David Pointcheval

Senior Researcher at CNRS

Head of the Crypto Team / INRIA CASCADE Project
Chairman of the ENS Computer Science Department

2017

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Decentralized Multi-Client Functional Encryption for Inner Product by Jérémy Chotard, Edouard Dufour Sans, Duong Hieu Phan, David Pointcheval. Technical report, IACR ePrint Archive, no. 2017/989, 2017
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange by Alexandra Boldyreva, Shan Chen, Pierre-Alain Dupont, David Pointcheval. In Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF '17), IEEE Computer Society, pp. 159-175, 2017
On the Tightness of Forward-Secure Signature Reductions by Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Technical report, IACR ePrint Archive, no. 2017/746, 2017
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange by Alexandra Boldyreva, Shan Chen, Pierre-Alain Dupont, David Pointcheval. Technical report, IACR ePrint Archive, no. 2017/559, 2017
Removing the Strong RSA Assumption from Arguments over the Integers by Geoffroy Couteau, Thomas Peters, David Pointcheval. In Advances in Cryptology - Proceedings of EUROCRYPT '17 -- Part II, Springer, vol. 10211, pp. 321-350, 2017
VTBPEKE: Verifier-based Two-Basis Password Exponential Key Exchange by David Pointcheval, Guilin Wang. In Proceedings of the 12th ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS '17), ACM Press, pp. 301-312, 2017
Removing Erasures with Explainable Hash Proof Systems by Michel Abdalla, Fabrice Benhamouda, David Pointcheval. In Conference on Practice and Theory in Public-Key Cryptography (PKC '17) -- Part I, Springer, vol. 10174, pp. 151-174, 2017
Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash by David Pointcheval, Olivier Sanders, Jacques Traoré. In Conference on Practice and Theory in Public-Key Cryptography (PKC '17) -- Part I, Springer, vol. 10174, pp. 61-90, 2017
Functional Encryption with Oblivious Helper by Pierre-Alain Dupont, David Pointcheval. In Proceedings of the 12th ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS '17), ACM Press, pp. 205-214, 2017
Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms by Jérémy Chotard, Duong Hieu Phan, David Pointcheval. In Proceedings of the 20th International Conference on Information Security (ISC '17), Springer, vol. ???, pp. ???-???, 2017

2016

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms by Jérémy Chotard, Duong Hieu Phan, David Pointcheval. Technical report, IACR ePrint Archive, no. 2016/1089, 2016
Divisible E-Cash Made Practical by Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré. In IET Information Security, The Institution of Engineering and Technology, vol. 10, no. 6, pp. 332-347, 2016
The Whole is Less than the Sum of its Parts: Constructing More Efficient Lattice-Based AKEs by Rafael del Pino, Vadim Lyubashevsky, David Pointcheval. In The 10th Conference on Security in Communication Networks (SCN '16), Springer, vol. 9841, pp. 273-291, 2016
Robust Password-Protected Secret Sharing by Michel Abdalla, Mario Cornejo, Anca Nitulescu, David Pointcheval. In The 21st European Symposium on Research in Computer Security (ESORICS '16) -- Part II, Springer, vol. 9879, pp. 61-79, 2016
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks by Michel Abdalla, Fabrice Benhamouda, David Pointcheval. In IET Information Security, The Institution of Engineering and Technology, vol. 10, no. 6, pp. 288-303, 2016
The Whole is Less than the Sum of its Parts: Constructing More Efficient Lattice-Based AKEs by Rafael del Pino, Vadim Lyubashevsky, David Pointcheval. Technical report, IACR ePrint Archive, no. 2016/435, 2016
Encryption Switching Protocols by Geoffroy Couteau, Thomas Peters, David Pointcheval. In Advances in Cryptology - Proceedings of CRYPTO '16 -- Part I, Springer, vol. 9814, pp. 308-338, 2016
Legally Fair Contract Signing Without Keystones by Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, David Pointcheval. Technical report, IACR ePrint Archive, no. 2016/363, 2016
Legally Fair Contract Signing Without Keystones by Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, David Pointcheval. In Conference on Applied Cryptography and Network Security (ACNS '16), Springer, vol. 9696, pp. 175-190, 2016
Removing the Strong RSA Assumption from Arguments over the Integers by Geoffroy Couteau, Thomas Peters, David Pointcheval. Technical report, IACR ePrint Archive, no. 2016/128, 2016
Robust Password-Protected Secret Sharing by Michel Abdalla, Mario Cornejo, Anca Nitulescu, David Pointcheval. Technical report, IACR ePrint Archive, no. 2016/123, 2016
Short Randomizable Signatures by David Pointcheval, Olivier Sanders. In The Cryptographers' Track at RSA Conference '16 (CT-RSA '16), Springer, vol. 9610, pp. 111-126, 2016
Better Security for Functional Encryption for Inner Product Evaluations by Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval. Technical report, IACR ePrint Archive, no. 2016/011, 2016
Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security by Raphael Bost, Pierre-Alain Fouque, David Pointcheval. Technical report, IACR ePrint Archive, no. 2016/062, 2016
The Eighth International Conference on Cryptology in Africa (AFRICACRYPT '16) Springer, vol. 9646 of Lecture Notes in Computer Science, 2016
Secure Distributed Computation on Private Inputs by Geoffroy Couteau, Thomas Peters, David Pointcheval. In Foundations and Practice of Security (FPS '15), Springer, vol. 9482, pp. 14-26, 2016

2015

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks by Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud. Technical report, IACR ePrint Archive, no. 2015/1219, 2015
Secure Distributed Computation on Private Inputs by Geoffroy Couteau, Thomas Peters, David Pointcheval. Technical report, IACR ePrint Archive, no. 2015/1196, 2015
Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash by David Pointcheval, Olivier Sanders, Jacques Traoré. Technical report, IACR ePrint Archive, no. 2015/972, 2015
Encryption Switching Protocols by Geoffroy Couteau, Thomas Peters, David Pointcheval. Technical report, IACR ePrint Archive, no. 2015/990, 2015
Short Randomizable Signatures by David Pointcheval, Olivier Sanders. Technical report, IACR ePrint Archive, no. 2015/525, 2015
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting by Fabrice Benhamouda, Geoffroy Couteau, David Pointcheval, Hoeteck Wee. Technical report, IACR ePrint Archive, no. 2015/246, 2015 - Full version of the Crypto '15 paper
Scalable Divisible E-cash by Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré. Technical report, IACR ePrint Archive, no. 2015/300, 2015 - Full version of the ACNS '15 paper
Forward Secure Non-Interactive Key Exchange by David Pointcheval, Olivier Sanders. Technical report, IACR ePrint Archive, no. 2015/278, 2015 - Extended version of the PKC '14 paper
Tighter Reductions for Forward-Secure Signature Schemes by Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Technical report, IACR ePrint Archive, no. 2015/196, 2015 - Full version of the PKC '13 paper
New Techniques for SPHFs and Efficient One-Round PAKE Protocols by Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud. Technical report, IACR ePrint Archive, no. 2015/188, 2015 - Extended version of the Crypto '13 paper
Functional Encryption Schemes for Inner Products by Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval. Technical report, IACR ePrint Archive, no. 2015/017, 2015 - Full version of the PKC '15 paper
Divisible E-Cash Made Practical by Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré. In Conference on Practice and Theory in Public-Key Cryptography (PKC '15), Springer, vol. 9020, pp. 77-100, 2015
Functional Encryption Schemes for Inner Products by Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval. In Conference on Practice and Theory in Public-Key Cryptography (PKC '15), Springer, vol. 9020, pp. 733-751, 2015
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks by Michel Abdalla, Fabrice Benhamouda, David Pointcheval. In Conference on Practice and Theory in Public-Key Cryptography (PKC '15), Springer, vol. 9020, pp. 332-352, 2015
Disjunctions for Hash Proof Systems: New Constructions and Applications by Michel Abdalla, Fabrice Benhamouda, David Pointcheval. In Advances in Cryptology - Proceedings of EUROCRYPT '15 - Part II, Springer, vol. 9057, pp. 69-100, 2015
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting by Fabrice Benhamouda, Geoffroy Couteau, David Pointcheval, Hoeteck Wee. In Advances in Cryptology - Proceedings of CRYPTO '15 - Part II, Springer, vol. 9216, pp. 107-129, 2015
Scalable Divisible E-Cash by Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré. In Conference on Applied Cryptography and Network Security (ACNS '15), Springer, vol. 9092, pp. 287-306, 2015
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks by Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud. In Conference on Applied Cryptography and Network Security (ACNS '15), Springer, vol. 9092, pp. 635-654, 2015

2014

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Disjunctions for Hash Proof Systems: New Constructions and Applications by Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Technical report, IACR ePrint Archive, no. 2014/483, 2014 - Full version of the Eurocrypt '15 paper
Removing Erasures with Explainable Hash Proof Systems by Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Technical report, ACR ePrint Archive, no. 2014/125, 2014
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks by Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Technical report, IACR ePrint Archive, no. 2014/609, 2014 - Full version of the PKC '15 paper
Divisible E-Cash Made Practical by Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré. Technical report, IACR ePrint Archive, no. 2014/785, 2014 - Full version of the PKC '15 paper
Forward Secure Non-Interactive Key Exchange by David Pointcheval, Olivier Sanders. In The 9th Conference on Security in Communication Networks (SCN '14), Springer, vol. 8642, pp. 21-39, 2014
The Seventh International Conference on Cryptology in Africa (AFRICACRYPT '14) Springer, vol. 8469 of Lecture Notes in Computer Science, 2014
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting by Sébastien Canard, David Pointcheval, Olivier Sanders. In Conference on Practice and Theory in Public-Key Cryptography (PKC '14), Springer, vol. 8383, pp. 167-184, 2014

2013

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Analysis of the Linux Pseudo-Random Number Generators by Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergniaud, Daniel Wichs. In VMWare Technical Journal, VMWare, vol. 2, no. 2, pp. 2-8, 2013
Short Blind Signatures by Olivier Blazy, Georg Fuchsbauer, David Pointcheval, Damien Vergnaud. In Journal of Computer Security, IOS Press, vol. 21, no. 5, pp. 627-661, 2013
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts by Duong Hieu Phan, David Pointcheval, Siamak F. Shahandashti, Mario Strefler. In International Journal of Information Security, Springer, vol. 12, no. 4, pp. 251-265, 2013
Black-box Trace&Revoke Codes by Hung Q. Ngo, Duong Hieu Phan, David Pointcheval. In Algorithmica, Springer, vol. 67, no. 3, pp. 418-448, 2013
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages by Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud. In Conference on Practice and Theory in Public-Key Cryptography (PKC '13), Springer, vol. 7778, pp. 272-291, 2013
Tighter Reductions for Forward-Secure Signature Scheme by Michel Abdalla, Fabrice Benhamouda, David Pointcheval. In Conference on Practice and Theory in Public-Key Cryptography (PKC '13), Springer, vol. 7778, pp. 292-311, 2013
Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust by Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, Daniel Wichs. Technical report, IACR ePrint Archive, no. 2013/338, 2013 - Full version of the ACM CCS '13 paper
Analysis and Improvement of Lindell's UC-Secure Commitment Schemes by Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud. Technical report, IACR ePrint Archive, no. 2013/123, 2013 - Extended version of ACNS '13 paper
Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions by Fabrice Benhamouda, David Pointcheval. Technical report, IACR ePrint Archive, no. 2013/833, 2013
Trapdoor Smooth Projective Hash Functions by Fabrice Benhamouda, David Pointcheval. Technical report, IACR ePrint Archive, no. 2013/341, 2013 - Full version of the Crypto '13 paper
New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange by Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud. Technical report, IACR ePrint Archive, no. 2013/034, 2013 - Full version of the Crypto '13 paper
SPHF-Friendly Non-Interactive Commitment Schemes by Michel Abdalla, Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval. Technical report, IACR ePrint Archive, no. 2013/588, 2013 - Full version of the Asiacrypt '13 paper
Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust by Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergniaud, Daniel Wichs. In Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '13), ACM Press, pp. 647-658, 2013
New Techniques for SPHFs and Efficient One-Round PAKE Protocols by Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud. In Advances in Cryptology - Proceedings of CRYPTO '13 - Part I, Springer, vol. 8042, pp. 449-475, 2013 - See also http://eprint.iacr.org/2013/034 and http://eprint.iacr.org/2013/341
Multi-Channel Broadcast Encryption by Duong Hieu Phan, David Pointcheval, Cuong Trinh Viet. In Proceedings of the 8th ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS '13), ACM Press, pp. 277-286, 2013
Analysis and Improvement of Lindell's UC-Secure Commitment Schemes by Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud. In Conference on Applied Cryptography and Network Security (ACNS '13), Springer, vol. 7954, pp. 534-551, 2013
SPHF-Friendly Non-Interactive Commitment Schemes by Michel Abdalla, Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '13 - Part I, Springer, vol. 8269, pp. 214-234, 2013

2012

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions by Olivier Blazy, David Pointcheval, Damien Vergnaud. In 9th Theory of Cryptography Conference (TCC '12), Springer, vol. 7194, pp. 94-111, 2012
Decentralized Dynamic Broadcast Encryption by Duong Hieu Phan, David Pointcheval, Mario Strefler. In The 8th Conference on Security in Communication Networks (SCN '12), Springer, vol. 7485, pp. 166-183, 2012
Compact Round-Optimal Partially-Blind Signatures by Olivier Blazy, David Pointcheval, Damien Vergnaud. In The 8th Conference on Security in Communication Networks (SCN '12), Springer, vol. 7485, pp. 95-112, 2012
The 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt '12) Springer, vol. 7237 of Lecture Notes in Computer Science, 2012
Password-Based Authenticated Key Exchange by David Pointcheval. In Conference on Practice and Theory in Public-Key Cryptography (PKC '12), Springer, vol. 7293, pp. 390-397, 2012
Autotomic Signatures by David Naccache, David Pointcheval. In Cryptography and Security: From Theory to Applications, Springer, vol. 6805 of Lecture Notes in Computer Science, pp. 143-155, 2012 - Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday
Message-based Traitor Tracing with Optimal Ciphertext Rate by Duong Hieu Phan, David Pointcheval, Mario Strefler. In Second International Conference on Cryptology and Information Security (LatinCrypt '12), Springer, vol. 7533, pp. 56-77, 2012
Multi-Channel Broadcast Encryption by Duong Hieu Phan, David Pointcheval, Viet Cuong Trinh. Technical report, IACR ePrint Archive, no. 2012/307, 2012 - Full version of the AsiaCCS '13 paper
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts by Duong Hieu Phan, David Pointcheval, Siamak F. Shahandashti, Mario Strefler. Technical report, IACR ePrint Archive, no. 2012/216, 2012 - Full version of the ACISP '12 paper
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages by Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud. Technical report, IACR ePrint Archive, no. 2012/284, 2012 - Full version of the PKC '13 paper
Verified Security of Redundancy-Free Encryption from Rabin and RSA by Gilles Barthe, David Pointcheval, Santiago Zanella-Béguelin. Technical report, IACR ePrint Archive, no. 2012/308, 2012 - Full version of the ACM CCS '12 paper
Verified Security of Redundancy-Free Encryption from Rabin and RSA by Gilles Barthe, David Pointcheval, Santiago Zanella-Béguelin. In Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS '12), ACM Press, pp. 724-735, 2012
Traceable Signature with Stepping Capabilities by Olivier Blazy, David Pointcheval. In Cryptography and Security: From Theory to Applications, Springer, vol. 6805 of Lecture Notes in Computer Science, pp. 108-131, 2012 - Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts by Duong Hieu Phan, David Pointcheval, Siamak F. Shahandashti, Mario Strefler. In The 17th Australasian Conference on Information Security and Privacy (ACISP '12), Springer, vol. 7372, pp. 308-321, 2012

2011

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Encyclopedia of Cryptography and Security (2nd Edition) - RSA Public-Key Encryption by David Pointcheval. Springer, New York, pp. 1069-1072, 2011
Encyclopedia of Cryptography and Security (2nd Edition) - Rabin Cryptosystem by David Pointcheval. Springer, New York, pp. 1013-1014, 2011
Encyclopedia of Cryptography and Security (2nd Edition) - OAEP: Optimal Asymmetric Encryption Padding by David Pointcheval. Springer, New York, pp. 882-884, 2011
Signatures on Randomizable Ciphertexts by Olivier Blazy, Georg Fuchsbauer, David Pointcheval, Damien Vergnaud. In Conference on Practice and Theory in Public-Key Cryptography (PKC '11), Springer, vol. 6571, pp. 403-422, 2011
The Fourth International Conference on Cryptology in Africa (AFRICACRYPT '11) Springer, vol. 6737 of Lecture Notes in Computer Science, 2011
Decentralized Dynamic Broadcast Encryption by Duong Hieu Phan, David Pointcheval, Mario Strefler. Technical report, IACR ePrint Archive, no. 2011/463, 2011 - Full version of the SCN '12 paper
Contributory Password-Authenticated Group Key Exchange with Join Capability by Michel Abdalla, Céline Chevalier, Louis Granboulan, David Pointcheval. In The Cryptographers' Track at RSA Conference '11 (CT-RSA '11), Springer, vol. 6558, pp. 142-160, 2011
Security Notions for Broadcast Encryption by Duong Hieu Phan, David Pointcheval, Mario Strefler. In Conference on Applied Cryptography and Network Security (ACNS '11), Springer, vol. 6715, pp. 377-394, 2011

2010

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
``Parallel Signcryption'' by Josef Pieprzyk, David Pointcheval. Chapter in Practical Signcryption, Springer, pp. 175-190, 2010
The 13th International Conference on Practice and Theory in Public Key Cryptography (PKC '10) Springer, vol. 6056 of Lecture Notes in Computer Science, 2010
Mediated Traceable Anonymous Encryption by Malika Izabachène, David Pointcheval, Damien Vergnaud. In First International Conference on Cryptology and Information Security (LatinCrypt '10), Springer, vol. 6212, pp. 40-60, 2010
On Some Incompatible Properties of Voting Schemes by Benoît Chevallier-Mames, Pierre-Alain Fouque, David Pointcheval, Julien P. Stern, Jacques Traoré. In Towards Trustworthy Elections, Springer, vol. 6000 of Lecture Notes in Computer Science, pp. 191-199, 2010
Strong Cryptography from Weak Secrets - Building Efficient PKE and IBE from Distributed Passwords by Xavier Boyen, Céline Chevalier, Georg Fuchsbauer, David Pointcheval. In Third African International Conference on Cryptology (AfricaCrypt '10), Springer, vol. 6055, pp. 297-315, 2010
Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys by Michel Abdalla, Céline Chevalier, Mark Manulis, David Pointcheval. In Third African International Conference on Cryptology (AfricaCrypt '10), Springer, vol. 6055, pp. 351-368, 2010

2009

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Distributed Public-Key Cryptography from Weak Secrets by Michel Abdalla, Xavier Boyen, Céline Chevalier, David Pointcheval. In Conference on Practice and Theory in Public-Key Cryptography (PKC '09), Springer, vol. 5443, pp. 139-159, 2009
Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures by Georg Fuchsbauer, David Pointcheval. In Third International Conference on Pairing-based Cryptography (Pairing 2009), Springer, vol. 5671, pp. 132-149, 2009
New Anonymity Notions for Identity-Based Encryption by Malika Izabachène, David Pointcheval. In Formal to Practical Security, Springer, vol. 5458 of Lecture Notes in Computer Science, pp. 138-157, 2009
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures by Georg Fuchsbauer, David Pointcheval. In Formal to Practical Security, Springer, vol. 5458 of Lecture Notes in Computer Science, pp. 95-116, 2009
Transferable Anonymous Constant-Size Fair E-Cash by Georg Fuchsbauer, David Pointcheval, Damien Vergnaud. Technical report, IACR ePrint Archive, no. 2009/146, 2009 - Full version of the CANS '09 paper
Optimal Randomness Extraction from a Diffie-Hellman Element by Céline Chevalier, Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer. In Advances in Cryptology - Proceedings of EUROCRYPT '09, Springer, vol. 5479, pp. 572-589, 2009
Transferable Constant-Size Fair E-Cash by Georg Fuchsbauer, David Pointcheval, Damien Vergnaud. In The 8th International Workshop on Cryptology and Network Security (CANS '09), Springer, vol. 5888, pp. 226-247, 2009
Smooth Projective Hashing for Conditionally Extractable Commitments by Michel Abdalla, Céline Chevalier, David Pointcheval. In Advances in Cryptology - Proceedings of CRYPTO '09, Springer, vol. 5677, pp. 671-689, 2009
The 7th International Conference on Applied Cryptography and Network Security (ACNS '09) Springer, vol. 5536, 2009
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness by Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval. In Second African International Conference on Cryptology (AfricaCrypt '09), Springer, vol. 5580, pp. 254-271, 2009

2008

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
New Anonymity Notions for Identity-Based Encryption by Malika Izabachène, David Pointcheval. In The 6th Conference on Security in Communication Networks (SCN '08), Springer, vol. 5229, pp. 375-391, 2008
Anonymous Proxy Signatures by Georg Fuchsbauer, David Pointcheval. In The 6th Conference on Security in Communication Networks (SCN '08), Springer, vol. 5229, pp. 201-217, 2008
An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication by Julien Bringer, Hervé Chabanne, David Pointcheval, Sébastien Zimmer. In The 3rd International Workshop on Security (IWSEC '08), Springer, vol. 5312, pp. 219-230, 2008
A Formal Study of the Privacy Concerns in Biometric-based Remote Authentication Schemes by Qiang Tang, Julien Bringer, Hervé Chabanne, David Pointcheval. In The 4th Information Security Practice and Experience Conference (ISPEC '08), Springer, vol. 4991, pp. 56-70, 2008
Encrypting Proofs on Pairings and Its Application to Anonymity for Signatures by Georg Fuchsbauer, David Pointcheval. Technical report, IACR ePrint Archive, no. 2008/528, 2008 - Earlier version of the Pairing '09 paper
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures by Georg Fuchsbauer, David Pointcheval. Technical report, IACR ePrint Archive, no. 2008/037, 2008 - Full version of the SCN '08 paper
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework by Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval. In The Cryptographers' Track at RSA Conference '08 (CT-RSA '08), Springer, vol. 4964, pp. 335-351, 2008
Anonymous and Transparent Gateway-based Password-Authenticated Key Exchange by Michel Abdalla, Malika Izabachène, David Pointcheval. In The 7th International Workshop on Cryptology and Network Security (CANS '08), Springer, vol. 5339, pp. 133-148, 2008
Dynamic Threshold Public-Key Encryption by Cécile Delerablée, David Pointcheval. In Advances in Cryptology - Proceedings of CRYPTO '08, Springer, vol. 5157, pp. 317-334, 2008
HMAC is a Randomness Extractor and Applications to TLS by Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer. In Proceedings of the 3rd ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS '08), ACM Press, pp. 21-32, 2008
Multi-Factor Authenticated Key Exchange by David Pointcheval, Sébastien Zimmer. In Conference on Applied Cryptography and Network Security (ACNS '08), Springer, vol. 5037, pp. 277-295, 2008

2007

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys by Cécile Delerablée, Pascal Paillier, David Pointcheval. In First International Conference on Pairing-based Cryptography (Pairing 2007), Springer, vol. 4575, pp. 39-59, 2007
Trapdoor-Hard-to-Invert Isomorphism and their Application to Password-based Authentication by Dario Catalano, David Pointcheval, Thomas Pornin. In Journal of Cryptology, Springer, vol. 20, no. 1, pp. 115-149, 2007
Extended Private Information Retrieval and its Application in Biometrics Authentications by Julien Bringer, Hervé Chabanne, David Pointcheval, Qiang Tang. In The 6th International Workshop on Cryptology and Network Security (CANS '07), Springer, vol. 4856, pp. 175-193, 2007
A Security Solution for IEEE 802.11's Ad-hoc Mode: Password Authentication and Group Diffie-Hellman Key Exchange by Emmanuel Bresson, Olivier Chevassut, David Pointcheval. In International Journal of Wireless and Mobile Computing, Inderscience Publishers, vol. 2, no. 1, pp. 4-13, 2007 - Special Issue on Security of Computer Network and Mobile Systems
Provably-Secure Authenticated Group Diffie-Hellman Key Exchange by Emmanuel Bresson, Olivier Chevassut, David Pointcheval. In ACM Transactions on Information and System Security, ACM, vol. 10, no. 3, pp. , 2007
Strong Password-Based Authentication in TLS using the Three-Party Group Diffie-Hellman Protocol by Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Moeller, David Pointcheval. In International Journal of Security and Networks, Inderscience Publishers, vol. 2, no. 3/4, pp. 284-296, 2007 - Special Issue on Cryptography in Networks
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication by Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang, Sébastien Zimmer. In The 12th Australasian Conference on Information Security and Privacy (ACISP '07), Springer, vol. 4586, pp. 96-106, 2007

2006

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Dynamic Fully Anonymous Short Group Signatures by Cécile Delerablée, David Pointcheval. In International Conference on Cryptology in Vietnam 2006, Springer, vol. 4341, pp. 193-210, 2006
A New Key Exchange Protocol based on MQV Assuming Public Computations by Sébastien Kunz-Jacques, David Pointcheval. In SCN '06, Springer, vol. 4116, pp. 186-200, 2006
About the security of MTI/C0 and MQV by Sébastien Kunz-Jacques, David Pointcheval. In SCN '06, Springer, vol. 4116, pp. 156-172, 2006
The Cryptographers' Track at RSA Conference '06 (CT-RSA '06) Springer, vol. 3860 of Lecture Notes in Computer Science, 2006
Encoding-Free ElGamal Encryption Without Random Oracles by Benoît Chevallier-Mames, Pascal Paillier, David Pointcheval. In Conference on Practice and Theory in Public-Key Cryptography (PKC '06), Springer, vol. 3958, pp. 91-104, 2006
The Twist-Augmented Technique for Key Exchange by Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval. In Conference on Practice and Theory in Public-Key Cryptography (PKC '06), Springer, vol. 3958, pp. 410-426, 2006
Password-based Group Key Exchange in a Constant Number of Rounds by Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, David Pointcheval. In Conference on Practice and Theory in Public-Key Cryptography (PKC '06), Springer, vol. 3958, pp. 427-442, 2006
The 5th International Workshop on Cryptology and Network Security (CANS '06) Springer, vol. 4301 of Lecture Notes in Computer Science, 2006
Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes by Pierre-Alain Fouque, David Pointcheval, Jacques Stern, Sébastien Zimmer. In ICALP '06, Springer, vol. 4052, pp. 240-251, 2006
Automated Security Proofs with Sequences of Games by Bruno Blanchet, David Pointcheval. Technical report, IACR ePrint Archive, no. 2006/069, 2006 - Full version of the Crypto '06 paper
On Some Incompatible Properties of Voting Schemes by Benoît Chevallier-Mames, Pierre-Alain Fouque, Julien P. Stern, David Pointcheval, Jacques Traoré. In Actes du IAVoSS Workshop On Trustworthy Elections (WOTE 2006), 2006
Automated Security Proofs with Sequences of Games by Bruno Blanchet, David Pointcheval. In Advances in Cryptology - Proceedings of CRYPTO '06, Springer, vol. 4117, pp. 538-554, 2006
Password-Based Authenticated Key Exchange In The Three-Party Setting by Michel Abdalla, Pierre-Alain Fouque, David Pointcheval. In IEE Proceedings Information Security, IEE, vol. 153, no. 1, pp. 27-39, 2006
Provably Secure Password-Based Authentication in TLS by Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Moeller, David Pointcheval. In Proceedings of the 1st ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS '06), ACM Press, pp. 35-45, 2006
A Scalable Password-based Group Key Exchange Protocol in the Standard Model by Michel Abdalla, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '06, Springer, vol. 4284, pp. 332-347, 2006

2005

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Encyclopedia of Cryptography and Security - ``RSA Public-Key Encryption'' (7 pages) by David Pointcheval. Springer, New York, 2005
Encyclopedia of Cryptography and Security - ``Rabin Cryptosystem'' (3 pages) by David Pointcheval. Springer, New York, 2005
Encyclopedia of Cryptography and Security - ``OAEP: Optimal Asymmetric Encryption Padding'' (5 pages) by David Pointcheval. Springer, New York, 2005
Advanced Course on Contemporary Cryptology - ``Provable Security for Public-Key Schemes'' by David Pointcheval. Birkhäuser Publishers, Basel, pp. 133-189, 2005 - 248 pages
Password-Based Authenticated Key Exchange In The Three-Party Setting by Michel Abdalla, Pierre-Alain Fouque, David Pointcheval. In Workshop on Practice and Theory in Public-Key Cryptography (PKC '05), Springer, vol. 3386, pp. 65-84, 2005
One-time Verifier-based Encrypted Key Exchange by Michel Abdalla, Olivier Chevassut, David Pointcheval. In Workshop on Practice and Theory in Public-Key Cryptography (PKC '05), Springer, vol. 3386, pp. 47-64, 2005
Interactive Diffie-Hellman Assumptions With Applications To Password-Based Cryptography by Michel Abdalla, David Pointcheval. In Advances in Cryptology - Proceedings of Financial Cryptography and Data Security '05 (FC '05), Springer, vol. 3570, pp. 341-356, 2005
Key Derivation and Randomness Extraction by Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval. Technical report, IACR ePrint Archive, no. 2005/061, 2005 - Earlier version of the PKC '06 paper
Public Traceability in Traitor Tracing Schemes by Hervé Chabanne, Duong Hieu Phan, David Pointcheval. In Advances in Cryptology - Proceedings of EUROCRYPT '05, Springer, vol. 3494, pp. 542-558, 2005
Simple Password-Based Encrypted Key Exchange Protocols by Michel Abdalla, David Pointcheval. In The Cryptographers' Track at RSA Conference '05 (CT-RSA '05), Springer, vol. 3376, pp. 191-208, 2005
Optimal Asymmetric Encryption and Signature Paddings by Benoît Chevallier-Mames, Duong Hieu Phan, David Pointcheval. In Conference on Applied Cryptography and Network Security (ACNS '05), Springer, vol. 3531, pp. 254-268, 2005
A Simple Threshold Authenticated Key Exchange from Short Secrets by Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '05, Springer, vol. 3788, pp. 566-584, 2005

2004

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
On the Security Notions for Public-Key Encryption Schemes by Duong Hieu Phan, David Pointcheval. In Proceedings of the Fourth Conference on Security in Communication Networks '04 (SCN '04), Springer, vol. 3352, pp. 33-47, 2004
Deterministic Symmetric Encryption (Semantic Security and Pseudo-Random Permutations) by Duong Hieu Phan, David Pointcheval. In Proceedings of the 11th Annual Workshop on Selected Areas in Cryptography (SAC '04), Springer, vol. 3357, pp. 185-200, 2004
New Security Results on Encrypted Key Exchange by Emmanuel Bresson, Olivier Chevassut, David Pointcheval. In Workshop on Practice and Theory in Public-Key Cryptography (PKC '04), Springer, vol. 2947, pp. 145-158, 2004
RSA-OAEP is Secure under the RSA Assumption by Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern. In Journal of Cryptology, Springer, vol. 17, no. 2, pp. 81-104, 2004
How to Disembed a Program? by Benoît Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval. Technical report, IACR ePrint Archive, no. 2004/138, 2004 - Full version of the CHES '04 paper
Password-Based Authenticated Key Exchange In The Three-Party Setting by Michel Abdalla, Pierre-Alain Fouque, David Pointcheval. Technical report, IACR ePrint Archive, no. 2004/233, 2004 - Full version of the PKC '05 paper
How to Disembed a Program? by Benoît Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval. In Cryptographic Hardware and Embedded Systems (CHES '04), Springer, vol. 3156, pp. 441-454, 2004
IPAKE: Isomorphisms for Password-based Authenticated Key Exchange by Dario Catalano, David Pointcheval, Thomas Pornin. In Advances in Cryptology - Proceedings of CRYPTO '04, Springer, vol. 3152, pp. 477-493, 2004
Mutual Authentication and Group Key Agreement for Low-Power Mobile Devices by Emmanuel Bresson, Olivier Chevassut, Abdelilah Essiari, David Pointcheval. In Journal of Computer Communications, Elsevier Science, vol. 27, no. 17, pp. 1730-1737, 2004 - Special Issue on Security and Performance in Wireless and Mobile Networks
OAEP 3-Round - A Generic and Secure Asymmetric Encryption Padding by Duong Hieu Phan, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '04, Springer, vol. 3329, pp. 63-78, 2004

2003

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
A Comparison between two Methods of Security Proof by Duong Hieu Phan, David Pointcheval. In Actes de la Première Conférence Internationale RIVF '03 Rencontres en Informatique Vietnam-France, Suger, Paris, pp. 105-110, 2003
A New $NP$-Complete Problem and Public Key Identification by David Pointcheval, Guillaume Poupard. In Designs, Codes and Cryptography, Kluwer Academic Publisher, Boston, vol. 28, no. 4, pp. 5-32, 2003
Mutual Authentication and Group Key Agreement for Low-Power Mobile Devices by Emmanuel Bresson, Olivier Chevassut, Abdelilah Essiari, David Pointcheval. In Proceedings of the 5th IFIP--TC6 International Conference on Mobile and Wireless Communications Networks (MWCN 2003), World Scientific Publishing, pp. 59-62, 2003
Ateliers Mathematica - ``Algorithmique des nombres et cryptologie asymétrique'' (46 pages) by Robert Erra, David Pointcheval. Vuibert, Paris, 2003 - 560 pages
Ateliers Mathematica - ``$\kappa \rho \upsilon \pi \tau\!$\emphò$\varsigma\ldots$'' (50 pages) by Robert Erra, David Pointcheval. Vuibert, Paris, 2003 - 560 pages
Security Proofs for an Efficient Password-Based Key Exchange by Emmanuel Bresson, Olivier Chevassut, David Pointcheval. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), ACM Press, pp. 241-250, 2003
The Impact of Decryption Failures on the Security of NTRU Encryption by Nick Howgrave-Graham, Phong Q. Nguyen, David Pointcheval, John Proos, Joseph H. Silverman, Ari Singer, William Whyte. In Advances in Cryptology - Proceedings of CRYPTO '03, Springer, vol. 2729, pp. 226-246, 2003
The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme by Mihir Bellare, Chanathip Namprempre, David Pointcheval, Michael Semanko. In Journal of Cryptology, Springer, vol. 16, no. 3, pp. 185-215, 2003
Parallel Cryptography by Josef Pieprzyk, David Pointcheval. In The 8th Australasian Conference on Information Security and Privacy (ACISP '03), Springer, vol. 2727, pp. 383-401, 2003
Chosen-Ciphertext Security without Redundancy by Duong Hieu Phan, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '03, Springer, vol. 2894, pp. 1-18, 2003
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and its Applications by Emmanuel Bresson, Dario Catalano, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '03, Springer, vol. 2894, pp. 37-54, 2003

2002

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
The Group Diffie-Hellman Problems by Emmanuel Bresson, Olivier Chevassut, David Pointcheval. In Workshop on Selected Areas in Cryptography (SAC '02), Springer, vol. 2595, pp. 325-338, 2002
Le chiffrement asymétrique et la sécurité prouvée by David Pointcheval. 2002
Asymmetric Cryptography and Practical Security by David Pointcheval. In Journal of Telecommunications and Information Technology, vol. 04/2002, pp. 41-56, 2002
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages by Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen. In Workshop on Practice and Theory in Public-Key Cryptography (PKC '02), Springer, vol. 2274, pp. 17-33, 2002
Practical Security in Public-Key Cryptography by David Pointcheval. In Proceedings of the 4th International Conference on Information Security and Cryptology (ICISC '01), Springer, vol. 2288, pp. 1-17, 2002
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages by Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen. Technical report, IACR ePrint Archive, no. 2002/011, 2002 - Full version of the PKC '02 paper
Security Proofs for an Efficient Password-Based Key Exchange by Emmanuel Bresson, Olivier Chevassut, David Pointcheval. Technical report, IACR ePrint Archive, no. 2002/192, 2002 - Full version of the ACM CCS '03 paper
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions by Emmanuel Bresson, Olivier Chevassut, David Pointcheval. In Advances in Cryptology - Proceedings of EUROCRYPT '02, Springer, vol. 2332, pp. 321-336, 2002
GEM: a Generic Chosen-Ciphertext Secure Encryption Method by Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen. In The Cryptographers' Track at RSA Conference '02 (CT-RSA '02), Springer, vol. 2271, pp. 263-276, 2002
Analysis and Improvements of NTRU Encryption Paddings by Phong Q. Nguyen, David Pointcheval. In Advances in Cryptology - Proceedings of CRYPTO '02, Springer, vol. 2442, pp. 210-225, 2002
Flaws in Applying Proof Methodologies to Signature Schemes by Jacques Stern, David Pointcheval, John Malone-Lee, Nigel P. Smart. In Advances in Cryptology - Proceedings of CRYPTO '02, Springer, vol. 2442, pp. 93-110, 2002
Two Formal Views of Authenticated Group Diffie-Hellman Key Exchange by Emmanuel Bresson, Olivier Chevassut, Olivier Pereira, David Pointcheval, Jean-Jacques Quisquater. In DIMACS Workshop on Cryptographic Protocols in Complex Environments, DIMACS, 2002
Group Diffie-Hellman Key Exchange Secure Against Dictionary Attacks by Emmanuel Bresson, Olivier Chevassut, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '02, Springer, vol. 2501, pp. 497-514, 2002

2001

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Number Theory and Public-Key Cryptography by David Pointcheval. In Combinatorial and Computational Mathematics: Present and Future, World Scientific, pp. 178-209, 2001
About Generic Conversions from any Weakly Secure Encryption Scheme into a Chosen-Ciphertext Secure Scheme by David Pointcheval. In Fourth Conference on Algebraic Geometry, Number Theory, Coding Theory and Cryptography, University of Tokyo, pp. 145-162, 2001
Practical Multi-Candidate Election System by Olivier Baudron, Pierre-Alain Fouque, David Pointcheval, Guillaume Poupard, Jacques Stern. In Proceedings of the 20th ACM Symposium on Principles of Distributed Computing (PODC '01), ACM Press, pp. 274-283, 2001
The Gap-Problems: a New Class of Problems for the Security of Cryptographic Schemes by Tatsuaki Okamoto, David Pointcheval. In Workshop on Practice and Theory in Public-Key Cryptography (PKC '01), Springer, vol. 1992, pp. 104-118, 2001
RSA-REACT: An Alternative to RSA-OAEP by Tatsuaki Okamoto, David Pointcheval. In Second NESSIE Workshop, NESSIE, 2001
Monotone Signatures by David Naccache, David Pointcheval, Christophe Tymen. In Advances in Cryptology - Proceedings of Financial Cryptography '01, Springer, vol. 2339, pp. 305-318, 2001
Mutual Authentication for Low-Power Mobile Devices by Markus Jakobsson, David Pointcheval. In Advances in Cryptology - Proceedings of Financial Cryptography '01, Springer, vol. 2339, pp. 178-195, 2001
The Power of RSA Inversion Oracles and the Security of Chaum's RSA Blind Signature Scheme by Mihir Bellare, Chanathip Namprempre, David Pointcheval, Michael Semanko. In Advances in Cryptology - Proceedings of Financial Cryptography '01, Springer, vol. 2339, pp. 319-338, 2001
The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme by Mihir Bellare, Chanathip Namprempre, David Pointcheval, Michael Semanko. Technical report, IACR ePrint Archive, no. 2001/002, 2001 - Full version of the FC '01 paper
REACT: Rapid Enhanced-security Asymmetric Cryptosystem Transform by Tatsuaki Okamoto, David Pointcheval. In The Cryptographers' Track at RSA Conference '01 (CT-RSA '01), Springer, vol. 2020, pp. 159-175, 2001
Secure Mobile Gambling by Markus Jakobsson, David Pointcheval, Adam Young. In The Cryptographers' Track at RSA Conference '01 (CT-RSA '01), Springer, vol. 2020, pp. 110-125, 2001
Twin Signatures: an Alternative to the Hash-and-Sign Paradigm by David Naccache, David Pointcheval, Jacques Stern. In Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS '01), ACM Press, pp. 20-27, 2001
Provably Authenticated Group Diffie-Hellman Key Exchange by Emmanuel Bresson, Olivier Chevassut, David Pointcheval, Jean-Jacques Quisquater. In Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS '01), ACM Press, pp. 255-264, 2001
RSA--OAEP is Secure under the RSA Assumption by Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern. In Advances in Cryptology - Proceedings of CRYPTO '01, Springer, vol. 2139, pp. 260-274, 2001
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks by Pierre-Alain Fouque, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '01, Springer, vol. 2248, pp. 351-368, 2001
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case by Emmanuel Bresson, Olivier Chevassut, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '01, Springer, vol. 2248, pp. 290-309, 2001
Key-Privacy in Public-Key Encryption by Mihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '01, Springer, vol. 2248, pp. 566-582, 2001

2000

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Security Arguments for Digital Signatures and Blind Signatures by David Pointcheval, Jacques Stern. In Journal of Cryptology, Springer, vol. 13, no. 3, pp. 361-396, 2000
Chosen-Ciphertext Security for any One-Way Cryptosystem by David Pointcheval. In Workshop on Practice and Theory in Public-Key Cryptography (PKC '00), Springer, vol. 1751, pp. 129-146, 2000
The Composite Discrete Logarithm and Secure Authentication by David Pointcheval. In Workshop on Practice and Theory in Public-Key Cryptography (PKC '00), Springer, vol. 1751, pp. 113-128, 2000
Design Validations for Discrete Logarithm Based Signature Schemes by Ernest F. Brickell, David Pointcheval, Serge Vaudenay, Moti Yung. In Workshop on Practice and Theory in Public-Key Cryptography (PKC '00), Springer, vol. 1751, pp. 276-292, 2000
Extended Notions of Security for Multicast Public Key Cryptosystems by Olivier Baudron, David Pointcheval, Jacques Stern. In Proceedings of the 27th International Colloquium on Automata, Languages and Programming (ICALP '00), Springer, vol. 1853, pp. 499-511, 2000
Self-Scrambling Anonymizers by David Pointcheval. In Advances in Cryptology - Proceedings of Financial Cryptography '00, Springer, vol. 1962, pp. 259-275, 2000
RSA-OAEP is Secure under the RSA Assumption by Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern. Technical report, IACR ePrint Archive, no. 2000/061, 2000 - Full version of the Crypto '01 paper
Authenticated Key Exchange Secure Against Dictionary Attacks by Mihir Bellare, David Pointcheval, Phillip Rogaway. Technical report, IACR ePrint Archive, no. 2000/014, 2000 - Extended version of Eurocrypt '00 paper
Authenticated Key Exchange Secure Against Dictionary Attacks by Mihir Bellare, David Pointcheval, Phillip Rogaway. In Advances in Cryptology - Proceedings of EUROCRYPT '00, Springer, vol. 1807, pp. 139-155, 2000

1999

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
New Public Key Cryptosystems based on the Dependent-RSA Problems by David Pointcheval. In Advances in Cryptology - Proceedings of EUROCRYPT '99, Springer, vol. 1592, pp. 239-254, 1999
DFC Update by Olivier Baudron, Henri Gilbert, Louis Granboulan, Helena Handschuh, Antoine Joux, Phong Q. Nguyen, Fabrice Noilhan, David Pointcheval, Thomas Pornin, Guillaume Poupard, Jacques Stern, Serge Vaudenay. In Second AES Candidate Conference, NIST, pp. , 1999
Report on the AES Candidates by Olivier Baudron, Henri Gilbert, Louis Granboulan, Helena Handschuh, Antoine Joux, Phong Q. Nguyen, Fabrice Noilhan, David Pointcheval, Thomas Pornin, Guillaume Poupard, Jacques Stern, Serge Vaudenay. In Second AES Candidate Conference, NIST, pp. , 1999
Efficient Public-Key Cryptosystems Provably Secure against Active Adversaries by Pascal Paillier, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '99, Springer, vol. 1716, pp. 165-179, 1999

1998

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Computational Alternatives to Random Number Generators by David M'Raïhi, David Naccache, David Pointcheval, Serge Vaudenay. In Fifth Annual Workshop on Selected Areas in Cryptography (SAC '98), Springer, vol. 1556, pp. 72-80, 1998
Distributed Trustees and Revokability: a Framework for Internet Payment by David M'Raïhi, David Pointcheval. In Advances in Cryptology - Proceedings of Financial Cryptography '98, Springer, vol. 1465, pp. 28-41, 1998
Relations among Notions of Security for Public-Key Encryption Schemes by Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway. Technical report, IACR ePrint Archive, no. 1998/021, 1998 - Full version of the Crypto '98 paper
Strengthened Security for Blind Signatures by David Pointcheval. In Advances in Cryptology - Proceedings of EUROCRYPT '98, Springer, vol. 1403, pp. 391-405, 1998
Relations among Notions of Security for Public-Key Encryption Schemes by Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway. In Advances in Cryptology - Proceedings of CRYPTO '98, Springer, vol. 1462, pp. 26-45, 1998

1997

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
New Blind Signatures Equivalent to Factorization by David Pointcheval, Jacques Stern. In Proceedings of the 4th ACM Conference on Computer and Communications Security (CCS '97), ACM Press, New York, pp. 92-99, 1997

1996

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Les preuves de connaissance et leurs preuves de sécurité by David Pointcheval. PhD thesis, University of Caen, France, 1996
Security Proofs for Signature Schemes by David Pointcheval, Jacques Stern. In Advances in Cryptology - Proceedings of EUROCRYPT '96, Springer, vol. 1070, pp. 387-398, 1996
Provably Secure Blind Signature Schemes by David Pointcheval, Jacques Stern. In Advances in Cryptology - Proceedings of ASIACRYPT '96, Springer, vol. 1163, pp. 252-265, 1996

1995

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
A New Identification Scheme Based on the Perceptrons Problem by David Pointcheval. In Advances in Cryptology - Proceedings of EUROCRYPT '95, Springer, vol. 921, pp. 319-328, 1995

1994

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Authentification by David Pointcheval. 1994 - Magistere Thesis
Neural Networks and their Cryptographic Applications by David Pointcheval. In Livre des résumés Eurocode '94, INRIA, pp. 183-193, 1994

1993

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Schémas d'authentification à clé publique exigeant peu de ressources by David Pointcheval. 1993 - Master Thesis

Slides

2012

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
La cryptographie et le vote 2012
Efficient Smooth Projective Hash Functions and Applications 2012
Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions 2012
Password-based Authenticated Key Exchange In , 2012

2011

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
What does Cryptography Guarantee? 2011
What Can Cryptography Guarantee? 2011
Round-Optimal Waters Blind Signatures 2011
Randomizable Commutative Signature and Encryption Schemes 2011

2010

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Efficient Receipt-Freeness for e-Voting In , 2010

2009

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Comment sécuriser nos échanges de données ? Confidentialité et anonymat 2009
Security Proofs using the Game-based Methodology 2009
The Game-based Methodology for Computational Security Proofs 2009
Smooth Projective Hashing for Conditionally Extractable Commitments 2009
Smooth Projective Hashing for Conditionally Extractable Commitments 2009
Smooth Projective Hashing for Conditionally Extractable Commitments In , 2009

2008

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Dynamic Threshold Public-Key Encryption In , 2008

2007

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
PAKE in the UC-Framework - Adaptive Security In , 2007
Extended Private Information Retrieval and its Application in Biometrics Authentications In , 2007

2006

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
A Scalable Password-based Group Key Exchange Protocol in the Standard Model In , 2006

2005

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Quelle sécurité avec la cryptographie ? 2005
Interactive Diffie-Hellman Assumptions with Applications to Password-based Authentication In , 2005
One-time Verifier-based Encrypted Key Exchange In , 2005

2004

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Security Proofs and Asymmetric Encryption without Redundancy 2004
The 'Twist Augmented' Approach for Diffie-Hellman Key Exchange 2004
Password-based Authenticated Key Exchange: State of the Art 2004
Asymmetric Cryptography - Provable Security 2004
Provable Security and Ideal Models 2004
Provable Security - Asymmetric Encryption 2004
Authenticated Key Exchange (passwords, groups, low-power devices) 2004
Provable Security for Public Key Schemes: Signatures 2004
Provable Security for Public Key Schemes: Encryption 2004
Provable Security for Public Key Schemes: Simple Examples 2004
Provable Security for Public Key Schemes: Various Models and Methods 2004
Provable Security for Public Key Schemes: Asymmetric Encryption and Signature 2004
Provable Security for Public Key Schemes: Introduction 2004
Provable Security for Public Key Schemes: Summary 2004
OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding In , 2004
IPAKE: Isomorphisms for Password-based Authenticated Key Exchange In , 2004

2003

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Provable Security: Authenticated Key Exchange 2003
Provable Security: RSA-PKCS - Encryption-Signature 2003
Provable Security: Introduction 2003
Group Key Exchange and Provable Security 2003
Provable Security - Asymmetric Encryption 2003
Chosen-Ciphertext Security without Redundancy In , 2003
Security Proofs for an Efficient Password-Based Key Exchange In , 2003

2002

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Provable Security in Cryptography -- DL-based Systems In , 2002
Provable Security: Encryption 2002
Provable Security: Signatures 2002
Provable Security: Simple Examples 2002
Provable Security: Introduction 2002
La cryptographie asymétrique et les preuves de sécurité 2002
Le chiffrement asymétrique et la sécurité prouvée --- Asymmetric Encryption and Provable security 2002

2001

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Practical Security in Public-Key Cryptography In , 2001
About Generic Conversions from any Weakly Secure Encryption Scheme into a Chosen-Ciphertext Secure Scheme 2001
Self-Scrambling Anonymizers In , 2001
REACT: Rapid Enhanced-security Asymmetric Cryptosystem Transform 2001
REACT: Rapid Enhanced-security Asymmetric Cryptosystem Transform In , 2001
Analysis and Improvements of NTRU Encryption Paddings In , 2001
Monotone Signatures In , 2001
Twin Signatures: an Alternative to the Hash-and-Sign Paradigm In , 2001
Flaws in Applying Proof Methodologies to Signature Schemes In , 2001
Secure Mobile Gambling In , 2001
Mutual Authentication for Low-Power Mobile Devices In , 2001
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks In , 2001

2000

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Secure Designs for Public-Key Cryptography based on the Discrete Logarithm 2000
The Composite Discrete Logarithm and Secure Authentication In , 2000
Chosen-Ciphertext Security for any One-Way Cryptosystem In , 2000
Design Validations for Discrete Logarithm Based Signature Schemes In , 2000

1999

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
La Sécurité Sémantique en Pratique 1999
New Public Key Cryptosystems based on the Dependent-RSA Problems In , 1999

1998

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Plaintext Awareness, Non-Malleability, and Chosen-Ciphertext Security: Implications and Separations 1998
Echange de Clés Authentifiées Résistant aux attaques par Dictionnaire 1998
Strengthened Security for Blind Signatures In , 1998

1997

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
New Blind Signatures Equivalent to Factorization In , 1997
Strengthened Security for Blind Signatures 1997

1996

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Provably Secure Blind Signature Schemes In , 1996
Security Proofs for Signature Schemes In , 1996
Preuves de Sécurité 1996
Les preuves de connaissances et leurs preuves de sécurité --- Proofs of Knowledge and Security Proofs 1996

1995

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
A New Identification Scheme Based on The Perceptrons Problem In , 1995

1994

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Neural Networks and Their Cryptographic Applications 1994