A fair and efficient solution to the socialist millionaires’ problem F Boudot, B Schoenmakers, J Traore Discrete Applied Mathematics 111 (1-2), 23-36, 2001 | 205 | 2001 |
Cryptographic system for group signature DA Modiano, S Canard, M Girault, J Traore US Patent 7,673,144, 2010 | 185 | 2010 |
M2M security: Challenges and solutions A Barki, A Bouabdallah, S Gharout, J Traore IEEE Communications Surveys & Tutorials 18 (2), 1241-1254, 2016 | 147 | 2016 |
On some incompatible properties of voting schemes B Chevallier-Mames, PA Fouque, D Pointcheval, J Stern, J Traoré Towards Trustworthy Elections: New Directions in Electronic Voting, 191-199, 2010 | 119 | 2010 |
Method and system with authentication, revocable anonymity and non-repudiation S Canard, S Guilloteau, E Malville, J Traore US Patent 7,840,813, 2010 | 98 | 2010 |
Group signatures and their relevance to privacy-protecting offline electronic cash systems J Traoré Information Security and Privacy: 4th Australasian Conference, ACISP’99 …, 1999 | 90 | 1999 |
Efficient publicly verifiable secret sharing schemes with fast or delayed recovery F Boudot, J Traoré Information and Communication Security: Second International Conference …, 1999 | 87 | 1999 |
On fair e-cash systems based on group signature schemes S Canard, J Traoré Information Security and Privacy: 8th Australasian Conference, ACISP 2003 …, 2003 | 80 | 2003 |
An online public auction protocol protecting bidder privacy KQ Nguyen, J Traoré Australasian Conference on Information Security and Privacy, 427-442, 2000 | 77 | 2000 |
An efficient fair off-line electronic cash system with extensions to checks and wallets with observers A de Solages, J Traoré International Conference on Financial Cryptography, 275-295, 1998 | 70 | 1998 |
Divisible e-cash made practical S Canard, D Pointcheval, O Sanders, J Traoré IACR International Workshop on Public Key Cryptography, 77-100, 2015 | 67 | 2015 |
A practical and secure coercion-resistant scheme for remote elections R Araújo, S Foulle, J Traoré Dagstuhl Seminar Proceedings, 2008 | 66 | 2008 |
Towards practical and secure coercion-resistant electronic elections R Araújo, N Ben Rajeb, R Robbana, J Traoré, S Youssfi Cryptology and Network Security: 9th International Conference, CANS 2010 …, 2010 | 63 | 2010 |
Improvement of efficiency in (unconditional) anonymous transferable e-cash S Canard, A Gouget, J Traoré Financial Cryptography and Data Security: 12th International Conference, FC …, 2008 | 56 | 2008 |
Achieving optimal anonymity in transferable e-cash with a judge O Blazy, S Canard, G Fuchsbauer, A Gouget, H Sibert, J Traoré International Conference on Cryptology in Africa, 206-223, 2011 | 55 | 2011 |
List signature schemes S Canard, B Schoenmakers, M Stam, J Traoré Discrete Applied Mathematics 154 (2), 189-201, 2006 | 54 | 2006 |
Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption. Z Xia, SA Schneider, J Heather, J Traoré EVT'08 Proceedings of the Conference on Electronic Voting Technology, 2008 | 50 | 2008 |
Improved secure integer comparison via homomorphic encryption F Bourse, O Sanders, J Traoré Cryptographers’ Track at the RSA Conference, 391-416, 2020 | 49 | 2020 |
Trusted execution environments: A look under the hood G Arfaoui, S Gharout, J Traoré 2014 2nd IEEE international conference on mobile cloud computing, services …, 2014 | 47 | 2014 |
Remote electronic voting can be efficient, verifiable and coercion-resistant R Araújo, A Barki, S Brunet, J Traoré Financial Cryptography and Data Security: FC 2016 International Workshops …, 2016 | 44 | 2016 |