60 results  save search

  • 1
  • 2
hal-01613782v1  Journal articles
Pooya FarshimLouiza KhatiDamien Vergnaud. Security of Even-Mansour Ciphers under Key-Dependent Messages
IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, 2017, 2017 (2), pp.84-104. ⟨10.13154/tosc.v2017.i2.84-104⟩
hal-01403418v1  Conference papers
Louiza KhatiNicky MouhaDamien Vergnaud. Full Disk Encryption: Bridging Theory and Practice
CT-RSA 2017 - RSA Conference Cryptographers' Track, Feb 2017, San Francisco, United States. pp.241--257, ⟨10.1007/978-3-319-52153-4_14⟩
inria-00356999v1  Conference papers
Benoît LibertDamien Vergnaud. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
12th International Conference on Practice and Theory in Public-Key Cryptography - PKC 2009, 2009, Irvine, United States. pp.235-255
hal-01110204v1  Conference papers
Brett HemenwayBenoît LibertRafail OstrovskyDamien Vergnaud. Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security
ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Jul 2011, Dakar, Senegal. pp.70-88
hal-01110047v1  Conference papers
Damien Vergnaud. Efficient and secure generalized pattern matching via fast fourier transform
AFRICACRYPT'11 - Proceedings of the 4th international conference on Progress in cryptology in Africa, Jul 2011, Dakar, Senegal. pp.41-58
hal-01110210v1  Conference papers
Malika IzabachèneBenoît LibertDamien Vergnaud. Block-wise p-signatures and non-interactive anonymous credentials with efficient attributes
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding, Dec 2011, Oxford, UK, United Kingdom. pp.431-450
hal-00871325v1  Books
Damien Vergnaud. Exercices et problèmes de cryptographie
Dunod, pp.304, 2012, Sciences Sup
hal-00871331v1  Conference papers
Aurélie BauerDamien VergnaudJean-Christophe Zapalowicz. Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods
PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, May 2012, Darmstadt, Germany. pp.609-626, ⟨10.1007/978-3-642-30057-8_36⟩
hal-01613794v1  Conference papers
Marc BeunardeauAisling ConnollyHouda FerradiRémi GéraudDavid Naccache et al.  Reusing Nonces in Schnorr Signatures
Computer Security - ESORICS 2017, Sep 2017, Oslo, Norway. pp.224-241, ⟨10.1007/978-3-319-66402-6_14⟩
hal-01613773v1  Conference papers
Sonia BelaidFabrice BenhamoudaAlain PasselègueEmmanuel ProuffAdrian Thillard et al.  Private Multiplication over Finite Fields
Advances in Cryptology - CRYPTO 2017, Aug 2017, Santa Barbara, United States. pp.397-426, ⟨10.1007/978-3-319-63697-9_14⟩
hal-01214711v1  Conference papers
Olivier BlazyCéline ChevalierDamien Vergnaud. Non-Interactive Zero-Knowledge Proofs of Non-Membership
Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, Apr 2015, San Francisco, United States. pp.145-164, ⟨10.1007/978-3-319-16715-2_8⟩
hal-01214714v1  Books
Damien Vergnaud. Exercices et problèmes de cryptographie - 2ème édition
Dunod, pp.304, 2015, Sciences Sup, ISBN-10: 2100721453
hal-01214701v1  Conference papers
Aurélie BauerDamien Vergnaud. Practical Key Recovery for Discrete-Logarithm Based Authentication Schemes from Random Nonce Bits.
Cryptographic Hardware and Embedded Systems - CHES 2015, Sep 2015, Saint-Malo, France. pp.287-306, ⟨10.1007/978-3-662-48324-4_15⟩
hal-01613813v1  Journal articles
Damien Vergnaud. Comment on ‘Attribute-Based Signatures for Supporting Anonymous Certification’ by N. Kaaniche and M. Laurent (ESORICS 2016)
The Computer Journal (Oxford), Oxford, 2017, Section D: Security in Computer Systems and Networks, ⟨10.1093/comjnl/bxx058⟩
hal-00865612v1  Conference papers
Olivier BlazyCéline ChevalierDavid PointchevalDamien Vergnaud. Analysis and Improvement of Lindell's UC-Secure Commitment Schemes
ACNS 2013 - 11th International Conference Applied Cryptography and Network Security, Jun 2013, Banff, Canada. pp.534-551, ⟨10.1007/978-3-642-38980-1_34⟩
hal-00764863v1  Conference papers
Olivier BlazyDavid PointchevalDamien Vergnaud. Compact Round-Optimal Partially-Blind Signatures
SCN 2012 - 8th International Conference Security and Cryptography for Networks, Sep 2012, Amalfi, Italy. pp.95-112, ⟨10.1007/978-3-642-32928-9_6⟩
hal-00864345v1  Conference papers
Fabrice BenhamoudaOlivier BlazyCéline ChevalierDavid PointchevalDamien Vergnaud. New Techniques for SPHFs and Efficient One-Round PAKE Protocols
CRYPTO 2013 - 33rd Annual Cryptology Conference, Aug 2013, Santa Barbara, CA, United States. pp.449-475, ⟨10.1007/978-3-642-40041-4_25⟩
hal-00864431v1  Conference papers
Yevgeniy DodisDavid PointchevalSylvain RuhaultDamien VergnaudDaniel Wichs. Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust
ACM CCS 2013 - 20th ACM Conference on Computer and Communications Security, Nov 2013, Berlin, Germany. ⟨10.1145/2508859.2516653⟩
inria-00577140v1  Conference papers
Marc JoyeMehdi TibouchiDamien Vergnaud. Huff's Model for Elliptic Curves
Algorithmic Number Theory, 9th International Symposium, ANTS-IX, Jul 2010, Nancy, France. pp.234-250, ⟨10.1007/978-3-642-14518-6_20⟩
inria-00577257v1  Conference papers
Sébastien CanardCécile DelerabléeAline GougetEmeline HufschmittFabien Laguillaumie et al.  Fair E-cash: Be Compact, Spend Faster
Information Security, 12th International Conference, ISC 2009, Sep 2009, Pisa, Italy. pp.294-309, ⟨10.1007/978-3-642-04474-8_24⟩
inria-00577142v1  Conference papers
Aurélie BauerJean-Sébastien CoronDavid NaccacheMehdi TibouchiDamien Vergnaud. On The Broadcast and Validity-Checking Security of PKCS #1 v1.5 Encryption
Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Jun 2010, Beijing, China. pp.1-18, ⟨10.1007/978-3-642-13708-2_1⟩
  • 1
  • 2