Fast server-aided RSA signatures secure against active attacks, Advances in Cryptology -CRYPTO'95, vol.963, pp.57-69, 1995. ,
Improving secure server performance by re-balancing SSL/TLS handshakes, ASIACCS 06: 1st ACM Symposium on Information, pp.26-34, 2006. ,
New algorithms for secure outsourcing of modular exponentiations, ESORICS 2012: 17th European Symposium on Research in Computer Security, vol.7459, pp.541-556, 2012. ,
Privately outsourcing exponentiation to a single server: Cryptanalysis and optimal constructions, ESORICS 2016: 21st European Symposium on Research in Computer Security, Part I, vol.9878, pp.261-278, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01375817
How to securely outsource cryptographic computations, TCC 2005: 2nd Theory of Cryptography Conference, vol.3378, pp.264-282, 2005. ,
Journal des sciences militaires, p.1883 ,
Two efficient serveraided secret computation protocols based on the addition sequence, Advances in Cryptology -ASIACRYPT'91, vol.739, pp.450-459, 1993. ,
Public keys, Advances in Cryptology -CRYPTO 2012, vol.7417, pp.626-642, 2012. ,
Security and performance of server-aided RSA computation protocols, Advances in Cryptology -CRYPTO'95, vol.963, pp.70-83, 1995. ,
Speeding up secret computations with insecure auxiliary devices, Advances in Cryptology -CRYPTO'88, vol.403, pp.497-506, 1990. ,
Cryptanalysis of server-aided RSA protocols with private-key splitting, Comput. J, vol.62, issue.8, pp.1194-1213, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02082342
Fast decipherment algorithm for RSA public key cryptosystem. Electronic Letters, vol.18, pp.905-907, 1982. ,
Digitalized signatures and public-key functions as intractable as factorization, 1979. ,
Probabilistic algorithm for testing primality, J. Number Theory, vol.12, pp.128-138, 1980. ,
A method for obtaining digital signatures and public-key cryptosystems, Communications of the Association for Computing Machinery, vol.21, pp.120-126, 1978. ,
Secure outsourcing in discrete-logarithm-based and pairing-based cryptography (Invited talk), Information Security Theory and Practice -12th IFIP WG 11.2 International Conference, pp.7-11, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-02294605
Securely outsourcing exponentiations with single untrusted program for cloud storage, ESORICS 2014: 19th European Symposium on Research in Computer Security, Part I, vol.8712, pp.326-343, 2014. ,
Efficient and secure outsourcing scheme for RSA decryption in Internet of Things, IEEE Internet of Things Journal, 2020. ,