Books

  1. Exercices et problèmes de cryptographie

    (Textbook in french - Foreword by Jacques Stern) Dunod, Paris, Sciences Sup, 2012.
    ISBN: 978-2-10-057340-0.
    (book page - in french)
top

Books edited

  1. Progress in Cryptology - Africacrypt 2014 - 7th International Conference on Cryptology in Africa

    (with David Pointcheval) Marrakesh, Morocco, May 28-30, 2014, Proceedings.
    Springer, Lect. Notes Comput. Sci. vol. 8469, 2014. [DOI].
    ISBN: 978-3-319-06733-9.

  2. Applied Cryptography and Network Security, 7th International Conference, ACNS '09

    (with Michel Abdalla, Pierre-Alain Fouque and David Pointcheval) Paris-Rocquencourt, France, June 2-5, 2009, Proceedings.
    Springer, Lect. Notes Comput. Sci. vol. 5536, 2009. [DOI].
    ISBN: 978-3-642-01956-2.

top

International journals

  1. Polynomial Interpolation of the Generalized Diffie-Hellman and Naor-Reingold Functions

    (with Thierry Mefenza) Designs, Codes and Cryptography
    to appear
  2. Comment on "Attribute-Based Signatures for Supporting Anonymous Certification" by N. Kaaniche and M. Laurent (ESORICS 2016)

    The Computer Journal, Volume 60, Issue 12, 1801-1808 (2017) [DOI]
  3. Security of Even--Mansour Ciphers under Key-Dependent Messages

    (with Pooya Farshim & Louiza Khati) IACR Transactions on Symmetric Cryptology (and FSE 2018)
    Volume 2017, Issue 2, 84-104 (2017) [DOI]
  4. Polynomial Interpolation of the Naor-Reingold Pseudo-Random Function

    (with Thierry Mefenza) Applicable Algebra in Engineering, Communication and Computing
    Volume 28, Issue 3, 237-255 (2017) [DOI]
  5. Comment on "A strong provably secure IBE scheme without bilinear map" by M. Zheng, Y. Xiang and H. Zhou [J. Comput. Syst. Sci. 81 (2015) 125-131]

    Journal of Computer and System Sciences Volume 82, Issue 5, 756-757 (2016) [DOI]
  6. Short Blind Signatures

    (with Olivier Blazy, Georg Fuchsbauer & David Pointcheval) Journal of Computer Security Volume 21, Issue 5, 627-661 (2013) [DOI]
    Preliminary version in PKC'11 and SCN'12.
  7. Towards Practical Black-Box Accountable Authority IBE: Weak Black-Box Traceability with Short Ciphertexts and Private Keys.

    (with Benoît Libert) IEEE Transactions on Information Theory Volume 57, Issue 10, 7189-7204 (2011) [DOI]
    Preliminary version in PKC'09.
  8. Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption.

    (with Benoît Libert) IEEE Transactions on Information Theory Volume 57, Issue 3, 1786-1802 (2011) [DOI] [Details]
    Preliminary version in PKC'08.
  9. Time-Selective Convertible Undeniable Signatures with Short Conversion Receipts.

    (with Fabien Laguillaumie) Information Sciences Volume 180, Issue 12, 2458-2475 (2010) [DOI]
    Preliminary version in RSA'05.
  10. New Extensions of Pairing-based Signatures into Universal (Multi) Designated Verifier Signatures.

    International Journal of Foundations of Computer Science Volume 20, Issue 1, 109-133 (2009) [DOI] [Details]
    Preliminary version in ICALP'06.
  11. Multi-Designated Verifiers Signatures: Anonymity without Encryption.

    (with Fabien Laguillaumie) Information Processing Letters Volume 102, Issues 2-3, 127-132 (2007) [DOI]
  12. Universal Forgery on Sekhar's Signature Scheme with Message Recovery.

    (with Fabien Laguillaumie & Jacques Traoré) International Journal of Computer Mathematics Volume 81, Issue 12, 1493-1495 (2004) [DOI]
top

International conferences

  1. Lattice Attacks on Pairing-Based Signatures

    (with Thierry Mefenza) Cryptography and Coding, 16th IMA International Conference
    (M. O'Neill ed.)
    Springer, Lect. Notes Comput. Sci., to appear, 2017,
  2. Lattice Attacks against Elliptic-Curve Signatures with Blinded Scalar Multiplication

    (with Dahmun Goudarzi & Matthieu Rivain) Selected Areas in Cryptography - SAC 2016
    (Roberto Avanzi & Howard Heys, eds.)
    Springer, Lect. Notes Comput. Sci., vol. 10532, 2017, p. 120-139 [DOI]
  3. Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures

    (with Dahmun Goudarzi, Matthieu Rivain & Srinivas Vivek) Cryptographic Hardware and Embedded Systems, CHES 2017
    (Wieland Fischer & Naofumi Homma, eds)
    Springer, Lect. Notes Comput. Sci., vol. 10529, 2017, p. 154-171 [DOI]
  4. Reusing Nonces in Schnorr Signatures

    (with Marc Beunardeau, Aisling Connolly, Remi Geraud & David Naccache) Computer Security - ESORICS 2017
    (Simon N. Foley, Dieter Gollmann & Einar Snekkenes, eds)
    Springer, Lect. Notes Comput. Sci., vol. 10492, 2017, p. 224-241 [DOI]
  5. Private Multiplication over Finite Fields

    (with Sonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, & Adrian Thillard) Advances in Cryptology - Crypto 2017
    (Jonathan Katz & Hovav Shacham, eds.)
    Springer, Lect. Notes Comput. Sci., vol. 10403, 2017, p. 397-426 [DOI]
  6. Full Disk Encryption: Bridging Theory and Practice.

    (with Louiza Khati & Nicky Mouha) Topics in cryptology - CT-RSA 2017
    (Helena Handschuh, ed.)
    Springer, Lect. Notes Comput. Sci., vol. 10159, 2017, p. 241-257 [DOI]
  7. Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions

    (with Céline Chevalier & Fabien Laguillaumie) Computer Security - ESORICS 2016
    (Sokratis Katsikas & Catherine Meadows, eds.)
    Springer, Lect. Notes Comput. Sci., vol. 9878, 2016, p. 261-278 [DOI]
  8. Distribution and Polynomial Interpolation of the Dodis-Yampolskiy Pseudo-Random Function

    (with Thierry Mefenza) Arithmetic of Finite Fields - WAIFI 2016
    (Sylvain Duquesne & Svetla Nikova eds.)
    Springer, Lect. Notes Comput. Sci., vol. 10064, 2016, p. 125-140 [DOI]
  9. Randomness Complexity of Private Circuits for Multiplication

    (with Sonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, & Adrian Thillard) Advances in Cryptology - Eurocrypt 2016
    (Jean-Sébastien Coron & Marc Fischlin, eds.)
    Springer, Lect. Notes Comput. Sci., vol. 9666, 2016, p. 616-648 [DOI]
  10. Easing Coppersmith Methods using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness

    (with Fabrice Benhamouda, Céline Chevalier & Adrian Thillard) 19th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2016
    (Chen-Mou Cheng, Kai-Min Chung, Giuseppe Persiano & Bo-Yin Yang, eds.)
    Springer, Lect. Notes Comput. Sci., vol. 9615, 2016, p. 36-66 [DOI].
  11. Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions

    (with Olivier Blazy & Céline Chevalier) Topics in cryptology - CT-RSA 2016
    (Kazue Sako, ed.)
    Springer, Lect. Notes Comput. Sci., vol. 9610, 2016, p. 3-18 [DOI]
  12. Practical Key Recovery for Discrete-Logarithm Based Authentication Schemes from Random Nonce Bits.

    (with Aurélie Bauer) Cryptographic Hardware and Embedded Systems, CHES 2015
    (Tim Güneysu & Helena Handschuh eds.)
    Springer, Lect. Notes Comput. Sci., vol. 9293, 2015, p. 287-306 [DOI]
  13. Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks.

    (with Michel Abdalla, Sonia Belaid, David Pointcheval, Sylvain Ruhault) Applied Cryptography and Network Security, 13th International Conference, ACNS 2015
    (T. Malkin, V. Kolesnikov, A. Bishop Lewko & M. Polychronakis eds.)
    Springer, Lect. Notes Comput. Sci., vol. 9092, 2015, p. 635-654 [DOI]
  14. Non-Interactive Zero-Knowledge Proofs of Non-Membership

    (with Olivier Blazy & Céline Chevalier) Topics in cryptology - CT-RSA 2015
    (K. Nyberg ed.)
    Springer, Lect. Notes Comput. Sci., vol. 9048, 2015, p. 145-164 [DOI]
  15. Algorithms for Outsourcing Pairing Computation

    (with Aurore Guillevic) Smart Card Research and Advanced Applications - 13th International Conference, CARDIS 2014
    (M. Joye & A. Moradi ed.)
    Springer, Lect. Notes Comput. Sci., vol. 8968, 2015, p. 193-211 [DOI]
  16. Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust

    (with Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault & Daniel Wichs) 2013 ACM Conference on Computer and Communications Security, CCS 2013
    (A.-R. Sadeghi, V. D. Gligor & M. Yung eds.)
    ACM, 2013, p.647-658 [IACR] [DOI]
  17. New Techniques for SPHFs and Efficient One-Round PAKE Protocols

    (with Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier & David Pointcheval) Advances in Cryptology - Crypto 2013
    (R. Canetti & J. Garay eds.)
    Springer, Lect. Notes Comput. Sci., vol. 8042, 2013, p. 449-475 [DOI]
  18. Analysis and Improvement of Lindell's UC-Secure Commitment Schemes

    (with Olivier Blazy, Céline Chevalier & David Pointcheval) Applied Cryptography and Network Security, 11th International Conference, ACNS 2013
    (R. Safavi-Naini & M. Locasto eds.)
    Springer, Lect. Notes Comput. Sci., vol. 7954, 2013, p. 534-551 [DOI]
  19. Time/Memory/Data Tradeoffs for Variants of the RSA Problem

    (with Pierre-Alain Fouque & Jean-Christophe Zapalowicz) 19th Annual International Computing and Combinatorics Conference, COCOON 2013
    (D. Du & G. Zhang eds.)
    Springer, Lect. Notes Comput. Sci., vol. 7936, 2013, p. 651-662 [DOI]
  20. Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages

    (with Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier & David Pointcheval) 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013
    (K. Kurosawa & G. Hanaoka eds.)
    Springer, Lect. Notes Comput. Sci., vol. 7778, 2013, p. 272-291 [DOI]
  21. Compact Round-Optimal Partially-Blind Signatures

    (with Olivier Blazy & David Pointcheval) 8th Conference on Security and Cryptography for Networks, SCN 2012
    (I. Visconti & R. de Prisco eds.)
    Springer, Lect. Notes Comput. Sci., vol. 7495, 2012, p. 95-112 [DOI]
  22. Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions

    (with Aurore Guillevic) Pairing-Based Cryptography - Pairing 2012 - 5th International Conference
    (M. Abdalla & T. Lange eds.)
    Springer, Lect. Notes Comput. Sci., vol. 7708, 2013, p.234-253 [DOI]
  23. Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods

    (with Aurélie Bauer & Jean-Christophe Zapalowicz) 15th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2012
    (M. Fischlin, J. Buchman & M. Manulis eds.)
    Springer, Lect. Notes Comput. Sci., vol. 7293, 2012, p. 609-626 [DOI]
  24. Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions

    (with Olivier Blazy & David Pointcheval) 9th Theory of Cryptography Conference, TCC 2012
    (R. Cramer, ed.)
    Springer, Lect. Notes Comput. Sci., vol. 7194, 2012, p. 94-111 [DOI]
  25. Block-wise P-Signatures and Non-Interactive Anonymous Credentials with Efficient Attributes

    (with Malika Izabachène & Benoit Libert) Cryptography and Coding, 13th IMA International Conference
    (L. Chen ed.)
    Springer, Lect. Notes Comput. Sci., vol. 7089, 2011, p. 431-450 [DOI]
  26. Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security.

    (with Brett Hemenway, Benoit Libert & Rafail Ostrovsky) Advances in Cryptology - Asiacrypt 2011
    (D. H. Lee & H. Wang eds.)
    Springer, Lect. Notes Comput. Sci., vol. 7073, 2011, p. 70-88 [DOI]
    IACR eprint, Report 2009/088, November 2009. [IACR]
  27. Efficient and Secure Generalized Pattern Matching via Fast Fourier Transform.

    Progress in Cryptology - Africacrypt 2011
    (A. Nitaj & D. Pointcheval eds.)
    Springer, Lect. Notes Comput. Sci., vol. 6737, 2011, p. 41-58 [DOI]
  28. Signatures on Randomizable Ciphertexts.

    (with Olivier Blazy, Georg Fuchsbauer & David Pointcheval) 14th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2011
    (D. Catalano, N. Fazio, R. Gennaro & A. Nicolosi eds.)
    Springer, Lect. Notes Comput. Sci., vol. 6571, 2011, p. 403-422 [DOI]
  29. Mediated Traceable Anonymous Encryption.

    (with Malika Izabachène & David Pointcheval) First International Conference on Cryptology and Information Security in Latin America, Latincrypt'2010
    (M. Abdalla & P. S. L. M. Barreto eds.)
    Springer, Lect. Notes Comput. Sci. vol. 6212, 2010, p. 40-60 [DOI]
  30. Huff’s Model for Elliptic Curves.

    (with Marc Joye & Mehdi Tibouchi) Algorithmic Number Theory, 9th International Symposium, ANTS-IX
    (G. Hanrot, F. Morain & E. Thomé eds.)
    Springer, Lect. Notes Comput. Sci. vol. 6197, 2010, p. 234-250 [DOI]
    IACR eprint, Report 2010/383, July 2010. [IACR]
  31. On The Broadcast and Validity-Checking Security of PKCS #1 v1.5 Encryption.

    (with Aurélie Bauer, Jean-Sébastien Coron, David Naccache & Mehdi Tibouchi) Applied Cryptography and Network Security, 8th International Conference, ACNS 2010
    (J. Zhou & M. Yung eds.)
    Springer, Lect. Notes Comput. Sci. vol. 6123, 2010, p. 1-18 [DOI]
    IACR eprint, Report 2010/135, March 2010. [IACR]

    (Mehdi Tibouchi received the Best Student Paper Award)

  32. Batch Groth-Sahai.

    (with Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert & Hervé Sibert) Applied Cryptography and Network Security, 8th International Conference, ACNS 2010
    (J. Zhou & M. Yung eds.)
    Springer, Lect. Notes Comput. Sci. vol. 6123, 2010, p. 218-235 [DOI]
    IACR eprint, Report 2010/040, January 2010. [IACR]
  33. Fair Blind Signatures without Random Oracles.

    (with Georg Fuchsbauer) Progress in Cryptology - Africacrypt 2010
    (D. Bernstein & T. Lange eds.)
    Springer, Lect. Notes Comput. Sci. vol. 6055, 2010, p. 16-33 [DOI]
    IACR eprint, Report 2010/101, March 2010. [IACR]
  34. Provably Secure Code-Based Threshold Ring Signatures.

    (with Léonard Dallot) Cryptography and Coding, 12th IMA International Conference
    (M. G. Parker ed.)
    Springer, Lect. Notes Comput. Sci. vol. 5921, 2009, p. 222-235 [DOI]
  35. Transferable Constant-Size Fair E-Cash.

    (with Georg Fuchsbauer & David Pointcheval) International Conference on Cryptology And Network Security, CANS 2009
    (J. A. Garay & A. Miyaji eds.)
    Springer, Lect. Notes Comput. Sci. vol. 5888, 2009, p. 226-247 [DOI]
    IACR eprint, Report 2009/146, March 2009. [IACR]
  36. Group Signatures with Verifier-Local Revocation and Backward Unlinkability
    in the Standard Model.

    (with Benoît Libert) International Conference on Cryptology And Network Security, CANS 2009
    (J. A. Garay, A. Miyaji & A. Otsuka eds. eds.)
    Springer, Lect. Notes Comput. Sci. vol. 5888, 2009, p. 498-517 [DOI] [Details]
  37. Fair E-cash: Be Compact, Spend Faster.

    (with Sébastien Canard, Cécile Delerablée, Aline Gouget, Emeline Hufschmitt, Fabien Laguillaumie,
    Hervé Sibert & Jacques Traoré)
    Information Security, 12th International Conference, ISC 2009
    (P. Samaranti, M. Yung, F. Martinelli & C. A. Ardagna eds.)
    Springer, Lect. Notes Comput. Sci. vol. 5735, 2009, p. 294-309 [DOI] [Details]
  38. Adaptive-ID Secure Revocable Identity-Based Encryption.

    (with Benoît Libert) Topics in cryptology - CT-RSA 2009
    (M. Fischlin ed.)
    Springer, Lect. Notes Comput. Sci. vol. 5473, 2009, p. 1-15 [DOI] [Details]
  39. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys.

    (with Benoît Libert) 12th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2009
    (S. Jarecki & G. Tsudik eds.)
    Springer, Lect. Notes Comput. Sci. vol. 5443, 2009, p. 235-255. [DOI] [Details]
  40. Multi-Use Unidirectional Proxy Re-Signatures.

    (with Benoît Libert)2008 ACM Conference on Computer and Communications Security, CCS 2008
    (P. Ning, P. F. Syverson & S. Jha eds.)
    ACM, 2008, p. 511-520. [DOI] [Details]
  41. Tracing Malicious Proxies in Proxy Re-Encryption.

    (with Benoît Libert) 2nd International Conference on Pairing-based Cryptography - Pairing 2008
    (S. Galbraith & K. Paterson eds.)
    Springer, Lect. Notes Comput. Sci. vol. 5209, 2008, p. 332-353. [DOI] [Details]
  42. Separation Results on the "One-More" Computational Problems.

    (with Emmanuel Bresson & Jean Monnerat) Topics in cryptology - CT-RSA 2008
    (T. Malkin ed.)
    Springer, Lect. Notes Comput. Sci. vol. 4964, 2008, p. 71-87. [DOI] [Details]
  43. Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption.

    (with Benoît Libert) 11th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2008
    (R. Cramer ed.)
    Springer, Lect. Notes Comput. Sci. vol. 4939, 2008, p. 360-379. [DOI] [Details]
  44. Trapdoor Permutation Polynomials of Z/nZ and Public Key Cryptosystems.

    (with Guilhem Castagnos) Information Security, 10th International Conference, ISC 2007
    (J. A. Garay, A. K. Lenstra, M. Mambo & R. Peralta, eds.)
    Springer, Lect. Notes Comput. Sci. vol. 4779, 2007, p. 333-350. [DOI]
  45. On the Soundness of Restricted Universal Designated Signatures and Dedicated Signatures.

    (with Fabien Laguillaumie) Information Security, 10th International Conference, ISC 2007
    (J. A. Garay, A. K. Lenstra, M. Mambo & R. Peralta, eds.)
    Springer, Lect. Notes Comput. Sci. vol. 4779, 2007, p. 175-188. [DOI]
  46. On Kabatianskii-Krouk-Smeets Signatures.

    (with Pierre-Louis Cayrel & Ayoub Otmani) International Workshop on the Arithmetic of Finite Fields, WAIFI 2007
    (C. Carlet & B. Sunar, eds.)
    Springer, Lect. Notes Comput. Sci. vol. 4547, 2007, p. 237-251. [DOI]
  47. Gradually Convertible Undeniable Signatures.

    (with Laila El Aimani) Applied Cryptography and Network Security, 5th International Conference, ACNS 2007
    (J. Katz & M. Yung, eds.)
    Springer, Lect. Notes Comput. Sci. vol. 4521, 2007, p. 478-496. [DOI]
  48. New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures.

    33rd International Colloquium on Automata, Languages and Programming, ICALP 2006
    (M. Bugliesi, B. Preneel, V. Sassone & I. Wegener, eds.)
    Springer, Lect. Notes Comput. Sci. vol. 4052, 2006, p. 58-69. [DOI] [Details]
  49. RSA-Based Secret Handshakes.

    International Workshop on Coding and Cryptography, WCC 2005
    (Ø. Ytrehus, ed.)
    Springer, Lect. Notes Comput. Sci. vol. 3969, 2006, p. 252-274. [DOI]
  50. Short Undeniable Signatures Without Random Oracles: the Missing Link.

    (with Fabien Laguillaumie) Progress in Cryptology - Indocrypt 2005
    (S. Maitra, C. E. Veni Madhavan & R. Venkatesan, eds.)
    Springer, Lect. Notes Comput. Sci. vol. 3797, 2005, p. 283-296. [DOI]
  51. Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log.

    (with Pascal Paillier) Advances in Cryptology - Asiacrypt 2005
    (B. Roy, ed.)
    Springer, Lect. Notes Comput. Sci. vol. 3788, 2005, p. 1-20. [DOI]

    (winner of the Best Paper Award)

  52. Universally Convertible Directed Signatures.

    (with Fabien Laguillaumie & Pascal Paillier) Advances in Cryptology - Asiacrypt 2005
    (B. Roy, ed.)
    Springer, Lect. Notes Comput. Sci. vol. 3788, 2005, p. 682-701. [DOI]
  53. Time-Selective Convertible Undeniable Signatures.

    (with Fabien Laguillaumie) Topics in cryptology - CT-RSA 2005
    (A. Menezes, ed)
    Springer Lect. Notes Comput. Sci. vol. 3376, 2005, p. 154-171. [DOI]
  54. Designated Verifiers Signature: Anonymity and Efficient Construction from any Bilinear Map.

    (with Fabien Laguillaumie) Fourth International Conference, SCN 2004
    (C. Blundo & S. Cimato, eds)
    Springer Lect. Notes Comput. Sci. vol. 3352, 2005, p. 107-121. [DOI]
  55. Multi-Designated Verifiers Signature Schemes.

    (with Fabien Laguillaumie) Sixth International Conference, ICICS 2004
    (J. Lopez, S. Qing & E. Okamoto, eds.)
    Springer Lect. Notes Comput. Sci. vol. 3269, 2004, p. 495-507. [DOI]
top