| [ .bib ] | How to use Merkle-Damgard — On the Security Relations
between Signature Schemes and their Inner Hash Functions.
|
| [ abstract ] | E. Bresson, B. Chevallier-Mames, C. Clavier, A. Gouget,
P. Paillier and T. Peyrin.
|
| [ pdf ] | In Proc. of ProvSec ’08, vol. 5324 of LNCS, pp. 241–253, ©
Springer-Verlag, Berlin, 2008.
|
| | Presented in the Provable Security (ProvSec ’08), October
30–November 1, Shangai, CN.
|
| | |
| [ .bib ] | Contributory Group Key Exchange in the Presence of
Malicious Participants.
|
| [ abstract ] | E. Bresson and M. Manulis.
|
| | IET Proc. Information Security (IET-IFS), 2(3):85–93,
September 2008. © IET.
|
| | |
| [ .bib ] | Securing Group Key Exchange against Strong Corruptions
and Key Registration Attacks.
|
| [ abstract ] | E. Bresson and M. Manulis.
|
| | Int. Journal of Applied Cryptography (IJACT), 1(2):91–107,
2008. © Inderscience.
|
| | |
| [ .bib ] | Separation Results on the “One-More” Computational
Problems.
|
| [ abstract ] | E. Bresson, J. Monnerat and D. Vergnaud.
|
| [ pdf ] | In Proc. of CT-RSA ’08, vol. 4964 of LNCS, pp. 71–87, ©
Springer-Verlag, Berlin, 2008.
|
| [ slides ] | Presented in the Cryptographer’s track at RSA Conference
(RSA ’08), April 07–11, San Francisco, California.
|
| | |
| [ .bib ] | Securing Group Key Exchange against Strong Corruptions.
|
| [ abstract ] | E. Bresson and M. Manulis.
|
| [ pdf, full pdf ] | In Proc. of ACM ASIA CCS ’08, pp. 249–260, © ACM Press,
2008.
|
| [ slides ] | Presented in the ACM Symposium on Information, Computer
and Communications Security (ASIA CCS ’08), March 18–20,
Tokyo, JP.
|
| | |
| |
| [ .bib ] | On Security Models and Compilers for Group Key Exchange
Protocols.
|
| [ abstract ] | E. Bresson, M. Manulis and J. Schwenk.
|
| [ pdf ] | In Proc. of IWSEC ’07, vol. 4752 of LNCS, pp. 292–307, ©
Springer-Verlag, Berlin, 2007.
|
| [ slides ] | Presented in the International Workshop on Security (IWSEC
’07), October 29–31, Nara, JP.
|
| | |
| [ .bib ] | A Generalization of DDH with Applications to Protocol
Analysis and Computational Soundness.
|
| [ abstract ] | E. Bresson, Y. Lakhnech, L. Mazaré and B. Warinschi.
|
| [ pdf ] | In Proc. of Crypto ’07, vol. 4622 of LNCS, pp. 482–499.
Springer-Verlag, Berlin, 2007. © IACR.
|
| [ slides ] | Presented in the IACR International Conference: Advances in
Cryptology (Crypto ’07), August 19–23, Santa Barbara,
California.
|
| | |
| [ .bib ] | Provably-Secure Authenticated Group Diffie-Hellman Key
Exchange.
|
| [ abstract ] | E. Bresson, O. Chevassut and D. Pointcheval.
|
| | ACM Trans. on Information and System Security (TISSEC),
10(3):10, July 2007. © ACM .
|
| | |
| [ .bib ] | Malicious Participants in Group Key Exchange: Key Control
and Contributiveness in the Shadow of Trust.
|
| [ abstract ] | E. Bresson and M. Manulis.
|
| [ pdf, full pdf ] | In Proc. of ATC ’07, vol. 4610 of LNCS, pp. 395–409, ©
Springer-Verlag, Berlin, 2007.
|
| | Presented in the 4th International Conference on Autonomic
and Trusted Computing (ATC ’07), July 11–13, Hong-Kong,
HK.
|
| | |
| [ .bib ] | Improved On-Line/Off-Line Threshold Signatures.
|
| [ abstract ] | E. Bresson, D. Catalano and R. Gennaro.
|
| [ pdf, full pdf ] | In Proc. of PKC ’07, vol. 4450 of LNCS, pp. 217–232.
Springer-Verlag, Berlin, 2007. © IACR.
|
| [ slides ] | Presented in the IACR International Conference: Practice and
Theory in Public Key Cryptography (PKC ’07), April 16–20,
Beijing, CN.
|
| | |
| [ .bib ] | Strong Password-Based Authentication in TLS using the
Three-Party Group Diffie-Hellman Protocol.
|
| [ abstract ] | M. F. Abdalla, E. Bresson, O. Chevassut, B. Möller and
D. Pointcheval.
|
| | International J. of Security and Networks (IJSN),
2(3/4):284–296, 2007. © Inderscience.
|
| | Special issue: “Cryptography in Networks”.
|
| | |
| |
| [ .bib ] | Password-Based Group Key Exchange in a Constant Number of
Rounds.
|
| [ abstract ] | M. F. Abdalla, E. Bresson, O. Chevassut and D. Pointcheval.
|
| [ pdf ] | In Proc. of PKC ’06, vol. 3958 of LNCS, pp. 427–442.
Springer-Verlag, Berlin, 2006. © IACR.
|
| [ slides ] | Presented in the IACR International Conference: Practice and
Theory in Public Key Cryptography (PKC ’06), April 24–26,
New-York, NY.
|
| | |
| [ .bib ] | Provably Secure Password-Based Authentication in TLS.
|
| [ abstract ] | M. F. Abdalla, E. Bresson, O. Chevassut, B. Möller and
D. Pointcheval.
|
| [ pdf ] | In Proc. of ACM ASIA CCS ’06, pp. 35–45, © ACM Press,
2006.
|
| | Presented in the ACM Symposium on Information, Computer and
Communications Security (ASIA CCS ’06), March 21–24, Taipei,
TW.
|
| | |
| |
| [ .bib ] | Mutual Authentication and Group Key Agreement for
Low-Power Mobile Devices.
|
| [ abstract ] | E. Bresson, O. Chevassut, A. Essiari and D. Pointcheval.
|
| | Journal of Computer Communications (ComCom),
27(17):1730–1737, July 2004. © Elsevier.
|
| | Special issue: “Security and Performance in Wireless and
Mobile Networks”.
|
| | |
| [ .bib ] | New Security Results on Encrypted Key Exchange.
|
| [ abstract ] | E. Bresson, O. Chevassut and D. Pointcheval.
|
| [ pdf, full pdf ] | In Proc. of PKC ’04, vol. 2947 of LNCS, pp. 145–158.
Springer-Verlag, Berlin, 2004. © IACR.
|
| [ slides ] | Presented in the IACR International Conference: Practice and
Theory in Public Key Cryptography (PKC ’04), March 1–4,
Singapore, SG.
|
| | |
| [ .bib ] | Constant Round Authenticated Group Key Agreement via
Distributed Computation.
|
| [ abstract ] | E. Bresson and D. Catalano.
|
| [ pdf ] | In Proc. of PKC ’04, vol. 2947 of LNCS, pp. 115–129.
Springer-Verlag, Berlin, 2004. © IACR.
|
| [ slides ] | Presented in the IACR International Conference: Practice and
Theory in Public Key Cryptography (PKC ’04), March 1–4,
Singapore, SG.
|
| | |
| |
| [ .bib ] | A Simple Public-Key Cryptosystem with a Double Trapdoor
Decryption Mechanism and its Applications.
|
| [ abstract ] | E. Bresson, D. Catalano and D. Pointcheval.
|
| [ pdf ] | In Proc. of Asiacrypt ’03, vol. 2894 of LNCS, pp. 37–54.
Springer-Verlag, Berlin, 2003. © IACR.
|
| [ slides ] | Presented in the IACR International Conference: Advances in
Cryptology (Asiacrypt ’03), November 30–December 4, Taipei,
TW.
|
| | |
| [ .bib ] | Security Proofs for an Efficient Password-Based Key
Exchange.
|
| [ abstract ] | E. Bresson, O. Chevassut and D. Pointcheval.
|
| [ pdf, full pdf ] | In Proc. of ACM CCS ’03, pp. 241–250, © ACM Press,
2003.
|
| [ slides ] | Presented in the 10th ACM Conference on Computer and
Communications Security (CCS ’03), October 27–31,
Washington D.C..
|
| | |
| [ .bib ] | Mutual Authentication and Group Key Agreement for
Low-Power Mobile Devices.
|
| [ abstract ] | E. Bresson, O. Chevassut, A. Essiari and D. Pointcheval.
|
| [ pdf ] | In Proc. of MWCN ’03, pp. 59–62, © World Scientific
Publishing, 2003.
|
| | Presented in the 5th IFIP-TC6 International Conference on
Mobile and Wireless Communications Networks, October
27–29, Singapore, SG.
|
| | |
| |
| [ .bib ] | Group Diffie-Hellman Key Exchange Secure against Dictionary
Attacks.
|
| [ abstract ] | E. Bresson, O. Chevassut and D. Pointcheval.
|
| [ pdf, full pdf ] | In Proc. of Asiacrypt ’02, vol. 2501 of LNCS, pp. 497–514.
Springer-Verlag, Berlin, 2002. © IACR.
|
| [ slides ] | Presented in the IACR International Conference: Advances in
Cryptology (Asiacrypt ’02), December 1–5, Queenstown,
NZ.
|
| | |
| [ .bib ] | Proofs of Knowledge for Non-Monotone Discrete-Log
Formulae and Applications.
|
| [ abstract ] | E. Bresson and J. Stern.
|
| [ pdf ] | In Proc. of ISC ’02, vol. 2433 of LNCS, pp. 272–288, ©
Springer-Verlag, Berlin, 2002.
|
| [ slides ] | Presented in the Information Security Conference (ISC ’02),
September 30–October 2, Saõ Paulo, BR.
|
| | |
| [ .bib ] | The Group Diffie-Hellman Problems.
|
| [ abstract ] | E. Bresson, O. Chevassut and D. Pointcheval.
|
| [ pdf ] | In Proc. of SAC ’02, vol. 2595 of LNCS, pp. 325–338, ©
Springer-Verlag, Berlin, 2002.
|
| [ slides ] | Presented in the Workshop on Selected Areas in Cryptography
(SAC ’02), August 15–16, Saint-John’s, NewFoundLand.
|
| | |
| [ .bib ] | Threshold Ring Signatures and Applications to Ad-Hoc
Groups.
|
| [ abstract ] | E. Bresson, J. Stern and M. Szydlo.
|
| [ pdf, full pdf ] | In Proc. of Crypto ’02, vol. 2442 of LNCS, pp. 465–480.
Springer-Verlag, Berlin, 2002. © IACR.
|
| [ slides ] | Presented in the IACR International Conference: Advances in
Cryptology (Crypto ’02), August 18–22, Santa Barbara,
California.
|
| | |
| [ .bib ] | Dynamic Group Diffie-Hellman Key Exchange under
Standard Assumptions.
|
| [ abstract ] | E. Bresson, O. Chevassut and D. Pointcheval.
|
| [ pdf, full pdf ] | In Proc. of Eurocrypt ’02, vol. 2332 of LNCS, pp. 321–336.
Springer-Verlag, Berlin, 2002. © IACR.
|
| [ slides ] | Presented in the IACR International Conference: Advances in
Cryptology (Eurocrypt ’02), April 28–May 2, Amsterdam,
NL.
|
| | |
| |
| [ .bib ] | Provably Authenticated Group Diffie-Hellman Key Exchange
— The Dynamic Case.
|
| [ abstract ] | E. Bresson, O. Chevassut and D. Pointcheval.
|
| [ pdf, full pdf ] | In Proc. of Asiacrypt ’01, vol. 2248 of LNCS, pp. 290–309.
Springer-Verlag, Berlin, 2001. © IACR.
|
| [ slides ] | Presented in the IACR International Conference: Advances in
Cryptology (Asiacrypt ’01), December 9–13, Gold Coast,
Queensland.
|
| | |
| [ .bib ] | Provably Authenticated Group Diffie-Hellman Key Exchange.
|
| [ abstract ] | E. Bresson, O. Chevassut, D. Pointcheval and J.-J.
Quisquater.
|
| [ pdf ] | In Proc. of ACM CCS ’01, pp. 255–264, © ACM Press,
2001.
|
| [ slides ] | Presented in the 8th ACM Conference on Computer
and Communications Security (CCS ’01), November 6–8,
Philadelphia, Pennsylvania.
|
| | |
| [ .bib ] | Efficient Revocation in Group Signatures.
|
| [ abstract ] | E. Bresson and J. Stern.
|
| [ pdf ] | In Proc. of PKC ’01, vol. 1992 of LNCS, pp. 190–206, ©
Springer-Verlag, Berlin, 2001.
|
| [ slides ] | Presented in the 4th International Workshop on Practice and
Theory in Public Key Cryptography (PKC ’01), February
13–15, Cheju Island, KR.
|
| | |
| |
| | SHABAL, a SHA-3 Submission.
|
| [ abstract ] | E. Bresson, A. Canteaut, B. Chevallier-Mames, C. Clavier,
T. Fuhr, A. Gouget, T. Icart, J.-F. Misarsky, M. Naya-Plasencia,
P. Paillier, T. Pornin, J.-R. Reinhard, C. Thuillet and
M. Videau.
|
| [ slides ] | The First SHA-3 Candidate Conference
(http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/Feb2009/index.html),
Leuven, BE. February 25th–28th 2009.
|
| | |
| |
| [ abstract ] | Malicious Participants in Group Key Exchange: Key Control
and Contributiveness in the Shadow of Trust.
|
| [ pdf ] | E. Bresson and M. Manulis.
|
| [ slides ] | Group-Oriented Cryptographic Protocols (GOCP), Wroclaw
University, Poland. July 9th 2007.
|
| | |
| | A Generalization of DDH with Applications to Protocol
Analysis and Computational Soundness.
|
| [ abstract ] | E. Bresson.
|
| [ slides ] | Crypto Team (Seminar), École normale supérieure, France.
June 21st 2007.
|
| | |
| [ abstract ] | Revisiting Security Relations Between Signature Schemes and
their Inner Hash Functions.
|
| [ pdf ] | E. Bresson, B. Chevallier-Mames, C. Clavier, B. Debraize,
P.-A. Fouque, L. Goubin, A. Gouget, G. Leurent, P. Q.
Nguyen, P. Paillier, T. Peyrin and S. Zimmer.
|
| [ slides ] | ECRYPT Hash Workshop (ECRYPT HW 07), Barcelona, ES.
May 24th–25th 2007.
|
| | |
| | Improved On-Line/Off-Line Threshold Signatures.
|
| [ abstract ] | E. Bresson, D. Catalano and R. Gennaro.
|
| [ slides ] | Workshop on Cryptographic Protocols (WCP07), Bertinoro
international Center for informatics (BiCi), Italie. March 4th–9th
2007.
|
| | |
| |
| [ abstract ] | Output Privacy in Secure Multiparty Computation.
|
| [ pdf ] | E. Bresson, D. Catalano, N. Fazio, A. Nicolosi and M. Yung.
|
| [ slides ] | Yet Another Conference in Cryptography (YACC), University of
Toulon, France. June 20th 2006.
|
| | |
| | Security Models for Group Key Exchange.
|
| [ abstract ] | E. Bresson.
|
| [ slides ] | HGI Institute (Cryptology seminar), Ruhr University, Germany.
May 4th 2006.
|
| | |
| | Password-Authentication and Key Exchange Protocols.
|
| [ abstract ] | E. Bresson.
|
| [ slides ] | VERIMAG Laboratory (Cryptology seminar), University of
Grenoble, France. April 6th 2006.
|
| | |
| |
| | Protocoles cryptographiques pour l’anonymat et l’authentification
dans les groupes.
|
| [ abstract ] | E. Bresson.
|
| [ slides ] | LASEC Laboratory (seminar), Swiss Institute of Technology
(EPFL), Switzerland. September 6th 2002.
|
| | |
| [ abstract ] | Two Formal Views of Authenticated Group Diffie-Hellman Key
Exchange.
|
| [ pdf ] | E. Bresson, O. Chevassut, D. Pointcheval, O. Pereira and J.-J.
Quisquater.
|
| [ slides ] | DIMACS Workshop on Cryptographic Protocols in Complex
Environments, Piscataway, New Jersey, USA. May 15th–17th
2002.
|
| | |
| | Signature et authentification dans les groupes.
|
| [ abstract ] | E. Bresson.
|
| [ slides ] | IRMAR Institute (Crypto seminar), University of Rennes,
France. April 26th 2002.
|
| | |
| |