Skip to Main content Skip to Navigation


...
hal-02571888v1  Conference papers
Thierry MefenzaDamien Vergnaud. Distribution and Polynomial Interpolation of the Dodis-Yampolskiy Pseudo-Random Function
Arithmetic of Finite Fields - 6th International Workshop, WAIFI 2016, Jul 2016, Ghent, Belgium. pp.125-140, ⟨10.1007/978-3-319-55227-9_10⟩
...
inria-00577167v1  Conference papers
Olivier BlazyGeorg FuchsbauerMalika IzabachèneAmandine JambertHervé Sibert et al.  Batch Groth-Sahai
Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Jun 2010, Beijing, China. pp.218-235, ⟨10.1007/978-3-642-13708-14⟩
...
tel-01089163v1  Habilitation à diriger des recherches
Damien Vergnaud. Primitives et constructions en cryptographie asymétrique
Cryptography and Security [cs.CR]. Ecole normale supérieure, 2014
hal-01082399v1  Conference papers
Léonard DallotDamien Vergnaud. Provably Secure Code-Based Threshold Ring Signatures
12th IMA International Conference, Cryptography and Coding 2009, Dec 2009, Cirencester, United Kingdom. ⟨10.1007/978-3-642-10868-6_13⟩
...
inria-00577255v1  Conference papers
Benoît LibertDamien Vergnaud. Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model
International Conference on Cryptology And Network Security, CANS 2009, Dec 2009, Kanazawa, Japan. pp.498-517, ⟨10.1007/978-3-642-10433-6_34⟩
...
hal-00672939v1  Conference papers
Olivier BlazyDavid PointchevalDamien Vergnaud. Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions
TCC 2012 - Ninth IACR Theory of Cryptography Conference, Mar 2012, Taormina, Italy. pp.94-112, ⟨10.1007/978-3-642-28914-9_6⟩
hal-00921915v1  Journal articles
Olivier BlazyGeorg FuchsbauerDavid PointchevalDamien Vergnaud. Short Blind Signatures
Journal of Computer Security, IOS Press, 2013, 21 (5), pp.627-661. ⟨10.3233/JCS-130477⟩
...
inria-00539540v1  Conference papers
Malika IzabachèneDavid PointchevalDamien Vergnaud. Mediated Traceable Anonymous Encryption
First International Conference on Cryptology and Information Security (LatinCrypt '10), Aug 2010, Puebla, Mexico. pp.40--60
inria-00542643v1  Conference papers
Olivier BlazyGeorg FuchsbauerDavid PointchevalDamien Vergnaud. Signatures on Randomizable Ciphertexts
PKC 2011 - Proceedings of the 2011 International Conference on Practice and Theory in Public Key Cryptography, Mar 2011, Taormina, Italy. pp.403-422, ⟨10.1007/978-3-642-19379-8_25⟩
...
inria-00577145v1  Conference papers
Georg FuchsbauerDamien Vergnaud. Fair Blind Signatures without Random Oracles
Africacrypt 2010, May 2010, Stellenbosch, South Africa. pp.16-33, ⟨10.1007/978-3-642-12678-9_2⟩
...
hal-01094301v1  Conference papers
Pierre-Alain FouqueDamien VergnaudJean-Christophe Zapalowicz. Time/Memory/Data Tradeoffs for Variants of the RSA Problem
Computing and Combinatorics, 19th International Conference, COCOON 2013, Jun 2013, Hangzhou, China. pp.651-662, ⟨10.1007/978-3-642-38768-5_57⟩
...
inria-00577257v1  Conference papers
Sébastien CanardCécile DelerabléeAline GougetEmeline HufschmittFabien Laguillaumie et al.  Fair E-cash: Be Compact, Spend Faster
Information Security, 12th International Conference, ISC 2009, Sep 2009, Pisa, Italy. pp.294-309, ⟨10.1007/978-3-642-04474-8_24⟩
...
inria-00577140v1  Conference papers
Marc JoyeMehdi TibouchiDamien Vergnaud. Huff's Model for Elliptic Curves
Algorithmic Number Theory, 9th International Symposium, ANTS-IX, Jul 2010, Nancy, France. pp.234-250, ⟨10.1007/978-3-642-14518-6_20⟩
hal-01110204v1  Conference papers
Brett HemenwayBenoît LibertRafail OstrovskyDamien Vergnaud. Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security
ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Jul 2011, Dakar, Senegal. pp.70-88
...
hal-01110043v1  Journal articles
Benoît LibertDamien Vergnaud. Towards Practical Black-Box Accountable Authority IBE: Weak Black-Box Traceability With Short Ciphertexts and Private Keys
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2011, 57 (10), pp.7189-7204
hal-01089517v1  Directions of work or proceedings
David PointchevalDamien Vergnaud. Progress in Cryptology – AFRICACRYPT 2014
David Pointcheval; Damien Vergnaud. May 2014, Marrakesh, Morocco. 8469, Springer, pp.476, 2014, Lecture Notes in Computer Science, 978-3-319-06733-9. ⟨10.1007/978-3-319-06734-6⟩
hal-00871325v1  Books
Damien Vergnaud. Exercices et problèmes de cryptographie
Dunod, pp.304, 2012, Sciences Sup
hal-01214714v1  Books
Damien Vergnaud. Exercices et problèmes de cryptographie - 2ème édition
Dunod, pp.304, 2015, Sciences Sup, 2100721453
hal-00864431v1  Conference papers
Yevgeniy DodisDavid PointchevalSylvain RuhaultDamien VergnaudDaniel Wichs. Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust
ACM CCS 2013 - 20th ACM Conference on Computer and Communications Security, Nov 2013, Berlin, Germany. ⟨10.1145/2508859.2516653⟩
...
inria-00356999v1  Conference papers
Benoît LibertDamien Vergnaud. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
12th International Conference on Practice and Theory in Public-Key Cryptography - PKC 2009, 2009, Irvine, United States. pp.235-255
hal-01214711v1  Conference papers
Olivier BlazyCéline ChevalierDamien Vergnaud. Non-Interactive Zero-Knowledge Proofs of Non-Membership
Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, Apr 2015, San Francisco, United States. pp.145-164, ⟨10.1007/978-3-319-16715-2_8⟩
...
hal-02395052v1  Conference papers
Eyal KushilevitzRafail OstrovskyEmmanuel ProuffAdi RosénAdrian Thillard et al.  Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND
TCC 2019 - 17th International Conference on Theory of Cryptography, Dec 2019, Nuremberg, Germany. pp.386-406, ⟨10.1007/978-3-030-36033-7_15⟩