BibTeX records: Xavier Boyen

download as .bib file

@article{DBLP:journals/cic/LiB24,
  author       = {Qinyi Li and
                  Xavier Boyen},
  title        = {Public-Key Authenticated Encryption with Keyword Search Made Easy},
  journal      = {{IACR} Commun. Cryptol.},
  volume       = {1},
  number       = {2},
  pages        = {16},
  year         = {2024},
  url          = {https://doi.org/10.62056/a63z11zn4},
  doi          = {10.62056/A63Z11ZN4},
  timestamp    = {Wed, 25 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cic/LiB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BaeeSBFP24,
  author       = {Mir Ali Rezazadeh Baee and
                  Leonie Simpson and
                  Xavier Boyen and
                  Ernest Foo and
                  Josef Pieprzyk},
  title        = {A Provably Secure and Efficient Cryptographic-Key Update Protocol
                  for Connected Vehicles},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {4066--4083},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3345406},
  doi          = {10.1109/TDSC.2023.3345406},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/BaeeSBFP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cii/MillerCFBP23,
  author       = {Thomas Miller and
                  Shoufeng Cao and
                  Marcus Foth and
                  Xavier Boyen and
                  Warwick Powell},
  title        = {An asset-backed decentralised finance instrument for food supply chains
                  - {A} case study from the livestock export industry},
  journal      = {Comput. Ind.},
  volume       = {147},
  pages        = {103863},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compind.2023.103863},
  doi          = {10.1016/J.COMPIND.2023.103863},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cii/MillerCFBP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AlupothaBM23,
  author       = {Jayamine Alupotha and
                  Xavier Boyen and
                  Matthew McKague},
  title        = {{LACT+:} Practical Post-Quantum Scalable Confidential Transactions},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {24},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020024},
  doi          = {10.3390/CRYPTOGRAPHY7020024},
  timestamp    = {Thu, 20 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AlupothaBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BaeeSBFP23,
  author       = {Mir Ali Rezazadeh Baee and
                  Leonie Simpson and
                  Xavier Boyen and
                  Ernest Foo and
                  Josef Pieprzyk},
  title        = {{ALI:} Anonymous Lightweight Inter-Vehicle Broadcast Authentication
                  With Encryption},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {1799--1817},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3164436},
  doi          = {10.1109/TDSC.2022.3164436},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/BaeeSBFP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BoyenL23,
  author       = {Xavier Boyen and
                  Qinyi Li},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Identity-Based Matchmaking Encryption with Enhanced Privacy - {A}
                  Generic Construction with Practical Instantiations},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14345},
  pages        = {425--445},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51476-0\_21},
  doi          = {10.1007/978-3-031-51476-0\_21},
  timestamp    = {Thu, 18 Jan 2024 08:27:15 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/BoyenL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlupothaBM22,
  author       = {Jayamine Alupotha and
                  Xavier Boyen and
                  Matthew McKague},
  title        = {Aggregable Confidential Transactions for Efficient Quantum-Safe Cryptocurrencies},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {17722--17747},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3149605},
  doi          = {10.1109/ACCESS.2022.3149605},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AlupothaBM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AlupothaBM22,
  author       = {Jayamine Alupotha and
                  Xavier Boyen and
                  Matthew McKague},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {Zero-History Confidential Chains with Zero-Knowledge Contracts: {A}
                  New Normal for Decentralized Ledgers?},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13554},
  pages        = {67--88},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17140-6\_4},
  doi          = {10.1007/978-3-031-17140-6\_4},
  timestamp    = {Tue, 27 Sep 2022 21:06:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AlupothaBM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlupothaB22,
  author       = {Jayamine Alupotha and
                  Xavier Boyen},
  title        = {Practical UC-Secure Zero-Knowledge Smart Contracts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {670},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/670},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlupothaB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlupothaB21,
  author       = {Jayamine Alupotha and
                  Xavier Boyen},
  title        = {Origami Store: UC-Secure Foldable Datachains for the Quantum Era},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {81454--81484},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3085413},
  doi          = {10.1109/ACCESS.2021.3085413},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AlupothaB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/PowellCMFBEVT21,
  author       = {Warwick Powell and
                  Shoufeng Cao and
                  Thomas Miller and
                  Marcus Foth and
                  Xavier Boyen and
                  Barry Earsman and
                  Santiago del Valle and
                  Charles Turner{-}Morris},
  title        = {From premise to practice of social consensus: How to agree on common
                  knowledge in blockchain-enabled supply chains},
  journal      = {Comput. Networks},
  volume       = {200},
  pages        = {108536},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comnet.2021.108536},
  doi          = {10.1016/J.COMNET.2021.108536},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/PowellCMFBEVT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AmarasingheBM21,
  author       = {Niluka Amarasinghe and
                  Xavier Boyen and
                  Matthew McKague},
  title        = {The Cryptographic Complexity of Anonymous Coins: {A} Systematic Exploration},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {1},
  pages        = {10},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5010010},
  doi          = {10.3390/CRYPTOGRAPHY5010010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AmarasingheBM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BoyenHMS21,
  author       = {Xavier Boyen and
                  Udyani Herath and
                  Matthew McKague and
                  Douglas Stebila},
  title        = {Associative Blockchain for Decentralized {PKI} Transparency},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {2},
  pages        = {14},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5020014},
  doi          = {10.3390/CRYPTOGRAPHY5020014},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/BoyenHMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/BaeeSBFP21,
  author       = {Mir Ali Rezazadeh Baee and
                  Leonie Simpson and
                  Xavier Boyen and
                  Ernest Foo and
                  Josef Pieprzyk},
  title        = {Authentication strategies in vehicular communications: a taxonomy
                  and framework},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2021},
  number       = {1},
  pages        = {129},
  year         = {2021},
  url          = {https://doi.org/10.1186/s13638-021-01968-6},
  doi          = {10.1186/S13638-021-01968-6},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejwcn/BaeeSBFP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/LiBF21,
  author       = {Qinyi Li and
                  Xavier Boyen and
                  Ernest Foo},
  title        = {CCA-security from adaptive all-but-one lossy trapdoor functions},
  journal      = {Theor. Comput. Sci.},
  volume       = {883},
  pages        = {99--121},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.tcs.2021.06.014},
  doi          = {10.1016/J.TCS.2021.06.014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/LiBF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/LiB21,
  author       = {Qinyi Li and
                  Xavier Boyen},
  title        = {Efficient public-key encryption with equality test from lattices},
  journal      = {Theor. Comput. Sci.},
  volume       = {892},
  pages        = {85--107},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.tcs.2021.09.010},
  doi          = {10.1016/J.TCS.2021.09.010},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/LiB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BaeeSBFP21,
  author       = {Mir Ali Rezazadeh Baee and
                  Leonie Simpson and
                  Xavier Boyen and
                  Ernest Foo and
                  Josef Pieprzyk},
  title        = {On the Efficiency of Pairing-Based Authentication for Connected Vehicles:
                  Time is Not on Our Side!},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {3678--3693},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3087359},
  doi          = {10.1109/TIFS.2021.3087359},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/BaeeSBFP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/BaeeSBFP21,
  author       = {Mir Ali Rezazadeh Baee and
                  Leonie Simpson and
                  Xavier Boyen and
                  Ernest Foo and
                  Josef Pieprzyk},
  title        = {A Model to Evaluate Reliability of Authentication Protocols in {C-ITS}
                  Safety-Critical Applications},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {70},
  number       = {9},
  pages        = {9306--9319},
  year         = {2021},
  url          = {https://doi.org/10.1109/TVT.2021.3097088},
  doi          = {10.1109/TVT.2021.3097088},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/BaeeSBFP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BoyenFL21,
  author       = {Xavier Boyen and
                  Ernest Foo and
                  Qinyi Li},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Anonymous Lattice Identity-Based Encryption with Traceable Identities},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {630--649},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_32},
  doi          = {10.1007/978-3-030-90567-5\_32},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BoyenFL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BoyenHM21,
  author       = {Xavier Boyen and
                  Thomas Haines and
                  Johannes M{\"{u}}ller},
  title        = {Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2021, Vienna, Austria, September 6-10, 2021},
  pages        = {272--291},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EuroSP51992.2021.00027},
  doi          = {10.1109/EUROSP51992.2021.00027},
  timestamp    = {Thu, 11 Nov 2021 09:11:58 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/BoyenHM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AmarasingheBM21,
  author       = {Niluka Amarasinghe and
                  Xavier Boyen and
                  Matthew McKague},
  editor       = {Nikita Borisov and
                  Claudia D{\'{\i}}az},
  title        = {The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from
                  a Systematic Approach},
  booktitle    = {Financial Cryptography and Data Security - 25th International Conference,
                  {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12674},
  pages        = {205--225},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-662-64322-8\_10},
  doi          = {10.1007/978-3-662-64322-8\_10},
  timestamp    = {Wed, 27 Oct 2021 09:25:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AmarasingheBM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BoyenIL21,
  author       = {Xavier Boyen and
                  Malika Izabach{\`{e}}ne and
                  Qinyi Li},
  editor       = {Jung Hee Cheon and
                  Jean{-}Pierre Tillich},
  title        = {Secure Hybrid Encryption in the Standard Model from Hard Learning
                  Problems},
  booktitle    = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto
                  2021, Daejeon, South Korea, July 20-22, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12841},
  pages        = {399--418},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-81293-5\_21},
  doi          = {10.1007/978-3-030-81293-5\_21},
  timestamp    = {Wed, 21 Jul 2021 15:51:05 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/BoyenIL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-04210,
  author       = {Eleanor McMurtry and
                  Xavier Boyen and
                  Chris Culnane and
                  Kristian Gj{\o}steen and
                  Thomas Haines and
                  Vanessa Teague},
  title        = {Towards Verifiable Remote Voting with Paper Assurance},
  journal      = {CoRR},
  volume       = {abs/2111.04210},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.04210},
  eprinttype    = {arXiv},
  eprint       = {2111.04210},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-04210.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-08455,
  author       = {Shoufeng Cao and
                  Thomas Miller and
                  Marcus Foth and
                  Warwick Powell and
                  Xavier Boyen and
                  Charles Turner{-}Morris},
  title        = {Integrating On-chain and Off-chain Governance for Supply Chain Transparency
                  and Integrity},
  journal      = {CoRR},
  volume       = {abs/2111.08455},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.08455},
  eprinttype    = {arXiv},
  eprint       = {2111.08455},
  timestamp    = {Mon, 22 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-08455.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmarasingheBM21,
  author       = {Niluka Amarasinghe and
                  Xavier Boyen and
                  Matthew McKague},
  title        = {The Cryptographic Complexity of Anonymous Coins: {A} Systematic Exploration},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {36},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/036},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AmarasingheBM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyenH021,
  author       = {Xavier Boyen and
                  Thomas Haines and
                  Johannes M{\"{u}}ller},
  title        = {Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {304},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/304},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyenH021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/AlupothaBF20,
  author       = {Jayamine Alupotha and
                  Xavier Boyen and
                  Ernest Foo},
  editor       = {Stephan Krenn and
                  Haya Schulmann and
                  Serge Vaudenay},
  title        = {Compact Multi-Party Confidential Transactions},
  booktitle    = {Cryptology and Network Security - 19th International Conference, {CANS}
                  2020, Vienna, Austria, December 14-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12579},
  pages        = {430--452},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65411-5\_21},
  doi          = {10.1007/978-3-030-65411-5\_21},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/AlupothaBF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BoyenHM20,
  author       = {Xavier Boyen and
                  Thomas Haines and
                  Johannes M{\"{u}}ller},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {A Verifiable and Practical Lattice-Based Decryption Mix Net with External
                  Auditing},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12309},
  pages        = {336--356},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59013-0\_17},
  doi          = {10.1007/978-3-030-59013-0\_17},
  timestamp    = {Fri, 02 Jul 2021 20:12:27 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BoyenHM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BoyenIL20,
  author       = {Xavier Boyen and
                  Malika Izabach{\`{e}}ne and
                  Qinyi Li},
  editor       = {Clemente Galdi and
                  Vladimir Kolesnikov},
  title        = {A Simple and Efficient CCA-Secure Lattice {KEM} in the Standard Model},
  booktitle    = {Security and Cryptography for Networks - 12th International Conference,
                  {SCN} 2020, Amalfi, Italy, September 14-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12238},
  pages        = {321--337},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57990-6\_16},
  doi          = {10.1007/978-3-030-57990-6\_16},
  timestamp    = {Tue, 08 Sep 2020 19:15:32 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BoyenIL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyenHM20,
  author       = {Xavier Boyen and
                  Thomas Haines and
                  Johannes M{\"{u}}ller},
  title        = {A Verifiable and Practical Lattice-Based Decryption Mix Net with External
                  Auditing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {115},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/115},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyenHM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BansalBP19,
  author       = {Tarun Kumar Bansal and
                  Xavier Boyen and
                  Josef Pieprzyk},
  title        = {Signcryption schemes with insider security in an ideal permutation
                  model},
  journal      = {J. Math. Cryptol.},
  volume       = {13},
  number       = {2},
  pages        = {117--150},
  year         = {2019},
  url          = {https://doi.org/10.1515/jmc-2018-0006},
  doi          = {10.1515/JMC-2018-0006},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/BansalBP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/AmarasingheBM19,
  author       = {Niluka Amarasinghe and
                  Xavier Boyen and
                  Matthew McKague},
  title        = {A Survey of Anonymity of Cryptocurrencies},
  booktitle    = {Proceedings of the Australasian Computer Science Week Multiconference,
                  {ACSW} 2019, Sydney, NSW, Australia, January 29-31, 2019},
  pages        = {2:1--2:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3290688.3290693},
  doi          = {10.1145/3290688.3290693},
  timestamp    = {Mon, 14 Jan 2019 08:35:38 +0100},
  biburl       = {https://dblp.org/rec/conf/acsw/AmarasingheBM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BoyenL19,
  author       = {Xavier Boyen and
                  Qinyi Li},
  editor       = {Jintai Ding and
                  Rainer Steinwandt},
  title        = {Direct CCA-Secure {KEM} and Deterministic {PKE} from Plain {LWE}},
  booktitle    = {Post-Quantum Cryptography - 10th International Conference, PQCrypto
                  2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11505},
  pages        = {116--130},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-25510-7\_7},
  doi          = {10.1007/978-3-030-25510-7\_7},
  timestamp    = {Mon, 15 Jul 2019 14:30:19 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/BoyenL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BoyenH18,
  author       = {Xavier Boyen and
                  Thomas Haines},
  title        = {Forward-Secure Linkable Ring Signatures from Bilinear Maps},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {35},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2040035},
  doi          = {10.3390/CRYPTOGRAPHY2040035},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/BoyenH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BoyenH18,
  author       = {Xavier Boyen and
                  Thomas Haines},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Forward-Secure Linkable Ring Signatures},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {245--264},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_15},
  doi          = {10.1007/978-3-319-93638-3\_15},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BoyenH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BoyenL18,
  author       = {Xavier Boyen and
                  Qinyi Li},
  editor       = {Bart Preneel and
                  Frederik Vercauteren},
  title        = {Almost Tight Multi-Instance Multi-Ciphertext Identity-Based Encryption
                  on Lattices},
  booktitle    = {Applied Cryptography and Network Security - 16th International Conference,
                  {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10892},
  pages        = {535--553},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93387-0\_28},
  doi          = {10.1007/978-3-319-93387-0\_28},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BoyenL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoyenCH18,
  author       = {Xavier Boyen and
                  Christopher Carr and
                  Thomas Haines},
  editor       = {Satya V. Lokam and
                  Sushmita Ruj and
                  Kouichi Sakurai},
  title        = {Graphchain: a Blockchain-Free Scalable Decentralised Ledger},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Blockchains, Cryptocurrencies,
                  and Contracts, BCC@AsiaCCS 2018, Incheon, Republic of Korea, June
                  4, 2018},
  pages        = {21--33},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3205230.3205235},
  doi          = {10.1145/3205230.3205235},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BoyenCH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyenL17,
  author       = {Xavier Boyen and
                  Qinyi Li},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {All-But-Many Lossy Trapdoor Functions from Lattices and Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {298--331},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_11},
  doi          = {10.1007/978-3-319-63697-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyenL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/CarrBBH17,
  author       = {Christopher Carr and
                  Colin Boyd and
                  Xavier Boyen and
                  Thomas Haines},
  title        = {Bitcoin Unchained},
  journal      = {{ERCIM} News},
  volume       = {2017},
  number       = {110},
  year         = {2017},
  url          = {https://ercim-news.ercim.eu/en110/special/bitcoin-unchained},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/CarrBBH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoydBCH17,
  author       = {Colin Boyd and
                  Xavier Boyen and
                  Christopher Carr and
                  Thomas Haines},
  title        = {Key Recovery: Inert and Public},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {243},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/243},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoydBCH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyenL17,
  author       = {Xavier Boyen and
                  Qinyi Li},
  title        = {All-But-Many Lossy Trapdoor Functions from Lattices and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {532},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/532},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyenL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Boyen16,
  author       = {Xavier Boyen},
  title        = {Unconditionally Anonymous Ring and Mesh Signatures},
  journal      = {J. Cryptol.},
  volume       = {29},
  number       = {4},
  pages        = {729--774},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00145-015-9208-2},
  doi          = {10.1007/S00145-015-9208-2},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Boyen16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BoyenL16,
  author       = {Xavier Boyen and
                  Qinyi Li},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Turing Machines with Shortcuts: Efficient Attribute-Based Encryption
                  for Bounded Functions},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {267--284},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_15},
  doi          = {10.1007/978-3-319-39555-5\_15},
  timestamp    = {Fri, 07 Aug 2020 17:57:32 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BoyenL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsc/HainesB16,
  author       = {Thomas Haines and
                  Xavier Boyen},
  title        = {{VOTOR:} conceptually simple remote voting against tiny tyrants},
  booktitle    = {Proceedings of the Australasian Computer Science Week Multiconference,
                  Canberra, Australia, February 2-5, 2016},
  pages        = {32},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2843043.2843362},
  doi          = {10.1145/2843043.2843362},
  timestamp    = {Mon, 26 Nov 2018 12:14:45 +0100},
  biburl       = {https://dblp.org/rec/conf/acsc/HainesB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BoyenL16,
  author       = {Xavier Boyen and
                  Qinyi Li},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Towards Tightly Secure Lattice Short Signature and Id-Based Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10032},
  pages        = {404--434},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53890-6\_14},
  doi          = {10.1007/978-3-662-53890-6\_14},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BoyenL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/Boyen16,
  author       = {Xavier Boyen},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {The Case For Human Primacy in Cryptography - (Summary from the Keynote
                  Lecture)},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {3--10},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_1},
  doi          = {10.1007/978-3-319-61273-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/Boyen16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/BoydBCH16,
  author       = {Colin Boyd and
                  Xavier Boyen and
                  Christopher Carr and
                  Thomas Haines},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Key Recovery: Inert and Public},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {111--126},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_6},
  doi          = {10.1007/978-3-319-61273-7\_6},
  timestamp    = {Fri, 14 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/BoydBCH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/HainesB16,
  author       = {Thomas Haines and
                  Xavier Boyen},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  Jordi Barrat and
                  Josh Benaloh and
                  Nicole J. Goodman and
                  Peter Y. A. Ryan and
                  Vanessa Teague},
  title        = {Truly Multi-authority 'Pr{\^{e}}t-{\`{a}}-Voter'},
  booktitle    = {Electronic Voting - First International Joint Conference, E-Vote-ID
                  2016, Bregenz, Austria, October 18-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10141},
  pages        = {56--72},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-52240-1\_4},
  doi          = {10.1007/978-3-319-52240-1\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/HainesB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PhongWANB16,
  author       = {Le Trieu Phong and
                  Lihua Wang and
                  Yoshinori Aono and
                  Manh Ha Nguyen and
                  Xavier Boyen},
  title        = {Proxy Re-Encryption Schemes with Key Privacy from {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {327},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/327},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PhongWANB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyenL16,
  author       = {Xavier Boyen and
                  Qinyi Li},
  title        = {Towards Tightly Secure Short Signature and {IBE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {498},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/498},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyenL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyenCH16,
  author       = {Xavier Boyen and
                  Christopher Carr and
                  Thomas Haines},
  title        = {Blockchain-Free Cryptocurrencies. {A} Rational Framework for Truly
                  Decentralised Fast Transactions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {871},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/871},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyenCH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscw/VyasSBDB15,
  author       = {Dhaval Vyas and
                  Stephen Snow and
                  Margot Brereton and
                  Uwe Dulleck and
                  Xavier Boyen},
  editor       = {Dan Cosley and
                  Andrea Forte and
                  Luigina Ciolfi and
                  David McDonald},
  title        = {Being Thrifty on a {\textdollar}100K Wage: Austerity in Family Finances},
  booktitle    = {18th {ACM} Conference on Computer Supported Cooperative Work {\&}
                  Social Computing, {CSCW} 2015, Vancouver, BC, Canada, March 14-18,
                  2015, Companion Volume},
  pages        = {167--170},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2685553.2698998},
  doi          = {10.1145/2685553.2698998},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscw/VyasSBDB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/BoyenL15,
  author       = {Xavier Boyen and
                  Qinyi Li},
  editor       = {Man Ho Au and
                  Atsuko Miyaji},
  title        = {Attribute-Based Encryption for Finite Automata from {LWE}},
  booktitle    = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa,
                  Japan, November 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9451},
  pages        = {247--267},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26059-4\_14},
  doi          = {10.1007/978-3-319-26059-4\_14},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/BoyenL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/MelchorBDG14,
  author       = {Carlos Aguilar Melchor and
                  Xavier Boyen and
                  Jean{-}Christophe Deneuville and
                  Philippe Gaborit},
  editor       = {Michele Mosca},
  title        = {Sealing the Leak on Classical {NTRU} Signatures},
  booktitle    = {Post-Quantum Cryptography - 6th International Workshop, PQCrypto 2014,
                  Waterloo, ON, Canada, October 1-3, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8772},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11659-4\_1},
  doi          = {10.1007/978-3-319-11659-4\_1},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/MelchorBDG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MelchorBDG14,
  author       = {Carlos Aguilar Melchor and
                  Xavier Boyen and
                  Jean{-}Christophe Deneuville and
                  Philippe Gaborit},
  title        = {Sealing the Leak on Classical {NTRU} signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {484},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/484},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MelchorBDG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyenFS14,
  author       = {Xavier Boyen and
                  Xiong Fan and
                  Elaine Shi},
  title        = {Adaptively Secure Fully Homomorphic Signatures Based on Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {916},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/916},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyenFS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Boyen13,
  author       = {Xavier Boyen},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Expressive Cryptography: Lattice Perspectives},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {267},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_18},
  doi          = {10.1007/978-3-642-39059-3\_18},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Boyen13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/MelchorBBFG13,
  author       = {Carlos Aguilar Melchor and
                  Slim Bettaieb and
                  Xavier Boyen and
                  Laurent Fousse and
                  Philippe Gaborit},
  editor       = {Amr M. Youssef and
                  Abderrahmane Nitaj and
                  Aboul Ella Hassanien},
  title        = {Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference
                  on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7918},
  pages        = {1--25},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38553-7\_1},
  doi          = {10.1007/978-3-642-38553-7\_1},
  timestamp    = {Fri, 31 Jan 2020 16:14:16 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/MelchorBBFG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/AonoBPW13,
  author       = {Yoshinori Aono and
                  Xavier Boyen and
                  Le Trieu Phong and
                  Lihua Wang},
  editor       = {Goutam Paul and
                  Serge Vaudenay},
  title        = {Key-Private Proxy Re-encryption under {LWE}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2013 - 14th International Conference
                  on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8250},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-03515-4\_1},
  doi          = {10.1007/978-3-319-03515-4\_1},
  timestamp    = {Fri, 04 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/AonoBPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Boyen13,
  author       = {Xavier Boyen},
  editor       = {Amit Sahai},
  title        = {Attribute-Based Functional Encryption on Lattices},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  pages        = {122--142},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_8},
  doi          = {10.1007/978-3-642-36594-2\_8},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Boyen13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1301-6683,
  author       = {Xavier Boyen and
                  Nir Friedman and
                  Daphne Koller},
  title        = {Discovering the Hidden Structure of Complex Dynamic Systems},
  journal      = {CoRR},
  volume       = {abs/1301.6683},
  year         = {2013},
  url          = {http://arxiv.org/abs/1301.6683},
  eprinttype    = {arXiv},
  eprint       = {1301.6683},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1301-6683.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1301-7362,
  author       = {Xavier Boyen and
                  Daphne Koller},
  title        = {Tractable Inference for Complex Stochastic Processes},
  journal      = {CoRR},
  volume       = {abs/1301.7362},
  year         = {2013},
  url          = {http://arxiv.org/abs/1301.7362},
  eprinttype    = {arXiv},
  eprint       = {1301.7362},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1301-7362.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MelchorBBFG13,
  author       = {Carlos Aguilar Melchor and
                  Slim Bettaieb and
                  Xavier Boyen and
                  Laurent Fousse and
                  Philippe Gaborit},
  title        = {Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {281},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/281},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MelchorBBFG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BarberBSU12,
  author       = {Simon Barber and
                  Xavier Boyen and
                  Elaine Shi and
                  Ersin Uzun},
  editor       = {Angelos D. Keromytis},
  title        = {Bitter to Better - How to Make Bitcoin a Better Currency},
  booktitle    = {Financial Cryptography and Data Security - 16th International Conference,
                  {FC} 2012, Kralendijk, Bonaire, February 27 - March 2, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7397},
  pages        = {399--414},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32946-3\_29},
  doi          = {10.1007/978-3-642-32946-3\_29},
  timestamp    = {Tue, 30 Jul 2024 10:38:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BarberBSU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AgrawalBVVW12,
  author       = {Shweta Agrawal and
                  Xavier Boyen and
                  Vinod Vaikuntanathan and
                  Panagiotis Voulgaris and
                  Hoeteck Wee},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Functional Encryption for Threshold Functions (or Fuzzy {IBE)} from
                  Lattices},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {280--297},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_17},
  doi          = {10.1007/978-3-642-30057-8\_17},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AgrawalBVVW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Boyen12,
  author       = {Xavier Boyen},
  title        = {Attribute-Based Functional Encryption on Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {716},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/716},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Boyen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BonehB11,
  author       = {Dan Boneh and
                  Xavier Boyen},
  title        = {Efficient Selective Identity-Based Encryption Without Random Oracles},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {4},
  pages        = {659--693},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9078-6},
  doi          = {10.1007/S00145-010-9078-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BonehB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/Boyen11,
  author       = {Xavier Boyen},
  editor       = {Dongdai Lin and
                  Gene Tsudik and
                  Xiaoyun Wang},
  title        = {Expressive Encryption Systems from Lattices - (Abstract from the Invited
                  Lecture)},
  booktitle    = {Cryptology and Network Security - 10th International Conference, {CANS}
                  2011, Sanya, China, December 10-12, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7092},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25513-7\_1},
  doi          = {10.1007/978-3-642-25513-7\_1},
  timestamp    = {Mon, 25 Nov 2019 15:32:12 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/Boyen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2011,
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5},
  doi          = {10.1007/978-3-642-24316-5},
  isbn         = {978-3-642-24315-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalBVVW11,
  author       = {Shweta Agrawal and
                  Xavier Boyen and
                  Vinod Vaikuntanathan and
                  Panagiotis Voulgaris and
                  Hoeteck Wee},
  title        = {Fuzzy Identity Based Encryption from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {414},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/414},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalBVVW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BoyenW10,
  author       = {Xavier Boyen and
                  Brent Waters},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {35--52},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_3},
  doi          = {10.1007/978-3-642-13708-2\_3},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BoyenW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BoyenCFP10,
  author       = {Xavier Boyen and
                  C{\'{e}}line Chevalier and
                  Georg Fuchsbauer and
                  David Pointcheval},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Strong Cryptography from Weak Secrets},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {297--315},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_18},
  doi          = {10.1007/978-3-642-12678-9\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/BoyenCFP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalBB10,
  author       = {Shweta Agrawal and
                  Dan Boneh and
                  Xavier Boyen},
  editor       = {Tal Rabin},
  title        = {Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext
                  Hierarchical {IBE}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {98--115},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_6},
  doi          = {10.1007/978-3-642-14623-7\_6},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalBB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BojinovBBB10,
  author       = {Hristo Bojinov and
                  Elie Bursztein and
                  Xavier Boyen and
                  Dan Boneh},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {Kamouflage: Loss-Resistant Password Management},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {286--302},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_18},
  doi          = {10.1007/978-3-642-15497-3\_18},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BojinovBBB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AgrawalBB10,
  author       = {Shweta Agrawal and
                  Dan Boneh and
                  Xavier Boyen},
  editor       = {Henri Gilbert},
  title        = {Efficient Lattice {(H)IBE} in the Standard Model},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {553--572},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_28},
  doi          = {10.1007/978-3-642-13190-5\_28},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AgrawalBB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AgrawalBBF10,
  author       = {Shweta Agrawal and
                  Dan Boneh and
                  Xavier Boyen and
                  David Mandell Freeman},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Preventing Pollution Attacks in Multi-source Network Coding},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {161--176},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_10},
  doi          = {10.1007/978-3-642-13013-7\_10},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AgrawalBBF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Boyen10,
  author       = {Xavier Boyen},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Lattice Mixing and Vanishing Trapdoors: {A} Framework for Fully Secure
                  Short Signatures and More},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {499--517},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_29},
  doi          = {10.1007/978-3-642-13013-7\_29},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Boyen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Boyen10,
  author       = {Xavier Boyen},
  editor       = {Alexander W. Dent and
                  Yuliang Zheng},
  title        = {Identity-Based Signcryption},
  booktitle    = {Practical Signcryption},
  series       = {Information Security and Cryptography},
  pages        = {195--216},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-540-89411-7\_10},
  doi          = {10.1007/978-3-540-89411-7\_10},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/series/isc/Boyen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalBBF10,
  author       = {Shweta Agrawal and
                  Dan Boneh and
                  Xavier Boyen and
                  David Mandell Freeman},
  title        = {Preventing Pollution Attacks in Multi-Source Network Coding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {183},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/183},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalBBF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/Boyen09,
  author       = {Xavier Boyen},
  editor       = {Juan A. Garay and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {{HPAKE} : Password Authentication Secure against Cross-Site User Impersonation},
  booktitle    = {Cryptology and Network Security, 8th International Conference, {CANS}
                  2009, Kanazawa, Japan, December 12-14, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5888},
  pages        = {279--298},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10433-6\_19},
  doi          = {10.1007/978-3-642-10433-6\_19},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/Boyen09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Boyen09,
  author       = {Xavier Boyen},
  editor       = {Wanqing Li and
                  Willy Susilo and
                  Udaya Kiran Tupakula and
                  Reihaneh Safavi{-}Naini and
                  Vijay Varadharajan},
  title        = {Hidden credential retrieval from a reusable password},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2009, Sydney, Australia, March
                  10-12, 2009},
  pages        = {228--238},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1533057.1533089},
  doi          = {10.1145/1533057.1533089},
  timestamp    = {Fri, 18 Mar 2022 11:47:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Boyen09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaBCP09,
  author       = {Michel Abdalla and
                  Xavier Boyen and
                  C{\'{e}}line Chevalier and
                  David Pointcheval},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Distributed Public-Key Cryptography from Weak Secrets},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {139--159},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_9},
  doi          = {10.1007/978-3-642-00468-1\_9},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaBCP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ciss/Boyen09,
  author       = {Xavier Boyen},
  editor       = {Marc Joye and
                  Gregory Neven},
  title        = {Flexible {IBE} and Beyond in the Commutative-Blinding Framework},
  booktitle    = {Identity-Based Cryptography},
  series       = {Cryptology and Information Security Series},
  volume       = {2},
  pages        = {65--82},
  publisher    = {{IOS} Press},
  year         = {2009},
  url          = {https://doi.org/10.3233/978-1-58603-947-9-65},
  doi          = {10.3233/978-1-58603-947-9-65},
  timestamp    = {Thu, 11 Apr 2019 14:31:06 +0200},
  biburl       = {https://dblp.org/rec/series/ciss/Boyen09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ciss/Boyen09a,
  author       = {Xavier Boyen},
  editor       = {Marc Joye and
                  Gregory Neven},
  title        = {Generalized {IBE} in the Exponent-Inversion Framework},
  booktitle    = {Identity-Based Cryptography},
  series       = {Cryptology and Information Security Series},
  volume       = {2},
  pages        = {83--99},
  publisher    = {{IOS} Press},
  year         = {2009},
  url          = {https://doi.org/10.3233/978-1-58603-947-9-83},
  doi          = {10.3233/978-1-58603-947-9-83},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ciss/Boyen09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/Boyen08,
  author       = {Xavier Boyen},
  title        = {A tapestry of identity-based encryption: practical frameworks compared},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {1},
  pages        = {3--21},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJACT.2008.017047},
  doi          = {10.1504/IJACT.2008.017047},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/Boyen08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BonehB08,
  author       = {Dan Boneh and
                  Xavier Boyen},
  title        = {Short Signatures Without Random Oracles and the {SDH} Assumption in
                  Bilinear Groups},
  journal      = {J. Cryptol.},
  volume       = {21},
  number       = {2},
  pages        = {149--177},
  year         = {2008},
  url          = {https://doi.org/10.1007/s00145-007-9005-7},
  doi          = {10.1007/S00145-007-9005-7},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BonehB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Boyen08,
  author       = {Xavier Boyen},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {New Paradigms for Password Security},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {1--5},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_1},
  doi          = {10.1007/978-3-540-70500-0\_1},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Boyen08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/Boyen08,
  author       = {Xavier Boyen},
  editor       = {Steven D. Galbraith and
                  Kenneth G. Paterson},
  title        = {The Uber-Assumption Family},
  booktitle    = {Pairing-Based Cryptography - Pairing 2008, Second International Conference,
                  Egham, UK, September 1-3, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5209},
  pages        = {39--56},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85538-5\_3},
  doi          = {10.1007/978-3-540-85538-5\_3},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/Boyen08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BoyenD08,
  author       = {Xavier Boyen and
                  C{\'{e}}cile Delerabl{\'{e}}e},
  editor       = {Rafail Ostrovsky and
                  Roberto De Prisco and
                  Ivan Visconti},
  title        = {Expressive Subgroup Signatures},
  booktitle    = {Security and Cryptography for Networks, 6th International Conference,
                  {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5229},
  pages        = {185--200},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85855-3\_13},
  doi          = {10.1007/978-3-540-85855-3\_13},
  timestamp    = {Tue, 25 Feb 2020 11:33:46 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/BoyenD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Boyen07,
  author       = {Xavier Boyen},
  editor       = {Kaoru Kurosawa},
  title        = {Miniature {CCA2} {PK} Encryption: Tight Security Without Redundancy},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {485--501},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_30},
  doi          = {10.1007/978-3-540-76900-2\_30},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Boyen07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Boyen07,
  author       = {Xavier Boyen},
  editor       = {Moni Naor},
  title        = {Mesh Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Barcelona, Spain, May 20-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4515},
  pages        = {210--227},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72540-4\_12},
  doi          = {10.1007/978-3-540-72540-4\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Boyen07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Boyen07a,
  author       = {Xavier Boyen},
  editor       = {Moni Naor},
  title        = {General \emph{Ad Hoc} Encryption from Exponent Inversion {IBE}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Barcelona, Spain, May 20-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4515},
  pages        = {394--411},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72540-4\_23},
  doi          = {10.1007/978-3-540-72540-4\_23},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Boyen07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BoyenW07,
  author       = {Xavier Boyen and
                  Brent Waters},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Full-Domain Subgroup Hiding and Constant-Size Group Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_1},
  doi          = {10.1007/978-3-540-71677-8\_1},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BoyenW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Boyen07,
  author       = {Xavier Boyen},
  editor       = {Niels Provos},
  title        = {Halting Password Puzzles: Hard-to-break Encryption from Human-memorable
                  Keys},
  booktitle    = {Proceedings of the 16th {USENIX} Security Symposium, Boston, MA, USA,
                  August 6-10, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/16th-usenix-security-symposium/halting-password-puzzles-hard-break-encryption-human},
  timestamp    = {Mon, 01 Feb 2021 08:43:02 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Boyen07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Boyen07,
  author       = {Xavier Boyen},
  title        = {Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling
                  Participants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {94},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/094},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Boyen07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc5091,
  author       = {Xavier Boyen and
                  Luther Martin},
  title        = {Identity-Based Cryptography Standard {(IBCS)} {\#}1: Supersingular
                  Curve Implementations of the {BF} and {BB1} Cryptosystems},
  journal      = {{RFC}},
  volume       = {5091},
  pages        = {1--63},
  year         = {2007},
  url          = {https://doi.org/10.17487/RFC5091},
  doi          = {10.17487/RFC5091},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc5091.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoyenSSW06,
  author       = {Xavier Boyen and
                  Hovav Shacham and
                  Emily Shen and
                  Brent Waters},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Forward-secure signatures with untrusted update},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {191--200},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180430},
  doi          = {10.1145/1180405.1180430},
  timestamp    = {Wed, 24 Feb 2021 17:28:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BoyenSSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyenW06,
  author       = {Xavier Boyen and
                  Brent Waters},
  editor       = {Cynthia Dwork},
  title        = {Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {290--307},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_17},
  doi          = {10.1007/11818175\_17},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyenW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehB06,
  author       = {Dan Boneh and
                  Xavier Boyen},
  editor       = {Cynthia Dwork},
  title        = {On the Impossibility of Efficiently Combining Collision Resistant
                  Hash Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {570--583},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_34},
  doi          = {10.1007/11818175\_34},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BonehBH06,
  author       = {Dan Boneh and
                  Xavier Boyen and
                  Shai Halevi},
  editor       = {David Pointcheval},
  title        = {Chosen Ciphertext Secure Public Key Threshold Encryption Without Random
                  Oracles},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at
                  the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3860},
  pages        = {226--243},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11605805\_15},
  doi          = {10.1007/11605805\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BonehBH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BoyenW06,
  author       = {Xavier Boyen and
                  Brent Waters},
  editor       = {Serge Vaudenay},
  title        = {Compact Group Signatures Without Random Oracles},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {427--444},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_26},
  doi          = {10.1007/11761679\_26},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BoyenW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/Boyen06,
  author       = {Xavier Boyen},
  editor       = {Gadiel Seroussi and
                  Alfredo Viola},
  title        = {A Promenade through the New Cryptography of Bilinear Pairings},
  booktitle    = {2006 {IEEE} Information Theory Workshop, {ITW} 2006, Punta del Este,
                  Uruguay, March 13-17, 2006},
  pages        = {19--23},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ITW.2006.1633773},
  doi          = {10.1109/ITW.2006.1633773},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/Boyen06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyenW06,
  author       = {Xavier Boyen and
                  Brent Waters},
  title        = {Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {85},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyenW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyenSSW06,
  author       = {Xavier Boyen and
                  Hovav Shacham and
                  Emily Shen and
                  Brent Waters},
  title        = {Forward-Secure Signatures with Untrusted Update},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {297},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/297},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyenSSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoyenMW05,
  author       = {Xavier Boyen and
                  Qixiang Mei and
                  Brent Waters},
  editor       = {Vijay Atluri and
                  Catherine Meadows and
                  Ari Juels},
  title        = {Direct chosen ciphertext security from identity-based techniques},
  booktitle    = {Proceedings of the 12th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages        = {320--329},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102120.1102162},
  doi          = {10.1145/1102120.1102162},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BoyenMW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BoyenDKOS05,
  author       = {Xavier Boyen and
                  Yevgeniy Dodis and
                  Jonathan Katz and
                  Rafail Ostrovsky and
                  Adam D. Smith},
  editor       = {Ronald Cramer},
  title        = {Secure Remote Authentication Using Biometric Data},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {147--163},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_9},
  doi          = {10.1007/11426639\_9},
  timestamp    = {Tue, 20 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BoyenDKOS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehBG05,
  author       = {Dan Boneh and
                  Xavier Boyen and
                  Eu{-}Jin Goh},
  editor       = {Ronald Cramer},
  title        = {Hierarchical Identity Based Encryption with Constant Size Ciphertext},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {440--456},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_26},
  doi          = {10.1007/11426639\_26},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BonehBG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehBG05,
  author       = {Dan Boneh and
                  Xavier Boyen and
                  Eu{-}Jin Goh},
  title        = {Hierarchical Identity Based Encryption with Constant Size Ciphertext},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehBG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyenMW05,
  author       = {Xavier Boyen and
                  Qixiang Mei and
                  Brent Waters},
  title        = {Direct Chosen Ciphertext Security from Identity-Based Techniques},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {288},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/288},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyenMW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyenW05,
  author       = {Xavier Boyen and
                  Brent Waters},
  title        = {Compact Group Signatures Without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {381},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/381},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyenW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Boyen04,
  author       = {Xavier Boyen},
  editor       = {Vijayalakshmi Atluri and
                  Birgit Pfitzmann and
                  Patrick D. McDaniel},
  title        = {Reusable cryptographic fuzzy extractors},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages        = {82--91},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1030083.1030096},
  doi          = {10.1145/1030083.1030096},
  timestamp    = {Fri, 13 Nov 2020 16:10:44 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Boyen04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehBS04,
  author       = {Dan Boneh and
                  Xavier Boyen and
                  Hovav Shacham},
  editor       = {Matthew K. Franklin},
  title        = {Short Group Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
                  CryptologyConference, Santa Barbara, California, USA, August 15-19,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3152},
  pages        = {41--55},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28628-8\_3},
  doi          = {10.1007/978-3-540-28628-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehBS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehB04,
  author       = {Dan Boneh and
                  Xavier Boyen},
  editor       = {Matthew K. Franklin},
  title        = {Secure Identity Based Encryption Without Random Oracles},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
                  CryptologyConference, Santa Barbara, California, USA, August 15-19,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3152},
  pages        = {443--459},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28628-8\_27},
  doi          = {10.1007/978-3-540-28628-8\_27},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehB04,
  author       = {Dan Boneh and
                  Xavier Boyen},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {Short Signatures Without Random Oracles},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {56--73},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_4},
  doi          = {10.1007/978-3-540-24676-3\_4},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BonehB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehB04a,
  author       = {Dan Boneh and
                  Xavier Boyen},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {Efficient Selective-ID Secure Identity-Based Encryption Without Random
                  Oracles},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {223--238},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_14},
  doi          = {10.1007/978-3-540-24676-3\_14},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BonehB04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehB04,
  author       = {Dan Boneh and
                  Xavier Boyen},
  title        = {Short Signatures Without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {171},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/171},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehB04a,
  author       = {Dan Boneh and
                  Xavier Boyen},
  title        = {Efficient Selective-ID Secure Identity Based Encryption Without Random
                  Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {172},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/172},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehB04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehB04b,
  author       = {Dan Boneh and
                  Xavier Boyen},
  title        = {Secure Identity Based Encryption Without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {173},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/173},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehB04b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehBS04,
  author       = {Dan Boneh and
                  Xavier Boyen and
                  Hovav Shacham},
  title        = {Short Group Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {174},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/174},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehBS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Boyen04,
  author       = {Xavier Boyen},
  title        = {Reusable Cryptographic Fuzzy Extractors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {358},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/358},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Boyen04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Boyen03,
  author       = {Xavier Boyen},
  editor       = {Dan Boneh},
  title        = {Multipurpose Identity-Based Signcryption {(A} Swiss Army Knife for
                  Identity-Based Cryptography)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 17-21,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2729},
  pages        = {383--399},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45146-4\_23},
  doi          = {10.1007/978-3-540-45146-4\_23},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Boyen03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Boyen03,
  author       = {Xavier Boyen},
  title        = {Multipurpose Identity-Based Signcryption : {A} Swiss Army Knife for
                  Identity-Based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {163},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/163},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Boyen03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Boyen02,
  author       = {Xavier Boyen},
  title        = {Inference and learning in complex stochastic processes},
  school       = {Stanford University, {USA}},
  year         = {2002},
  url          = {https://searchworks.stanford.edu/view/5506759},
  timestamp    = {Wed, 31 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Boyen02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fss/BoyenW99,
  author       = {Xavier Boyen and
                  Louis Wehenkel},
  title        = {Automatic induction of fuzzy decision trees and its application to
                  power system security assessment},
  journal      = {Fuzzy Sets Syst.},
  volume       = {102},
  number       = {1},
  pages        = {3--19},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0165-0114(98)00198-5},
  doi          = {10.1016/S0165-0114(98)00198-5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fss/BoyenW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/BoyenK99,
  author       = {Xavier Boyen and
                  Daphne Koller},
  editor       = {Jim Hendler and
                  Devika Subramanian},
  title        = {Exploiting the Architecture of Dynamic Systems},
  booktitle    = {Proceedings of the Sixteenth National Conference on Artificial Intelligence
                  and Eleventh Conference on Innovative Applications of Artificial Intelligence,
                  July 18-22, 1999, Orlando, Florida, {USA}},
  pages        = {313--320},
  publisher    = {{AAAI} Press / The {MIT} Press},
  year         = {1999},
  url          = {http://www.aaai.org/Library/AAAI/1999/aaai99-046.php},
  timestamp    = {Tue, 05 Sep 2023 09:10:47 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/BoyenK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uai/BoyenFK99,
  author       = {Xavier Boyen and
                  Nir Friedman and
                  Daphne Koller},
  editor       = {Kathryn B. Laskey and
                  Henri Prade},
  title        = {Discovering the Hidden Structure of Complex Dynamic Systems},
  booktitle    = {{UAI} '99: Proceedings of the Fifteenth Conference on Uncertainty
                  in Artificial Intelligence, Stockholm, Sweden, July 30 - August 1,
                  1999},
  pages        = {91--100},
  publisher    = {Morgan Kaufmann},
  year         = {1999},
  url          = {https://dslpitt.org/uai/displayArticleDetails.jsp?mmnu=1\&\#38;smnu=2\&\#38;article\_id=157\&\#38;proceeding\_id=15},
  timestamp    = {Wed, 03 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uai/BoyenFK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/BoyenK98,
  author       = {Xavier Boyen and
                  Daphne Koller},
  editor       = {Michael J. Kearns and
                  Sara A. Solla and
                  David A. Cohn},
  title        = {Approximate Learning of Dynamic Models},
  booktitle    = {Advances in Neural Information Processing Systems 11, {[NIPS} Conference,
                  Denver, Colorado, USA, November 30 - December 5, 1998]},
  pages        = {396--402},
  publisher    = {The {MIT} Press},
  year         = {1998},
  url          = {http://papers.nips.cc/paper/1588-approximate-learning-of-dynamic-models},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/BoyenK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uai/BoyenK98,
  author       = {Xavier Boyen and
                  Daphne Koller},
  editor       = {Gregory F. Cooper and
                  Seraf{\'{\i}}n Moral},
  title        = {Tractable Inference for Complex Stochastic Processes},
  booktitle    = {{UAI} '98: Proceedings of the Fourteenth Conference on Uncertainty
                  in Artificial Intelligence, University of Wisconsin Business School,
                  Madison, Wisconsin, USA, July 24-26, 1998},
  pages        = {33--42},
  publisher    = {Morgan Kaufmann},
  year         = {1998},
  url          = {https://dslpitt.org/uai/displayArticleDetails.jsp?mmnu=1\&\#38;smnu=2\&\#38;article\_id=230\&\#38;proceeding\_id=14},
  timestamp    = {Wed, 03 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uai/BoyenK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}