[6]An Anonymous Trace-and-Revoke Broadcast Encryption Scheme (Olivier Blazy, Sayantan Mukherjee, Huyen Nguyen, Duong Hieu Phan, Damien Stehlé), In Information Security and Privacy - 26th Australasian Conference, ACISP 2021 (Sushmita Ruj Joonsang Baek, ed.), Springer, volume , 2021.
[5]Legally keeping secrets from mobile operators: Lawful Interception Key Exchange (LIKE) (Ghada Arfaoui, Olivier Blazy, Xavier Bultel, Pierre-Alain Fouque, Thibaut Jacques, Adina Nedelcu, Cristina Onete), In Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security (Elisa Bertino Haya Shulman Michael Waidner, ed.), Springer, volume , 2021.
[4]Secure Decision Forest Evaluation (Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Baptiste Cottier, David Pointcheval), In Proceedings of the 16th International Conference on Availability, Reliability and Security, ARES 2021, Online, August 17-20, 2021, ACM, 2021.
[3]Zero-Knowledge Reparation of the Véron and AGS Code-based Identification Schemes (Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Philippe Gaborit), In IEEE International Symposium on Information Theory, ISIT 2021 (Stephen Hanly Henry Pfister Emina Soljanin Michael Gastpar, ed.), IEEE, volume , 2021.
[2]Generic Plaintext Equality and Inequality Proofs (Olivier Blazy, Xavier Bultel, Pascal Lafourcade, Octavio Perez-Kempner), In Financial Cryptography and Data Security - 25th International Conference, FC 2021 (Claudia Diaz Nikita Borisov, ed.), Springer, volume , 2021.
[1] An IoT Attribute-Based Security Framework for Topic-based Publish/Subscribe Systems (Olivier Blazy, Emmanuel Conchon, Mathieu Klingler, Damien Sauveron), In IEEE Access, IEEE, volume 9, 2021. doi