Chevalier Céline
Maître de conférences à l'Université Panthéon-Assas Paris 2.
Membre du CRED.
Membre associé de l'équipe Cryptographie du département d'informatique de l'ENS.
HdR: le manuscrit en pdf.
Thèse: le manuscrit en pdf,
en pdf.zip.
Publications:
- Designs, Codes, and Cryptography (to appear, 2022):
Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses
(Céline Chevalier, Elham Kashefi, Luka Music)
- Theory of Computer Science (895, 2021):
Hardware security without secure hardware: How to decrypt with a password
and a server.
(Olivier Blazy, Laura Brouilhet, Céline Chevalier, Patrick Towa, Ida Tucker,
Damien Vergnaud)
- Algorithmica (83, 2021):
Privately Outsourcing Exponentiation to a Single Server:
Cryptanalysis and Optimal Constructions
(Céline Chevalier, Fabien Laguillaumie, Damien Vergnaud)
- ProvSec 2020:
Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses
(Céline Chevalier, Elham Kashefi, Luka Music)
- QCrypt 2020:
On Security Notions for Encryption in a Quantum World
(Céline Chevalier, Ehsan Ebrahimi, Quoc Huy Vu)
- Secrypt 2020:
Round-Optimal Constant-Size Blind Signatures
(Olivier Blazy, Brouilhet Laura, Céline Chevalier, Neals Fournaise)
- ARES 2019:
Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with
Adaptive Corruptions
(Olivier Blazy, Céline Chevalier, Quoc Huy Vu)
- ARES 2018:
Non-Interactive Key Exchange from Identity-Based Encryption
(Olivier Blazy, Céline Chevalier)
- ARES 2018:
Spreading Alerts Quietly: New Insights from Theory and Practice
(Olivier Blazy, Céline Chevalier)
- ACNS 2017:
Almost Optimal Oblivious Transfer from QA-NIZK
(Olivier Blazy, Céline Chevalier et Paul Germouty)
- Asiacrypt 2016:
Structure-Preserving Smooth Projective Hashing
(Olivier Blazy et Céline Chevalier)
- Asiacrypt 2016:
Adaptive Oblivious Transfer and Generalization
(Olivier Blazy, Céline Chevalier et Paul Germouty)
- Esorics 2016:
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis
and Optimal Constructions
(Céline Chevalier, Fabien Laguillaumie et Damien Vergnaud)
- PKC 2016:
Easing Coppersmith Methods using Analytic Combinatorics: Applications
to Public-Key Cryptography with Weak Pseudorandomness
(Fabrice Ben Hamouda, Céline Chevalier, Adrian Thillard et Damien Vergnaud)
- CT-RSA 2016:
Mitigating Server Breaches in Password-Based Authentication:
Secure and Efficient Solutions
(Olivier Blazy, Céline Chevalier et Damien Vergnaud)
- ACNS 2015:
Generic Construction of UC-Secure Oblivious Transfer
(Olivier Blazy et Céline Chevalier)
- CT-RSA 2015:
Non-Interactive Zero-Knowledge Proofs of Non-Membership
(Olivier Blazy, Céline Chevalier et Damien Vergnaud)
- Asiacrypt 2013:
SPHF-Friendly Non-Interactive Commitments
(Michel Abdalla, Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier,
David Pointcheval et Damien Vergnaud)
- Crypto 2013:
New Smooth Projective Hash Functions and One-Round Authenticated
Key Exchange
(Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval et
Damien Vergnaud)
- ACNS 2013:
Analysis and Improvement of Lindell's UC-Secure Commitment Schemes
(Olivier Blazy, Céline Chevalier, David Pointcheval et Damien Vergnaud)
- PKC 2013:
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
(Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval
et Damien
Vergnaud)
- FMSD 2013 (journal):
Composition of Password-Based Protocols
(Céline Chevalier, Stéphanie Delaune, Steve Kremer et Mark D. Ryan)
- FSTTCS 2011:
Transforming Password Protocols to Compose
(Céline Chevalier, Stéphanie Delaune et Steve Kremer)
- IWCS 2011:
Vaudenay's Privacy Model in the Universal Composability
Framework: A Case Study
(Hervé Chabanne et Céline Chevalier)
- CT-RSA 2011:
Contributory
Password-Authenticated Group Key Exchange with Join Capability
(Michel Abdalla, Céline Chevalier, Louis Granboulan et David
Pointcheval)
- Africacrypt 2010:
Flexible
Group Key Exchange with On-Demand Computation of Subgroup Keys
(Michel Abdalla, Céline Chevalier, Mark Manulis et David Pointcheval)
- Africacrypt 2010:
Strong
Cryptography from Weak Secrets - Building Efficient PKE and IBE from
Distributed Passwords
(Xavier Boyen, Céline Chevalier, Georg Fuchsbauer et David Pointcheval)
- Crypto 2009:
Smooth
Projective Hashing for Conditionally Extractable Commitments
(Michel Abdalla, Céline Chevalier et David Pointcheval)
- Africacrypt 2009:
Password-Authenticated
Group Key Agreement with Adaptive Security and Contributiveness
(Michel Abdalla, Dario Catalano, Céline Chevalier et David Pointcheval)
- Eurocrypt 2009:
Optimal
Randomness Extraction from a Diffie-Hellman Element
(Céline Chevalier, Pierre-Alain Fouque, David Pointcheval et Sébastien
Zimmer)
- PKC 2009:
Distributed
Public-Key Cryptography from Weak Secrets
(Michel Abdalla, Xavier Boyen, Céline Chevalier et David Pointcheval)
- CT-RSA 2008:
Efficient
Two-Party Password-Based Key Exchange Protocols in the UC
Framework
(Michel Abdalla, Dario Catalano, Céline Chevalier et David Pointcheval)
Enseignement:
- Projets de L3 Maths/Info: carrés
magiques, iPod, ondelettes
- Formation LaTeX au CIES Jussieu (2006--2008): Niveau
1 et Niveau 2
- Formation LaTeX au CIES Jussieu (2008--2009):
- Formation LaTeX à l'EDITE (2009--2010):
- Formation LaTeX à l'Université Paris 2 (2011--2012):
- Formation LaTeX à l'Université Paris 2 (2013--2014):
- Formation LaTeX à l'Urfist de Bordeaux (2013--2014):
- Formation LaTeX à l'Urfist de Bordeaux (2014--2015):
- Formation LaTeX à l'École doctorale 4 de Paris Sorbonne (2014--2015):
- Formation LaTeX à l'Université Paris 2 (2014--2015):
- Formation LaTeX à l'Urfist de Bordeaux (2015--2016):
- Formation LaTeX au CNRS (2016--2017):
- Formation LaTeX à l'Urfist de Bordeaux (2016--2017):
- Formation LaTeX à l'Université Paris 2 (2016--2017):
- Formation LaTeX à l'Urfist de Bordeaux (2017--2018):