default search action
Jacques Traoré
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Olivier Sanders, Jacques Traoré:
Compact Issuer-Hiding Authentication, Application to Anonymous Credential. Proc. Priv. Enhancing Technol. 2024(3): 645-658 (2024) - 2023
- [c51]Divi De Lacour, Marc Lacoste, Mario Südholt, Jacques Traoré:
Towards Scalable Resilient Federated Learning: A Fully Decentralised Approach. PerCom Workshops 2023: 621-627 - [i12]Olivier Sanders, Jacques Traoré:
Efficient Issuer-Hiding Authentication, Application to Anonymous Credential. IACR Cryptol. ePrint Arch. 2023: 1845 (2023) - 2022
- [j7]Ghada Arfaoui, Gildas Avoine, Olivier Gimenez, Jacques Traoré:
ICRP: Internet-Friendly Cryptographic Relay-Detection Protocol. Cryptogr. 6(4): 52 (2022) - 2021
- [c50]Aïda Diop, Nicolas Desmoulins, Jacques Traoré:
Pass-As-You-Go: A Direct Anonymous Attestation-Based Untraceable Contactless Transit Pass. ACNS Workshops 2021: 417-435 - [c49]Ghada Arfaoui, Gildas Avoine, Olivier Gimenez, Jacques Traoré:
How Distance-Bounding Can Detect Internet Traffic Hijacking. CANS 2021: 355-371 - [c48]Olivier Sanders, Jacques Traoré:
EPID with Malicious Revocation. CT-RSA 2021: 177-200 - [c47]Guillaume Kaim, Sébastien Canard, Adeline Roux-Langlois, Jacques Traoré:
Post-quantum Online Voting Scheme. Financial Cryptography Workshops 2021: 290-305 - 2020
- [c46]Florian Bourse, Olivier Sanders, Jacques Traoré:
Improved Secure Integer Comparison via Homomorphic Encryption. CT-RSA 2020: 391-416 - [c45]Aïda Diop, Maryline Laurent, Jean Leneutre, Jacques Traoré:
CoRA: A Scalable Collective Remote Attestation Protocol for Sensor Networks. ICISSP 2020: 84-95 - [c44]Matheus O. L. de Sá, Roberto Araújo, Alberto C. Lima Sobrinho, André Silva Neto, Gabriela S. Maximino, Jacques Traoré:
How colored passwords can improve the usability of coercion-resistant internet voting systems. IHC 2020: 49:1-49:6 - [c43]Sébastien Canard, Adela Georgescu, Guillaume Kaim, Adeline Roux-Langlois, Jacques Traoré:
Constant-Size Lattice-Based Group Signature with Forward Security in the Standard Model. ProvSec 2020: 24-44 - [i11]Samuel Bouaziz-Ermann, Sébastien Canard, Gautier Eberhart, Guillaume Kaim, Adeline Roux-Langlois, Jacques Traoré:
Lattice-based (Partially) Blind Signature without Restart. IACR Cryptol. ePrint Arch. 2020: 260 (2020) - [i10]Olivier Sanders, Jacques Traoré:
EPID with Malicious Revocation. IACR Cryptol. ePrint Arch. 2020: 1498 (2020)
2010 – 2019
- 2019
- [c42]Nicolas Desmoulins, Aïda Diop, Yvan Rafflé, Jacques Traoré, Josselin Gratesac:
Practical Anonymous Attestation-based Pseudonym Schemes for Vehicular Networks. VNC 2019: 1-8 - [i9]Florian Bourse, Olivier Sanders, Jacques Traoré:
Improved Secure Integer Comparison via Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2019: 427 (2019) - 2018
- [c41]Sébastien Canard, David Pointcheval, Quentin Santos, Jacques Traoré:
Privacy-Preserving Plaintext-Equality of Low-Entropy Inputs. ACNS 2018: 262-279 - [c40]Sébastien Canard, David Pointcheval, Quentin Santos, Jacques Traoré:
Practical Strategy-Resistant Privacy-Preserving Elections. ESORICS (2) 2018: 331-349 - [c39]André Silva Neto, Matheus Leite, Roberto Araújo, Marcelle Pereira Mota, Nelson Cruz Sampaio Neto, Jacques Traoré:
Usability Considerations For Coercion-Resistant Election Systems. IHC 2018: 40:1-40:10 - [c38]Aïda Diop, Saïd Gharout, Maryline Laurent, Jean Leneutre, Jacques Traoré:
Questioning the security and efficiency of the ESIoT approach. WISEC 2018: 202-207 - [i8]Sébastien Canard, David Pointcheval, Quentin Santos, Jacques Traoré:
Practical Strategy-Resistant Privacy-Preserving Elections. IACR Cryptol. ePrint Arch. 2018: 827 (2018) - 2017
- [c37]Véronique Cortier, Alicia Filipiak, Jan Florent, Said Gharout, Jacques Traoré:
Designing and Proving an EMV-Compliant Payment Protocol for Mobile Devices. EuroS&P 2017: 467-480 - [c36]David Pointcheval, Olivier Sanders, Jacques Traoré:
Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash. Public Key Cryptography (1) 2017: 61-90 - [c35]Amira Barki, Nicolas Desmoulins, Saïd Gharout, Jacques Traoré:
Anonymous attestations made practical. WISEC 2017: 87-98 - [i7]Mohamed Sabt, Jacques Traoré:
Cryptanalysis of GlobalPlatform Secure Channel Protocols. IACR Cryptol. ePrint Arch. 2017: 32 (2017) - 2016
- [j6]Amira Barki, Abdelmadjid Bouabdallah, Said Gharout, Jacques Traoré:
M2M Security: Challenges and Solutions. IEEE Commun. Surv. Tutorials 18(2): 1241-1254 (2016) - [j5]Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré:
Divisible e-cash made practical. IET Inf. Secur. 10(6): 332-347 (2016) - [c34]Mohamed Sabt, Jacques Traoré:
Breaking into the KeyStore: A Practical Forgery Attack Against Android KeyStore. ESORICS (2) 2016: 531-548 - [c33]Amira Barki, Solenn Brunet, Nicolas Desmoulins, Sébastien Gambs, Saïd Gharout, Jacques Traoré:
Private eCash in Practice (Short Paper). Financial Cryptography 2016: 99-109 - [c32]Roberto Araújo, Amira Barki, Solenn Brunet, Jacques Traoré:
Remote Electronic Voting Can Be Efficient, Verifiable and Coercion-Resistant. Financial Cryptography Workshops 2016: 224-232 - [c31]Amira Barki, Solenn Brunet, Nicolas Desmoulins, Jacques Traoré:
Improved Algebraic MACs and Practical Keyed-Verification Anonymous Credentials. SAC 2016: 360-380 - [c30]Mohamed Sabt, Jacques Traoré:
Cryptanalysis of GlobalPlatform Secure Channel Protocols. SSR 2016: 62-91 - [i6]Mohamed Sabt, Jacques Traoré:
Breaking Into the KeyStore: A Practical Forgery Attack Against Android KeyStore. IACR Cryptol. ePrint Arch. 2016: 677 (2016) - 2015
- [j4]Ghada Arfaoui, Jean-François Lalande, Jacques Traoré, Nicolas Desmoulins, Pascal Berthomé, Saïd Gharout:
A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing. Proc. Priv. Enhancing Technol. 2015(2): 25-45 (2015) - [c29]Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré:
Scalable Divisible E-cash. ACNS 2015: 287-306 - [c28]Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré:
Divisible E-Cash Made Practical. Public Key Cryptography 2015: 77-100 - [c27]Ghada Arfaoui, Saïd Gharout, Jean-François Lalande, Jacques Traoré:
Practical and Privacy-Preserving TEE Migration. WISTP 2015: 153-168 - [i5]Ghada Arfaoui, Jean-François Lalande, Jacques Traoré, Nicolas Desmoulins, Pascal Berthomé, Saïd Gharout:
A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing. CoRR abs/1505.03048 (2015) - [i4]Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré:
Scalable Divisible E-cash. IACR Cryptol. ePrint Arch. 2015: 300 (2015) - [i3]David Pointcheval, Olivier Sanders, Jacques Traoré:
Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash. IACR Cryptol. ePrint Arch. 2015: 972 (2015) - 2014
- [c26]Nicolas Desmoulins, Roch Lescuyer, Olivier Sanders, Jacques Traoré:
Direct Anonymous Attestations with Dependent Basename Opening. CANS 2014: 206-221 - [c25]Ghada Arfaoui, Said Gharout, Jacques Traoré:
Trusted Execution Environments: A Look under the Hood. MobileCloud 2014: 259-266 - [i2]Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré:
Divisible E-Cash Made Practical. IACR Cryptol. ePrint Arch. 2014: 785 (2014) - 2013
- [c24]Sébastien Canard, Iwen Coisel, Amandine Jambert, Jacques Traoré:
New Results for the Practical Use of Range Proofs. EuroPKI 2013: 47-64 - [c23]Roberto Araújo, Jacques Traoré:
A Practical Coercion Resistant Voting Scheme Revisited. VoteID 2013: 193-209 - 2012
- [c22]Sébastien Canard, Nicolas Desmoulins, Julien Devigne, Jacques Traoré:
On the Implementation of a Pairing-Based Cryptographic Protocol in a Constrained Device. Pairing 2012: 210-217 - 2011
- [c21]Olivier Blazy, Sébastien Canard, Georg Fuchsbauer, Aline Gouget, Hervé Sibert, Jacques Traoré:
Achieving Optimal Anonymity in Transferable E-Cash with a Judge. AFRICACRYPT 2011: 206-223 - [c20]Sébastien Canard, Roch Lescuyer, Jacques Traoré:
Multi-show Anonymous Credentials with Encrypted Attributes in the Standard Model. CANS 2011: 194-213 - 2010
- [c19]Roberto Araújo, Narjes Ben Rajeb, Riadh Robbana, Jacques Traoré, Souheib Yousfi:
Towards Practical and Secure Coercion-Resistant Electronic Elections. CANS 2010: 278-297 - [c18]Benoît Chevallier-Mames, Pierre-Alain Fouque, David Pointcheval, Julien Stern, Jacques Traoré:
On Some Incompatible Properties of Voting Schemes. Towards Trustworthy Elections 2010: 191-199 - [c17]Roberto Araújo, Sébastien Foulle, Jacques Traoré:
A Practical and Secure Coercion-Resistant Scheme for Internet Voting. Towards Trustworthy Elections 2010: 330-342
2000 – 2009
- 2009
- [c16]Sébastien Canard, Cécile Delerablée, Aline Gouget, Emeline Hufschmitt, Fabien Laguillaumie, Hervé Sibert, Jacques Traoré, Damien Vergnaud:
Fair E-Cash: Be Compact, Spend Faster. ISC 2009: 294-309 - 2008
- [c15]Sébastien Canard, Eric Malville, Jacques Traoré:
Identity federation and privacy: one step beyond. Digital Identity Management 2008: 25-32 - [c14]Sébastien Canard, Aline Gouget, Jacques Traoré:
Improvement of Efficiency in (Unconditional) Anonymous Transferable E-Cash. Financial Cryptography 2008: 202-214 - [c13]Zhe Xia, Steve A. Schneider, James Heather, Jacques Traoré:
Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption. EVT 2008 - 2007
- [c12]Emeline Hufschmitt, Jacques Traoré:
Fair Blind Signatures Revisited. Pairing 2007: 268-292 - [c11]Sébastien Canard, Iwen Coisel, Jacques Traoré:
Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use. ProvSec 2007: 122-137 - [c10]Sébastien Foulle, Steve A. Schneider, Jacques Traoré, Zhe Xia:
Threat Analysis of a Practical Voting Scheme with Receipts. VOTE-ID 2007: 156-165 - [i1]Roberto Araújo, Sébastien Foulle, Jacques Traoré:
A practical and secure coercion-resistant scheme for remote elections. Frontiers of Electronic Voting 2007 - 2006
- [j3]Sébastien Canard, Berry Schoenmakers, Martijn Stam, Jacques Traoré:
List signature schemes. Discret. Appl. Math. 154(2): 189-201 (2006) - [c9]Sébastien Canard, Matthieu Gaud, Jacques Traoré:
Defeating Malicious Servers in a Blind Signatures Based Voting System. Financial Cryptography 2006: 148-153 - 2004
- [j2]Fabien Laguillaumie, Jacques Traoré, Damien Vergnaud:
Universal forgery on Sekhar's signature scheme with message recovery. Int. J. Comput. Math. 81(12): 1493-1495 (2004) - [c8]Sébastien Canard, Jacques Traoré:
Anonymous Services using Smart Cards and Cryptography. CARDIS 2004: 83-98 - 2003
- [c7]Sébastien Canard, Jacques Traoré:
On Fair E-cash Systems Based on Group Signature Schemes. ACISP 2003: 237-248 - [c6]Matthieu Gaud, Jacques Traoré:
On the Anonymity of Fair Offline E-cash Systems. Financial Cryptography 2003: 34-50 - 2001
- [j1]Fabrice Boudot, Berry Schoenmakers, Jacques Traoré:
A fair and efficient solution to the socialist millionaires' problem. Discret. Appl. Math. 111(1-2): 23-36 (2001) - 2000
- [c5]Khanh Quoc Nguyen, Jacques Traoré:
An Online Public Auction Protocol Protecting Bidder Privacy. ACISP 2000: 427-442
1990 – 1999
- 1999
- [c4]Jacques Traoré:
Group Signatures and Their Relevance to Privacy-Protecting Off-Line Electronic Cash Systems. ACISP 1999: 228-243 - [c3]Fabrice Boudot, Jacques Traoré:
Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed Recovery. ICICS 1999: 87-102 - 1998
- [c2]Aymeric die Solages, Jacques Traoré:
An Efficient Fair Off-Line Electronic Cash System with Extensions to Checks and Wallets with Observers. Financial Cryptography 1998: 275-295 - 1997
- [c1]Jacques Traoré:
Making unfair a "fair" blind signature scheme. ICICS 1997: 386-397
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint