#### Filter Results:

- Full text PDF available (10)

#### Publication Year

2002

2017

- This year (0)
- Last 5 years (7)
- Last 10 years (12)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

- Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Claude Bajard
- IACR Cryptology ePrint Archive
- 2010

The Canettiâ€“Krawczyk (CK) and extended Canettiâ€“Krawczyk (eCK) security models, are widely used to provide security arguments for key agreement protocols. We discuss security shades in the (e)CKâ€¦ (More)

- Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Claude Bajard
- IACR Cryptology ePrint Archive
- 2009

The Exponential Challenge Response (XRC) and Dual Exponential Challenge Response (DCR) signature schemes are the building blocks of the HMQV protocol. We propose a complementary analysis of theseâ€¦ (More)

This paper deals with the computation of the rank and some integer Smith forms of a series of sparse matrices arising in algebraic K-theory. The number of non zero entries in the considered matricesâ€¦ (More)

- Philippe Elbaz-Vincent, Stefan MÃ¼ller-Stach
- 2002

If R is a smooth semi-local algebra of geometric type over an infinite field, we prove that the Milnor K-group K n (R) surjects onto the higher Chow group CHn(R , n) for all n 0. Our proof showsâ€¦ (More)

- Philippe Elbaz-Vincent, Herbert Gangl
- GSI
- 2015

We show that the entropy functionâ€”and hence the finite 1-logarithmâ€”behaves a lot like certain derivations. We recall its cohomological interpretation as a 2-cocycle and also deduce 2n-cocycles forâ€¦ (More)

ForN = 5, 6 and 7, using the classification of perfect quadratic form s, we compute the homology of the VoronoÃ¯ cell complexes attach ed to the modular groupsSLN(Z) andGLN(Z). From this we deduce theâ€¦ (More)

- Augustin P. Sarr, Philippe Elbaz-Vincent
- AFRICACRYPT
- 2012

The Canettiâ€“Krawczyk (CK) model remains widely used for the analysis of key agreement protocols. We recall the CK model, and its variant used for the analysis of the HMQV protocol, the CKHMQV model;â€¦ (More)

- C. Jayet-Griffon, M.-A. Cornelie, Paolo Maistri, Philippe Elbaz-Vincent, RÃ©gis Leveugle
- 2015 International Conference on ReConFigurableâ€¦
- 2015

Fully Homomorphic Encryption (FHE) becomes an important encryption scheme in the frame of Cloud computing. Current software implementations are however very slow and require a huge computing power.â€¦ (More)

- Philippe Elbaz-Vincent, Herbert Gangl, C CHRISTOPHESOULÃ‰
- 2011

For N = 5, 6 and 7, using the classification of perfect quadratic forms, we compute the homology of the VoronoÃ¯ cell complexes attached to the modular groups SLN(Z) and GLN(Z). From this we deduceâ€¦ (More)

- Augustin P. Sarr, Philippe Elbaz-Vincent
- IJACT
- 2017