A fair and efficient solution to the socialist millionaires’ problem F Boudot, B Schoenmakers, J Traore Discrete Applied Mathematics 111 (1-2), 23-36, 2001 | 177 | 2001 |
M2M security: Challenges and solutions A Barki, A Bouabdallah, S Gharout, J Traore IEEE Communications Surveys & Tutorials 18 (2), 1241-1254, 2016 | 89 | 2016 |
Cryptographic system for group signature DA Modiano, S Canard, M Girault, J Traore US Patent 7,673,144, 2010 | 86 | 2010 |
Group signatures and their relevance to privacy-protecting offline electronic cash systems J Traoré Australasian Conference on Information Security and Privacy, 228-243, 1999 | 83 | 1999 |
Efficient publicly verifiable secret sharing schemes with fast or delayed recovery F Boudot, J Traoré International Conference on Information and Communications Security, 87-102, 1999 | 72 | 1999 |
Method and system with authentication, revocable anonymity and non-repudiation S Canard, S Guilloteau, E Malville, J Traore US Patent 7,840,813, 2010 | 71 | 2010 |
An online public auction protocol protecting bidder privacy KQ Nguyen, J Traoré Australasian Conference on Information Security and Privacy, 427-442, 2000 | 71 | 2000 |
On fair e-cash systems based on group signature schemes S Canard, J Traoré Australasian Conference on Information Security and Privacy, 237-248, 2003 | 67 | 2003 |
An efficient fair off-line electronic cash system with extensions to checks and wallets with observers A de Solages, J Traoré International Conference on Financial Cryptography, 275-295, 1998 | 65 | 1998 |
Guide to pairing-based cryptography N El Mrabet, M Joye CRC Press, 2017 | 61 | 2017 |
On some incompatible properties of voting schemes B Chevallier-Mames, PA Fouque, D Pointcheval, J Stern, J Traoré Towards Trustworthy Elections, 191-199, 2010 | 55 | 2010 |
A practical and secure coercion-resistant scheme for remote elections R Araújo, S Foulle, J Traoré Dagstuhl Seminar Proceedings, 2008 | 55 | 2008 |
Improvement of efficiency in (unconditional) anonymous transferable e-cash S Canard, A Gouget, J Traoré International Conference on Financial Cryptography and Data Security, 202-214, 2008 | 49 | 2008 |
Divisible e-cash made practical S Canard, D Pointcheval, O Sanders, J Traoré IET Information Security 10 (6), 332-347, 2016 | 48 | 2016 |
Towards practical and secure coercion-resistant electronic elections R Araújo, NB Rajeb, R Robbana, J Traoré, S Youssfi International Conference on Cryptology and Network Security, 278-297, 2010 | 48 | 2010 |
Achieving optimal anonymity in transferable e-cash with a judge O Blazy, S Canard, G Fuchsbauer, A Gouget, H Sibert, J Traoré International Conference on Cryptology in Africa, 206-223, 2011 | 47 | 2011 |
List signature schemes S Canard, B Schoenmakers, M Stam, J Traoré Discrete Applied Mathematics 154 (2), 189-201, 2006 | 47 | 2006 |
On some incompatible properties of voting schemes B Chevallier-Mames, PA Fouque, D Pointcheval, J Traoré In IAVoSS Workshop On Trustworthy Elections, WOTE’06, 2006 | 43 | 2006 |
Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption. Z Xia, SA Schneider, J Heather, J Traoré EVT'08 Proceedings of the Conference on Electronic Voting Technology, 2008 | 40 | 2008 |
A practical and secure coercion-resistant scheme for internet voting R Araujo, S Foulle, J Traoré Towards Trustworthy Elections, 330-342, 2010 | 33 | 2010 |