Books

  1. Exercices et problèmes de cryptographie

    (Textbook in french - Foreword by Jacques Stern) Dunod, Paris, Sciences Sup, 2012.
    ISBN: 978-2-10-057340-0.
    (book page - in french)
  2. Applied Cryptography and Network Security, 7th International Conference, ACNS '09

    (with Michel Abdalla, Pierre-Alain Fouque and David Pointcheval) Paris-Rocquencourt, France, June 2-5, 2009, Proceedings.
    Springer, Lect. Notes Comput. Sci. vol. 5536, 2009. [DOI].
    ISBN: 978-3-642-01956-2.

top

International journals

  1. Towards Practical Black-Box Accountable Authority IBE: Weak Black-Box Traceability with Short Ciphertexts and Private Keys.

    (with Benoît Libert) IEEE Transactions on Information Theory Volume 57, Issue 10, 7189-7204 (2011) [DOI]
    Preliminary version in PKC'09.
  2. Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption.

    (with Benoît Libert) IEEE Transactions on Information Theory Volume 57, Issue 3, 1786-1802 (2011) [DOI] [Details]
    Preliminary version in PKC'08.
  3. Time-Selective Convertible Undeniable Signatures with Short Conversion Receipts.

    (with Fabien Laguillaumie) Information Sciences Volume 180, Issue 12, 2458-2475 (2010) [DOI]
    Preliminary version in RSA'05.
  4. New Extensions of Pairing-based Signatures into Universal (Multi) Designated Verifier Signatures.

    International Journal of Foundations of Computer Science Volume 20, Issue 1, 109-133 (2009) [DOI] [Details]
    Preliminary version in ICALP'06.
  5. Multi-Designated Verifiers Signatures: Anonymity without Encryption.

    (with Fabien Laguillaumie) Information Processing Letters Volume 102, Issues 2-3, 127-132 (2007) [DOI]
  6. Universal Forgery on Sekhar's Signature Scheme with Message Recovery.

    (with Fabien Laguillaumie & Jacques Traoré) International Journal of Computer Mathematics Volume 81, Issue 12, 1493-1495 (2004) [DOI]
top

International conferences

  1. Time/Memory/Data Tradeoffs for Variants of the RSA Problem

    (with Pierre-Alain Fouque & Jean-Christophe Zapalowicz) 19th Annual International Computing and Combinatorics Conference, COCOON 2013
    (D. Du & G. Zhang eds.)
    Springer, Lect. Notes Comput. Sci., 2013, to appear
  2. Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages

    (with Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier & David Pointcheval) 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013
    (K. Kurosawa & G. Hanaoka eds.)
    Springer, Lect. Notes Comput. Sci., vol. 7778, 2013, p. 272-291 [DOI]
  3. Compact Round-Optimal Partially-Blind Signatures

    (with Olivier Blazy & David Pointcheval) 8th Conference on Security and Cryptography for Networks, SCN 2012
    (I. Visconti & R. de Prisco eds.)
    Springer, Lect. Notes Comput. Sci., vol. 7495, 2012, p. 95-112 [DOI]
  4. Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions

    (with Aurore Guillevic) Pairing-Based Cryptography - Pairing 2012 - 5th International Conference
    (M. Abdalla & T. Lange eds.)
    Springer, Lect. Notes Comput. Sci., to appear, 2012
  5. Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods

    (with Aurélie Bauer & Jean-Christophe Zapalowicz) 15th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2012
    (M. Fischlin, J. Buchman & M. Manulis eds.)
    Springer, Lect. Notes Comput. Sci., vol. 7293, 2012, p. 609-626 [DOI]
  6. Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions

    (with Olivier Blazy & David Pointcheval) 9th Theory of Cryptography Conference, TCC 2012
    (R. Cramer, ed.)
    Springer, Lect. Notes Comput. Sci., vol. 7194, 2012, p. 94-111 [DOI]
  7. Block-wise P-Signatures and Non-Interactive Anonymous Credentials with Efficient Attributes

    (with Malika Izabachène & Benoit Libert) Cryptography and Coding, 13th IMA International Conference
    (L. Chen ed.)
    Springer, Lect. Notes Comput. Sci., vol. 7089, 2011, p. 431-450 [DOI]
  8. Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security.

    (with Brett Hemenway, Benoit Libert & Rafail Ostrovsky) Advances in Cryptology - Asiacrypt 2011
    (D. H. Lee & H. Wang eds.)
    Springer, Lect. Notes Comput. Sci., vol. 7073, 2011, p. 70-88 [DOI]
    IACR eprint, Report 2009/088, November 2009. [IACR]
  9. Efficient and Secure Generalized Pattern Matching via Fast Fourier Transform.

    Progress in Cryptology - Africacrypt 2011
    (A. Nitaj & D. Pointcheval eds.)
    Springer, Lect. Notes Comput. Sci., vol. 6737, 2011, p. 41-58 [DOI]
  10. Signatures on Randomizable Ciphertexts.

    (with Olivier Blazy, Georg Fuchsbauer & David Pointcheval) 14th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2011
    (D. Catalano, N. Fazio, R. Gennaro & A. Nicolosi eds.)
    Springer, Lect. Notes Comput. Sci., vol. 6571, 2011, p. 403-422 [DOI]
  11. Mediated Traceable Anonymous Encryption.

    (with Malika Izabachène & David Pointcheval) First International Conference on Cryptology and Information Security in Latin America, Latincrypt'2010
    (M. Abdalla & P. S. L. M. Barreto eds.)
    Springer, Lect. Notes Comput. Sci. vol. 6212, 2010, p. 40-60 [DOI]
  12. Huff’s Model for Elliptic Curves.

    (with Marc Joye & Mehdi Tibouchi) Algorithmic Number Theory, 9th International Symposium, ANTS-IX
    (G. Hanrot, F. Morain & E. Thomé eds.)
    Springer, Lect. Notes Comput. Sci. vol. 6197, 2010, p. 234-250 [DOI]
    IACR eprint, Report 2010/383, July 2010. [IACR]
  13. On The Broadcast and Validity-Checking Security of PKCS #1 v1.5 Encryption.

    (with Aurélie Bauer, Jean-Sébastien Coron, David Naccache & Mehdi Tibouchi) Applied Cryptography and Network Security, 8th International Conference, ACNS 2010
    (J. Zhou & M. Yung eds.)
    Springer, Lect. Notes Comput. Sci. vol. 6123, 2010, p. 1-18 [DOI]
    IACR eprint, Report 2010/135, March 2010. [IACR]

    (Mehdi Tibouchi received the Best Student Paper Award)

  14. Batch Groth-Sahai.

    (with Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert & Hervé Sibert) Applied Cryptography and Network Security, 8th International Conference, ACNS 2010
    (J. Zhou & M. Yung eds.)
    Springer, Lect. Notes Comput. Sci. vol. 6123, 2010, p. 218-235 [DOI]
    IACR eprint, Report 2010/040, January 2010. [IACR]
  15. Fair Blind Signatures without Random Oracles.

    (with Georg Fuchsbauer) Progress in Cryptology - Africacrypt 2010
    (D. Bernstein & T. Lange eds.)
    Springer, Lect. Notes Comput. Sci. vol. 6055, 2010, p. 16-33 [DOI]
    IACR eprint, Report 2010/101, March 2010. [IACR]
  16. Provably Secure Code-Based Threshold Ring Signatures.

    (with Léonard Dallot) Cryptography and Coding, 12th IMA International Conference
    (M. G. Parker ed.)
    Springer, Lect. Notes Comput. Sci. vol. 5921, 2009, p. 222-235 [DOI]
  17. Transferable Constant-Size Fair E-Cash.

    (with Georg Fuchsbauer & David Pointcheval) International Conference on Cryptology And Network Security, CANS 2009
    (J. A. Garay & A. Miyaji eds.)
    Springer, Lect. Notes Comput. Sci. vol. 5888, 2009, p. 226-247 [DOI]
    IACR eprint, Report 2009/146, March 2009. [IACR]
  18. Group Signatures with Verifier-Local Revocation and Backward Unlinkability
    in the Standard Model.

    (with Benoît Libert) International Conference on Cryptology And Network Security, CANS 2009
    (J. A. Garay, A. Miyaji & A. Otsuka eds. eds.)
    Springer, Lect. Notes Comput. Sci. vol. 5888, 2009, p. 498-517 [DOI] [Details]
  19. Fair E-cash: Be Compact, Spend Faster.

    (with Sébastien Canard, Cécile Delerablée, Aline Gouget, Emeline Hufschmitt, Fabien Laguillaumie,
    Hervé Sibert & Jacques Traoré)
    Information Security, 12th International Conference, ISC 2009
    (P. Samaranti, M. Yung, F. Martinelli & C. A. Ardagna eds.)
    Springer, Lect. Notes Comput. Sci. vol. 5735, 2009, p. 294-309 [DOI] [Details]
  20. Adaptive-ID Secure Revocable Identity-Based Encryption.

    (with Benoît Libert) Topics in cryptology - CT-RSA 2009
    (M. Fischlin ed.)
    Springer, Lect. Notes Comput. Sci. vol. 5473, 2009, p. 1-15 [DOI] [Details]
  21. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys.

    (with Benoît Libert) 12th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2009
    (S. Jarecki & G. Tsudik eds.)
    Springer, Lect. Notes Comput. Sci. vol. 5443, 2009, p. 235-255. [DOI] [Details]
  22. Multi-Use Unidirectional Proxy Re-Signatures.

    (with Benoît Libert)2008 ACM Conference on Computer and Communications Security, CCS 2008
    (P. Ning, P. F. Syverson & S. Jha eds.)
    ACM, 2008, p. 511-520. [DOI] [Details]
  23. Tracing Malicious Proxies in Proxy Re-Encryption.

    (with Benoît Libert) 2nd International Conference on Pairing-based Cryptography - Pairing 2008
    (S. Galbraith & K. Paterson eds.)
    Springer, Lect. Notes Comput. Sci. vol. 5209, 2008, p. 332-353. [DOI] [Details]
  24. Separation Results on the "One-More" Computational Problems.

    (with Emmanuel Bresson & Jean Monnerat) Topics in cryptology - CT-RSA 2008
    (T. Malkin ed.)
    Springer, Lect. Notes Comput. Sci. vol. 4964, 2008, p. 71-87. [DOI] [Details]
  25. Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption.

    (with Benoît Libert) 11th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2008
    (R. Cramer ed.)
    Springer, Lect. Notes Comput. Sci. vol. 4939, 2008, p. 360-379. [DOI] [Details]
  26. Trapdoor Permutation Polynomials of Z/nZ and Public Key Cryptosystems.

    (with Guilhem Castagnos) Information Security, 10th International Conference, ISC 2007
    (J. A. Garay, A. K. Lenstra, M. Mambo & R. Peralta, eds.)
    Springer, Lect. Notes Comput. Sci. vol. 4779, 2007, p. 333-350. [DOI]
  27. On the Soundness of Restricted Universal Designated Signatures and Dedicated Signatures.

    (with Fabien Laguillaumie) Information Security, 10th International Conference, ISC 2007
    (J. A. Garay, A. K. Lenstra, M. Mambo & R. Peralta, eds.)
    Springer, Lect. Notes Comput. Sci. vol. 4779, 2007, p. 175-188. [DOI]
  28. On Kabatianskii-Krouk-Smeets Signatures.

    (with Pierre-Louis Cayrel & Ayoub Otmani) International Workshop on the Arithmetic of Finite Fields, WAIFI 2007
    (C. Carlet & B. Sunar, eds.)
    Springer, Lect. Notes Comput. Sci. vol. 4547, 2007, p. 237-251. [DOI]
  29. Gradually Convertible Undeniable Signatures.

    (with Laila El Aimani) Applied Cryptography and Network Security, 5th International Conference, ACNS 2007
    (J. Katz & M. Yung, eds.)
    Springer, Lect. Notes Comput. Sci. vol. 4521, 2007, p. 478-496. [DOI]
  30. New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures.

    33rd International Colloquium on Automata, Languages and Programming, ICALP 2006
    (M. Bugliesi, B. Preneel, V. Sassone & I. Wegener, eds.)
    Springer, Lect. Notes Comput. Sci. vol. 4052, 2006, p. 58-69. [DOI] [Details]
  31. RSA-Based Secret Handshakes.

    International Workshop on Coding and Cryptography, WCC 2005
    (Ø. Ytrehus, ed.)
    Springer, Lect. Notes Comput. Sci. vol. 3969, 2006, p. 252-274. [DOI]
  32. Short Undeniable Signatures Without Random Oracles: the Missing Link.

    (with Fabien Laguillaumie) Progress in Cryptology - Indocrypt 2005
    (S. Maitra, C. E. Veni Madhavan & R. Venkatesan, eds.)
    Springer, Lect. Notes Comput. Sci. vol. 3797, 2005, p. 283-296. [DOI]
  33. Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log.

    (with Pascal Paillier) Advances in Cryptology - Asiacrypt 2005
    (B. Roy, ed.)
    Springer, Lect. Notes Comput. Sci. vol. 3788, 2005, p. 1-20. [DOI]

    (winner of the Best Paper Award)

  34. Universally Convertible Directed Signatures.

    (with Fabien Laguillaumie & Pascal Paillier) Advances in Cryptology - Asiacrypt 2005
    (B. Roy, ed.)
    Springer, Lect. Notes Comput. Sci. vol. 3788, 2005, p. 682-701. [DOI]
  35. Time-Selective Convertible Undeniable Signatures.

    (with Fabien Laguillaumie) Topics in cryptology - CT-RSA 2005
    (A. Menezes, ed)
    Springer Lect. Notes Comput. Sci. vol. 3376, 2005, p. 154-171. [DOI]
  36. Designated Verifiers Signature: Anonymity and Efficient Construction from any Bilinear Map.

    (with Fabien Laguillaumie) Fourth International Conference, SCN 2004
    (C. Blundo & S. Cimato, eds)
    Springer Lect. Notes Comput. Sci. vol. 3352, 2005, p. 107-121. [DOI]
  37. Multi-Designated Verifiers Signature Schemes.

    (with Fabien Laguillaumie) Sixth International Conference, ICICS 2004
    (J. Lopez, S. Qing & E. Okamoto, eds.)
    Springer Lect. Notes Comput. Sci. vol. 3269, 2004, p. 495-507. [DOI]
top

Submitted

  1. Analysis and Improvement of Lindell's UC-Secure Commitment Schemes

    (with Olivier Blazy, Céline Chevalier & David Pointcheval) IACR eprint, Report 2013/123, March 2013. [IACR]
  2. New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange

    (with Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier & David Pointcheval) IACR eprint, Report 2013/034, February 2013. [IACR]
  3. Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security.

    (with Brett Hemenway, Benoit Libert & Rafail Ostrovsky) Preliminary version in Asiacrypt 2011
    IACR eprint, Report 2009/088, November 2009. [IACR]
top