Emmanuel Bresson’s homepage


DCSSI Crypto Lab
51, bld de La Tour-Maubourg
75700 PARIS 07 SP, France
Tel. (+33) or (0).171.75.84.87
Fax. (+33) or (0).171.75.84.90
webmail: ÉNS
web: http://www.di.ens.fr/ bresson/
emmanuel.bresson..at..polytechnique.org

 WARNING!  This page is no longer updated

Scientific activities

Editorial and Organisation Boards:

Program Committees:

Reviewing:

Thesis Jury:

Publications

2009

.bib ] Fully Robust and Strongly Secure Group Key Exchange.
abstract ] T. Brecher, E. Bresson, M. Manulis and J. Schwenk.
In Proc. of CANS ’09, LNCS, © Springer-Verlag, Berlin, 2009.
To be presented in the 8th Int. Conf. on Cryptology And Network Security (CANS ’09), December 12–14, Ishikawa, JP.
 

2008

.bib ] How to use Merkle-Damgard — On the Security Relations between Signature Schemes and their Inner Hash Functions.
abstract ] E. Bresson, B. Chevallier-Mames, C. Clavier, A. Gouget, P. Paillier and T. Peyrin.
pdf ] In Proc. of ProvSec ’08, vol. 5324 of LNCS, pp. 241–253, © Springer-Verlag, Berlin, 2008.
Presented in the Provable Security (ProvSec ’08), October 30–November 1, Shangai, CN.
 
.bib ] Contributory Group Key Exchange in the Presence of Malicious Participants.
abstract ] E. Bresson and M. Manulis.
IET Proc. Information Security (IET-IFS), 2(3):85–93, September 2008. © IET.
 
.bib ] Securing Group Key Exchange against Strong Corruptions and Key Registration Attacks.
abstract ] E. Bresson and M. Manulis.
Int. Journal of Applied Cryptography (IJACT), 1(2):91–107, 2008. © Inderscience.
 
.bib ] Separation Results on the “One-More” Computational Problems.
abstract ] E. Bresson, J. Monnerat and D. Vergnaud.
pdf ] In Proc. of CT-RSA ’08, vol. 4964 of LNCS, pp. 71–87, © Springer-Verlag, Berlin, 2008.
slides ] Presented in the Cryptographer’s track at RSA Conference (RSA ’08), April 07–11, San Francisco, California.
 
.bib ] Securing Group Key Exchange against Strong Corruptions.
abstract ] E. Bresson and M. Manulis.
pdffull pdf ] In Proc. of ACM ASIA CCS ’08, pp. 249–260, © ACM Press, 2008.
slides ] Presented in the ACM Symposium on Information, Computer and Communications Security (ASIA CCS ’08), March 18–20, Tokyo, JP.
 

2007

.bib ] On Security Models and Compilers for Group Key Exchange Protocols.
abstract ] E. Bresson, M. Manulis and J. Schwenk.
pdf ] In Proc. of IWSEC ’07, vol. 4752 of LNCS, pp. 292–307, © Springer-Verlag, Berlin, 2007.
slides ] Presented in the International Workshop on Security (IWSEC ’07), October 29–31, Nara, JP.
 
.bib ] A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness.
abstract ] E. Bresson, Y. Lakhnech, L. Mazaré and B. Warinschi.
pdf ] In Proc. of Crypto ’07, vol. 4622 of LNCS, pp. 482–499. Springer-Verlag, Berlin, 2007. © IACR.
slides ] Presented in the IACR International Conference: Advances in Cryptology (Crypto ’07), August 19–23, Santa Barbara, California.
 
.bib ] Provably-Secure Authenticated Group Diffie-Hellman Key Exchange.
abstract ] E. Bresson, O. Chevassut and D. Pointcheval.
ACM Trans. on Information and System Security (TISSEC), 10(3):10, July 2007. © ACM .
 
.bib ] Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.
abstract ] E. Bresson and M. Manulis.
pdffull pdf ] In Proc. of ATC ’07, vol. 4610 of LNCS, pp. 395–409, © Springer-Verlag, Berlin, 2007.
Presented in the 4th International Conference on Autonomic and Trusted Computing (ATC ’07), July 11–13, Hong-Kong, HK.
 
.bib ] Improved On-Line/Off-Line Threshold Signatures.
abstract ] E. Bresson, D. Catalano and R. Gennaro.
pdffull pdf ] In Proc. of PKC ’07, vol. 4450 of LNCS, pp. 217–232. Springer-Verlag, Berlin, 2007. © IACR.
slides ] Presented in the IACR International Conference: Practice and Theory in Public Key Cryptography (PKC ’07), April 16–20, Beijing, CN.
 
.bib ] Strong Password-Based Authentication in TLS using the Three-Party Group Diffie-Hellman Protocol.
abstract ] M. F. Abdalla, E. Bresson, O. Chevassut, B. Möller and D. Pointcheval.
International J. of Security and Networks (IJSN), 2(3/4):284–296, 2007. © Inderscience.
Special issue: “Cryptography in Networks”.
 

2006

.bib ] Password-Based Group Key Exchange in a Constant Number of Rounds.
abstract ] M. F. Abdalla, E. Bresson, O. Chevassut and D. Pointcheval.
pdf ] In Proc. of PKC ’06, vol. 3958 of LNCS, pp. 427–442. Springer-Verlag, Berlin, 2006. © IACR.
slides ] Presented in the IACR International Conference: Practice and Theory in Public Key Cryptography (PKC ’06), April 24–26, New-York, NY.
 
.bib ] Provably Secure Password-Based Authentication in TLS.
abstract ] M. F. Abdalla, E. Bresson, O. Chevassut, B. Möller and D. Pointcheval.
pdf ] In Proc. of ACM ASIA CCS ’06, pp. 35–45, © ACM Press, 2006.
Presented in the ACM Symposium on Information, Computer and Communications Security (ASIA CCS ’06), March 21–24, Taipei, TW.
 

2005

.bib ] A Security Solution for IEEE 802.11’s Ad-hoc Mode: Password-Authentication and Group Diffie-Hellman Key Exchange.
abstract ] E. Bresson, O. Chevassut and D. Pointcheval.
International Journal of Wireless and Mobile Computing (IJWMC), 2(1):4–13, 2007. © Inderscience.
Special issue: “Security of Computer Network and Mobile Systems”.
 

2004

.bib ] Mutual Authentication and Group Key Agreement for Low-Power Mobile Devices.
abstract ] E. Bresson, O. Chevassut, A. Essiari and D. Pointcheval.
Journal of Computer Communications (ComCom), 27(17):1730–1737, July 2004. © Elsevier.
Special issue: “Security and Performance in Wireless and Mobile Networks”.
 
.bib ] New Security Results on Encrypted Key Exchange.
abstract ] E. Bresson, O. Chevassut and D. Pointcheval.
pdffull pdf ] In Proc. of PKC ’04, vol. 2947 of LNCS, pp. 145–158. Springer-Verlag, Berlin, 2004. © IACR.
slides ] Presented in the IACR International Conference: Practice and Theory in Public Key Cryptography (PKC ’04), March 1–4, Singapore, SG.
 
.bib ] Constant Round Authenticated Group Key Agreement via Distributed Computation.
abstract ] E. Bresson and D. Catalano.
pdf ] In Proc. of PKC ’04, vol. 2947 of LNCS, pp. 115–129. Springer-Verlag, Berlin, 2004. © IACR.
slides ] Presented in the IACR International Conference: Practice and Theory in Public Key Cryptography (PKC ’04), March 1–4, Singapore, SG.
 

2003

.bib ] A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and its Applications.
abstract ] E. Bresson, D. Catalano and D. Pointcheval.
pdf ] In Proc. of Asiacrypt ’03, vol. 2894 of LNCS, pp. 37–54. Springer-Verlag, Berlin, 2003. © IACR.
slides ] Presented in the IACR International Conference: Advances in Cryptology (Asiacrypt ’03), November 30–December 4, Taipei, TW.
 
.bib ] Security Proofs for an Efficient Password-Based Key Exchange.
abstract ] E. Bresson, O. Chevassut and D. Pointcheval.
pdffull pdf ] In Proc. of ACM CCS ’03, pp. 241–250, © ACM Press, 2003.
slides ] Presented in the 10th ACM Conference on Computer and Communications Security (CCS ’03), October 27–31, Washington D.C..
 
.bib ] Mutual Authentication and Group Key Agreement for Low-Power Mobile Devices.
abstract ] E. Bresson, O. Chevassut, A. Essiari and D. Pointcheval.
pdf ] In Proc. of MWCN ’03, pp. 59–62, © World Scientific Publishing, 2003.
Presented in the 5th IFIP-TC6 International Conference on Mobile and Wireless Communications Networks, October 27–29, Singapore, SG.
 

2002

.bib ] Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks.
abstract ] E. Bresson, O. Chevassut and D. Pointcheval.
pdffull pdf ] In Proc. of Asiacrypt ’02, vol. 2501 of LNCS, pp. 497–514. Springer-Verlag, Berlin, 2002. © IACR.
slides ] Presented in the IACR International Conference: Advances in Cryptology (Asiacrypt ’02), December 1–5, Queenstown, NZ.
 
.bib ] Proofs of Knowledge for Non-Monotone Discrete-Log Formulae and Applications.
abstract ] E. Bresson and J. Stern.
pdf ] In Proc. of ISC ’02, vol. 2433 of LNCS, pp. 272–288, © Springer-Verlag, Berlin, 2002.
slides ] Presented in the Information Security Conference (ISC ’02), September 30–October 2, Saõ Paulo, BR.
 
.bib ] The Group Diffie-Hellman Problems.
abstract ] E. Bresson, O. Chevassut and D. Pointcheval.
pdf ] In Proc. of SAC ’02, vol. 2595 of LNCS, pp. 325–338, © Springer-Verlag, Berlin, 2002.
slides ] Presented in the Workshop on Selected Areas in Cryptography (SAC ’02), August 15–16, Saint-John’s, NewFoundLand.
 
.bib ] Threshold Ring Signatures and Applications to Ad-Hoc Groups.
abstract ] E. Bresson, J. Stern and M. Szydlo.
pdffull pdf ] In Proc. of Crypto ’02, vol. 2442 of LNCS, pp. 465–480. Springer-Verlag, Berlin, 2002. © IACR.
slides ] Presented in the IACR International Conference: Advances in Cryptology (Crypto ’02), August 18–22, Santa Barbara, California.
 
.bib ] Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions.
abstract ] E. Bresson, O. Chevassut and D. Pointcheval.
pdffull pdf ] In Proc. of Eurocrypt ’02, vol. 2332 of LNCS, pp. 321–336. Springer-Verlag, Berlin, 2002. © IACR.
slides ] Presented in the IACR International Conference: Advances in Cryptology (Eurocrypt ’02), April 28–May 2, Amsterdam, NL.
 

2001

.bib ] Provably Authenticated Group Diffie-Hellman Key Exchange — The Dynamic Case.
abstract ] E. Bresson, O. Chevassut and D. Pointcheval.
pdffull pdf ] In Proc. of Asiacrypt ’01, vol. 2248 of LNCS, pp. 290–309. Springer-Verlag, Berlin, 2001. © IACR.
slides ] Presented in the IACR International Conference: Advances in Cryptology (Asiacrypt ’01), December 9–13, Gold Coast, Queensland.
 
.bib ] Provably Authenticated Group Diffie-Hellman Key Exchange.
abstract ] E. Bresson, O. Chevassut, D. Pointcheval and J.-J. Quisquater.
pdf ] In Proc. of ACM CCS ’01, pp. 255–264, © ACM Press, 2001.
slides ] Presented in the 8th ACM Conference on Computer and Communications Security (CCS ’01), November 6–8, Philadelphia, Pennsylvania.
 
.bib ] Efficient Revocation in Group Signatures.
abstract ] E. Bresson and J. Stern.
pdf ] In Proc. of PKC ’01, vol. 1992 of LNCS, pp. 190–206, © Springer-Verlag, Berlin, 2001.
slides ] Presented in the 4th International Workshop on Practice and Theory in Public Key Cryptography (PKC ’01), February 13–15, Cheju Island, KR.
 

Presentations

2009

SHABAL, a SHA-3 Submission.
abstract ] E. Bresson, A. Canteaut, B. Chevallier-Mames, C. Clavier, T. Fuhr, A. Gouget, T. Icart, J.-F. Misarsky, M. Naya-Plasencia, P. Paillier, T. Pornin, J.-R. Reinhard, C. Thuillet and M. Videau.
slides ] The First SHA-3 Candidate Conference (http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/Feb2009/index.html), Leuven, BE. February 25th–28th 2009.
 

2008

Secure and Practical Voting Machines.
abstract ] E. Bresson, F. Chabaud, X. Chassagneux and M. Videau.
slides ] Computer and Electronics Security Application Rendez-vous (http://www.rennes.supelec.fr/CESAR/), Rennes, FR. December 2008.
 

2007

abstract ] Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.
pdf ] E. Bresson and M. Manulis.
slides ] Group-Oriented Cryptographic Protocols (GOCP), Wroclaw University, Poland. July 9th 2007.
 
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness.
abstract ] E. Bresson.
slides ] Crypto Team (Seminar), École normale supérieure, France. June 21st 2007.
 
abstract ] Revisiting Security Relations Between Signature Schemes and their Inner Hash Functions.
pdf ] E. Bresson, B. Chevallier-Mames, C. Clavier, B. Debraize, P.-A. Fouque, L. Goubin, A. Gouget, G. Leurent, P. Q. Nguyen, P. Paillier, T. Peyrin and S. Zimmer.
slides ] ECRYPT Hash Workshop (ECRYPT HW 07), Barcelona, ES. May 24th–25th 2007.
 
Improved On-Line/Off-Line Threshold Signatures.
abstract ] E. Bresson, D. Catalano and R. Gennaro.
slides ] Workshop on Cryptographic Protocols (WCP07), Bertinoro international Center for informatics (BiCi), Italie. March 4th–9th 2007.
 

2006

abstract ] Output Privacy in Secure Multiparty Computation.
pdf ] E. Bresson, D. Catalano, N. Fazio, A. Nicolosi and M. Yung.
slides ] Yet Another Conference in Cryptography (YACC), University of Toulon, France. June 20th 2006.
 
Security Models for Group Key Exchange.
abstract ] E. Bresson.
slides ] HGI Institute (Cryptology seminar), Ruhr University, Germany. May 4th 2006.
 
Password-Authentication and Key Exchange Protocols.
abstract ] E. Bresson.
slides ] VERIMAG Laboratory (Cryptology seminar), University of Grenoble, France. April 6th 2006.
 

2004

Constant Round Authenticated Group Key Agreement from General Assumptions.
abstract ] E. Bresson and D. Catalano.
slides ] CIRM Research Center (Cryptography workshop), University of Marseille, France. November 8th–12th 2004.
 
Password-Based Key Agreement Protocols.
abstract ] E. Bresson.
slides ] GREYC Research Group (Crypto seminar), University of Caen, France. April 1st 2004.
 

2002

Protocoles cryptographiques pour l’anonymat et l’authentification dans les groupes.
abstract ] E. Bresson.
slides ] LASEC Laboratory (seminar), Swiss Institute of Technology (EPFL), Switzerland. September 6th 2002.
 
abstract ] Two Formal Views of Authenticated Group Diffie-Hellman Key Exchange.
pdf ] E. Bresson, O. Chevassut, D. Pointcheval, O. Pereira and J.-J. Quisquater.
slides ] DIMACS Workshop on Cryptographic Protocols in Complex Environments, Piscataway, New Jersey, USA. May 15th–17th 2002.
 
Signature et authentification dans les groupes.
abstract ] E. Bresson.
slides ] IRMAR Institute (Crypto seminar), University of Rennes, France. April 26th 2002.
 

2000

A Short Introduction to Cryptology.
E. Bresson.
Seminar at École polytechnique. May 2000.
 

Teaching and students

2008–2009

M. de Saint-Sauveur, “Lattices attacks on RSA and (EC)DSA”
Ecole polytechnique, Paris

2007–2008

Master “Sécurité des Systèmes Informatiques” — Cryptologie
Univ. Paris XII (Créteil)
Cours: version en ligne des transparents

Cryptography
European network “ATHENS”, Paristech/ENSTA

2006–2007

Master “Sécurité des Systèmes Informatiques” — Cryptologie
Univ. Paris XII (Créteil)

Cryptography
European network “ATHENS”, Paristech/ENSTA

2004–2005

G. Erny, “Cryptanalysis of RSA using continuous fractions”
ESIEE, engineering school

2003–2004

H. Le Normand, “Security of SSL protocols”
Master SSI, Supélec Rennes

2002–2003

C Programming (D. Pointcheval)
"Programming Basics" at ENSTA

2001–2002

Cryptographic systems (5) – digital signature
Master of Science: “Computer security” at ENSIB

2000–2001

C programming (G. Poupard)
“Algorithmics” at ENSTA

Universitary curriculum

Admitted in École polytechnique, 1995.
Graduated and admitted in Corps de l’Armement, 1998.
DEA (1st year of PhD) "Algorithmics", 1999. With distinction.
PhD in cryptography at ÉNS (GRECC), 2002. With distinction.
Member of the IACR (International Association for Cryptologic Research) and EATCS (European Association for Theoretical Computyer Science).

PhD thesis

.bib ] Cryptographic protocols for group anonymity and authentication.
abstract ] E. Bresson (Jacques Stern, advisor).
pdf.zip ] Defended on october 17th 2002, at École normale supérieure (more details)..
04/04/04:  new version posted. Errata and corrections here.
05/05/05:  new version. Errata and corrections here.
06/06/06:  new version. Errata and corrections here.
07/07/07:  new version. Errata and corrections here.



Generated from LaTeX Last modified : Tue, 01 Dec. 2009, 17:48:06 CET (+0100)
Emmanuel BRESSON