Keys: The Trace and Revoke Approach – Dalit Naor , Moni Naor
1 On the security of group communication schemes – Shouhuai Xu - 2007
2 On the security of group communication schemes based on symmetric key cryptosystems – Shouhuai Xu - 2005
19 From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs – Moni Naor, Omer Reingold - 1998
Président du jury: – Le Chiffrement Asymétrique, Et La Sécurité Prouvée, David Pointcheval, Gilles Kahn, Dan Boneh, Anca Muscholl, Adi Shamir, École Normale Supérieure, Brigitte Vallée, Moti Yung
5 Provably Secure Length-saving Public-Key Encryption Scheme under the Computational Diffie-Hellman Assumption – Joonsang Baek, Byoungcheon Lee, Kwangjo Kim - 2000