Skip to Main content Skip to Navigation

hal-00878640v1  Journal articles
Céline ChevalierStéphanie DelauneSteve KremerMark D. Ryan. Composition of Password-based Protocols
Formal Methods in System Design, Springer Verlag, 2013, 43 (3), pp.369-413. ⟨10.1007/s10703-013-0184-6⟩
inria-00419147v1  Conference papers
Michel AbdallaDario CatalanoCéline ChevalierDavid Pointcheval. Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
Second African International Conference on Cryptology (AfricaCrypt '09), 2009, Gammarth - Tunisie, Tunisia. pp.254--271
hal-00864345v1  Conference papers
Fabrice BenhamoudaOlivier BlazyCéline ChevalierDavid PointchevalDamien Vergnaud. New Techniques for SPHFs and Efficient One-Round PAKE Protocols
CRYPTO 2013 - 33rd Annual Cryptology Conference, Aug 2013, Santa Barbara, CA, United States. pp.449-475, ⟨10.1007/978-3-642-40041-4_25⟩
hal-03130894v1  Conference papers
Olivier BlazyLaura BrouilhetCéline ChevalierNeals Fournaise. Round-optimal Constant-size Blind Signatures
SECRYPT 2020 - 17th International Conference on Security and Cryptography, Jul 2020, Lieusaint - Paris / Virtual, France. pp.213-224, ⟨10.5220/0009888702130224⟩
hal-00865612v1  Conference papers
Olivier BlazyCéline ChevalierDavid PointchevalDamien Vergnaud. Analysis and Improvement of Lindell's UC-Secure Commitment Schemes
ACNS 2013 - 11th International Conference Applied Cryptography and Network Security, Jun 2013, Banff, Canada. pp.534-551, ⟨10.1007/978-3-642-38980-1_34⟩
hal-00934343v1  Conference papers
Céline ChevalierDamien GaumontDavid Naccache. How to (Carefully) Breach a Service Contract?
Open Problems in Mathematical and Computational Sciences Conference, Sep 2013, Istambul, Turkey
inria-00539542v1  Conference papers
Xavier BoyenCéline ChevalierGeorg FuchsbauerDavid Pointcheval. Strong Cryptography from Weak Secrets - Building Efficient PKE and IBE from Distributed Passwords
Third African International Conference on Cryptology (AfricaCrypt '10), May 2010, Stellenbosch, South Africa. pp.297--315
hal-01214711v1  Conference papers
Olivier BlazyCéline ChevalierDamien Vergnaud. Non-Interactive Zero-Knowledge Proofs of Non-Membership
Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, Apr 2015, San Francisco, United States. pp.145-164, ⟨10.1007/978-3-319-16715-2_8⟩
hal-00790633v1  Conference papers
Fabrice Ben HamoudaOlivier BlazyCéline ChevalierDavid PointchevalDamien Vergnaud. Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Feb 2013, Nara, Japan. pp.272-291, ⟨10.1007/978-3-642-36362-7_18⟩
inria-00419148v1  Conference papers
Céline ChevalierPierre-Alain FouqueDavid PointchevalSébastien Zimmer. Optimal Randomness Extraction from a Diffie-Hellman Element
Advances in Cryptology -- Proceedings of EUROCRYPT '09, 2009, Cologne, Allemagne, Germany. pp.572--589
inria-00419149v1  Conference papers
Michel AbdallaXavier BoyenCéline ChevalierDavid Pointcheval. Distributed Public-Key Cryptography from Weak Secrets
Conference on Practice and Theory in Public-Key Cryptography (PKC '09), 2009, Irvine, California, USA, United States. pp.139--159
inria-00419145v1  Conference papers
Michel AbdallaCéline ChevalierDavid Pointcheval. Smooth Projective Hashing for Conditionally Extractable Commitments
Advances in Cryptology -- Proceedings of CRYPTO '09, 2009, Santa-Barbara, Californie, United States. pp.671--689
inria-00539541v1  Conference papers
Michel AbdallaCéline ChevalierMark ManulisDavid Pointcheval. Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys
Third African International Conference on Cryptology (AfricaCrypt '10), 2010, Stellenbosch, South Africa. pp.351--368
inria-00419157v1  Conference papers
Michel AbdallaDario CatalanoCéline ChevalierDavid Pointcheval. Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework
The Cryptographers' Track at RSA Conference '08 (CT-RSA '08), 2008, San Francisco, Californie, Germany. pp.335--351
hal-03097496v1  Conference papers
Luka MusicElham KashefiCéline Chevalier. Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses
ProvSec 2020 - 14th International Conference on Provable and Practical Security, Nov 2020, Singapour / Virtual, Singapore. pp.318-337, ⟨10.1007/978-3-030-62576-4_16⟩
hal-03130890v1  Conference papers
Céline ChevalierQuoc Huy VuEhsan Ebrahimi Khaleghi. On Security Notions for Encryption in a Quantum World
QCrypt 2020 - 10th International Conference on Quantum Cryptography, Aug 2020, Amsterdam / Virtual, Netherlands
inria-00636753v1  Conference papers
Céline ChevalierStéphanie DelauneSteve Kremer. Transforming Password Protocols to Compose
31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11), Dec 2011, Mumbai, India