Books
-
Exercices et problèmes de cryptographie
(Textbook in french - Foreword by Jacques Stern)
Dunod, Paris, Sciences Sup, 2012.
ISBN:
978-2-10-057340-0.
(book page - in french)
top
Books edited
-
Progress in Cryptology - Africacrypt 2014 - 7th International
Conference on Cryptology in Africa
(with David Pointcheval)
Marrakesh, Morocco, May 28-30, 2014, Proceedings.
Springer, Lect. Notes Comput. Sci. vol. 8469, 2014. [DOI].
ISBN: 978-3-319-06733-9.
-
Applied Cryptography and Network Security, 7th International Conference, ACNS '09
(with Michel Abdalla, Pierre-Alain Fouque and David Pointcheval)
Paris-Rocquencourt, France, June 2-5, 2009, Proceedings.
Springer, Lect. Notes Comput. Sci. vol. 5536, 2009. [DOI].
ISBN: 978-3-642-01956-2.
top
International journals
-
Polynomial Interpolation of the Generalized Diffie-Hellman and
Naor-Reingold Functions
(with Thierry Mefenza)
Designs, Codes and Cryptography
to appear
-
Comment on "Attribute-Based Signatures for Supporting Anonymous
Certification" by N. Kaaniche and M. Laurent
(ESORICS 2016)
The Computer Journal,
Volume 60, Issue 12, 1801-1808 (2017) [DOI]
-
Security of Even--Mansour Ciphers under Key-Dependent
Messages
(with Pooya Farshim & Louiza Khati)
IACR Transactions on Symmetric Cryptology (and FSE
2018)
Volume 2017, Issue 2, 84-104 (2017) [DOI]
-
Polynomial Interpolation of the Naor-Reingold Pseudo-Random Function
(with Thierry Mefenza)
Applicable Algebra in Engineering, Communication and
Computing
Volume 28, Issue 3, 237-255 (2017)
[DOI]
-
Comment on "A strong provably secure IBE scheme without bilinear map"
by M. Zheng, Y. Xiang and H. Zhou [J. Comput. Syst. Sci. 81 (2015)
125-131]
Journal of Computer and System Sciences
Volume 82, Issue 5, 756-757 (2016) [DOI]
-
Short Blind Signatures
(with Olivier Blazy, Georg Fuchsbauer & David Pointcheval)
Journal of Computer Security
Volume 21, Issue 5, 627-661 (2013) [DOI]
Preliminary version in PKC'11 and SCN'12.
-
Towards Practical Black-Box Accountable Authority IBE: Weak Black-Box Traceability with Short Ciphertexts and Private Keys.
(with Benoît Libert)
IEEE Transactions on Information Theory
Volume 57, Issue 10, 7189-7204 (2011) [DOI]
Preliminary version in PKC'09.
-
Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption.
(with Benoît Libert)
IEEE Transactions on Information Theory
Volume 57, Issue 3, 1786-1802 (2011) [DOI] [Details]
Preliminary version in PKC'08.
-
Time-Selective Convertible Undeniable Signatures with Short Conversion Receipts.
(with Fabien Laguillaumie)
Information Sciences
Volume 180, Issue 12, 2458-2475 (2010) [DOI]
Preliminary version in RSA'05.
-
New Extensions of Pairing-based Signatures into Universal (Multi) Designated Verifier Signatures.
International Journal of Foundations of Computer Science
Volume 20, Issue 1, 109-133 (2009) [DOI] [Details]
Preliminary version in ICALP'06.
-
Multi-Designated Verifiers Signatures: Anonymity without Encryption.
(with Fabien Laguillaumie)
Information Processing Letters
Volume 102, Issues 2-3, 127-132 (2007) [DOI]
-
Universal Forgery on Sekhar's Signature Scheme with Message Recovery.
(with Fabien Laguillaumie & Jacques Traoré)
International Journal of Computer Mathematics
Volume 81, Issue 12, 1493-1495 (2004) [DOI]
top
International conferences
-
Lattice Attacks on Pairing-Based Signatures
(with Thierry Mefenza)
Cryptography and Coding, 16th IMA International Conference
(M. O'Neill ed.)
Springer, Lect. Notes Comput. Sci., to appear, 2017,
-
Lattice Attacks against Elliptic-Curve Signatures with Blinded Scalar Multiplication
(with Dahmun Goudarzi & Matthieu Rivain)
Selected Areas in Cryptography - SAC 2016
(Roberto Avanzi & Howard Heys, eds.)
Springer, Lect. Notes Comput. Sci., vol. 10532, 2017,
p. 120-139 [DOI]
-
Generalized Polynomial Decomposition for S-boxes with Application
to Side-Channel Countermeasures
(with Dahmun Goudarzi, Matthieu Rivain &
Srinivas Vivek)
Cryptographic Hardware and Embedded Systems, CHES
2017
(Wieland Fischer & Naofumi Homma, eds)
Springer, Lect. Notes Comput. Sci., vol. 10529,
2017, p. 154-171 [DOI]
-
Reusing Nonces in Schnorr Signatures
(with Marc Beunardeau, Aisling Connolly, Remi
Geraud & David Naccache)
Computer Security - ESORICS 2017
(Simon N. Foley, Dieter Gollmann & Einar Snekkenes, eds)
Springer, Lect. Notes Comput. Sci., vol. 10492, 2017, p. 224-241
[DOI]
-
Private Multiplication over Finite Fields
(with Sonia Belaïd, Fabrice Benhamouda, Alain
Passelègue, Emmanuel Prouff, & Adrian Thillard)
Advances in Cryptology - Crypto 2017
(Jonathan Katz & Hovav Shacham, eds.)
Springer, Lect. Notes Comput. Sci., vol. 10403, 2017,
p. 397-426 [DOI]
-
Full Disk Encryption: Bridging Theory and Practice.
(with Louiza Khati & Nicky Mouha)
Topics in cryptology - CT-RSA 2017
(Helena Handschuh, ed.)
Springer, Lect. Notes Comput. Sci., vol. 10159, 2017,
p. 241-257 [DOI]
-
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis
and Optimal Constructions
(with Céline Chevalier & Fabien Laguillaumie)
Computer Security - ESORICS 2016
(Sokratis Katsikas & Catherine Meadows, eds.)
Springer, Lect. Notes Comput. Sci., vol. 9878, 2016,
p. 261-278
[DOI]
-
Distribution and Polynomial Interpolation of the Dodis-Yampolskiy
Pseudo-Random Function
(with Thierry Mefenza)
Arithmetic of Finite Fields - WAIFI 2016
(Sylvain Duquesne & Svetla Nikova eds.)
Springer, Lect. Notes Comput. Sci., vol. 10064, 2016,
p. 125-140 [DOI]
-
Randomness Complexity of Private Circuits for Multiplication
(with Sonia Belaïd, Fabrice Benhamouda, Alain
Passelègue, Emmanuel Prouff, & Adrian Thillard)
Advances in Cryptology - Eurocrypt 2016
(Jean-Sébastien Coron & Marc Fischlin, eds.)
Springer, Lect. Notes Comput. Sci., vol. 9666, 2016, p. 616-648
[DOI]
-
Easing Coppersmith Methods using Analytic Combinatorics: Applications
to Public-Key Cryptography with Weak Pseudorandomness
(with Fabrice Benhamouda, Céline Chevalier &
Adrian Thillard)
19th International Conference on Practice and Theory in
Public-Key Cryptography, PKC 2016
(Chen-Mou Cheng, Kai-Min Chung, Giuseppe Persiano & Bo-Yin Yang, eds.)
Springer, Lect. Notes Comput. Sci., vol. 9615, 2016,
p. 36-66 [DOI].
-
Mitigating Server Breaches in Password-Based Authentication:
Secure and Efficient Solutions
(with Olivier Blazy & Céline Chevalier)
Topics in cryptology - CT-RSA 2016
(Kazue Sako, ed.)
Springer, Lect. Notes Comput. Sci., vol. 9610, 2016,
p. 3-18 [DOI]
-
Practical Key Recovery for Discrete-Logarithm Based Authentication
Schemes from Random Nonce Bits.
(with Aurélie Bauer)
Cryptographic Hardware and Embedded Systems, CHES 2015
(Tim Güneysu & Helena Handschuh eds.)
Springer, Lect. Notes Comput. Sci., vol. 9293, 2015, p. 287-306 [DOI]
-
Robust Pseudo-Random Number Generators with Input Secure Against
Side-Channel Attacks.
(with Michel Abdalla, Sonia Belaid, David
Pointcheval, Sylvain Ruhault)
Applied Cryptography and Network Security, 13th
International Conference, ACNS 2015
(T. Malkin, V. Kolesnikov, A. Bishop Lewko &
M. Polychronakis eds.)
Springer, Lect. Notes Comput. Sci., vol. 9092, 2015,
p. 635-654 [DOI]
-
Non-Interactive Zero-Knowledge Proofs of Non-Membership
(with Olivier Blazy & Céline Chevalier)
Topics in cryptology - CT-RSA 2015
(K. Nyberg ed.)
Springer, Lect. Notes Comput. Sci., vol. 9048, 2015, p. 145-164
[DOI]
-
Algorithms for Outsourcing Pairing Computation
(with Aurore Guillevic)
Smart Card Research and Advanced Applications - 13th
International Conference, CARDIS 2014
(M. Joye & A. Moradi ed.)
Springer, Lect. Notes Comput. Sci., vol. 8968, 2015,
p. 193-211 [DOI]
-
Security Analysis of Pseudo-Random Number Generators with Input:
/dev/random is not Robust
(with Yevgeniy Dodis, David Pointcheval, Sylvain
Ruhault & Daniel Wichs)
2013 ACM Conference on Computer and Communications Security, CCS 2013
(A.-R. Sadeghi, V. D. Gligor & M. Yung eds.)
ACM, 2013, p.647-658
[IACR] [DOI]
-
New Techniques for SPHFs and Efficient One-Round PAKE Protocols
(with Fabrice Ben Hamouda, Olivier Blazy,
Céline Chevalier & David Pointcheval)
Advances in Cryptology - Crypto 2013
(R. Canetti & J. Garay eds.)
Springer, Lect. Notes Comput. Sci., vol. 8042, 2013,
p. 449-475 [DOI]
-
Analysis and Improvement of Lindell's UC-Secure Commitment Schemes
(with Olivier Blazy,
Céline Chevalier & David Pointcheval)
Applied Cryptography and Network Security, 11th
International Conference, ACNS 2013
(R. Safavi-Naini & M. Locasto eds.)
Springer, Lect. Notes Comput. Sci., vol. 7954, 2013,
p. 534-551 [DOI]
-
Time/Memory/Data Tradeoffs for Variants of the RSA Problem
(with Pierre-Alain Fouque & Jean-Christophe Zapalowicz)
19th Annual International Computing and Combinatorics Conference, COCOON 2013
(D. Du & G. Zhang eds.)
Springer, Lect. Notes Comput. Sci., vol. 7936,
2013, p. 651-662 [DOI]
-
Efficient UC-Secure Authenticated Key-Exchange
for Algebraic Languages
(with Fabrice Ben Hamouda, Olivier Blazy,
Céline Chevalier & David Pointcheval)
16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013
(K. Kurosawa & G. Hanaoka eds.)
Springer, Lect. Notes Comput. Sci., vol. 7778, 2013,
p. 272-291 [DOI]
-
Compact Round-Optimal Partially-Blind Signatures
(with Olivier Blazy & David Pointcheval)
8th Conference on Security and Cryptography for Networks, SCN 2012
(I. Visconti & R. de Prisco eds.)
Springer, Lect. Notes Comput. Sci., vol. 7495, 2012,
p. 95-112 [DOI]
-
Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order
Evaluation and Pairing-Friendly Constructions
(with Aurore Guillevic)
Pairing-Based Cryptography - Pairing 2012 - 5th
International Conference
(M. Abdalla & T. Lange eds.)
Springer, Lect. Notes Comput. Sci., vol. 7708, 2013,
p.234-253 [DOI]
-
Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods
(with Aurélie Bauer & Jean-Christophe Zapalowicz)
15th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2012
(M. Fischlin, J. Buchman & M. Manulis eds.)
Springer, Lect. Notes Comput. Sci., vol. 7293, 2012,
p. 609-626 [DOI]
-
Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash
Functions
(with Olivier Blazy & David Pointcheval)
9th Theory of Cryptography Conference, TCC 2012
(R. Cramer, ed.)
Springer, Lect. Notes Comput. Sci., vol. 7194, 2012,
p. 94-111 [DOI]
-
Block-wise P-Signatures and Non-Interactive Anonymous Credentials with Efficient Attributes
(with Malika Izabachène & Benoit Libert)
Cryptography and Coding, 13th IMA International Conference
(L. Chen ed.)
Springer, Lect. Notes Comput. Sci., vol. 7089, 2011,
p. 431-450 [DOI]
-
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security.
(with Brett Hemenway, Benoit Libert & Rafail Ostrovsky)
Advances in Cryptology - Asiacrypt 2011
(D. H. Lee & H. Wang eds.)
Springer, Lect. Notes Comput. Sci., vol. 7073, 2011,
p. 70-88 [DOI]
IACR eprint, Report 2009/088, November 2009.
[IACR]
-
Efficient and Secure Generalized Pattern Matching via Fast Fourier Transform.
Progress in Cryptology - Africacrypt 2011
(A. Nitaj & D. Pointcheval eds.)
Springer, Lect. Notes Comput. Sci., vol. 6737, 2011,
p. 41-58 [DOI]
-
Signatures on Randomizable Ciphertexts.
(with Olivier Blazy, Georg Fuchsbauer & David Pointcheval)
14th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2011
(D. Catalano, N. Fazio, R. Gennaro & A. Nicolosi eds.)
Springer, Lect. Notes Comput. Sci., vol. 6571, 2011, p. 403-422
[DOI]
-
Mediated Traceable Anonymous Encryption.
(with Malika Izabachène & David Pointcheval)
First International Conference on Cryptology and Information Security in Latin America, Latincrypt'2010
(M. Abdalla & P. S. L. M. Barreto eds.)
Springer, Lect. Notes Comput. Sci. vol. 6212, 2010, p. 40-60
[DOI]
-
Huff’s Model for Elliptic Curves.
(with Marc Joye & Mehdi Tibouchi)
Algorithmic Number Theory, 9th International Symposium, ANTS-IX
(G. Hanrot, F. Morain & E. Thomé eds.)
Springer, Lect. Notes Comput. Sci. vol. 6197, 2010, p. 234-250
[DOI]
IACR eprint, Report 2010/383, July 2010.
[IACR]
-
On The Broadcast and Validity-Checking Security of PKCS #1 v1.5 Encryption.
(with Aurélie Bauer, Jean-Sébastien Coron, David Naccache & Mehdi Tibouchi)
Applied Cryptography and Network Security, 8th International Conference, ACNS 2010
(J. Zhou & M. Yung eds.)
Springer, Lect. Notes Comput. Sci. vol. 6123, 2010, p. 1-18
[DOI]
IACR eprint, Report 2010/135, March 2010.
[IACR]
(Mehdi Tibouchi received the Best Student Paper Award)
-
Batch Groth-Sahai.
(with Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert & Hervé Sibert)
Applied Cryptography and Network Security, 8th International Conference, ACNS 2010
(J. Zhou & M. Yung eds.)
Springer, Lect. Notes Comput. Sci. vol. 6123, 2010, p. 218-235
[DOI]
IACR eprint, Report 2010/040, January 2010.
[IACR]
-
Fair Blind Signatures without Random Oracles.
(with Georg Fuchsbauer)
Progress in Cryptology - Africacrypt 2010
(D. Bernstein & T. Lange eds.)
Springer, Lect. Notes Comput. Sci. vol. 6055, 2010, p. 16-33
[DOI]
IACR eprint, Report 2010/101, March 2010.
[IACR]
-
Provably Secure Code-Based Threshold Ring Signatures.
(with Léonard Dallot)
Cryptography and Coding, 12th IMA International Conference
(M. G. Parker ed.)
Springer, Lect. Notes Comput. Sci. vol. 5921, 2009, p. 222-235
[DOI]
-
Transferable Constant-Size Fair E-Cash.
(with Georg Fuchsbauer & David Pointcheval)
International Conference on Cryptology And Network Security, CANS 2009
(J. A. Garay & A. Miyaji eds.)
Springer, Lect. Notes Comput. Sci. vol. 5888, 2009, p. 226-247
[DOI]
IACR eprint, Report 2009/146, March 2009.
[IACR]
-
Group Signatures with Verifier-Local Revocation and Backward Unlinkability
in the Standard Model.
(with Benoît Libert)
International Conference on Cryptology And Network Security, CANS 2009
(J. A. Garay, A. Miyaji & A. Otsuka eds. eds.)
Springer, Lect. Notes Comput. Sci. vol. 5888, 2009, p. 498-517
[DOI] [Details]
-
Fair E-cash: Be Compact, Spend Faster.
(with Sébastien Canard, Cécile Delerablée, Aline Gouget, Emeline Hufschmitt, Fabien Laguillaumie,
Hervé Sibert & Jacques Traoré)
Information Security, 12th International Conference, ISC 2009
(P. Samaranti, M. Yung, F. Martinelli & C. A. Ardagna eds.)
Springer, Lect. Notes Comput. Sci. vol. 5735, 2009, p. 294-309
[DOI] [Details]
-
Adaptive-ID Secure Revocable Identity-Based Encryption.
(with Benoît Libert)
Topics in cryptology - CT-RSA 2009
(M. Fischlin ed.)
Springer, Lect. Notes Comput. Sci. vol. 5473, 2009, p. 1-15
[DOI] [Details]
-
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys.
(with Benoît Libert)
12th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2009
(S. Jarecki & G. Tsudik eds.)
Springer, Lect. Notes Comput. Sci. vol. 5443, 2009, p. 235-255.
[DOI] [Details]
-
Multi-Use Unidirectional Proxy Re-Signatures.
(with Benoît Libert)2008 ACM Conference on Computer and Communications Security, CCS 2008
(P. Ning, P. F. Syverson & S. Jha eds.)
ACM, 2008, p. 511-520.
[DOI]
[Details]
-
Tracing Malicious Proxies in Proxy Re-Encryption.
(with Benoît Libert)
2nd International Conference on Pairing-based Cryptography - Pairing 2008
(S. Galbraith & K. Paterson eds.)
Springer, Lect. Notes Comput. Sci. vol. 5209, 2008, p. 332-353.
[DOI]
[Details]
-
Separation Results on the "One-More" Computational Problems.
(with Emmanuel Bresson & Jean Monnerat)
Topics in cryptology - CT-RSA 2008
(T. Malkin ed.)
Springer, Lect. Notes Comput. Sci. vol. 4964, 2008, p. 71-87.
[DOI]
[Details]
-
Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption.
(with Benoît Libert)
11th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2008
(R. Cramer ed.)
Springer, Lect. Notes Comput. Sci. vol. 4939, 2008, p. 360-379.
[DOI]
[Details]
-
Trapdoor Permutation Polynomials of Z/nZ and Public Key Cryptosystems.
(with Guilhem Castagnos)
Information Security, 10th International Conference, ISC 2007
(J. A. Garay, A. K. Lenstra, M. Mambo & R. Peralta, eds.)
Springer, Lect. Notes Comput. Sci. vol. 4779, 2007, p. 333-350.
[DOI]
-
On the Soundness of Restricted Universal Designated Signatures and Dedicated Signatures.
(with Fabien Laguillaumie)
Information Security, 10th International Conference, ISC 2007
(J. A. Garay, A. K. Lenstra, M. Mambo & R. Peralta, eds.)
Springer, Lect. Notes Comput. Sci. vol. 4779, 2007, p. 175-188.
[DOI]
-
On Kabatianskii-Krouk-Smeets Signatures.
(with Pierre-Louis Cayrel & Ayoub Otmani)
International Workshop on the Arithmetic of Finite Fields, WAIFI 2007
(C. Carlet & B. Sunar, eds.)
Springer, Lect. Notes Comput. Sci.
vol. 4547, 2007, p. 237-251. [DOI]
-
Gradually Convertible Undeniable Signatures.
(with Laila El Aimani)
Applied Cryptography and Network Security, 5th International Conference, ACNS 2007
(J. Katz & M. Yung, eds.)
Springer, Lect. Notes Comput. Sci. vol. 4521, 2007, p. 478-496. [DOI]
-
New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures.
33rd International Colloquium on
Automata, Languages and Programming, ICALP 2006
(M. Bugliesi, B. Preneel, V. Sassone & I. Wegener, eds.)
Springer, Lect. Notes Comput. Sci. vol. 4052, 2006, p. 58-69. [DOI] [Details]
-
RSA-Based Secret Handshakes.
International Workshop on Coding and Cryptography, WCC 2005
(Ø. Ytrehus, ed.)
Springer, Lect. Notes Comput. Sci.
vol. 3969, 2006, p. 252-274. [DOI]
-
Short Undeniable Signatures Without Random Oracles: the Missing Link.
(with Fabien Laguillaumie)
Progress in Cryptology - Indocrypt 2005
(S. Maitra, C. E. Veni Madhavan & R. Venkatesan, eds.)
Springer, Lect. Notes Comput. Sci.
vol. 3797, 2005, p. 283-296.
[DOI]
-
Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log.
(with Pascal Paillier)
Advances in Cryptology - Asiacrypt 2005
(B. Roy, ed.)
Springer, Lect. Notes Comput. Sci. vol. 3788, 2005, p. 1-20.
[DOI]
(winner of the Best Paper Award)
-
Universally Convertible Directed Signatures.
(with Fabien Laguillaumie & Pascal Paillier)
Advances in Cryptology - Asiacrypt 2005
(B. Roy, ed.)
Springer, Lect. Notes Comput. Sci. vol. 3788, 2005, p. 682-701.
[DOI]
-
Time-Selective Convertible Undeniable Signatures.
(with Fabien Laguillaumie)
Topics in cryptology - CT-RSA 2005
(A. Menezes, ed)
Springer Lect. Notes Comput. Sci. vol. 3376, 2005, p. 154-171.
[DOI]
-
Designated Verifiers Signature: Anonymity and Efficient Construction from any Bilinear Map.
(with Fabien Laguillaumie)
Fourth International Conference, SCN 2004
(C. Blundo & S. Cimato, eds)
Springer Lect. Notes
Comput. Sci. vol. 3352, 2005, p. 107-121.
[DOI]
-
Multi-Designated Verifiers Signature Schemes.
(with Fabien Laguillaumie)
Sixth International Conference, ICICS 2004
(J. Lopez, S. Qing & E. Okamoto, eds.)
Springer Lect. Notes
Comput. Sci. vol. 3269, 2004, p. 495-507.
[DOI]
top