No photo of Frédéric Lafitte

Frédéric Lafitte

Researcher

    20112024

    Research activity per year

    Filter
    Conference contribution

    Search results

    • 2014

      A note on a signature building block and relevant security reduction in the green-hohenberger ot scheme

      Cao, Z., Lafitte, F. & Markowitch, O., 2014, Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Revised Selected Papers. Yung, M., Lin, D., Xu, S. & Yung, M. (eds.). Springer, p. 282-288 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8567).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    • Safe cryptographic random number generation using untrusted generators

      Bruyninckx, H., Lafitte, F. & Van Heule, D., 2014, 2014 IEEE International Conference on Communications, ICC 2014. Institute of Electrical and Electronics Engineers Inc., p. 731-736 6 p. 6883406. (2014 IEEE International Conference on Communications, ICC 2014).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    • 2013

      Authenticated key agreement in wireless networks with automated key management

      Qachri, N., Lafitte, F. & Markowitch, O., 2013, SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks. p. 62-69 8 p. (SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    • Blinded additively homomorphic encryption schemes for self-tallying voting

      Dossogne, J. & Lafitte, F., 2013, SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks. p. 173-180 8 p. (SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    • On authentication factors: "What you can" and "how you do it"

      Dossogne, J. & Lafitte, F., 2013, SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks. p. 70-78 9 p. (SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    • SAT based analysis of LTE stream cipher ZUC

      Lafitte, F., Markowitch, O. & Van Heule, D., 2013, SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks. p. 110-116 7 p. (SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    • Secure and practical threshold RSA

      Dossogne, J., Lafitte, F. & Van Heule, D., 2013, SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks. p. 79-85 7 p. (SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    • 2012

      Coercion-freeness in e-voting via multi-party designated verifier schemes

      Dossogne, J., Lafitte, F. & Markowitch, O., 2012, 5th International Conference on Electronic Voting 2012, EVOTE 2012 - Proceedings. Gesellschaft fur Informatik (GI), p. 127-141 15 p. (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI); vol. P-205).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    • Mental voting booths

      Dossogne, J. & Lafitte, F., 2012, Information Security Technology for Applications - 16th Nordic Conference on Secure IT Systems, NordSec 2011, Revised Selected Papers. p. 82-97 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7161 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Your message has successfully been sent.
    Your message was not sent due to an error.