Skip to Main content Skip to Navigation

inria-00539543v1  Conference papers
Georg FuchsbauerDavid PointchevalDamien Vergnaud. Transferable Constant-Size Fair E-Cash
Proceedings of the 8th International Workshop on Cryptology and Network Security (CANS '09), 2009, Kanazawa, Ishikawa, Japan. pp.226--247, ⟨10.1007/978-3-642-10433-6_15⟩
hal-01110043v1  Journal articles
Benoît LibertDamien Vergnaud. Towards Practical Black-Box Accountable Authority IBE: Weak Black-Box Traceability With Short Ciphertexts and Private Keys
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2011, 57 (10), pp.7189-7204
inria-00356999v1  Conference papers
Benoît LibertDamien Vergnaud. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
12th International Conference on Practice and Theory in Public-Key Cryptography - PKC 2009, 2009, Irvine, United States. pp.235-255
inria-00556688v1  Conference papers
Pierre-Alain FouqueGilles Macario-RatLudovic PerretJacques Stern. Total Break of the l-IC Signature Scheme
Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Mar 2008, Barcelona, Spain. pp.1-17, ⟨10.1007/978-3-540-78440-1_1⟩
hal-01094301v1  Conference papers
Pierre-Alain FouqueDamien VergnaudJean-Christophe Zapalowicz. Time/Memory/Data Tradeoffs for Variants of the RSA Problem
Computing and Combinatorics, 19th International Conference, COCOON 2013, Jun 2013, Hangzhou, China. pp.651-662, ⟨10.1007/978-3-642-38768-5_57⟩
inria-00556680v1  Conference papers
Charles BouillaguetPierre-Alain FouqueGaëtan Leurent. Security Analysis of SIMD
Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2010, 2010, Ontario, Canada
hal-00672939v1  Conference papers
Olivier BlazyDavid PointchevalDamien Vergnaud. Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions
TCC 2012 - Ninth IACR Theory of Cryptography Conference, Mar 2012, Taormina, Italy. pp.94-112, ⟨10.1007/978-3-642-28914-9_6⟩
tel-01089163v1  Habilitation à diriger des recherches
Damien Vergnaud. Primitives et constructions en cryptographie asymétrique
Cryptography and Security [cs.CR]. Ecole normale supérieure, 2014
inria-00556673v1  Conference papers
Jérémy JeanPierre-Alain Fouque. Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
Fast Software Encryption, 18th International Workshop : FSE 2011, Feb 2011, Lyngby, Denmark. pp.107-127, ⟨10.1007/978-3-642-21702-9_7⟩
hal-01214701v1  Conference papers
Aurélie BauerDamien Vergnaud. Practical Key Recovery for Discrete-Logarithm Based Authentication Schemes from Random Nonce Bits.
Cryptographic Hardware and Embedded Systems - CHES 2015, Sep 2015, Saint-Malo, France. pp.287-306, ⟨10.1007/978-3-662-48324-4_15⟩
inria-00556681v1  Conference papers
Pierre-Alain FouqueGaëtan LeurentDenis RéalFrédéric Valette. Practical Electromagnetic Template Attack on HMAC
Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, 2009, Lausanne, Switzerland. pp.66-80, ⟨10.1007/978-3-642-04138-9_6⟩
inria-00556671v1  Conference papers
Charles BouillaguetJean-Charles FaugèrePierre-Alain FouqueLudovic Perret. Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial With One Secret Problem
14th IACR International Conference on Practice and Theory of Public Key Cryptography - PKC 2011, Mar 2011, Taormina, Italy. pp.473-493, ⟨10.1007/978-3-642-19379-8_29⟩
inria-00556691v1  Conference papers
Vivien DuboisPierre-Alain FouqueAdi ShamirJacques Stern. Practical Cryptanalysis of SFLASH
Advances in Cryptology - CRYPTO 2007: 27th Annual International Cryptology Conference, 2007, Santa Barbara, California, United States. pp.1-12, ⟨10.1007/978-3-540-74143-5_1⟩
inria-00419148v1  Conference papers
Céline ChevalierPierre-Alain FouqueDavid PointchevalSébastien Zimmer. Optimal Randomness Extraction from a Diffie-Hellman Element
Advances in Cryptology -- Proceedings of EUROCRYPT '09, 2009, Cologne, Allemagne, Germany. pp.572--589
inria-00556684v1  Conference papers
Pierre-Alain FouqueGwenaëlle MartinetFrédéric ValetteSebastien Zimmer. On the Security of the CCM Encryption Mode and of a Slight Variant
Applied Cryptography and Network Security : 6th International Conference, ACNS 2008, 2008, New York, United States. pp.411-428, ⟨10.1007/978-3-540-68914-0_25⟩
inria-00577142v1  Conference papers
Aurélie BauerJean-Sébastien CoronDavid NaccacheMehdi TibouchiDamien Vergnaud. On The Broadcast and Validity-Checking Security of PKCS #1 v1.5 Encryption
Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Jun 2010, Beijing, China. pp.1-18, ⟨10.1007/978-3-642-13708-2_1⟩
inria-00539539v1  Book sections
Benoît Chevallier-MamesPierre-Alain FouqueDavid PointchevalJulien SternJacques Traoré. On Some Incompatible Properties of Voting Schemes
D. Chaum, R. Rivest, M. Jakobsson, B. Schoenmakers, P. Ryan, and J. Benaloh. Towards Trustworthy Elections, 6000, springer, pp.191--199, 2010, lncs
inria-00539540v1  Conference papers
Malika IzabachèneDavid PointchevalDamien Vergnaud. Mediated Traceable Anonymous Encryption
First International Conference on Cryptology and Information Security (LatinCrypt '10), Aug 2010, Puebla, Mexico. pp.40--60
inria-00556685v1  Conference papers
Pierre-Alain FouqueGilles Macario-RatJacques Stern. Key Recovery on Hidden Monomial Multivariate Schemes
Advances in Cryptology - EUROCRYPT 2008 : 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2008, Istanbul, Turkey. pp.19-30, ⟨10.1007/978-3-540-78967-3_2⟩
inria-00577140v1  Conference papers
Marc JoyeMehdi TibouchiDamien Vergnaud. Huff's Model for Elliptic Curves
Algorithmic Number Theory, 9th International Symposium, ANTS-IX, Jul 2010, Nancy, France. pp.234-250, ⟨10.1007/978-3-642-14518-6_20⟩
inria-00419158v1  Conference papers
Pierre-Alain FouqueDavid PointchevalSébastien Zimmer. HMAC is a Randomness Extractor and Applications to TLS
Proceedings of the 3rd ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS '08), 2008, Tokyo, Japon, Japan. pp.21--32
inria-00577255v1  Conference papers
Benoît LibertDamien Vergnaud. Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model
International Conference on Cryptology And Network Security, CANS 2009, Dec 2009, Kanazawa, Japan. pp.498-517, ⟨10.1007/978-3-642-10433-6_34⟩
inria-00556690v1  Conference papers
Pierre-Alain FouqueGaëtan LeurentPhong Q. Nguyen. Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, 2007, Santa Barbara, California, United States. pp.13-30, ⟨10.1007/978-3-540-74143-5_2⟩