Books
-
Exercices et problèmes de cryptographie
(Textbook in french - Foreword by Jacques Stern)
Dunod, Paris, Sciences Sup, 2012.
ISBN:
978-2-10-057340-0.
(book page - in french)
-
Applied Cryptography and Network Security, 7th International Conference, ACNS '09
(with Michel Abdalla, Pierre-Alain Fouque and David Pointcheval)
Paris-Rocquencourt, France, June 2-5, 2009, Proceedings.
Springer, Lect. Notes Comput. Sci. vol. 5536, 2009. [DOI].
ISBN: 978-3-642-01956-2.
top
International journals
-
Towards Practical Black-Box Accountable Authority IBE: Weak Black-Box Traceability with Short Ciphertexts and Private Keys.
(with Benoît Libert)
IEEE Transactions on Information Theory
Volume 57, Issue 10, 7189-7204 (2011) [DOI]
Preliminary version in PKC'09.
-
Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption.
(with Benoît Libert)
IEEE Transactions on Information Theory
Volume 57, Issue 3, 1786-1802 (2011) [DOI] [Details]
Preliminary version in PKC'08.
-
Time-Selective Convertible Undeniable Signatures with Short Conversion Receipts.
(with Fabien Laguillaumie)
Information Sciences
Volume 180, Issue 12, 2458-2475 (2010) [DOI]
Preliminary version in RSA'05.
-
New Extensions of Pairing-based Signatures into Universal (Multi) Designated Verifier Signatures.
International Journal of Foundations of Computer Science
Volume 20, Issue 1, 109-133 (2009) [DOI] [Details]
Preliminary version in ICALP'06.
-
Multi-Designated Verifiers Signatures: Anonymity without Encryption.
(with Fabien Laguillaumie)
Information Processing Letters
Volume 102, Issues 2-3, 127-132 (2007) [DOI]
-
Universal Forgery on Sekhar's Signature Scheme with Message Recovery.
(with Fabien Laguillaumie & Jacques Traoré)
International Journal of Computer Mathematics
Volume 81, Issue 12, 1493-1495 (2004) [DOI]
top
International conferences
-
Time/Memory/Data Tradeoffs for Variants of the RSA Problem
(with Pierre-Alain Fouque & Jean-Christophe Zapalowicz)
19th Annual International Computing and Combinatorics Conference, COCOON 2013
(D. Du & G. Zhang eds.)
Springer, Lect. Notes Comput. Sci., 2013, to appear
-
Efficient UC-Secure Authenticated Key-Exchange
for Algebraic Languages
(with Fabrice Ben Hamouda, Olivier Blazy,
Céline Chevalier & David Pointcheval)
16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013
(K. Kurosawa & G. Hanaoka eds.)
Springer, Lect. Notes Comput. Sci., vol. 7778, 2013,
p. 272-291 [DOI]
-
Compact Round-Optimal Partially-Blind Signatures
(with Olivier Blazy & David Pointcheval)
8th Conference on Security and Cryptography for Networks, SCN 2012
(I. Visconti & R. de Prisco eds.)
Springer, Lect. Notes Comput. Sci., vol. 7495, 2012,
p. 95-112 [DOI]
-
Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order
Evaluation and Pairing-Friendly Constructions
(with Aurore Guillevic)
Pairing-Based Cryptography - Pairing 2012 - 5th
International Conference
(M. Abdalla & T. Lange eds.)
Springer, Lect. Notes Comput. Sci., to appear,
2012
-
Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods
(with Aurélie Bauer & Jean-Christophe Zapalowicz)
15th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2012
(M. Fischlin, J. Buchman & M. Manulis eds.)
Springer, Lect. Notes Comput. Sci., vol. 7293, 2012,
p. 609-626 [DOI]
-
Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash
Functions
(with Olivier Blazy & David Pointcheval)
9th Theory of Cryptography Conference, TCC 2012
(R. Cramer, ed.)
Springer, Lect. Notes Comput. Sci., vol. 7194, 2012,
p. 94-111 [DOI]
-
Block-wise P-Signatures and Non-Interactive Anonymous Credentials with Efficient Attributes
(with Malika Izabachène & Benoit Libert)
Cryptography and Coding, 13th IMA International Conference
(L. Chen ed.)
Springer, Lect. Notes Comput. Sci., vol. 7089, 2011,
p. 431-450 [DOI]
-
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security.
(with Brett Hemenway, Benoit Libert & Rafail Ostrovsky)
Advances in Cryptology - Asiacrypt 2011
(D. H. Lee & H. Wang eds.)
Springer, Lect. Notes Comput. Sci., vol. 7073, 2011,
p. 70-88 [DOI]
IACR eprint, Report 2009/088, November 2009.
[IACR]
-
Efficient and Secure Generalized Pattern Matching via Fast Fourier Transform.
Progress in Cryptology - Africacrypt 2011
(A. Nitaj & D. Pointcheval eds.)
Springer, Lect. Notes Comput. Sci., vol. 6737, 2011,
p. 41-58 [DOI]
-
Signatures on Randomizable Ciphertexts.
(with Olivier Blazy, Georg Fuchsbauer & David Pointcheval)
14th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2011
(D. Catalano, N. Fazio, R. Gennaro & A. Nicolosi eds.)
Springer, Lect. Notes Comput. Sci., vol. 6571, 2011, p. 403-422
[DOI]
-
Mediated Traceable Anonymous Encryption.
(with Malika Izabachène & David Pointcheval)
First International Conference on Cryptology and Information Security in Latin America, Latincrypt'2010
(M. Abdalla & P. S. L. M. Barreto eds.)
Springer, Lect. Notes Comput. Sci. vol. 6212, 2010, p. 40-60
[DOI]
-
Huff’s Model for Elliptic Curves.
(with Marc Joye & Mehdi Tibouchi)
Algorithmic Number Theory, 9th International Symposium, ANTS-IX
(G. Hanrot, F. Morain & E. Thomé eds.)
Springer, Lect. Notes Comput. Sci. vol. 6197, 2010, p. 234-250
[DOI]
IACR eprint, Report 2010/383, July 2010.
[IACR]
-
On The Broadcast and Validity-Checking Security of PKCS #1 v1.5 Encryption.
(with Aurélie Bauer, Jean-Sébastien Coron, David Naccache & Mehdi Tibouchi)
Applied Cryptography and Network Security, 8th International Conference, ACNS 2010
(J. Zhou & M. Yung eds.)
Springer, Lect. Notes Comput. Sci. vol. 6123, 2010, p. 1-18
[DOI]
IACR eprint, Report 2010/135, March 2010.
[IACR]
(Mehdi Tibouchi received the Best Student Paper Award)
-
Batch Groth-Sahai.
(with Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert & Hervé Sibert)
Applied Cryptography and Network Security, 8th International Conference, ACNS 2010
(J. Zhou & M. Yung eds.)
Springer, Lect. Notes Comput. Sci. vol. 6123, 2010, p. 218-235
[DOI]
IACR eprint, Report 2010/040, January 2010.
[IACR]
-
Fair Blind Signatures without Random Oracles.
(with Georg Fuchsbauer)
Progress in Cryptology - Africacrypt 2010
(D. Bernstein & T. Lange eds.)
Springer, Lect. Notes Comput. Sci. vol. 6055, 2010, p. 16-33
[DOI]
IACR eprint, Report 2010/101, March 2010.
[IACR]
-
Provably Secure Code-Based Threshold Ring Signatures.
(with Léonard Dallot)
Cryptography and Coding, 12th IMA International Conference
(M. G. Parker ed.)
Springer, Lect. Notes Comput. Sci. vol. 5921, 2009, p. 222-235
[DOI]
-
Transferable Constant-Size Fair E-Cash.
(with Georg Fuchsbauer & David Pointcheval)
International Conference on Cryptology And Network Security, CANS 2009
(J. A. Garay & A. Miyaji eds.)
Springer, Lect. Notes Comput. Sci. vol. 5888, 2009, p. 226-247
[DOI]
IACR eprint, Report 2009/146, March 2009.
[IACR]
-
Group Signatures with Verifier-Local Revocation and Backward Unlinkability
in the Standard Model.
(with Benoît Libert)
International Conference on Cryptology And Network Security, CANS 2009
(J. A. Garay, A. Miyaji & A. Otsuka eds. eds.)
Springer, Lect. Notes Comput. Sci. vol. 5888, 2009, p. 498-517
[DOI] [Details]
-
Fair E-cash: Be Compact, Spend Faster.
(with Sébastien Canard, Cécile Delerablée, Aline Gouget, Emeline Hufschmitt, Fabien Laguillaumie,
Hervé Sibert & Jacques Traoré)
Information Security, 12th International Conference, ISC 2009
(P. Samaranti, M. Yung, F. Martinelli & C. A. Ardagna eds.)
Springer, Lect. Notes Comput. Sci. vol. 5735, 2009, p. 294-309
[DOI] [Details]
-
Adaptive-ID Secure Revocable Identity-Based Encryption.
(with Benoît Libert)
Topics in cryptology - CT-RSA 2009
(M. Fischlin ed.)
Springer, Lect. Notes Comput. Sci. vol. 5473, 2009, p. 1-15
[DOI] [Details]
-
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys.
(with Benoît Libert)
12th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2009
(S. Jarecki & G. Tsudik eds.)
Springer, Lect. Notes Comput. Sci. vol. 5443, 2009, p. 235-255.
[DOI] [Details]
-
Multi-Use Unidirectional Proxy Re-Signatures.
(with Benoît Libert)2008 ACM Conference on Computer and Communications Security, CCS 2008
(P. Ning, P. F. Syverson & S. Jha eds.)
ACM, 2008, p. 511-520.
[DOI]
[Details]
-
Tracing Malicious Proxies in Proxy Re-Encryption.
(with Benoît Libert)
2nd International Conference on Pairing-based Cryptography - Pairing 2008
(S. Galbraith & K. Paterson eds.)
Springer, Lect. Notes Comput. Sci. vol. 5209, 2008, p. 332-353.
[DOI]
[Details]
-
Separation Results on the "One-More" Computational Problems.
(with Emmanuel Bresson & Jean Monnerat)
Topics in cryptology - CT-RSA 2008
(T. Malkin ed.)
Springer, Lect. Notes Comput. Sci. vol. 4964, 2008, p. 71-87.
[DOI]
[Details]
-
Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption.
(with Benoît Libert)
11th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2008
(R. Cramer ed.)
Springer, Lect. Notes Comput. Sci. vol. 4939, 2008, p. 360-379.
[DOI]
[Details]
-
Trapdoor Permutation Polynomials of Z/nZ and Public Key Cryptosystems.
(with Guilhem Castagnos)
Information Security, 10th International Conference, ISC 2007
(J. A. Garay, A. K. Lenstra, M. Mambo & R. Peralta, eds.)
Springer, Lect. Notes Comput. Sci. vol. 4779, 2007, p. 333-350.
[DOI]
-
On the Soundness of Restricted Universal Designated Signatures and Dedicated Signatures.
(with Fabien Laguillaumie)
Information Security, 10th International Conference, ISC 2007
(J. A. Garay, A. K. Lenstra, M. Mambo & R. Peralta, eds.)
Springer, Lect. Notes Comput. Sci. vol. 4779, 2007, p. 175-188.
[DOI]
-
On Kabatianskii-Krouk-Smeets Signatures.
(with Pierre-Louis Cayrel & Ayoub Otmani)
International Workshop on the Arithmetic of Finite Fields, WAIFI 2007
(C. Carlet & B. Sunar, eds.)
Springer, Lect. Notes Comput. Sci.
vol. 4547, 2007, p. 237-251. [DOI]
-
Gradually Convertible Undeniable Signatures.
(with Laila El Aimani)
Applied Cryptography and Network Security, 5th International Conference, ACNS 2007
(J. Katz & M. Yung, eds.)
Springer, Lect. Notes Comput. Sci. vol. 4521, 2007, p. 478-496. [DOI]
-
New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures.
33rd International Colloquium on
Automata, Languages and Programming, ICALP 2006
(M. Bugliesi, B. Preneel, V. Sassone & I. Wegener, eds.)
Springer, Lect. Notes Comput. Sci. vol. 4052, 2006, p. 58-69. [DOI] [Details]
-
RSA-Based Secret Handshakes.
International Workshop on Coding and Cryptography, WCC 2005
(Ø. Ytrehus, ed.)
Springer, Lect. Notes Comput. Sci.
vol. 3969, 2006, p. 252-274. [DOI]
-
Short Undeniable Signatures Without Random Oracles: the Missing Link.
(with Fabien Laguillaumie)
Progress in Cryptology - Indocrypt 2005
(S. Maitra, C. E. Veni Madhavan & R. Venkatesan, eds.)
Springer, Lect. Notes Comput. Sci.
vol. 3797, 2005, p. 283-296.
[DOI]
-
Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log.
(with Pascal Paillier)
Advances in Cryptology - Asiacrypt 2005
(B. Roy, ed.)
Springer, Lect. Notes Comput. Sci. vol. 3788, 2005, p. 1-20.
[DOI]
(winner of the Best Paper Award)
-
Universally Convertible Directed Signatures.
(with Fabien Laguillaumie & Pascal Paillier)
Advances in Cryptology - Asiacrypt 2005
(B. Roy, ed.)
Springer, Lect. Notes Comput. Sci. vol. 3788, 2005, p. 682-701.
[DOI]
-
Time-Selective Convertible Undeniable Signatures.
(with Fabien Laguillaumie)
Topics in cryptology - CT-RSA 2005
(A. Menezes, ed)
Springer Lect. Notes Comput. Sci. vol. 3376, 2005, p. 154-171.
[DOI]
-
Designated Verifiers Signature: Anonymity and Efficient Construction from any Bilinear Map.
(with Fabien Laguillaumie)
Fourth International Conference, SCN 2004
(C. Blundo & S. Cimato, eds)
Springer Lect. Notes
Comput. Sci. vol. 3352, 2005, p. 107-121.
[DOI]
-
Multi-Designated Verifiers Signature Schemes.
(with Fabien Laguillaumie)
Sixth International Conference, ICICS 2004
(J. Lopez, S. Qing & E. Okamoto, eds.)
Springer Lect. Notes
Comput. Sci. vol. 3269, 2004, p. 495-507.
[DOI]
top
Submitted
-
Analysis and Improvement of Lindell's UC-Secure Commitment Schemes
(with Olivier Blazy,
Céline Chevalier & David Pointcheval)
IACR eprint, Report 2013/123, March 2013. [IACR]
-
New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange
(with Fabrice Ben Hamouda, Olivier Blazy,
Céline Chevalier & David Pointcheval)
IACR eprint, Report 2013/034, February 2013. [IACR]
-
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security.
(with Brett Hemenway, Benoit Libert & Rafail Ostrovsky)
Preliminary version in Asiacrypt 2011
IACR eprint, Report 2009/088, November 2009. [IACR]
top