[3]Hardware Security without Secure Hardware: How to Decrypt with a Password and a Server (Olivier Blazy, Laura Brouilhet, Céline Chevalier, Patrick Towa, Ida Tucker, and Damien Vergnaud), In Theoretical Computer Science, Elsevier, 2021. doi
[2] Round-Optimal Constant-Size Blind Signatures (Olivier Blazy, Laura Brouilhet, Céline Chevalier, Neals Fournaise), In Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020 (Pierangela Samarati, Sabrina De Capitani di Vimercati, Mohammad S. Obaidat, Jalel Ben-Othman, eds.), ScitePress, 2020. doi
[1] Anonymous Identity Based Encryption with Traceable Identities (Olivier Blazy, Laura Brouilhet, Duong Hieu Phan), In Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019, Canterbury, UK, August 26-29, 2019, ACM, 2019. doi