David Pointcheval

Senior Researcher at CNRS

Head of the Crypto Team / INRIA Project Team CASCADE
Chair of the ENS Computer Science Department

2024

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Cryptographie asymétrique : Primitives et protocoles by David Pointcheval. ISTE Editions, 2024 - 330 pages
Attribute-Based Signatures with Advanced Delegation, and Tracing by Cécile Delerablée, Lénaïck Gouriou, David Pointcheval. In The Cryptographers' Track at RSA Conference '24 (CT-RSA '24), Springer, 2024

2023

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Asymmetric Cryptography: Primitives and Protocols by David Pointcheval. Wiley-ISTE, 2023 - 298 pages
Traceable constant-size multi-authority credentials by Chloé Hébant, David Pointcheval. In Information and Computation, pp. 105060, 2023
What Does Provable Security Mean for Cryptographic Schemes? by David Pointcheval. In Communications of the ACM, vol. 66, no. 6, pp. 106, 2023
Topical Collection on Computing on Encrypted Data by David Pointcheval, Nigel P. Smart. In Journal of Cryptology, Springer, vol. 36, no. 2, pp. 4, 2023
Verifiable Decentralized Multi-Client Functional Encryption for Inner Product by Dinh Duy Nguyen, Duong Hieu Phan, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '23, Springer, pp. 33-65, 2023
Covercrypt: an Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE by Théophile Brézot, Paola de Perthuis, David Pointcheval. In The 28th European Symposium on Research in Computer Security (ESORICS '23), Springer, vol. 14344, pp. 372-392, 2023
Linearly-Homomorphic Signatures for Short Randomizable Proofs of Subset Membership by David Pointcheval. In Eighth International Joint Conference on Electronic Voting (E-Vote-ID '23), 2023
Optimal Security Notion for Decentralized Multi-Client Functional Encryption by Ky Nguyen, Duong Hieu Phan, David Pointcheval. In Conference on Applied Cryptography and Network Security (ACNS '23), Springer, vol. 13906, pp. 336-365, 2023
GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges by Hugo Beguinet, Céline Chevalier, David Pointcheval, Thomas Ricosset, Mélissa Rossi. In Conference on Applied Cryptography and Network Security (ACNS '23), Springer, vol. 13906, pp. 516-538, 2023
Tracing a Linear Subspace: Application to Linearly-Homomorphic Group Signatures by Chloé Hébant, David Pointcheval, Robert Schädlich. In Conference on Practice and Theory in Public-Key Cryptography (PKC '23), Springer, vol. 13940, pp. 312-341, 2023
Optimized Homomorphic Evaluation of Boolean Functions by Nicolas Bon, David Pointcheval, Matthieu Rivain. Technical report, IACR ePrint Archive, no. 2023/1589, 2023
Linearly-Homomorphic Signatures for Short Randomizable Proofs of Subset Membership by David Pointcheval. Technical report, IACR ePrint Archive, no. 2023/1499, 2023
Covercrypt: an Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE by Théophile Brézot, Paola de Perthuis, David Pointcheval. Technical report, IACR ePrint Archive, no. 2023/836, 2023
GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges by Hugo Beguinet, Céline Chevalier, David Pointcheval, Thomas Ricosset, Mélissa Rossi. Technical report, IACR ePrint Archive, no. 2023/470, 2023
Optimal Security Notion for Decentralized Multi-Client Functional Encryption by Ky Nguyen, Duong Hieu Phan, David Pointcheval. Technical report, IACR ePrint Archive, no. 2023/435, 2023
Verifiable Multi-Client Functional Encryption for Inner Product by Dinh Duy Nguyen, Duong Hieu Phan, David Pointcheval. Technical report, IACR ePrint Archive, no. 2023/268, 2023
Tracing a Linear Subspace: Application to Linearly-Homomorphic Group Signatures by Chloé Hébant, David Pointcheval, Robert Schädlich. Technical report, IACR ePrint Archive, no. 2023/138, 2023

2022

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
AriaNN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing by Théo Ryffel, Pierre Tholoniat, David Pointcheval, Francis Bach. In Proceedings on Privacy Enhancing Technologies, vol. 2022, no. 1, pp. 291-316, 2022
Security Analysis of Improved EDHOC Protocol by Baptiste Cottier, David Pointcheval. In Foundations and Practice of Security (FPS '22), Springer, vol. 13877, pp. 3-18, 2022
Post-Quantum Oblivious Transfer from Smooth Projective Hash Functions with Grey Zone by Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Baptiste Cottier, David Pointcheval. In Foundations and Practice of Security (FPS '22), Springer, vol. 13877, 2022
Multi-Client Functional Encryption with Fine-Grained Access-Control by Ky Nguyen, Duong Hieu Phan, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '22 -- Part I, Springer, vol. 13791, pp. 95-125, 2022
Two-Client Inner-Product Functional Encryption, with an Application to Money-Laundering Detection by Paola de Perthuis, David Pointcheval. In Proceedings of the 29th ACM Conference on Computer and Communications Security (CCS '22), ACM Press, pp. 725-737, 2022
MyOPE: Malicious securitY for Oblivious Polynomial Evaluation by Malika Izabachène, Anca Nitulescu, Paola de Perthuis, David Pointcheval. In The 13th Conference on Security in Communication Networks (SCN '22), Springer, vol. 13409, pp. 663-686, 2022
Key-Policy ABE with Switchable Attributes by Cécile Delerablée, Lénaïck Gouriou, David Pointcheval. In The 13th Conference on Security in Communication Networks (SCN '22), Springer, vol. 13409, pp. 147-171, 2022
Traceable Attribute-Based Anonymous Credentials by Chloé Hébant, David Pointcheval. In The 13th Conference on Security in Communication Networks (SCN '22), Springer, vol. 13409, pp. 411-434, 2022
Function-Hiding Decentralized Multi-Client Functional Encryption for Inner Products by Ky Nguyen, David Pointcheval, and Robert Schädlich. Technical report, IACR ePrint Archive, no. 2022/1532, 2022
Security Analysis of the EDHOC Protocol by Baptiste Cottier, David Pointcheval. Technical report, HAL, no. 03772082, 2022
Post-Quantum Oblivious Transfer from Smooth Projective Hash Functions with Grey Zone by Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Baptiste Cottier, David Pointcheval. Technical report, HAL, no. 03772089, 2022
Two-Client Inner-Product Functional Encryption, with an Application to Money-Laundering Detection by Paola de Perthuis, David Pointcheval. Technical report, IACR ePrint Archive, no. 2022/441, 2022
Multi-Client Functional Encryption with Fine-Grained Access Control by Ky Nguyen, Duong Hieu Phan, David Pointcheval. Technical report, IACR ePrint Archive, no. 2022/215, 2022
Differential Privacy Guarantees for Stochastic Gradient Langevin Dynamics by Théo Ryffel, Francis Bach, David Pointcheval. Technical report, arXiv.org, no. 2201.11980, 2022

2021

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Secure Decision Forest Evaluation by Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Baptiste Cottier, David Pointcheval. In Proceedings of the 16th International Conference on Availability, Reliability and Security (ARES '21), ACM, pp. 1-12, 2021
MyOPE: Malicious securitY for Oblivious Polynomial Evaluation by Malika Izabachène, Anca Nitulescu, Paola de Perthuis, David Pointcheval. Technical report, IACR ePrint Archive, no. 2021/1291, 2021
Secure Decision Forest Evaluation by Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Baptiste Cottier, David Pointcheval. Technical report, HAL, no. 03321368, 2021
Key-Policy ABE with Delegation of Rights by Cécile Delerablée, Lénaïck Gouriou, David Pointcheval. Technical report, IACR ePrint Archive, no. 2021/867, 2021
2-Step Multi-Client Quadratic Functional Encryption from Decentralized Function-Hiding Inner-Product by Michel Abdalla, David Pointcheval, Azam Soleimanian. Technical report, IACR ePrint Archive, no. 2021/001, 2021

2020

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
13 Défis de la Cybersécurité - ``La sécurité des données dans le cloud'' by David Pointcheval. CNRS Editions, Paris, pp. 161-174, 2020 - 262 pages
Corrigendum: Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks by Michel Abdalla, Fabrice Benhamouda, David Pointcheval. In IET Information Security, The Institution of Engineering and Technology, vol. 14, no. 3, 2020
Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model by Michel Abdalla, Florian Bourse, Hugo Marival, David Pointcheval, Azam Soleimanian, Hendrik Waldner. In The 12th Conference on Security in Communication Networks (SCN '20), Springer, vol. 12238, pp. 525-545, 2020
Dynamic Decentralized Functional Encryption by Jérémy Chotard, Edouard Dufour Sans, Romain Gay, Duong Hieu Phan, David Pointcheval. In Advances in Cryptology - Proceedings of CRYPTO '20 -- Part I, Springer, vol. 12170, pp. 747-775, 2020
Linearly-Homomorphic Signatures and Scalable Mix-Nets by Chloé Hébant, Duong Hieu Phan, David Pointcheval. In Conference on Practice and Theory in Public-Key Cryptography (PKC '20), Springer, vol. 12111, pp. 597-627, 2020
Boosting Verifiable Computation on Encrypted Data by Dario Fiore, Anca Nitulescu, David Pointcheval. In Conference on Practice and Theory in Public-Key Cryptography (PKC '20), Springer, vol. 12111, pp. 124-154, 2020
Traceable Inner Product Functional Encryption by Xuan Thanh Do, Duong Hieu Phan, David Pointcheval. In The Cryptographers' Track at RSA Conference '20 (CT-RSA '20), Springer, vol. 12006, pp. 564-585, 2020
ARIANN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing by Théo Ryffel, Pierre Tholoniat, David Pointcheval, Francis Bach. Technical report, arXiv.org, no. 2006.04593, 2020
Traceable Attribute-Based Anonymous Credentials by Chloé Hébant, David Pointcheval. Technical report, IACR ePrint Archive, no. 2020/657, 2020
Dynamic Decentralized Functional Encryption by Jérémy Chotard, Edouard Dufour Sans, Romain Gay, Duong Hieu Phan, David Pointcheval. Technical report, IACR ePrint Archive, no. 2020/197, 2020
Boosting Verifiable Computation on Encrypted Data by Dario Fiore, Anca Nitulescu, David Pointcheval. Technical report, IACR ePrint Archive, no. 2020/132, 2020

2019

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
On the Tightness of Forward-Secure Signature Reductions by Michel Abdalla, Fabrice Benhamouda, David Pointcheval. In Journal of Cryptology, Springer, vol. 32, no. 1, pp. 84-150, 2019
Partially Encrypted Machine Learning using Functional Encryption by Théo Ryffel, Edouard Dufour-Sans, Romain Gay, Francis Bach, David Pointcheval. In Advances in Neural Information Processing Systems (NeurIPS 2019), vol. 32, pp. , 2019
Divisible E-Cash from Constrained Pseudo-Random Functions by Florian Bourse, David Pointcheval, Olivier Sanders. In Advances in Cryptology - Proceedings of ASIACRYPT '19, Springer, vol. 11921, pp. 679-708, 2019
Decentralized Evaluation of Quadratic Polynomials on Encrypted Data by Chloé Hébant, Duong Hieu Phan, David Pointcheval. In Proceedings of the 22nd International Conference on Information Security (ISC '19), Springer, vol. 11723, pp. 87-106, 2019
Unbounded Inner Product Functional Encryption, with Succinct Keys by Edouard Dufour-Sans, David Pointcheval. In Conference on Applied Cryptography and Network Security (ACNS '19), Springer, vol. 11464, pp. 426-441, 2019
Partially Encrypted Machine Learning using Functional Encryption by Théo Ryffel, Edouard Dufour-Sans, Romain Gay, Francis Bach, David Pointcheval. Technical report, arXiv.org, no. 1905.10214, 2019
Linearly-Homomorphic Signatures and Scalable Mix-Nets by Chloé Hébant, Duong Hieu Phan, David Pointcheval. Technical report, IACR ePrint Archive, no. 2019/547, 2019
Divisible E-Cash from Constrained Pseudo-Random Functions by Florian Bourse, David Pointcheval, Olivier Sanders. Technical report, IACR ePrint Archive, no. 2019/136, 2019

2018

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
A New Technique for Compacting Ciphertext in Multi-Channel Broadcast Encryption and Attribute-Based Encryption by Sébastien Canard, Duong Hieu Phan, David Pointcheval, Viet Cuong Trinh. In Theoretical Computer Science, Elsevier, vol. 723, pp. 51-72, 2018
Decentralized Multi-Client Functional Encryption for Inner Product by Jérémy Chotard, Edouard Dufour Sans, Romain Gay, Duong Hieu Phan, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '18, Springer, vol. 11273, pp. 703-732, 2018
On the Leakage of Corrupted Garbled Circuits by Aurélien Dupin, David Pointcheval, Christophe Bidan. In The 12th International Conference on Provable Security (ProvSec '18), Springer, vol. 11192, pp. 3-21, 2018
Practical Strategy-Resistant Privacy-Preserving Elections by Sébastien Canard, David Pointcheval, Quentin Santos, Jacques Traoré. In The 23rd European Symposium on Research in Computer Security (ESORICS '18) -- Part II, Springer, vol. 11099, pp. 331-349, 2018
Privacy-Preserving Plaintext-Equality of Low-Entropy Inputs by Sébastien Canard, David Pointcheval, Quentin Santos, Jacques Traoré. In Conference on Applied Cryptography and Network Security (ACNS '18), Springer, vol. 10892, pp. 262-279, 2018
Fuzzy-Password Authenticated Key Exchange by Pierre-Alain Dupont, Julia Hesse, David Pointcheval, Leonid Reyzin, Sophia Yakoubov. In Advances in Cryptology - Proceedings of EUROCRYPT '18 -- Part III, Springer, vol. 10822, pp. 393-424, 2018
Reassessing Security of Randomizable Signatures by David Pointcheval, Olivier Sanders. In The Cryptographers' Track at RSA Conference '18 (CT-RSA '18), Springer, vol. 10808, pp. 319-338, 2018
Multi-Client Functional Encryption with Repetition for Inner Product by Jérémy Chotard, Edouard Dufour Sans, Romain Gay, Duong Hieu Phan, David Pointcheval. Technical report, IACR ePrint Archive, no. 2018/1021, 2018
Decentralized Evaluation of Quadratic Polynomials on Encrypted Data by Chloé Hébant, Duong Hieu Phan, David Pointcheval. Technical report, IACR ePrint Archive, no. 2018/1019, 2018
Practical Strategy-Resistant Privacy-Preserving Elections by Sébastien Canard, David Pointcheval, Quentin Santos, Jacques Traoré. Technical report, IACR ePrint Archive, no. 2018/827, 2018
On the Leakage of Corrupted Garbled Circuits by Aurélien Dupin, David Pointcheval, Christophe Bidan. Technical report, IACR ePrint Archive, no. 2018/743, 2018
Unbounded Inner Product Functional Encryption, with Succinct Keys by Edouard Dufour Sans, David Pointcheval. Technical report, IACR ePrint Archive, no. 2018/487, 2018
Reading in the Dark: Classifying Encrypted Digits with Functional Encryption by Edouard Dufour Sans, Romain Gay, David Pointcheval. Technical report, IACR ePrint Archive, no. 2018/206, 2018

2017

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms by Jérémy Chotard, Duong Hieu Phan, David Pointcheval. In Proceedings of the 20th International Conference on Information Security (ISC '17), Springer, vol. 10599, pp. 155-172, 2017
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange by Alexandra Boldyreva, Shan Chen, Pierre-Alain Dupont, David Pointcheval. In Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF '17), IEEE Computer Society, pp. 159-175, 2017
Functional Encryption with Oblivious Helper by Pierre-Alain Dupont, David Pointcheval. In Proceedings of the 12th ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS '17), ACM Press, pp. 205-214, 2017
VTBPEKE: Verifier-based Two-Basis Password Exponential Key Exchange by David Pointcheval, Guilin Wang. In Proceedings of the 12th ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS '17), ACM Press, pp. 301-312, 2017
Removing the Strong RSA Assumption from Arguments over the Integers by Geoffroy Couteau, Thomas Peters, David Pointcheval. In Advances in Cryptology - Proceedings of EUROCRYPT '17 -- Part II, Springer, vol. 10211, pp. 321-350, 2017
Removing Erasures with Explainable Hash Proof Systems by Michel Abdalla, Fabrice Benhamouda, David Pointcheval. In Conference on Practice and Theory in Public-Key Cryptography (PKC '17) -- Part I, Springer, vol. 10174, pp. 151-174, 2017
Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash by David Pointcheval, Olivier Sanders, Jacques Traoré. In Conference on Practice and Theory in Public-Key Cryptography (PKC '17) -- Part I, Springer, vol. 10174, pp. 61-90, 2017
Reassessing Security of Randomizable Signatures by David Pointcheval, Olivier Sanders. Technical report, IACR ePrint Archive, no. 2017/1197, 2017
Fuzzy Authenticated Key Exchange by Pierre-Alain Dupont, Julia Hesse, David Pointcheval, Leonid Reyzin, Sophia Yakoubov. Technical report, IACR ePrint Archive, no. 2017/1111, 2017
Decentralized Multi-Client Functional Encryption for Inner Product by Jérémy Chotard, Edouard Dufour Sans, Romain Gay, Duong Hieu Phan, David Pointcheval. Technical report, IACR ePrint Archive, no. 2017/989, 2017
On the Tightness of Forward-Secure Signature Reductions by Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Technical report, IACR ePrint Archive, no. 2017/746, 2017
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange by Alexandra Boldyreva, Shan Chen, Pierre-Alain Dupont, David Pointcheval. Technical report, IACR ePrint Archive, no. 2017/559, 2017

2016

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
The Eighth International Conference on Cryptology in Africa (AFRICACRYPT '16) Springer, vol. 9646 of Lecture Notes in Computer Science, 2016
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks by Michel Abdalla, Fabrice Benhamouda, David Pointcheval. In IET Information Security, The Institution of Engineering and Technology, vol. 10, no. 6, pp. 288-303, 2016
Divisible E-Cash Made Practical by Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré. In IET Information Security, The Institution of Engineering and Technology, vol. 10, no. 6, pp. 332-347, 2016
Robust Password-Protected Secret Sharing by Michel Abdalla, Mario Cornejo, Anca Nitulescu, David Pointcheval. In The 21st European Symposium on Research in Computer Security (ESORICS '16) -- Part II, Springer, vol. 9879, pp. 61-79, 2016
The Whole is Less than the Sum of its Parts: Constructing More Efficient Lattice-Based AKEs by Rafael del Pino, Vadim Lyubashevsky, David Pointcheval. In The 10th Conference on Security in Communication Networks (SCN '16), Springer, vol. 9841, pp. 273-291, 2016
Encryption Switching Protocols by Geoffroy Couteau, Thomas Peters, David Pointcheval. In Advances in Cryptology - Proceedings of CRYPTO '16 -- Part I, Springer, vol. 9814, pp. 308-338, 2016
Legally Fair Contract Signing Without Keystones by Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, David Pointcheval. In Conference on Applied Cryptography and Network Security (ACNS '16), Springer, vol. 9696, pp. 175-190, 2016
Short Randomizable Signatures by David Pointcheval, Olivier Sanders. In The Cryptographers' Track at RSA Conference '16 (CT-RSA '16), Springer, vol. 9610, pp. 111-126, 2016
Secure Distributed Computation on Private Inputs by Geoffroy Couteau, Thomas Peters, David Pointcheval. In Foundations and Practice of Security (FPS '15), Springer, vol. 9482, pp. 14-26, 2016
Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms by Jérémy Chotard, Duong Hieu Phan, David Pointcheval. Technical report, IACR ePrint Archive, no. 2016/1089, 2016
The Whole is Less than the Sum of its Parts: Constructing More Efficient Lattice-Based AKEs by Rafael del Pino, Vadim Lyubashevsky, David Pointcheval. Technical report, IACR ePrint Archive, no. 2016/435, 2016
Legally Fair Contract Signing Without Keystones by Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, David Pointcheval. Technical report, IACR ePrint Archive, no. 2016/363, 2016
Removing the Strong RSA Assumption from Arguments over the Integers by Geoffroy Couteau, Thomas Peters, David Pointcheval. Technical report, IACR ePrint Archive, no. 2016/128, 2016
Robust Password-Protected Secret Sharing by Michel Abdalla, Mario Cornejo, Anca Nitulescu, David Pointcheval. Technical report, IACR ePrint Archive, no. 2016/123, 2016
Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security by Raphael Bost, Pierre-Alain Fouque, David Pointcheval. Technical report, IACR ePrint Archive, no. 2016/062, 2016
Better Security for Functional Encryption for Inner Product Evaluations by Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval. Technical report, IACR ePrint Archive, no. 2016/011, 2016

2015

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting by Fabrice Benhamouda, Geoffroy Couteau, David Pointcheval, Hoeteck Wee. In Advances in Cryptology - Proceedings of CRYPTO '15 - Part II, Springer, vol. 9216, pp. 107-129, 2015
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks by Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud. In Conference on Applied Cryptography and Network Security (ACNS '15), Springer, vol. 9092, pp. 635-654, 2015
Scalable Divisible E-Cash by Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré. In Conference on Applied Cryptography and Network Security (ACNS '15), Springer, vol. 9092, pp. 287-306, 2015
Disjunctions for Hash Proof Systems: New Constructions and Applications by Michel Abdalla, Fabrice Benhamouda, David Pointcheval. In Advances in Cryptology - Proceedings of EUROCRYPT '15 - Part II, Springer, vol. 9057, pp. 69-100, 2015
Functional Encryption Schemes for Inner Products by Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval. In Conference on Practice and Theory in Public-Key Cryptography (PKC '15), Springer, vol. 9020, pp. 733-751, 2015
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks by Michel Abdalla, Fabrice Benhamouda, David Pointcheval. In Conference on Practice and Theory in Public-Key Cryptography (PKC '15), Springer, vol. 9020, pp. 332-352, 2015
Divisible E-Cash Made Practical by Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré. In Conference on Practice and Theory in Public-Key Cryptography (PKC '15), Springer, vol. 9020, pp. 77-100, 2015
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks by Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud. Technical report, IACR ePrint Archive, no. 2015/1219, 2015
Secure Distributed Computation on Private Inputs by Geoffroy Couteau, Thomas Peters, David Pointcheval. Technical report, IACR ePrint Archive, no. 2015/1196, 2015
Encryption Switching Protocols by Geoffroy Couteau, Thomas Peters, David Pointcheval. Technical report, IACR ePrint Archive, no. 2015/990, 2015
Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash by David Pointcheval, Olivier Sanders, Jacques Traoré. Technical report, IACR ePrint Archive, no. 2015/972, 2015
Short Randomizable Signatures by David Pointcheval, Olivier Sanders. Technical report, IACR ePrint Archive, no. 2015/525, 2015
Scalable Divisible E-cash by Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré. Technical report, IACR ePrint Archive, no. 2015/300, 2015 - Full version of the ACNS '15 paper
Forward Secure Non-Interactive Key Exchange by David Pointcheval, Olivier Sanders. Technical report, IACR ePrint Archive, no. 2015/278, 2015 - Extended version of the PKC '14 paper
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting by Fabrice Benhamouda, Geoffroy Couteau, David Pointcheval, Hoeteck Wee. Technical report, IACR ePrint Archive, no. 2015/246, 2015 - Full version of the Crypto '15 paper
Tighter Reductions for Forward-Secure Signature Schemes by Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Technical report, IACR ePrint Archive, no. 2015/196, 2015 - Full version of the PKC '13 paper
New Techniques for SPHFs and Efficient One-Round PAKE Protocols by Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud. Technical report, IACR ePrint Archive, no. 2015/188, 2015 - Extended version of the Crypto '13 paper
Functional Encryption Schemes for Inner Products by Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval. Technical report, IACR ePrint Archive, no. 2015/017, 2015 - Full version of the PKC '15 paper

2014

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
The Seventh International Conference on Cryptology in Africa (AFRICACRYPT '14) Springer, vol. 8469 of Lecture Notes in Computer Science, 2014
Forward Secure Non-Interactive Key Exchange by David Pointcheval, Olivier Sanders. In The 9th Conference on Security in Communication Networks (SCN '14), Springer, vol. 8642, pp. 21-39, 2014
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting by Sébastien Canard, David Pointcheval, Olivier Sanders. In Conference on Practice and Theory in Public-Key Cryptography (PKC '14), Springer, vol. 8383, pp. 167-184, 2014
Divisible E-Cash Made Practical by Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré. Technical report, IACR ePrint Archive, no. 2014/785, 2014 - Full version of the PKC '15 paper
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks by Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Technical report, IACR ePrint Archive, no. 2014/609, 2014 - Full version of the PKC '15 paper
Disjunctions for Hash Proof Systems: New Constructions and Applications by Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Technical report, IACR ePrint Archive, no. 2014/483, 2014 - Full version of the Eurocrypt '15 paper
Removing Erasures with Explainable Hash Proof Systems by Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Technical report, ACR ePrint Archive, no. 2014/125, 2014

2013

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Analysis of the Linux Pseudo-Random Number Generators by Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, Daniel Wichs. In VMWare Technical Journal, VMWare, vol. 2, no. 2, pp. 2-8, 2013
Short Blind Signatures by Olivier Blazy, Georg Fuchsbauer, David Pointcheval, Damien Vergnaud. In Journal of Computer Security, IOS Press, vol. 21, no. 5, pp. 627-661, 2013
Black-box Trace&Revoke Codes by Hung Q. Ngo, Duong Hieu Phan, David Pointcheval. In Algorithmica, Springer, vol. 67, no. 3, pp. 418-448, 2013
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts by Duong Hieu Phan, David Pointcheval, Siamak F. Shahandashti, Mario Strefler. In International Journal of Information Security, Springer, vol. 12, no. 4, pp. 251-265, 2013
SPHF-Friendly Non-Interactive Commitment Schemes by Michel Abdalla, Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '13 - Part I, Springer, vol. 8269, pp. 214-234, 2013
Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust by Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, Daniel Wichs. In Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '13), ACM Press, pp. 647-658, 2013
New Techniques for SPHFs and Efficient One-Round PAKE Protocols by Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud. In Advances in Cryptology - Proceedings of CRYPTO '13 - Part I, Springer, vol. 8042, pp. 449-475, 2013 - See also http://eprint.iacr.org/2013/034 and http://eprint.iacr.org/2013/341
Analysis and Improvement of Lindell's UC-Secure Commitment Schemes by Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud. In Conference on Applied Cryptography and Network Security (ACNS '13), Springer, vol. 7954, pp. 534-551, 2013
Multi-Channel Broadcast Encryption by Duong Hieu Phan, David Pointcheval, Cuong Trinh Viet. In Proceedings of the 8th ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS '13), ACM Press, pp. 277-286, 2013
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages by Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud. In Conference on Practice and Theory in Public-Key Cryptography (PKC '13), Springer, vol. 7778, pp. 272-291, 2013
Tighter Reductions for Forward-Secure Signature Scheme by Michel Abdalla, Fabrice Benhamouda, David Pointcheval. In Conference on Practice and Theory in Public-Key Cryptography (PKC '13), Springer, vol. 7778, pp. 292-311, 2013
Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions by Fabrice Benhamouda, David Pointcheval. Technical report, IACR ePrint Archive, no. 2013/833, 2013
SPHF-Friendly Non-Interactive Commitment Schemes by Michel Abdalla, Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval. Technical report, IACR ePrint Archive, no. 2013/588, 2013 - Full version of the Asiacrypt '13 paper
Trapdoor Smooth Projective Hash Functions by Fabrice Benhamouda, David Pointcheval. Technical report, IACR ePrint Archive, no. 2013/341, 2013 - Full version of the Crypto '13 paper
Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust by Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, Daniel Wichs. Technical report, IACR ePrint Archive, no. 2013/338, 2013 - Full version of the ACM CCS '13 paper
Analysis and Improvement of Lindell's UC-Secure Commitment Schemes by Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud. Technical report, IACR ePrint Archive, no. 2013/123, 2013 - Extended version of ACNS '13 paper
New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange by Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud. Technical report, IACR ePrint Archive, no. 2013/034, 2013 - Full version of the Crypto '13 paper

2012

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
The 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt '12) Springer, vol. 7237 of Lecture Notes in Computer Science, 2012
Verified Security of Redundancy-Free Encryption from Rabin and RSA by Gilles Barthe, David Pointcheval, Santiago Zanella-Béguelin. In Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS '12), ACM Press, pp. 724-735, 2012
Message-based Traitor Tracing with Optimal Ciphertext Rate by Duong Hieu Phan, David Pointcheval, Mario Strefler. In Second International Conference on Cryptology and Information Security (LatinCrypt '12), Springer, vol. 7533, pp. 56-77, 2012
Decentralized Dynamic Broadcast Encryption by Duong Hieu Phan, David Pointcheval, Mario Strefler. In The 8th Conference on Security in Communication Networks (SCN '12), Springer, vol. 7485, pp. 166-183, 2012
Compact Round-Optimal Partially-Blind Signatures by Olivier Blazy, David Pointcheval, Damien Vergnaud. In The 8th Conference on Security in Communication Networks (SCN '12), Springer, vol. 7485, pp. 95-112, 2012
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts by Duong Hieu Phan, David Pointcheval, Siamak F. Shahandashti, Mario Strefler. In The 17th Australasian Conference on Information Security and Privacy (ACISP '12), Springer, vol. 7372, pp. 308-321, 2012
Password-Based Authenticated Key Exchange by David Pointcheval. In Conference on Practice and Theory in Public-Key Cryptography (PKC '12), Springer, vol. 7293, pp. 390-397, 2012
Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions by Olivier Blazy, David Pointcheval, Damien Vergnaud. In 9th Theory of Cryptography Conference (TCC '12), Springer, vol. 7194, pp. 94-111, 2012
Verified Security of Redundancy-Free Encryption from Rabin and RSA by Gilles Barthe, David Pointcheval, Santiago Zanella-Béguelin. Technical report, IACR ePrint Archive, no. 2012/308, 2012 - Full version of the ACM CCS '12 paper
Multi-Channel Broadcast Encryption by Duong Hieu Phan, David Pointcheval, Viet Cuong Trinh. Technical report, IACR ePrint Archive, no. 2012/307, 2012 - Full version of the AsiaCCS '13 paper
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages by Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud. Technical report, IACR ePrint Archive, no. 2012/284, 2012 - Full version of the PKC '13 paper
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts by Duong Hieu Phan, David Pointcheval, Siamak F. Shahandashti, Mario Strefler. Technical report, IACR ePrint Archive, no. 2012/216, 2012 - Full version of the ACISP '12 paper
Traceable Signature with Stepping Capabilities by Olivier Blazy, David Pointcheval. In Cryptography and Security: From Theory to Applications, Springer, vol. 6805 of Lecture Notes in Computer Science, pp. 108-131, 2012 - Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday
Autotomic Signatures by David Naccache, David Pointcheval. In Cryptography and Security: From Theory to Applications, Springer, vol. 6805 of Lecture Notes in Computer Science, pp. 143-155, 2012 - Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday

2011

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
The Fourth International Conference on Cryptology in Africa (AFRICACRYPT '11) Springer, vol. 6737 of Lecture Notes in Computer Science, 2011
Encyclopedia of Cryptography and Security (2nd Edition) - OAEP: Optimal Asymmetric Encryption Padding by David Pointcheval. Springer, New York, pp. 882-884, 2011
Encyclopedia of Cryptography and Security (2nd Edition) - Rabin Cryptosystem by David Pointcheval. Springer, New York, pp. 1013-1014, 2011
Encyclopedia of Cryptography and Security (2nd Edition) - RSA Public-Key Encryption by David Pointcheval. Springer, New York, pp. 1069-1072, 2011
Security Notions for Broadcast Encryption by Duong Hieu Phan, David Pointcheval, Mario Strefler. In Conference on Applied Cryptography and Network Security (ACNS '11), Springer, vol. 6715, pp. 377-394, 2011
Signatures on Randomizable Ciphertexts by Olivier Blazy, Georg Fuchsbauer, David Pointcheval, Damien Vergnaud. In Conference on Practice and Theory in Public-Key Cryptography (PKC '11), Springer, vol. 6571, pp. 403-422, 2011
Contributory Password-Authenticated Group Key Exchange with Join Capability by Michel Abdalla, Céline Chevalier, Louis Granboulan, David Pointcheval. In The Cryptographers' Track at RSA Conference '11 (CT-RSA '11), Springer, vol. 6558, pp. 142-160, 2011
Decentralized Dynamic Broadcast Encryption by Duong Hieu Phan, David Pointcheval, Mario Strefler. Technical report, IACR ePrint Archive, no. 2011/463, 2011 - Full version of the SCN '12 paper

2010

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
The 13th International Conference on Practice and Theory in Public Key Cryptography (PKC '10) Springer, vol. 6056 of Lecture Notes in Computer Science, 2010
``Parallel Signcryption'' by Josef Pieprzyk, David Pointcheval. Chapter in Practical Signcryption, Springer, pp. 175-190, 2010
On Some Incompatible Properties of Voting Schemes by Benoît Chevallier-Mames, Pierre-Alain Fouque, David Pointcheval, Julien P. Stern, Jacques Traoré. In Towards Trustworthy Elections, Springer, vol. 6000 of Lecture Notes in Computer Science, pp. 191-199, 2010
Mediated Traceable Anonymous Encryption by Malika Izabachène, David Pointcheval, Damien Vergnaud. In First International Conference on Cryptology and Information Security (LatinCrypt '10), Springer, vol. 6212, pp. 40-60, 2010
Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys by Michel Abdalla, Céline Chevalier, Mark Manulis, David Pointcheval. In Third African International Conference on Cryptology (AfricaCrypt '10), Springer, vol. 6055, pp. 351-368, 2010
Strong Cryptography from Weak Secrets - Building Efficient PKE and IBE from Distributed Passwords by Xavier Boyen, Céline Chevalier, Georg Fuchsbauer, David Pointcheval. In Third African International Conference on Cryptology (AfricaCrypt '10), Springer, vol. 6055, pp. 297-315, 2010

2009

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
The 7th International Conference on Applied Cryptography and Network Security (ACNS '09) Springer, vol. 5536, 2009
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures by Georg Fuchsbauer, David Pointcheval. In Formal to Practical Security, Springer, vol. 5458 of Lecture Notes in Computer Science, pp. 95-116, 2009
New Anonymity Notions for Identity-Based Encryption by Malika Izabachène, David Pointcheval. In Formal to Practical Security, Springer, vol. 5458 of Lecture Notes in Computer Science, pp. 138-157, 2009
Transferable Constant-Size Fair E-Cash by Georg Fuchsbauer, David Pointcheval, Damien Vergnaud. In The 8th International Workshop on Cryptology and Network Security (CANS '09), Springer, vol. 5888, pp. 226-247, 2009
Smooth Projective Hashing for Conditionally Extractable Commitments by Michel Abdalla, Céline Chevalier, David Pointcheval. In Advances in Cryptology - Proceedings of CRYPTO '09, Springer, vol. 5677, pp. 671-689, 2009
Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures by Georg Fuchsbauer, David Pointcheval. In Third International Conference on Pairing-based Cryptography (Pairing 2009), Springer, vol. 5671, pp. 132-149, 2009
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness by Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval. In Second African International Conference on Cryptology (AfricaCrypt '09), Springer, vol. 5580, pp. 254-271, 2009
Optimal Randomness Extraction from a Diffie-Hellman Element by Céline Chevalier, Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer. In Advances in Cryptology - Proceedings of EUROCRYPT '09, Springer, vol. 5479, pp. 572-589, 2009
Distributed Public-Key Cryptography from Weak Secrets by Michel Abdalla, Xavier Boyen, Céline Chevalier, David Pointcheval. In Conference on Practice and Theory in Public-Key Cryptography (PKC '09), Springer, vol. 5443, pp. 139-159, 2009
Transferable Anonymous Constant-Size Fair E-Cash by Georg Fuchsbauer, David Pointcheval, Damien Vergnaud. Technical report, IACR ePrint Archive, no. 2009/146, 2009 - Full version of the CANS '09 paper

2008

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Anonymous and Transparent Gateway-based Password-Authenticated Key Exchange by Michel Abdalla, Malika Izabachène, David Pointcheval. In The 7th International Workshop on Cryptology and Network Security (CANS '08), Springer, vol. 5339, pp. 133-148, 2008
An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication by Julien Bringer, Hervé Chabanne, David Pointcheval, Sébastien Zimmer. In The 3rd International Workshop on Security (IWSEC '08), Springer, vol. 5312, pp. 219-230, 2008
New Anonymity Notions for Identity-Based Encryption by Malika Izabachène, David Pointcheval. In The 6th Conference on Security in Communication Networks (SCN '08), Springer, vol. 5229, pp. 375-391, 2008
Anonymous Proxy Signatures by Georg Fuchsbauer, David Pointcheval. In The 6th Conference on Security in Communication Networks (SCN '08), Springer, vol. 5229, pp. 201-217, 2008
Dynamic Threshold Public-Key Encryption by Cécile Delerablée, David Pointcheval. In Advances in Cryptology - Proceedings of CRYPTO '08, Springer, vol. 5157, pp. 317-334, 2008
Multi-Factor Authenticated Key Exchange by David Pointcheval, Sébastien Zimmer. In Conference on Applied Cryptography and Network Security (ACNS '08), Springer, vol. 5037, pp. 277-295, 2008
A Formal Study of the Privacy Concerns in Biometric-based Remote Authentication Schemes by Qiang Tang, Julien Bringer, Hervé Chabanne, David Pointcheval. In The 4th Information Security Practice and Experience Conference (ISPEC '08), Springer, vol. 4991, pp. 56-70, 2008
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework by Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval. In The Cryptographers' Track at RSA Conference '08 (CT-RSA '08), Springer, vol. 4964, pp. 335-351, 2008
HMAC is a Randomness Extractor and Applications to TLS by Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer. In Proceedings of the 3rd ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS '08), ACM Press, pp. 21-32, 2008
Encrypting Proofs on Pairings and Its Application to Anonymity for Signatures by Georg Fuchsbauer, David Pointcheval. Technical report, IACR ePrint Archive, no. 2008/528, 2008 - Earlier version of the Pairing '09 paper
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures by Georg Fuchsbauer, David Pointcheval. Technical report, IACR ePrint Archive, no. 2008/037, 2008 - Full version of the SCN '08 paper

2007

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Provably-Secure Authenticated Group Diffie-Hellman Key Exchange by Emmanuel Bresson, Olivier Chevassut, David Pointcheval. In ACM Transactions on Information and System Security, ACM, vol. 10, no. 3, pp. , 2007
Strong Password-Based Authentication in TLS using the Three-Party Group Diffie-Hellman Protocol by Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Moeller, David Pointcheval. In International Journal of Security and Networks, Inderscience Publishers, vol. 2, no. 3/4, pp. 284-296, 2007 - Special Issue on Cryptography in Networks
Trapdoor-Hard-to-Invert Isomorphism and their Application to Password-based Authentication by Dario Catalano, David Pointcheval, Thomas Pornin. In Journal of Cryptology, Springer, vol. 20, no. 1, pp. 115-149, 2007
A Security Solution for IEEE 802.11's Ad-hoc Mode: Password Authentication and Group Diffie-Hellman Key Exchange by Emmanuel Bresson, Olivier Chevassut, David Pointcheval. In International Journal of Wireless and Mobile Computing, Inderscience Publishers, vol. 2, no. 1, pp. 4-13, 2007 - Special Issue on Security of Computer Network and Mobile Systems
Extended Private Information Retrieval and its Application in Biometrics Authentications by Julien Bringer, Hervé Chabanne, David Pointcheval, Qiang Tang. In The 6th International Workshop on Cryptology and Network Security (CANS '07), Springer, vol. 4856, pp. 175-193, 2007
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication by Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang, Sébastien Zimmer. In The 12th Australasian Conference on Information Security and Privacy (ACISP '07), Springer, vol. 4586, pp. 96-106, 2007
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys by Cécile Delerablée, Pascal Paillier, David Pointcheval. In First International Conference on Pairing-based Cryptography (Pairing 2007), Springer, vol. 4575, pp. 39-59, 2007

2006

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
The 5th International Workshop on Cryptology and Network Security (CANS '06) Springer, vol. 4301 of Lecture Notes in Computer Science, 2006
The Cryptographers' Track at RSA Conference '06 (CT-RSA '06) Springer, vol. 3860 of Lecture Notes in Computer Science, 2006
Password-Based Authenticated Key Exchange In The Three-Party Setting by Michel Abdalla, Pierre-Alain Fouque, David Pointcheval. In IEE Proceedings Information Security, IEE, vol. 153, no. 1, pp. 27-39, 2006
A Scalable Password-based Group Key Exchange Protocol in the Standard Model by Michel Abdalla, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '06, Springer, vol. 4284, pp. 332-347, 2006
Dynamic Fully Anonymous Short Group Signatures by Cécile Delerablée, David Pointcheval. In International Conference on Cryptology in Vietnam 2006, Springer, vol. 4341, pp. 193-210, 2006
Automated Security Proofs with Sequences of Games by Bruno Blanchet, David Pointcheval. In Advances in Cryptology - Proceedings of CRYPTO '06, Springer, vol. 4117, pp. 538-554, 2006
About the security of MTI/C0 and MQV by Sébastien Kunz-Jacques, David Pointcheval. In SCN '06, Springer, vol. 4116, pp. 156-172, 2006
A New Key Exchange Protocol based on MQV Assuming Public Computations by Sébastien Kunz-Jacques, David Pointcheval. In SCN '06, Springer, vol. 4116, pp. 186-200, 2006
Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes by Pierre-Alain Fouque, David Pointcheval, Jacques Stern, Sébastien Zimmer. In ICALP '06, Springer, vol. 4052, pp. 240-251, 2006
Password-based Group Key Exchange in a Constant Number of Rounds by Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, David Pointcheval. In Conference on Practice and Theory in Public-Key Cryptography (PKC '06), Springer, vol. 3958, pp. 427-442, 2006
The Twist-Augmented Technique for Key Exchange by Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval. In Conference on Practice and Theory in Public-Key Cryptography (PKC '06), Springer, vol. 3958, pp. 410-426, 2006
Encoding-Free ElGamal Encryption Without Random Oracles by Benoît Chevallier-Mames, Pascal Paillier, David Pointcheval. In Conference on Practice and Theory in Public-Key Cryptography (PKC '06), Springer, vol. 3958, pp. 91-104, 2006
Provably Secure Password-Based Authentication in TLS by Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Moeller, David Pointcheval. In Proceedings of the 1st ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS '06), ACM Press, pp. 35-45, 2006
Automated Security Proofs with Sequences of Games by Bruno Blanchet, David Pointcheval. Technical report, IACR ePrint Archive, no. 2006/069, 2006 - Full version of the Crypto '06 paper
On Some Incompatible Properties of Voting Schemes by Benoît Chevallier-Mames, Pierre-Alain Fouque, Julien P. Stern, David Pointcheval, Jacques Traoré. In Actes du IAVoSS Workshop On Trustworthy Elections (WOTE 2006), 2006

2005

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Advanced Course on Contemporary Cryptology - ``Provable Security for Public-Key Schemes'' by David Pointcheval. Birkhäuser Publishers, Basel, pp. 133-189, 2005 - 248 pages
Encyclopedia of Cryptography and Security - ``OAEP: Optimal Asymmetric Encryption Padding'' (5 pages) by David Pointcheval. Springer, New York, 2005
Encyclopedia of Cryptography and Security - ``Rabin Cryptosystem'' (3 pages) by David Pointcheval. Springer, New York, 2005
Encyclopedia of Cryptography and Security - ``RSA Public-Key Encryption'' (7 pages) by David Pointcheval. Springer, New York, 2005
A Simple Threshold Authenticated Key Exchange from Short Secrets by Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '05, Springer, vol. 3788, pp. 566-584, 2005
Optimal Asymmetric Encryption and Signature Paddings by Benoît Chevallier-Mames, Duong Hieu Phan, David Pointcheval. In Conference on Applied Cryptography and Network Security (ACNS '05), Springer, vol. 3531, pp. 254-268, 2005
Public Traceability in Traitor Tracing Schemes by Hervé Chabanne, Duong Hieu Phan, David Pointcheval. In Advances in Cryptology - Proceedings of EUROCRYPT '05, Springer, vol. 3494, pp. 542-558, 2005
Interactive Diffie-Hellman Assumptions With Applications To Password-Based Cryptography by Michel Abdalla, David Pointcheval. In Advances in Cryptology - Proceedings of Financial Cryptography and Data Security '05 (FC '05), Springer, vol. 3570, pp. 341-356, 2005
Simple Password-Based Encrypted Key Exchange Protocols by Michel Abdalla, David Pointcheval. In The Cryptographers' Track at RSA Conference '05 (CT-RSA '05), Springer, vol. 3376, pp. 191-208, 2005
Password-Based Authenticated Key Exchange In The Three-Party Setting by Michel Abdalla, Pierre-Alain Fouque, David Pointcheval. In Workshop on Practice and Theory in Public-Key Cryptography (PKC '05), Springer, vol. 3386, pp. 65-84, 2005
One-time Verifier-based Encrypted Key Exchange by Michel Abdalla, Olivier Chevassut, David Pointcheval. In Workshop on Practice and Theory in Public-Key Cryptography (PKC '05), Springer, vol. 3386, pp. 47-64, 2005
Key Derivation and Randomness Extraction by Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval. Technical report, IACR ePrint Archive, no. 2005/061, 2005 - Earlier version of the PKC '06 paper

2004

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Mutual Authentication and Group Key Agreement for Low-Power Mobile Devices by Emmanuel Bresson, Olivier Chevassut, Abdelilah Essiari, David Pointcheval. In Journal of Computer Communications, Elsevier Science, vol. 27, no. 17, pp. 1730-1737, 2004 - Special Issue on Security and Performance in Wireless and Mobile Networks
RSA-OAEP is Secure under the RSA Assumption by Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern. In Journal of Cryptology, Springer, vol. 17, no. 2, pp. 81-104, 2004
OAEP 3-Round - A Generic and Secure Asymmetric Encryption Padding by Duong Hieu Phan, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '04, Springer, vol. 3329, pp. 63-78, 2004
On the Security Notions for Public-Key Encryption Schemes by Duong Hieu Phan, David Pointcheval. In Proceedings of the Fourth Conference on Security in Communication Networks '04 (SCN '04), Springer, vol. 3352, pp. 33-47, 2004
IPAKE: Isomorphisms for Password-based Authenticated Key Exchange by Dario Catalano, David Pointcheval, Thomas Pornin. In Advances in Cryptology - Proceedings of CRYPTO '04, Springer, vol. 3152, pp. 477-493, 2004
Deterministic Symmetric Encryption (Semantic Security and Pseudo-Random Permutations) by Duong Hieu Phan, David Pointcheval. In Proceedings of the 11th Annual Workshop on Selected Areas in Cryptography (SAC '04), Springer, vol. 3357, pp. 185-200, 2004
How to Disembed a Program? by Benoît Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval. In Cryptographic Hardware and Embedded Systems (CHES '04), Springer, vol. 3156, pp. 441-454, 2004
New Security Results on Encrypted Key Exchange by Emmanuel Bresson, Olivier Chevassut, David Pointcheval. In Workshop on Practice and Theory in Public-Key Cryptography (PKC '04), Springer, vol. 2947, pp. 145-158, 2004
Password-Based Authenticated Key Exchange In The Three-Party Setting by Michel Abdalla, Pierre-Alain Fouque, David Pointcheval. Technical report, IACR ePrint Archive, no. 2004/233, 2004 - Full version of the PKC '05 paper
How to Disembed a Program? by Benoît Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval. Technical report, IACR ePrint Archive, no. 2004/138, 2004 - Full version of the CHES '04 paper

2003

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Ateliers Mathematica - ``$\kappa \rho \upsilon \pi \tau\!$\emphò$\varsigma\ldots$'' (50 pages) by Robert Erra, David Pointcheval. Vuibert, Paris, 2003 - 560 pages
Ateliers Mathematica - ``Algorithmique des nombres et cryptologie asymétrique'' (46 pages) by Robert Erra, David Pointcheval. Vuibert, Paris, 2003 - 560 pages
The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme by Mihir Bellare, Chanathip Namprempre, David Pointcheval, Michael Semanko. In Journal of Cryptology, Springer, vol. 16, no. 3, pp. 185-215, 2003
A New $NP$-Complete Problem and Public Key Identification by David Pointcheval, Guillaume Poupard. In Designs, Codes and Cryptography, Kluwer Academic Publisher, Boston, vol. 28, no. 4, pp. 5-32, 2003
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and its Applications by Emmanuel Bresson, Dario Catalano, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '03, Springer, vol. 2894, pp. 37-54, 2003
Chosen-Ciphertext Security without Redundancy by Duong Hieu Phan, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '03, Springer, vol. 2894, pp. 1-18, 2003
Security Proofs for an Efficient Password-Based Key Exchange by Emmanuel Bresson, Olivier Chevassut, David Pointcheval. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), ACM Press, pp. 241-250, 2003
Mutual Authentication and Group Key Agreement for Low-Power Mobile Devices by Emmanuel Bresson, Olivier Chevassut, Abdelilah Essiari, David Pointcheval. In Proceedings of the 5th IFIP--TC6 International Conference on Mobile and Wireless Communications Networks (MWCN 2003), World Scientific Publishing, pp. 59-62, 2003
The Impact of Decryption Failures on the Security of NTRU Encryption by Nick Howgrave-Graham, Phong Q. Nguyen, David Pointcheval, John Proos, Joseph H. Silverman, Ari Singer, William Whyte. In Advances in Cryptology - Proceedings of CRYPTO '03, Springer, vol. 2729, pp. 226-246, 2003
Parallel Cryptography by Josef Pieprzyk, David Pointcheval. In The 8th Australasian Conference on Information Security and Privacy (ACISP '03), Springer, vol. 2727, pp. 383-401, 2003
A Comparison between two Methods of Security Proof by Duong Hieu Phan, David Pointcheval. In Actes de la Première Conférence Internationale RIVF '03 Rencontres en Informatique Vietnam-France, Suger, Paris, pp. 105-110, 2003

2002

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Asymmetric Cryptography and Practical Security by David Pointcheval. In Journal of Telecommunications and Information Technology, vol. 04/2002, pp. 41-56, 2002
Group Diffie-Hellman Key Exchange Secure Against Dictionary Attacks by Emmanuel Bresson, Olivier Chevassut, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '02, Springer, vol. 2501, pp. 497-514, 2002
Analysis and Improvements of NTRU Encryption Paddings by Phong Q. Nguyen, David Pointcheval. In Advances in Cryptology - Proceedings of CRYPTO '02, Springer, vol. 2442, pp. 210-225, 2002
Flaws in Applying Proof Methodologies to Signature Schemes by Jacques Stern, David Pointcheval, John Malone-Lee, Nigel P. Smart. In Advances in Cryptology - Proceedings of CRYPTO '02, Springer, vol. 2442, pp. 93-110, 2002
The Group Diffie-Hellman Problems by Emmanuel Bresson, Olivier Chevassut, David Pointcheval. In Workshop on Selected Areas in Cryptography (SAC '02), Springer, vol. 2595, pp. 325-338, 2002
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions by Emmanuel Bresson, Olivier Chevassut, David Pointcheval. In Advances in Cryptology - Proceedings of EUROCRYPT '02, Springer, vol. 2332, pp. 321-336, 2002
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages by Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen. In Workshop on Practice and Theory in Public-Key Cryptography (PKC '02), Springer, vol. 2274, pp. 17-33, 2002
GEM: a Generic Chosen-Ciphertext Secure Encryption Method by Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen. In The Cryptographers' Track at RSA Conference '02 (CT-RSA '02), Springer, vol. 2271, pp. 263-276, 2002
Practical Security in Public-Key Cryptography by David Pointcheval. In Proceedings of the 4th International Conference on Information Security and Cryptology (ICISC '01), Springer, vol. 2288, pp. 1-17, 2002
Security Proofs for an Efficient Password-Based Key Exchange by Emmanuel Bresson, Olivier Chevassut, David Pointcheval. Technical report, IACR ePrint Archive, no. 2002/192, 2002 - Full version of the ACM CCS '03 paper
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages by Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen. Technical report, IACR ePrint Archive, no. 2002/011, 2002 - Full version of the PKC '02 paper
Two Formal Views of Authenticated Group Diffie-Hellman Key Exchange by Emmanuel Bresson, Olivier Chevassut, Olivier Pereira, David Pointcheval, Jean-Jacques Quisquater. In DIMACS Workshop on Cryptographic Protocols in Complex Environments, DIMACS, 2002
Le chiffrement asymétrique et la sécurité prouvée by David Pointcheval. 2002

2001

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Key-Privacy in Public-Key Encryption by Mihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '01, Springer, vol. 2248, pp. 566-582, 2001
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case by Emmanuel Bresson, Olivier Chevassut, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '01, Springer, vol. 2248, pp. 290-309, 2001
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks by Pierre-Alain Fouque, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '01, Springer, vol. 2248, pp. 351-368, 2001
Provably Authenticated Group Diffie-Hellman Key Exchange by Emmanuel Bresson, Olivier Chevassut, David Pointcheval, Jean-Jacques Quisquater. In Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS '01), ACM Press, pp. 255-264, 2001
Twin Signatures: an Alternative to the Hash-and-Sign Paradigm by David Naccache, David Pointcheval, Jacques Stern. In Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS '01), ACM Press, pp. 20-27, 2001
RSA--OAEP is Secure under the RSA Assumption by Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern. In Advances in Cryptology - Proceedings of CRYPTO '01, Springer, vol. 2139, pp. 260-274, 2001
Practical Multi-Candidate Election System by Olivier Baudron, Pierre-Alain Fouque, David Pointcheval, Guillaume Poupard, Jacques Stern. In Proceedings of the 20th ACM Symposium on Principles of Distributed Computing (PODC '01), ACM Press, pp. 274-283, 2001
The Power of RSA Inversion Oracles and the Security of Chaum's RSA Blind Signature Scheme by Mihir Bellare, Chanathip Namprempre, David Pointcheval, Michael Semanko. In Advances in Cryptology - Proceedings of Financial Cryptography '01, Springer, vol. 2339, pp. 319-338, 2001
Mutual Authentication for Low-Power Mobile Devices by Markus Jakobsson, David Pointcheval. In Advances in Cryptology - Proceedings of Financial Cryptography '01, Springer, vol. 2339, pp. 178-195, 2001
Monotone Signatures by David Naccache, David Pointcheval, Christophe Tymen. In Advances in Cryptology - Proceedings of Financial Cryptography '01, Springer, vol. 2339, pp. 305-318, 2001
Secure Mobile Gambling by Markus Jakobsson, David Pointcheval, Adam Young. In The Cryptographers' Track at RSA Conference '01 (CT-RSA '01), Springer, vol. 2020, pp. 110-125, 2001
REACT: Rapid Enhanced-security Asymmetric Cryptosystem Transform by Tatsuaki Okamoto, David Pointcheval. In The Cryptographers' Track at RSA Conference '01 (CT-RSA '01), Springer, vol. 2020, pp. 159-175, 2001
The Gap-Problems: a New Class of Problems for the Security of Cryptographic Schemes by Tatsuaki Okamoto, David Pointcheval. In Workshop on Practice and Theory in Public-Key Cryptography (PKC '01), Springer, vol. 1992, pp. 104-118, 2001
The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme by Mihir Bellare, Chanathip Namprempre, David Pointcheval, Michael Semanko. Technical report, IACR ePrint Archive, no. 2001/002, 2001 - Full version of the FC '01 paper
RSA-REACT: An Alternative to RSA-OAEP by Tatsuaki Okamoto, David Pointcheval. In Second NESSIE Workshop, NESSIE, 2001
About Generic Conversions from any Weakly Secure Encryption Scheme into a Chosen-Ciphertext Secure Scheme by David Pointcheval. In Fourth Conference on Algebraic Geometry, Number Theory, Coding Theory and Cryptography, University of Tokyo, pp. 145-162, 2001
Number Theory and Public-Key Cryptography by David Pointcheval. In Combinatorial and Computational Mathematics: Present and Future, World Scientific, pp. 178-209, 2001

2000

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Security Arguments for Digital Signatures and Blind Signatures by David Pointcheval, Jacques Stern. In Journal of Cryptology, Springer, vol. 13, no. 3, pp. 361-396, 2000
Extended Notions of Security for Multicast Public Key Cryptosystems by Olivier Baudron, David Pointcheval, Jacques Stern. In Proceedings of the 27th International Colloquium on Automata, Languages and Programming (ICALP '00), Springer, vol. 1853, pp. 499-511, 2000
Authenticated Key Exchange Secure Against Dictionary Attacks by Mihir Bellare, David Pointcheval, Phillip Rogaway. In Advances in Cryptology - Proceedings of EUROCRYPT '00, Springer, vol. 1807, pp. 139-155, 2000
Self-Scrambling Anonymizers by David Pointcheval. In Advances in Cryptology - Proceedings of Financial Cryptography '00, Springer, vol. 1962, pp. 259-275, 2000
Design Validations for Discrete Logarithm Based Signature Schemes by Ernest F. Brickell, David Pointcheval, Serge Vaudenay, Moti Yung. In Workshop on Practice and Theory in Public-Key Cryptography (PKC '00), Springer, vol. 1751, pp. 276-292, 2000
The Composite Discrete Logarithm and Secure Authentication by David Pointcheval. In Workshop on Practice and Theory in Public-Key Cryptography (PKC '00), Springer, vol. 1751, pp. 113-128, 2000
Chosen-Ciphertext Security for any One-Way Cryptosystem by David Pointcheval. In Workshop on Practice and Theory in Public-Key Cryptography (PKC '00), Springer, vol. 1751, pp. 129-146, 2000
RSA-OAEP is Secure under the RSA Assumption by Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern. Technical report, IACR ePrint Archive, no. 2000/061, 2000 - Full version of the Crypto '01 paper
Authenticated Key Exchange Secure Against Dictionary Attacks by Mihir Bellare, David Pointcheval, Phillip Rogaway. Technical report, IACR ePrint Archive, no. 2000/014, 2000 - Extended version of Eurocrypt '00 paper

1999

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Efficient Public-Key Cryptosystems Provably Secure against Active Adversaries by Pascal Paillier, David Pointcheval. In Advances in Cryptology - Proceedings of ASIACRYPT '99, Springer, vol. 1716, pp. 165-179, 1999
New Public Key Cryptosystems based on the Dependent-RSA Problems by David Pointcheval. In Advances in Cryptology - Proceedings of EUROCRYPT '99, Springer, vol. 1592, pp. 239-254, 1999
Report on the AES Candidates by Olivier Baudron, Henri Gilbert, Louis Granboulan, Helena Handschuh, Antoine Joux, Phong Q. Nguyen, Fabrice Noilhan, David Pointcheval, Thomas Pornin, Guillaume Poupard, Jacques Stern, Serge Vaudenay. In Second AES Candidate Conference, NIST, pp. , 1999
DFC Update by Olivier Baudron, Henri Gilbert, Louis Granboulan, Helena Handschuh, Antoine Joux, Phong Q. Nguyen, Fabrice Noilhan, David Pointcheval, Thomas Pornin, Guillaume Poupard, Jacques Stern, Serge Vaudenay. In Second AES Candidate Conference, NIST, pp. , 1999

1998

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Relations among Notions of Security for Public-Key Encryption Schemes by Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway. In Advances in Cryptology - Proceedings of CRYPTO '98, Springer, vol. 1462, pp. 26-45, 1998
Strengthened Security for Blind Signatures by David Pointcheval. In Advances in Cryptology - Proceedings of EUROCRYPT '98, Springer, vol. 1403, pp. 391-405, 1998
Computational Alternatives to Random Number Generators by David M'Raïhi, David Naccache, David Pointcheval, Serge Vaudenay. In Fifth Annual Workshop on Selected Areas in Cryptography (SAC '98), Springer, vol. 1556, pp. 72-80, 1998
Distributed Trustees and Revokability: a Framework for Internet Payment by David M'Raïhi, David Pointcheval. In Advances in Cryptology - Proceedings of Financial Cryptography '98, Springer, vol. 1465, pp. 28-41, 1998
Relations among Notions of Security for Public-Key Encryption Schemes by Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway. Technical report, IACR ePrint Archive, no. 1998/021, 1998 - Full version of the Crypto '98 paper

1997

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
New Blind Signatures Equivalent to Factorization by David Pointcheval, Jacques Stern. In Proceedings of the 4th ACM Conference on Computer and Communications Security (CCS '97), ACM Press, New York, pp. 92-99, 1997

1996

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Provably Secure Blind Signature Schemes by David Pointcheval, Jacques Stern. In Advances in Cryptology - Proceedings of ASIACRYPT '96, Springer, vol. 1163, pp. 252-265, 1996
Security Proofs for Signature Schemes by David Pointcheval, Jacques Stern. In Advances in Cryptology - Proceedings of EUROCRYPT '96, Springer, vol. 1070, pp. 387-398, 1996
Les preuves de connaissance et leurs preuves de sécurité by David Pointcheval. PhD thesis, University of Caen, France, 1996

1995

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
A New Identification Scheme Based on the Perceptrons Problem by David Pointcheval. In Advances in Cryptology - Proceedings of EUROCRYPT '95, Springer, vol. 921, pp. 319-328, 1995

1994

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Neural Networks and their Cryptographic Applications by David Pointcheval. In Livre des résumés Eurocode '94, INRIA, pp. 183-193, 1994
Authentification by David Pointcheval. 1994 - Magistere Thesis

1993

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Schémas d'authentification à clé publique exigeant peu de ressources by David Pointcheval. 1993 - Master Thesis

Slides

2018

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
La cryptographie: Art, Science ou Magie... 2018

2017

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Computations on Encrypted Data and Privacy In , 2017

2016

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Efficient Private Disjointness Testing In , 2016

2012

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Password-based Authenticated Key Exchange In , 2012
Efficient Smooth Projective Hash Functions and Applications 2012
Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions 2012
La cryptographie et le vote 2012

2011

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
What Can Cryptography Guarantee? 2011
Randomizable Commutative Signature and Encryption Schemes 2011
Round-Optimal Waters Blind Signatures 2011
What does Cryptography Guarantee? 2011

2010

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Efficient Receipt-Freeness for e-Voting In , 2010

2009

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Smooth Projective Hashing for Conditionally Extractable Commitments In , 2009
The Game-based Methodology for Computational Security Proofs 2009
Comment sécuriser nos échanges de données ? Confidentialité et anonymat 2009
Smooth Projective Hashing for Conditionally Extractable Commitments 2009
Smooth Projective Hashing for Conditionally Extractable Commitments 2009
Security Proofs using the Game-based Methodology 2009

2008

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Dynamic Threshold Public-Key Encryption In , 2008

2007

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
PAKE in the UC-Framework - Adaptive Security In , 2007
Extended Private Information Retrieval and its Application in Biometrics Authentications In , 2007

2006

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
A Scalable Password-based Group Key Exchange Protocol in the Standard Model In , 2006

2005

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Interactive Diffie-Hellman Assumptions with Applications to Password-based Authentication In , 2005
One-time Verifier-based Encrypted Key Exchange In , 2005
Quelle sécurité avec la cryptographie ? 2005

2004

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding In , 2004
IPAKE: Isomorphisms for Password-based Authenticated Key Exchange In , 2004
The 'Twist Augmented' Approach for Diffie-Hellman Key Exchange 2004
Provable Security and Ideal Models 2004
Asymmetric Cryptography - Provable Security 2004
Password-based Authenticated Key Exchange: State of the Art 2004
Authenticated Key Exchange (passwords, groups, low-power devices) 2004
Security Proofs and Asymmetric Encryption without Redundancy 2004
Provable Security - Asymmetric Encryption 2004

2003

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Chosen-Ciphertext Security without Redundancy In , 2003
Security Proofs for an Efficient Password-Based Key Exchange In , 2003
Group Key Exchange and Provable Security 2003
Provable Security - Asymmetric Encryption 2003

2002

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Provable Security in Cryptography -- DL-based Systems In , 2002
La cryptographie asymétrique et les preuves de sécurité 2002
Le chiffrement asymétrique et la sécurité prouvée --- Asymmetric Encryption and Provable security 2002

2001

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Flaws in Applying Proof Methodologies to Signature Schemes In , 2001
Analysis and Improvements of NTRU Encryption Paddings In , 2001
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks In , 2001
Practical Security in Public-Key Cryptography In , 2001
Twin Signatures: an Alternative to the Hash-and-Sign Paradigm In , 2001
REACT: Rapid Enhanced-security Asymmetric Cryptosystem Transform In , 2001
Secure Mobile Gambling In , 2001
Mutual Authentication for Low-Power Mobile Devices In , 2001
Monotone Signatures In , 2001
Self-Scrambling Anonymizers In , 2001
REACT: Rapid Enhanced-security Asymmetric Cryptosystem Transform 2001
About Generic Conversions from any Weakly Secure Encryption Scheme into a Chosen-Ciphertext Secure Scheme 2001

2000

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
The Composite Discrete Logarithm and Secure Authentication In , 2000
Design Validations for Discrete Logarithm Based Signature Schemes In , 2000
Chosen-Ciphertext Security for any One-Way Cryptosystem In , 2000
Secure Designs for Public-Key Cryptography based on the Discrete Logarithm 2000

1999

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
New Public Key Cryptosystems based on the Dependent-RSA Problems In , 1999
La Sécurité Sémantique en Pratique 1999

1998

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Strengthened Security for Blind Signatures In , 1998
Plaintext Awareness, Non-Malleability, and Chosen-Ciphertext Security: Implications and Separations 1998
Echange de Clés Authentifiées Résistant aux attaques par Dictionnaire 1998

1997

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
New Blind Signatures Equivalent to Factorization In , 1997
Strengthened Security for Blind Signatures 1997

1996

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Provably Secure Blind Signature Schemes In , 1996
Security Proofs for Signature Schemes In , 1996
Preuves de Sécurité 1996
Les preuves de connaissances et leurs preuves de sécurité --- Proofs of Knowledge and Security Proofs 1996

1995

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
A New Identification Scheme Based on The Perceptrons Problem In , 1995

1994

  •  Publisher Version
  •  Full Version
  •  Related Material
  •  Presentation Slides
Neural Networks and Their Cryptographic Applications 1994