What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Xavier Boyen
Google Scholar
56
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/esorics
Predicate-Private Asymmetric Searchable Encryption for Conjunctions from Lattices.
Qinyi Li
Xavier Boyen
2024
journals/cic
Public-Key Authenticated Encryption with Keyword Search Made Easy.
Qinyi Li
Xavier Boyen
2023
conf/esorics
Identity-Based Matchmaking Encryption with Enhanced Privacy - A Generic Construction with Practical Instantiations.
Xavier Boyen
Qinyi Li
2022
conf/esorics
Zero-History Confidential Chains with Zero-Knowledge Contracts: A New Normal for Decentralized Ledgers?
Jayamine Alupotha
Xavier Boyen
Matthew McKague
2021
journals/tifs
On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side!
Mir Ali Rezazadeh Baee
Leonie Simpson
Xavier Boyen
Ernest Foo
Josef Pieprzyk
2021
conf/acisp
Anonymous Lattice Identity-Based Encryption with Traceable Identities.
Xavier Boyen
Ernest Foo
Qinyi Li
2021
conf/fc
The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach.
Niluka Amarasinghe
Xavier Boyen
Matthew McKague
2021
conf/eurosp
Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting.
Xavier Boyen
Thomas Haines
Johannes Müller
2020
conf/esorics
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing.
Xavier Boyen
Thomas Haines
Johannes Müller
2020
conf/cans
Compact Multi-Party Confidential Transactions.
Jayamine Alupotha
Xavier Boyen
Ernest Foo
2018
conf/ccs
Graphchain: a Blockchain-Free Scalable Decentralised Ledger.
Xavier Boyen
Christopher Carr
Thomas Haines
2018
conf/acisp
Forward-Secure Linkable Ring Signatures.
Xavier Boyen
Thomas Haines
2018
conf/acns
Almost Tight Multi-Instance Multi-Ciphertext Identity-Based Encryption on Lattices.
Xavier Boyen
Qinyi Li
2017
conf/crypto
All-But-Many Lossy Trapdoor Functions from Lattices and Applications.
Xavier Boyen
Qinyi Li
2016
journals/joc
Unconditionally Anonymous Ring and Mesh Signatures.
Xavier Boyen
2016
conf/acns
Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions.
Xavier Boyen
Qinyi Li
2016
conf/asiacrypt
Towards Tightly Secure Lattice Short Signature and Id-Based Encryption.
Xavier Boyen
Qinyi Li
2015
conf/provsec
Attribute-Based Encryption for Finite Automata from LWE.
Xavier Boyen
Qinyi Li
2013
conf/acisp
Expressive Cryptography: Lattice Perspectives.
Xavier Boyen
2013
conf/africacrypt
Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting.
Carlos Aguilar Melchor
Slim Bettaieb
Xavier Boyen
Laurent Fousse
Philippe Gaborit
2013
conf/tcc
Attribute-Based Functional Encryption on Lattices.
Xavier Boyen
2012
conf/fc
Bitter to Better - How to Make Bitcoin a Better Currency.
Simon Barber
Xavier Boyen
Elaine Shi
Ersin Uzun
2012
conf/pkc
Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices.
Shweta Agrawal
Xavier Boyen
Vinod Vaikuntanathan
Panagiotis Voulgaris
Hoeteck Wee
2011
journals/joc
Efficient Selective Identity-Based Encryption Without Random Oracles.
Dan Boneh
Xavier Boyen
2011
conf/cans
Expressive Encryption Systems from Lattices - (Abstract from the Invited Lecture).
Xavier Boyen
2010
conf/crypto
Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE.
Shweta Agrawal
Dan Boneh
Xavier Boyen
2010
conf/acns
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions.
Xavier Boyen
Brent Waters
2010
conf/esorics
Kamouflage: Loss-Resistant Password Management.
Hristo Bojinov
Elie Bursztein
Xavier Boyen
Dan Boneh
2010
conf/pkc
Preventing Pollution Attacks in Multi-source Network Coding.
Shweta Agrawal
Dan Boneh
Xavier Boyen
David Mandell Freeman
2010
conf/pkc
Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More.
Xavier Boyen
2010
conf/eurocrypt
Efficient Lattice (H)IBE in the Standard Model.
Shweta Agrawal
Dan Boneh
Xavier Boyen
2010
conf/africacrypt
Strong Cryptography from Weak Secrets.
Xavier Boyen
Céline Chevalier
Georg Fuchsbauer
David Pointcheval
2009
conf/ccs
Hidden credential retrieval from a reusable password.
Xavier Boyen
2009
conf/pkc
Distributed Public-Key Cryptography from Weak Secrets.
Michel Abdalla
Xavier Boyen
Céline Chevalier
David Pointcheval
2009
conf/cans
HPAKE : Password Authentication Secure against Cross-Site User Impersonation.
Xavier Boyen
2008
journals/joc
Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups.
Dan Boneh
Xavier Boyen
2008
conf/acisp
New Paradigms for Password Security.
Xavier Boyen
2007
conf/uss
Halting Password Puzzles: Hard-to-break Encryption from Human-memorable Keys.
Xavier Boyen
2007
conf/pkc
Full-Domain Subgroup Hiding and Constant-Size Group Signatures.
Xavier Boyen
Brent Waters
2007
conf/eurocrypt
Encryption from Exponent Inversion IBE.
Xavier Boyen
2007
conf/eurocrypt
Mesh Signatures.
Xavier Boyen
2007
conf/asiacrypt
Miniature CCA2 PK Encryption: Tight Security Without Redundancy.
Xavier Boyen
2006
conf/ccs
Forward-secure signatures with untrusted update.
Xavier Boyen
Hovav Shacham
Emily Shen
Brent Waters
2006
conf/crypto
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions.
Dan Boneh
Xavier Boyen
2006
conf/crypto
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles).
Xavier Boyen
Brent Waters
2006
conf/ctrsa
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles.
Dan Boneh
Xavier Boyen
Shai Halevi
2006
conf/eurocrypt
Compact Group Signatures Without Random Oracles.
Xavier Boyen
Brent Waters
2005
conf/ccs
Direct chosen ciphertext security from identity-based techniques.
Xavier Boyen
Qixiang Mei
Brent Waters
2005
conf/eurocrypt
Hierarchical Identity Based Encryption with Constant Size Ciphertext.
Dan Boneh
Xavier Boyen
Eu-Jin Goh
2005
conf/eurocrypt
Secure Remote Authentication Using Biometric Data.
Xavier Boyen
Yevgeniy Dodis
Jonathan Katz
Rafail Ostrovsky
Adam D. Smith
2004
conf/ccs
Reusable cryptographic fuzzy extractors.
Xavier Boyen
2004
conf/crypto
Secure Identity Based Encryption Without Random Oracles.
Dan Boneh
Xavier Boyen
2004
conf/crypto
Short Group Signatures.
Dan Boneh
Xavier Boyen
Hovav Shacham
2004
conf/eurocrypt
Short Signatures Without Random Oracles.
Dan Boneh
Xavier Boyen
2004
conf/eurocrypt
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles.
Dan Boneh
Xavier Boyen
2003
conf/crypto
Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography).
Xavier Boyen
Coauthors
Adam D. Smith
(1)
Brent Waters
(6)
Carlos Aguilar Melchor
(1)
Céline Chevalier
(2)
Christopher Carr
(1)
Dan Boneh
(13)
David Mandell Freeman
(1)
David Pointcheval
(2)
Elaine Shi
(1)
Elie Bursztein
(1)
Emily Shen
(1)
Ernest Foo
(3)
Ersin Uzun
(1)
Eu-Jin Goh
(1)
Georg Fuchsbauer
(1)
Hoeteck Wee
(1)
Hovav Shacham
(2)
Hristo Bojinov
(1)
Jayamine Alupotha
(2)
Johannes Müller
(2)
Jonathan Katz
(1)
Josef Pieprzyk
(1)
Laurent Fousse
(1)
Leonie Simpson
(1)
Matthew McKague
(2)
Michel Abdalla
(1)
Mir Ali Rezazadeh Baee
(1)
Niluka Amarasinghe
(1)
Panagiotis Voulgaris
(1)
Philippe Gaborit
(1)
Qinyi Li
(9)
Qixiang Mei
(1)
Rafail Ostrovsky
(1)
Shai Halevi
(1)
Shweta Agrawal
(4)
Simon Barber
(1)
Slim Bettaieb
(1)
Thomas Haines
(4)
Vinod Vaikuntanathan
(1)
Xavier Boyen
(56)
Yevgeniy Dodis
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to