Skip to Main content Skip to Navigation

hal-01084550v1  Conference papers
Aurore GuillevicDamien Vergnaud. Algorithms for Outsourcing Pairing Computation
CARDIS 2014 - 13th Smart Card Research and Advanced Application Conference, Conservatoire National des Arts et Métiers (CNAM), Nov 2014, Paris, France. ⟨10.1007/978-3-319-16763-3_12⟩
hal-01893905v1  Conference papers
Louiza KhatiDamien Vergnaud. Analysis and Improvement of an Authentication Scheme in Incremental Cryptography
SAC 2018 - 25th International Conference on Selected Areas in Cryptography, Aug 2018, Calgary, Canada. pp.50-70, ⟨10.1007/978-3-030-10970-7_3⟩
hal-00865612v1  Conference papers
Olivier BlazyCéline ChevalierDavid PointchevalDamien Vergnaud. Analysis and Improvement of Lindell's UC-Secure Commitment Schemes
ACNS 2013 - 11th International Conference Applied Cryptography and Network Security, Jun 2013, Banff, Canada. pp.534-551, ⟨10.1007/978-3-642-38980-1_34⟩
inria-00577167v1  Conference papers
Olivier BlazyGeorg FuchsbauerMalika IzabachèneAmandine JambertHervé Sibert et al.  Batch Groth-Sahai
Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Jun 2010, Beijing, China. pp.218-235, ⟨10.1007/978-3-642-13708-14⟩
hal-01110210v1  Conference papers
Malika IzabachèneBenoît LibertDamien Vergnaud. Block-wise p-signatures and non-interactive anonymous credentials with efficient attributes
IMACC'11 - 13th IMA international conference on Cryptography and Coding, Dec 2011, Oxford, UK, United Kingdom. pp.431-450
hal-01084490v1  Conference papers
Mario CornejoSylvain Ruhault. Characterization of Real-Life PRNGs under Partial State Corruption
CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Nov 2014, Scottsdale, Arizona, United States. pp.1004-1015, ⟨10.1145/2660267.2660377⟩
hal-01613813v1  Journal articles
Damien Vergnaud. Comment on ‘Attribute-Based Signatures for Supporting Anonymous Certification’ by N. Kaaniche and M. Laurent (ESORICS 2016)
The Computer Journal, Oxford University Press (UK), 2017, Section D: Security in Computer Systems and Networks, ⟨10.1093/comjnl/bxx058⟩
hal-00764863v1  Conference papers
Olivier BlazyDavid PointchevalDamien Vergnaud. Compact Round-Optimal Partially-Blind Signatures
SCN 2012 - 8th International Conference Security and Cryptography for Networks, Sep 2012, Amalfi, Italy. pp.95-112, ⟨10.1007/978-3-642-32928-9_6⟩
hal-02571888v1  Conference papers
Thierry MefenzaDamien Vergnaud. Distribution and Polynomial Interpolation of the Dodis-Yampolskiy Pseudo-Random Function
Arithmetic of Finite Fields - 6th International Workshop, WAIFI 2016, Jul 2016, Ghent, Belgium. pp.125-140, ⟨10.1007/978-3-319-55227-9_10⟩
hal-01110047v1  Conference papers
Damien Vergnaud. Efficient and secure generalized pattern matching via fast fourier transform
AFRICACRYPT'11 - 4th international conference on Progress in cryptology in Africa, Jul 2011, Dakar, Senegal. pp.41-58
hal-00790633v1  Conference papers
Fabrice Ben HamoudaOlivier BlazyCéline ChevalierDavid PointchevalDamien Vergnaud. Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Feb 2013, Nara, Japan. pp.272-291, ⟨10.1007/978-3-642-36362-7_18⟩
hal-00871325v1  Books
Damien Vergnaud. Exercices et problèmes de cryptographie
Dunod, pp.304, 2012, Sciences Sup
hal-01214714v1  Books
Damien Vergnaud. Exercices et problèmes de cryptographie - 2ème édition
Dunod, pp.304, 2015, Sciences Sup, ISBN-10: 2100721453
inria-00577145v1  Conference papers
Georg FuchsbauerDamien Vergnaud. Fair Blind Signatures without Random Oracles
Africacrypt 2010, May 2010, Stellenbosch, South Africa. pp.16-33, ⟨10.1007/978-3-642-12678-9_2⟩
inria-00577257v1  Conference papers
Sébastien CanardCécile DelerabléeAline GougetEmeline HufschmittFabien Laguillaumie et al.  Fair E-cash: Be Compact, Spend Faster
Information Security, 12th International Conference, ISC 2009, Sep 2009, Pisa, Italy. pp.294-309, ⟨10.1007/978-3-642-04474-8_24⟩
hal-01403418v1  Conference papers
Louiza KhatiNicky MouhaDamien Vergnaud. Full Disk Encryption: Bridging Theory and Practice
CT-RSA 2017 - RSA Conference Cryptographers' Track, Feb 2017, San Francisco, United States. pp.241--257, ⟨10.1007/978-3-319-52153-4_14⟩
inria-00577255v1  Conference papers
Benoît LibertDamien Vergnaud. Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model
International Conference on Cryptology And Network Security, CANS 2009, Dec 2009, Kanazawa, Japan. pp.498-517, ⟨10.1007/978-3-642-10433-6_34⟩
inria-00577140v1  Conference papers
Marc JoyeMehdi TibouchiDamien Vergnaud. Huff's Model for Elliptic Curves
Algorithmic Number Theory, 9th International Symposium, ANTS-IX, Jul 2010, Nancy, France. pp.234-250, ⟨10.1007/978-3-642-14518-6_20⟩
hal-00871331v1  Conference papers
Aurélie BauerDamien VergnaudJean-Christophe Zapalowicz. Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods
PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, May 2012, Darmstadt, Germany. pp.609-626, ⟨10.1007/978-3-642-30057-8_36⟩
hal-01379249v1  Conference papers
Dahmun GoudarziMatthieu RivainDamien Vergnaud. Lattice Attacks against Elliptic-Curve Signatures with Blinded Scalar Multiplication
Selected Areas in Cryptography - SAC 2016, Aug 2016, St. John’s, Canada
hal-01737064v1  Conference papers
Thierry Mefenza NountuDamien Vergnaud. Lattice Attacks on Pairing-Based Signatures
IMACC 2017 - 16th IMA International Conference on Cryptography and Coding, Dec 2017, Oxford, United Kingdom. pp.352-370, ⟨10.1007/978-3-319-71045-7_18⟩
hal-01110204v1  Conference papers
Brett HemenwayBenoît LibertRafail OstrovskyDamien Vergnaud. Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security
ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Jul 2011, Dakar, Senegal. pp.70-88
hal-02395052v1  Conference papers
Eyal KushilevitzRafail OstrovskyEmmanuel ProuffAdi RosénAdrian Thillard et al.  Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND
TCC 2019 - 17th International Conference on Theory of Cryptography, Dec 2019, Nuremberg, Germany. pp.386-406, ⟨10.1007/978-3-030-36033-7_15⟩
inria-00539540v1  Conference papers
Malika IzabachèneDavid PointchevalDamien Vergnaud. Mediated Traceable Anonymous Encryption
First International Conference on Cryptology and Information Security (LatinCrypt '10), Aug 2010, Puebla, Mexico. pp.40--60