Skip to Main content Skip to Navigation

inria-00556688v1  Conference papers
Pierre-Alain FouqueGilles Macario-RatLudovic PerretJacques Stern. Total Break of the l-IC Signature Scheme
Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Mar 2008, Barcelona, Spain. pp.1-17, ⟨10.1007/978-3-540-78440-1_1⟩
hal-01377993v1  Conference papers
Houda FerradiRémi GéraudDiana MaimutDavid NaccacheDavid Pointcheval. Legally Fair Contract Signing Without Keystones
ACNS 2016 - 14th International Conference Applied Cryptography and Network Security, Jun 2016, Guildford, United Kingdom. pp.175 - 190, ⟨10.1007/978-3-319-39555-5_10⟩
hal-01220355v1  Conference papers
Romain GayIordanis KerenidisHoeteck Wee. Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption
CRYPTO 2015 - Advances in Cryptology, Aug 2015, Santa Barbara, United States. pp.485-502, ⟨10.1007/978-3-662-48000-7_24⟩
hal-01093876v1  Reports
Fabrice BenhamoudaDavid Pointcheval. Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions
[Technical Report] Cryptology ePrint Archive: Report 2013/833, IACR. 2014
inria-00356999v1  Conference papers
Benoît LibertDamien Vergnaud. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
12th International Conference on Practice and Theory in Public-Key Cryptography - PKC 2009, 2009, Irvine, United States. pp.235-255
inria-00577255v1  Conference papers
Benoît LibertDamien Vergnaud. Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model
International Conference on Cryptology And Network Security, CANS 2009, Dec 2009, Kanazawa, Japan. pp.498-517, ⟨10.1007/978-3-642-10433-6_34⟩
hal-00672939v1  Conference papers
Olivier BlazyDavid PointchevalDamien Vergnaud. Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions
TCC 2012 - Ninth IACR Theory of Cryptography Conference, Mar 2012, Taormina, Italy. pp.94-112, ⟨10.1007/978-3-642-28914-9_6⟩
hal-01214701v1  Conference papers
Aurélie BauerDamien Vergnaud. Practical Key Recovery for Discrete-Logarithm Based Authentication Schemes from Random Nonce Bits.
Cryptographic Hardware and Embedded Systems - CHES 2015, Sep 2015, Saint-Malo, France. pp.287-306, ⟨10.1007/978-3-662-48324-4_15⟩
hal-01094685v1  Reports
Romain GayPierrick MéauxHoeteck Wee. Predicate Encryption for Multi-Dimensional Range Queries from Lattices
[Technical Report] Cryptology ePrint Archive: Report 2014/965, IACR. 2014
hal-00915848v1  Journal articles
Michel AbdallaJames BirkettDario CatalanoAlexander W. DentJohn Malone-Lee et al.  Wildcarded Identity-Based Encryption
Journal of Cryptology, Springer Verlag, 2011, 24 (1), pp.42-82. ⟨10.1007/s00145-010-9060-3⟩
hal-01220353v1  Conference papers
Romain GayPierrick MéauxHoeteck Wee. Predicate Encryption for Multi-dimensional Range Queries from Lattices
PKC 2015 - Public-Key Cryptography, Apr 2015, Gaithersburg, United States. pp.752-776, ⟨10.1007/978-3-662-46447-2_34⟩
inria-00577145v1  Conference papers
Georg FuchsbauerDamien Vergnaud. Fair Blind Signatures without Random Oracles
Africacrypt 2010, May 2010, Stellenbosch, South Africa. pp.16-33, ⟨10.1007/978-3-642-12678-9_2⟩
hal-01613813v1  Journal articles
Damien Vergnaud. Comment on ‘Attribute-Based Signatures for Supporting Anonymous Certification’ by N. Kaaniche and M. Laurent (ESORICS 2016)
The Computer Journal, Oxford University Press (UK), 2017, Section D: Security in Computer Systems and Networks, ⟨10.1093/comjnl/bxx058⟩
inria-00577140v1  Conference papers
Marc JoyeMehdi TibouchiDamien Vergnaud. Huff's Model for Elliptic Curves
Algorithmic Number Theory, 9th International Symposium, ANTS-IX, Jul 2010, Nancy, France. pp.234-250, ⟨10.1007/978-3-642-14518-6_20⟩
hal-01108287v1  Reports
Michel AbdallaFlorian BourseAngelo de CaroDavid Pointcheval. Simple Functional Encryption Schemes for Inner Products
[Technical Report] Cryptology ePrint Archive: Report 2015/017, IACR. 2015
hal-01235177v1  Conference papers
Vadim LyubashevskyDaniel Wichs. Simple Lattice Trapdoor Sampling from a Broad Class of Distributions
Public Key Cryptography 2015, IACR, Mar 2015, Gaithersburgh, United States. ⟨10.1007/978-3-662-46447-2_32⟩
hal-01084737v1  Conference papers
Fabrice BenhamoudaJan CamenischStephan KrennVadim LyubashevskyGregory Neven. Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures
ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2014, Kaohsiung, Taiwan. pp.551-572, ⟨10.1007/978-3-662-45611-8_29⟩
hal-01214711v1  Conference papers
Olivier BlazyCéline ChevalierDamien Vergnaud. Non-Interactive Zero-Knowledge Proofs of Non-Membership
Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, Apr 2015, San Francisco, United States. pp.145-164, ⟨10.1007/978-3-319-16715-2_8⟩
hal-01110238v1  Journal articles
Hervé ChabanneMehdi Tibouchi. Securing e-passports with elliptic curves
IEEE Security and Privacy Magazine, Institute of Electrical and Electronics Engineers, 2011, 9 (2), pp.75-78
hal-00934337v1  Reports
Hervé ChabanneJean-Michel CioranescoVincent DespiegelJean-Christophe FondeurDavid Naccache. Using Hamiltonian Totems as Passwords
[Research Report] IACR Cryptology ePrint Archive 2013: 751 (2013), 2013