Ultrasonic amplification and non-ohmic behaviour in CdS and ZnO, Ultrasonics, vol.1, issue.4, p.V, 1963. ,
Simple Functional Encryption Schemes for Inner Products, Lecture Notes in Computer Science, vol.9020, pp.733-751, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01131971
Decentralizing Inner-Product Functional Encryption, Public-Key Cryptography ? PKC 2019, vol.11443, pp.128-157, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02317011
Multi-input functional encryption for inner products: Function-hiding realizations and constructions without pairings, CRYPTO 2018, Part I, vol.10991, pp.597-627, 2018. ,
Eprint, Cryptology ePrint Archive, 2019. ,
Multi-input Inner-Product Functional Encryption from Pairings, Lecture Notes in Computer Science, pp.601-626, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01524105
Indistinguishability Obfuscation from Compact Functional Encryption, Lecture Notes in Computer Science, vol.9215, pp.308-326, 2015. ,
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions, Advances in Cryptology ? CRYPTO 2016, vol.9816, pp.333-362, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01228559
Function-Hiding Inner Product Encryption, Advances in Cryptology -- ASIACRYPT 2015, vol.9452, pp.470-491, 2015. ,
Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions, Journal of Cryptology, vol.31, issue.2, pp.434-520, 2017. ,
Functional Encryption: Definitions and Challenges, Theory of Cryptography, vol.6597, pp.253-273, 2011. ,
Decentralized multi-client functional encryption for inner product, ASIACRYPT 2018, Part II, vol.11273, pp.703-732, 2018. ,
Multi-client functional encryption with repetition for inner product, Cryptology ePrint Archive, 1021. ,
Full-Hiding (Unbounded) Multi-input Inner Product Functional Encryption from the k-Linear Assumption, Public-Key Cryptography ? PKC 2018, vol.10770, pp.245-277, 2018. ,
Multi-input functional encryption, EUROCRYPT 2014, vol.8441, pp.578-602, 2014. ,
Privacy-Friendly Aggregation for the Smart-Grid, Privacy Enhancing Technologies, vol.6794, pp.175-191, 2011. ,
Figure 8: Reprsentative oscillogram and sonogram of the (A and D) (1 ? )2 + N10, (B and E) (1 ? )3 + N10, (C and F) (1 ? )4 + N10 (G and J) (1 ? )5 + N10, (H and K) (1 ? )6 + N10, and (I and L) (1 ? )7 + N10 call types. ,
Eprint, Cryptology ePrint Archive, 2019. ,