Skip to Main content Skip to Navigation


...
hal-01377993v1  Conference papers
Houda FerradiRémi GéraudDiana MaimutDavid NaccacheDavid Pointcheval. Legally Fair Contract Signing Without Keystones
ACNS 2016 - 14th International Conference Applied Cryptography and Network Security, Jun 2016, Guildford, United Kingdom. pp.175 - 190, ⟨10.1007/978-3-319-39555-5_10⟩
hal-01471876v1  Conference papers
David PointchevalOlivier SandersJacques Traoré. Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash
Public-Key Cryptography - PKC 2017 - 20th International Conference on Practice and Theory in Public-Key Cryptography, Mar 2017, Amsterdam, Netherlands. pp.61-90, ⟨10.1007/978-3-662-54365-8_4⟩
hal-01139400v1  Reports
Sébastien CanardDavid PointchevalOlivier SandersJacques Traoré. Scalable Divisible E-cash
[Research Report] Cryptology ePrint Archive: Report 2015/300, IACR. 2015
...
inria-00419152v1  Conference papers
Malika IzabachèneDavid Pointcheval. New Anonymity Notions for Identity-Based Encryption
SCN '08, 2008, Amalfi, Italie, Italy. pp.375--391
...
inria-00419151v1  Conference papers
Julien BringerHervé ChabanneDavid PointchevalSébastien Zimmer. An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication
The 3rd International Workshop on Security (IWSEC '08), 2008, Kagawa, Japon, Japan. pp.219--230
...
hal-01628797v1  Conference papers
Alexandra BoldyrevaShan ChenPierre-Alain DupontDavid Pointcheval. Human Computing for Handling Strong Corruptions in Authenticated Key Exchange
CSF 2017 - 30th IEEE Computer Security Foundations Symposium, Aug 2017, Santa Barbara, CA, United States. pp.159 - 175, ⟨10.1109/CSF.2017.31⟩
hal-01668008v1  Reports
Pierre-Alain DupontJulia HesseDavid PointchevalLeonid ReyzinSophia Yakoubov. Fuzzy Authenticated Key Exchange
[Research Report] 2017/1111, IACR Cryptology ePrint Archive. 2017
hal-01377995v1  Directions of work or proceedings
David PointchevalAbderrahmane NitajTajjeeddine Rachidi. 8th International Conference on Cryptology in Africa - Africacrypt 2016
David Pointcheval; Abderrahmane Nitaj; Tajjeeddine Rachidi. Africacrypt 2016, Apr 2016, Fes, Morocco. LNCS (9646), Springer Verlag, 2016, Africacrypt 2016, 978-3-319-31517-1. ⟨10.1007/978-3-319-31517-1⟩
hal-02357181v1  Conference papers
Théo RyffelEdouard Dufour-SansRomain GayFrancis BachDavid Pointcheval. Partially Encrypted Machine Learning using Functional Encryption
NeurIPS 2019 - Thirty-third Conference on Neural Information Processing Systems, Dec 2019, Vancouver, Canada
hal-01245235v1  Reports
Geoffroy CouteauThomas PetersDavid Pointcheval. Secure Distributed Computation on Private Inputs
[Research Report] Cryptology ePrint Archive: Report 2015/1196, IACR Cryptology ePrint Archive. 2015
hal-01668020v1  Conference papers
Jérémy ChotardEdouard Dufour SansRomain GayDavid PointchevalDuong Hieu Phan. Decentralized Multi-Client Functional Encryption for Inner Product
ASIACRYPT '18 - 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2018, Brisbane, Australia. ⟨10.1007/978-3-030-03329-3_24⟩
...
hal-02948657v1  Conference papers
Michel AbdallaFlorian BourseHugo MarivalDavid PointchevalAzam Soleimanian et al.  Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model
SCN 2020 - 12th International Conference Security and Cryptography for Networks., Sep 2020, Amalfi / Virtual, Italy. pp.525-545, ⟨10.1007/978-3-030-57990-6_26⟩
hal-01471896v1  Conference papers
Michel AbdallaFabrice BenhamoudaDavid Pointcheval. Removing Erasures with Explainable Hash Proof Systems
Public-Key Cryptography - PKC 2017 - 20th International Conference on Practice and Theory in Public-Key Cryptography, Mar 2017, Amsterdam, Netherlands. pp.151-174, ⟨10.1007/978-3-662-54365-8_7⟩
hal-01471901v1  Conference papers
Geoffroy CouteauThomas PetersDavid Pointcheval. Removing the Strong RSA Assumption from Arguments over the Integers
EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Apr 2017, Paris, France. ⟨10.1007/978-3-319-56614-6_11⟩
hal-00790626v1  Conference papers
Michel AbdallaFabrice Ben HamoudaDavid Pointcheval. Tighter Reductions for Forward-Secure Signature Scheme
Public-Key Cryptography (PKC 2013), Feb 2013, Nara, Japan. pp.292-311, ⟨10.1007/978-3-642-36362-7_19⟩
hal-00763979v1  Journal articles
Hung Q. NgoDuong Hieu PhanDavid Pointcheval. Black-Box Trace&Revoke Codes
Algorithmica, Springer Verlag, 2013, 67 (3), pp.418-448. ⟨10.1007/s00453-012-9702-y⟩
hal-00764842v1  Conference papers
Duong Hieu PhanDavid PointchevalMario Strefler. Message-Based Traitor Tracing with Optimal Ciphertext Rate
LATINCRYPT 2012 - 2nd International Conference on Cryptology and Information Security in Latin America, Oct 2012, Santiago, Chile. pp.56-77, ⟨10.1007/978-3-642-33481-8_4⟩
hal-00764847v1  Conference papers
Duong Hieu PhanDavid PointchevalMario Strefler. Decentralized Dynamic Broadcast Encryption
SCN 2012 - 8th International Conference Security and Cryptography for Networks, Sep 2012, Amalfi, Italy. pp.166-183, ⟨10.1007/978-3-642-32928-9_10⟩
hal-00764852v1  Conference papers
Duong Hieu PhanDavid PointchevalSiamak F. ShahandashtiMario Strefler. Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts
ACISP 2012 - 17th Australasian Conference Information Security and Privacy, Jul 2012, Wollongong, Australia. pp.308-321, ⟨10.1007/978-3-642-31448-3_23⟩
hal-00764871v1  Conference papers
Gilles BartheDavid PointchevalSantiago Zanella-Béguelin. Verified security of redundancy-free encryption from Rabin and RSA
CCS '12 - ACM conference on Computer and communications security, Oct 2012, Raleigh, NC, United States. pp.724-735, ⟨10.1145/2382196.2382272⟩
hal-00763543v1  Book sections
David Pointcheval. RSA Public-Key Encryption
Henk C. A. van Tilborg and Sushil Jajodia. Encyclopedia of Cryptography and Security, Springer, pp.1069-1072, 2011, 978-1-4419-5905-8. ⟨10.1007/978-1-4419-5906-5_153⟩
hal-00764863v1  Conference papers
Olivier BlazyDavid PointchevalDamien Vergnaud. Compact Round-Optimal Partially-Blind Signatures
SCN 2012 - 8th International Conference Security and Cryptography for Networks, Sep 2012, Amalfi, Italy. pp.95-112, ⟨10.1007/978-3-642-32928-9_6⟩
...
inria-00419145v1  Conference papers
Michel AbdallaCéline ChevalierDavid Pointcheval. Smooth Projective Hashing for Conditionally Extractable Commitments
Advances in Cryptology -- Proceedings of CRYPTO '09, 2009, Santa-Barbara, Californie, United States. pp.671--689
...
inria-00419158v1  Conference papers
Pierre-Alain FouqueDavid PointchevalSébastien Zimmer. HMAC is a Randomness Extractor and Applications to TLS
Proceedings of the 3rd ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS '08), 2008, Tokyo, Japon, Japan. pp.21--32
...
inria-00419144v1  Book sections
Malika IzabachèneDavid Pointcheval. New Anonymity Notions for Identity-Based Encryption
V. Cortier and C. Kirchner and M. Okada and H. Sakurada. Formal to Practical Security, LNCS 5458, Springer-Verlag, pp.138--157, 2009, Lecture notes in computer science
...
inria-00539541v1  Conference papers
Michel AbdallaCéline ChevalierMark ManulisDavid Pointcheval. Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys
Third African International Conference on Cryptology (AfricaCrypt '10), 2010, Stellenbosch, South Africa. pp.351--368