Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: David Pointcheval
@article{DBLP:journals/iacr/DelerableeGP24, author = {C{\'{e}}cile Delerabl{\'{e}}e and L{\'{e}}na{\"{\i}}ck Gouriou and David Pointcheval}, title = {Attribute-Based Signatures with Advanced Delegation, and Tracing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {328}, year = {2024}, url = {https://eprint.iacr.org/2024/328}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DelerableeGP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Pointcheval23, author = {David Pointcheval}, title = {Technical Perspective: What Does Provable Security Mean for Cryptographic Schemes?}, journal = {Commun. {ACM}}, volume = {66}, number = {6}, pages = {106}, year = {2023}, url = {https://doi.org/10.1145/3592836}, doi = {10.1145/3592836}, timestamp = {Tue, 18 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/Pointcheval23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/HebantP23, author = {Chlo{\'{e}} H{\'{e}}bant and David Pointcheval}, title = {Traceable constant-size multi-authority credentials}, journal = {Inf. Comput.}, volume = {293}, pages = {105060}, year = {2023}, url = {https://doi.org/10.1016/j.ic.2023.105060}, doi = {10.1016/J.IC.2023.105060}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/HebantP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/PointchevalS23, author = {David Pointcheval and Nigel P. Smart}, title = {Topical Collection on Computing on Encrypted Data}, journal = {J. Cryptol.}, volume = {36}, number = {2}, pages = {4}, year = {2023}, url = {https://doi.org/10.1007/s00145-023-09444-8}, doi = {10.1007/S00145-023-09444-8}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/PointchevalS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NguyenPP23, author = {Ky Nguyen and Duong Hieu Phan and David Pointcheval}, editor = {Mehdi Tibouchi and Xiaofeng Wang}, title = {Optimal Security Notion for Decentralized Multi-Client Functional Encryption}, booktitle = {Applied Cryptography and Network Security - 21st International Conference, {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13906}, pages = {336--365}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-33491-7\_13}, doi = {10.1007/978-3-031-33491-7\_13}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/NguyenPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BeguinetCPRR23, author = {Hugo Beguinet and C{\'{e}}line Chevalier and David Pointcheval and Thomas Ricosset and M{\'{e}}lissa Rossi}, editor = {Mehdi Tibouchi and Xiaofeng Wang}, title = {GeT a {CAKE:} Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges}, booktitle = {Applied Cryptography and Network Security - 21st International Conference, {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13906}, pages = {516--538}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-33491-7\_19}, doi = {10.1007/978-3-031-33491-7\_19}, timestamp = {Wed, 31 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BeguinetCPRR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/NguyenPP23, author = {Dinh Duy Nguyen and Duong Hieu Phan and David Pointcheval}, editor = {Jian Guo and Ron Steinfeld}, title = {Verifiable Decentralized Multi-client Functional Encryption for Inner Product}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14442}, pages = {33--65}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8733-7\_2}, doi = {10.1007/978-981-99-8733-7\_2}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/NguyenPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BrezotPP23, author = {Th{\'{e}}ophile Br{\'{e}}zot and Paola de Perthuis and David Pointcheval}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Covercrypt: An Efficient Early-Abort {KEM} for Hidden Access Policies with Traceability from the {DDH} and {LWE}}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14344}, pages = {372--392}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50594-2\_19}, doi = {10.1007/978-3-031-50594-2\_19}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/BrezotPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HebantPS23, author = {Chlo{\'{e}} H{\'{e}}bant and David Pointcheval and Robert Sch{\"{a}}dlich}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Tracing a Linear Subspace: Application to Linearly-Homomorphic Group Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {312--341}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_12}, doi = {10.1007/978-3-031-31368-4\_12}, timestamp = {Fri, 05 May 2023 22:44:30 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HebantPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HebantPS23, author = {Chlo{\'{e}} H{\'{e}}bant and David Pointcheval and Robert Sch{\"{a}}dlich}, title = {Tracing a Linear Subspace: Application to Linearly-Homomorphic Group Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {138}, year = {2023}, url = {https://eprint.iacr.org/2023/138}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HebantPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenPP23, author = {Dinh Duy Nguyen and Duong Hieu Phan and David Pointcheval}, title = {Verifiable Multi-Client Functional Encryption for Inner Product}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {268}, year = {2023}, url = {https://eprint.iacr.org/2023/268}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NguyenPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenPP23a, author = {Ky Nguyen and Duong Hieu Phan and David Pointcheval}, title = {Optimal Security Notion for Decentralized Multi-Client Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {435}, year = {2023}, url = {https://eprint.iacr.org/2023/435}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NguyenPP23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeguinetCPRR23, author = {Hugo Beguinet and C{\'{e}}line Chevalier and David Pointcheval and Thomas Ricosset and M{\'{e}}lissa Rossi}, title = {GeT a {CAKE:} Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {470}, year = {2023}, url = {https://eprint.iacr.org/2023/470}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeguinetCPRR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrezotPP23, author = {Th{\'{e}}ophile Br{\'{e}}zot and Paola de Perthuis and David Pointcheval}, title = {Covercrypt: an Efficient Early-Abort {KEM} for Hidden Access Policies with Traceability from the {DDH} and {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {836}, year = {2023}, url = {https://eprint.iacr.org/2023/836}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrezotPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pointcheval23, author = {David Pointcheval}, title = {Linearly-Homomorphic Signatures for Short Randomizable Proofs of Subset Membership}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1499}, year = {2023}, url = {https://eprint.iacr.org/2023/1499}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pointcheval23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonPR23, author = {Nicolas Bon and David Pointcheval and Matthieu Rivain}, title = {Optimized Homomorphic Evaluation of Boolean Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1589}, year = {2023}, url = {https://eprint.iacr.org/2023/1589}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BonPR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/RyffelTPB22, author = {Th{\'{e}}o Ryffel and Pierre Tholoniat and David Pointcheval and Francis R. Bach}, title = {AriaNN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {1}, pages = {291--316}, year = {2022}, url = {https://doi.org/10.2478/popets-2022-0015}, doi = {10.2478/POPETS-2022-0015}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/RyffelTPB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/NguyenPP22, author = {Ky Nguyen and Duong Hieu Phan and David Pointcheval}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Multi-Client Functional Encryption with Fine-Grained Access Control}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13791}, pages = {95--125}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22963-3\_4}, doi = {10.1007/978-3-031-22963-3\_4}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/NguyenPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PerthuisP22, author = {Paola de Perthuis and David Pointcheval}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Two-Client Inner-Product Functional Encryption with an Application to Money-Laundering Detection}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {725--737}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3559374}, doi = {10.1145/3548606.3559374}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PerthuisP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/CottierP22, author = {Baptiste Cottier and David Pointcheval}, editor = {Guy{-}Vincent Jourdan and Laurent Mounier and Carlisle M. Adams and Florence S{\`{e}}des and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Security Analysis of Improved {EDHOC} Protocol}, booktitle = {Foundations and Practice of Security - 15th International Symposium, {FPS} 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13877}, pages = {3--18}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-30122-3\_1}, doi = {10.1007/978-3-031-30122-3\_1}, timestamp = {Sat, 27 May 2023 15:23:45 +0200}, biburl = {https://dblp.org/rec/conf/fps/CottierP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/BettaiebBBCP22, author = {Slim Bettaieb and Lo{\"{\i}}c Bidoux and Olivier Blazy and Baptiste Cottier and David Pointcheval}, editor = {Guy{-}Vincent Jourdan and Laurent Mounier and Carlisle M. Adams and Florence S{\`{e}}des and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Post-quantum and UC-Secure Oblivious Transfer from {SPHF} with Grey Zone}, booktitle = {Foundations and Practice of Security - 15th International Symposium, {FPS} 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13877}, pages = {54--70}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-30122-3\_4}, doi = {10.1007/978-3-031-30122-3\_4}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/BettaiebBBCP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DelerableeGP22, author = {C{\'{e}}cile Delerabl{\'{e}}e and L{\'{e}}na{\"{\i}}ck Gouriou and David Pointcheval}, editor = {Clemente Galdi and Stanislaw Jarecki}, title = {Key-Policy {ABE} with Switchable Attributes}, booktitle = {Security and Cryptography for Networks - 13th International Conference, {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13409}, pages = {147--171}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-14791-3\_7}, doi = {10.1007/978-3-031-14791-3\_7}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/DelerableeGP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/HebantP22, author = {Chlo{\'{e}} H{\'{e}}bant and David Pointcheval}, editor = {Clemente Galdi and Stanislaw Jarecki}, title = {Traceable Constant-Size Multi-authority Credentials}, booktitle = {Security and Cryptography for Networks - 13th International Conference, {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13409}, pages = {411--434}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-14791-3\_18}, doi = {10.1007/978-3-031-14791-3\_18}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/HebantP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/IzabacheneNPP22, author = {Malika Izabach{\`{e}}ne and Anca Nitulescu and Paola de Perthuis and David Pointcheval}, editor = {Clemente Galdi and Stanislaw Jarecki}, title = {MyOPE: Malicious SecuritY for Oblivious Polynomial Evaluation}, booktitle = {Security and Cryptography for Networks - 13th International Conference, {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13409}, pages = {663--686}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-14791-3\_29}, doi = {10.1007/978-3-031-14791-3\_29}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/IzabacheneNPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-11980, author = {Th{\'{e}}o Ryffel and Francis R. Bach and David Pointcheval}, title = {Differential Privacy Guarantees for Stochastic Gradient Langevin Dynamics}, journal = {CoRR}, volume = {abs/2201.11980}, year = {2022}, url = {https://arxiv.org/abs/2201.11980}, eprinttype = {arXiv}, eprint = {2201.11980}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-11980.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-03599, author = {Baptiste Cottier and David Pointcheval}, title = {Security Analysis of the {EDHOC} protocol}, journal = {CoRR}, volume = {abs/2209.03599}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.03599}, doi = {10.48550/ARXIV.2209.03599}, eprinttype = {arXiv}, eprint = {2209.03599}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-03599.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-04149, author = {Slim Bettaieb and Lo{\"{\i}}c Bidoux and Olivier Blazy and Baptiste Cottier and David Pointcheval}, title = {Post-Quantum Oblivious Transfer from Smooth Projective Hash Functions with Grey Zone}, journal = {CoRR}, volume = {abs/2209.04149}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.04149}, doi = {10.48550/ARXIV.2209.04149}, eprinttype = {arXiv}, eprint = {2209.04149}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-04149.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenPP22, author = {Ky Nguyen and Duong Hieu Phan and David Pointcheval}, title = {Multi-Client Functional Encryption with Fine-Grained Access Control}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {215}, year = {2022}, url = {https://eprint.iacr.org/2022/215}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NguyenPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PerthuisP22, author = {Paola de Perthuis and David Pointcheval}, title = {Two-Client Inner-Product Functional Encryption, with an Application to Money-Laundering Detection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {441}, year = {2022}, url = {https://eprint.iacr.org/2022/441}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PerthuisP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenPS22, author = {Ky Nguyen and David Pointcheval and Robert Sch{\"{a}}dlich}, title = {Function-Hiding Decentralized Multi-Client Functional Encryption for Inner Products}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1532}, year = {2022}, url = {https://eprint.iacr.org/2022/1532}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NguyenPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BettaiebBBCP21, author = {Slim Bettaieb and Lo{\"{\i}}c Bidoux and Olivier Blazy and Baptiste Cottier and David Pointcheval}, editor = {Delphine Reinhardt and Tilo M{\"{u}}ller}, title = {Secure Decision Forest Evaluation}, booktitle = {{ARES} 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021}, pages = {24:1--24:12}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3465481.3465763}, doi = {10.1145/3465481.3465763}, timestamp = {Tue, 17 Aug 2021 14:54:34 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BettaiebBBCP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-08546, author = {Slim Bettaieb and Lo{\"{\i}}c Bidoux and Olivier Blazy and Baptiste Cottier and David Pointcheval}, title = {Secure Decision Forest Evaluation}, journal = {CoRR}, volume = {abs/2108.08546}, year = {2021}, url = {https://arxiv.org/abs/2108.08546}, eprinttype = {arXiv}, eprint = {2108.08546}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-08546.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaPS21, author = {Michel Abdalla and David Pointcheval and Azam Soleimanian}, title = {2-Step Multi-Client Quadratic Functional Encryption from Decentralized Function-Hiding Inner-Product}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1}, year = {2021}, url = {https://eprint.iacr.org/2021/001}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DelerableeGP21, author = {C{\'{e}}cile Delerabl{\'{e}}e and L{\'{e}}na{\"{\i}}ck Gouriou and David Pointcheval}, title = {Key-Policy {ABE} with Delegation of Rights}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {867}, year = {2021}, url = {https://eprint.iacr.org/2021/867}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DelerableeGP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IzabacheneNPP21, author = {Malika Izabach{\`{e}}ne and Anca Nitulescu and Paola de Perthuis and David Pointcheval}, title = {MyOPE: Malicious securitY for Oblivious Polynomial Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1291}, year = {2021}, url = {https://eprint.iacr.org/2021/1291}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IzabacheneNPP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/AbdallaBP20, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, title = {Corrigendum: Public-key encryption indistinguishable under plaintext-checkable attacks}, journal = {{IET} Inf. Secur.}, volume = {14}, number = {3}, pages = {365--366}, year = {2020}, url = {https://doi.org/10.1049/iet-ifs.2019.0200}, doi = {10.1049/IET-IFS.2019.0200}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/AbdallaBP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChotardDGPP20, author = {J{\'{e}}r{\'{e}}my Chotard and Edouard Dufour{-}Sans and Romain Gay and Duong Hieu Phan and David Pointcheval}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Dynamic Decentralized Functional Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {747--775}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_25}, doi = {10.1007/978-3-030-56784-2\_25}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChotardDGPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DoPP20, author = {Xuan Thanh Do and Duong Hieu Phan and David Pointcheval}, editor = {Stanislaw Jarecki}, title = {Traceable Inner Product Functional Encryption}, booktitle = {Topics in Cryptology - {CT-RSA} 2020 - The Cryptographers' Track at the {RSA} Conference 2020, San Francisco, CA, USA, February 24-28, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12006}, pages = {564--585}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-40186-3\_24}, doi = {10.1007/978-3-030-40186-3\_24}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/DoPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FioreNP20, author = {Dario Fiore and Anca Nitulescu and David Pointcheval}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Boosting Verifiable Computation on Encrypted Data}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {124--154}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_5}, doi = {10.1007/978-3-030-45388-6\_5}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FioreNP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HebantPP20, author = {Chlo{\'{e}} H{\'{e}}bant and Duong Hieu Phan and David Pointcheval}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Linearly-Homomorphic Signatures and Scalable Mix-Nets}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {597--627}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_21}, doi = {10.1007/978-3-030-45388-6\_21}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HebantPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/AbdallaBMPSW20, author = {Michel Abdalla and Florian Bourse and Hugo Marival and David Pointcheval and Azam Soleimanian and Hendrik Waldner}, editor = {Clemente Galdi and Vladimir Kolesnikov}, title = {Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model}, booktitle = {Security and Cryptography for Networks - 12th International Conference, {SCN} 2020, Amalfi, Italy, September 14-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12238}, pages = {525--545}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57990-6\_26}, doi = {10.1007/978-3-030-57990-6\_26}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/AbdallaBMPSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-04593, author = {Th{\'{e}}o Ryffel and David Pointcheval and Francis R. Bach}, title = {{ARIANN:} Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing}, journal = {CoRR}, volume = {abs/2006.04593}, year = {2020}, url = {https://arxiv.org/abs/2006.04593}, eprinttype = {arXiv}, eprint = {2006.04593}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-04593.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FioreNP20, author = {Dario Fiore and Anca Nitulescu and David Pointcheval}, title = {Boosting Verifiable Computation on Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {132}, year = {2020}, url = {https://eprint.iacr.org/2020/132}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FioreNP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChotardDGPP20, author = {J{\'{e}}r{\'{e}}my Chotard and Edouard Dufour{-}Sans and Romain Gay and Duong Hieu Phan and David Pointcheval}, title = {Dynamic Decentralized Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {197}, year = {2020}, url = {https://eprint.iacr.org/2020/197}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChotardDGPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HebantP20, author = {Chlo{\'{e}} H{\'{e}}bant and David Pointcheval}, title = {Traceable Attribute-Based Anonymous Credentials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {657}, year = {2020}, url = {https://eprint.iacr.org/2020/657}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HebantP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBMPSW20, author = {Michel Abdalla and Florian Bourse and Hugo Marival and David Pointcheval and Azam Soleimanian and Hendrik Waldner}, title = {Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {788}, year = {2020}, url = {https://eprint.iacr.org/2020/788}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBMPSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbdallaBP19, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, title = {On the Tightness of Forward-Secure Signature Reductions}, journal = {J. Cryptol.}, volume = {32}, number = {1}, pages = {84--150}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9283-2}, doi = {10.1007/S00145-018-9283-2}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbdallaBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SansP19, author = {Edouard Dufour Sans and David Pointcheval}, editor = {Robert H. Deng and Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and Mart{\'{\i}}n Ochoa and Moti Yung}, title = {Unbounded Inner-Product Functional Encryption with Succinct Keys}, booktitle = {Applied Cryptography and Network Security - 17th International Conference, {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11464}, pages = {426--441}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21568-2\_21}, doi = {10.1007/978-3-030-21568-2\_21}, timestamp = {Wed, 29 May 2019 12:25:55 +0200}, biburl = {https://dblp.org/rec/conf/acns/SansP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BoursePS19, author = {Florian Bourse and David Pointcheval and Olivier Sanders}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Divisible E-Cash from Constrained Pseudo-Random Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11921}, pages = {679--708}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34578-5\_24}, doi = {10.1007/978-3-030-34578-5\_24}, timestamp = {Tue, 26 Nov 2019 14:11:51 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BoursePS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/HebantPP19, author = {Chlo{\'{e}} H{\'{e}}bant and Duong Hieu Phan and David Pointcheval}, editor = {Zhiqiang Lin and Charalampos Papamanthou and Michalis Polychronakis}, title = {Decentralized Evaluation of Quadratic Polynomials on Encrypted Data}, booktitle = {Information Security - 22nd International Conference, {ISC} 2019, New York City, NY, USA, September 16-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11723}, pages = {87--106}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30215-3\_5}, doi = {10.1007/978-3-030-30215-3\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/HebantPP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/RyffelPBDG19, author = {Th{\'{e}}o Ryffel and David Pointcheval and Francis R. Bach and Edouard Dufour{-}Sans and Romain Gay}, editor = {Hanna M. Wallach and Hugo Larochelle and Alina Beygelzimer and Florence d'Alch{\'{e}}{-}Buc and Emily B. Fox and Roman Garnett}, title = {Partially Encrypted Deep Learning using Functional Encryption}, booktitle = {Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, December 8-14, 2019, Vancouver, BC, Canada}, pages = {4519--4530}, year = {2019}, url = {https://proceedings.neurips.cc/paper/2019/hash/9d28de8ff9bb6a3fa41fddfdc28f3bc1-Abstract.html}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/RyffelPBDG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-10214, author = {Th{\'{e}}o Ryffel and Edouard Dufour Sans and Romain Gay and Francis R. Bach and David Pointcheval}, title = {Partially Encrypted Machine Learning using Functional Encryption}, journal = {CoRR}, volume = {abs/1905.10214}, year = {2019}, url = {http://arxiv.org/abs/1905.10214}, eprinttype = {arXiv}, eprint = {1905.10214}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-10214.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HebantPP19, author = {Chlo{\'{e}} H{\'{e}}bant and Duong Hieu Phan and David Pointcheval}, title = {Linearly-Homomorphic Signatures and Scalable Mix-Nets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {547}, year = {2019}, url = {https://eprint.iacr.org/2019/547}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HebantPP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DoPP19, author = {Xuan Thanh Do and Duong Hieu Phan and David Pointcheval}, title = {Traceable Inner Product Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1358}, year = {2019}, url = {https://eprint.iacr.org/2019/1358}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DoPP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/CanardPPT18, author = {S{\'{e}}bastien Canard and Duong Hieu Phan and David Pointcheval and Viet Cuong Trinh}, title = {A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption}, journal = {Theor. Comput. Sci.}, volume = {723}, pages = {51--72}, year = {2018}, url = {https://doi.org/10.1016/j.tcs.2018.02.036}, doi = {10.1016/J.TCS.2018.02.036}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/CanardPPT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CanardPST18, author = {S{\'{e}}bastien Canard and David Pointcheval and Quentin Santos and Jacques Traor{\'{e}}}, editor = {Bart Preneel and Frederik Vercauteren}, title = {Privacy-Preserving Plaintext-Equality of Low-Entropy Inputs}, booktitle = {Applied Cryptography and Network Security - 16th International Conference, {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10892}, pages = {262--279}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93387-0\_14}, doi = {10.1007/978-3-319-93387-0\_14}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/CanardPST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChotardSGPP18, author = {J{\'{e}}r{\'{e}}my Chotard and Edouard Dufour Sans and Romain Gay and Duong Hieu Phan and David Pointcheval}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Decentralized Multi-Client Functional Encryption for Inner Product}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11273}, pages = {703--732}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03329-3\_24}, doi = {10.1007/978-3-030-03329-3\_24}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChotardSGPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/PointchevalS18, author = {David Pointcheval and Olivier Sanders}, editor = {Nigel P. Smart}, title = {Reassessing Security of Randomizable Signatures}, booktitle = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10808}, pages = {319--338}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76953-0\_17}, doi = {10.1007/978-3-319-76953-0\_17}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/PointchevalS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CanardPST18, author = {S{\'{e}}bastien Canard and David Pointcheval and Quentin Santos and Jacques Traor{\'{e}}}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Practical Strategy-Resistant Privacy-Preserving Elections}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {331--349}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_17}, doi = {10.1007/978-3-319-98989-1\_17}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CanardPST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DupontHPRY18, author = {Pierre{-}Alain Dupont and Julia Hesse and David Pointcheval and Leonid Reyzin and Sophia Yakoubov}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Fuzzy Password-Authenticated Key Exchange}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {393--424}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_13}, doi = {10.1007/978-3-319-78372-7\_13}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DupontHPRY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/DupinPB18, author = {Aur{\'{e}}lien Dupin and David Pointcheval and Christophe Bidan}, editor = {Joonsang Baek and Willy Susilo and Jongkil Kim}, title = {On the Leakage of Corrupted Garbled Circuits}, booktitle = {Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11192}, pages = {3--21}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01446-9\_1}, doi = {10.1007/978-3-030-01446-9\_1}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/DupinPB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SansGP18, author = {Edouard Dufour Sans and Romain Gay and David Pointcheval}, title = {Reading in the Dark: Classifying Encrypted Digits with Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {206}, year = {2018}, url = {http://eprint.iacr.org/2018/206}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SansGP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SansP18, author = {Edouard Dufour Sans and David Pointcheval}, title = {Unbounded Inner Product Functional Encryption, with Succinct Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {487}, year = {2018}, url = {https://eprint.iacr.org/2018/487}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SansP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DupinPB18, author = {Aur{\'{e}}lien Dupin and David Pointcheval and Christophe Bidan}, title = {On the Leakage of Corrupted Garbled Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {743}, year = {2018}, url = {https://eprint.iacr.org/2018/743}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DupinPB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanardPST18, author = {S{\'{e}}bastien Canard and David Pointcheval and Quentin Santos and Jacques Traor{\'{e}}}, title = {Practical Strategy-Resistant Privacy-Preserving Elections}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {827}, year = {2018}, url = {https://eprint.iacr.org/2018/827}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanardPST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HebantPP18, author = {Chlo{\'{e}} H{\'{e}}bant and Duong Hieu Phan and David Pointcheval}, title = {Decentralized Evaluation of Quadratic Polynomials on Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1019}, year = {2018}, url = {https://eprint.iacr.org/2018/1019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HebantPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChotardSGPP18, author = {J{\'{e}}r{\'{e}}my Chotard and Edouard Dufour Sans and Romain Gay and Duong Hieu Phan and David Pointcheval}, title = {Multi-Client Functional Encryption with Repetition for Inner Product}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1021}, year = {2018}, url = {https://eprint.iacr.org/2018/1021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChotardSGPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DupontP17, author = {Pierre{-}Alain Dupont and David Pointcheval}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Functional Encryption with Oblivious Helper}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {205--214}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3052996}, doi = {10.1145/3052973.3052996}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DupontP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PointchevalW17, author = {David Pointcheval and Guilin Wang}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {{VTBPEKE:} Verifier-based Two-Basis Password Exponential Key Exchange}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {301--312}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053026}, doi = {10.1145/3052973.3053026}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PointchevalW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BoldyrevaCDP17, author = {Alexandra Boldyreva and Shan Chen and Pierre{-}Alain Dupont and David Pointcheval}, title = {Human Computing for Handling Strong Corruptions in Authenticated Key Exchange}, booktitle = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa Barbara, CA, USA, August 21-25, 2017}, pages = {159--175}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSF.2017.31}, doi = {10.1109/CSF.2017.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BoldyrevaCDP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CouteauPP17, author = {Geoffroy Couteau and Thomas Peters and David Pointcheval}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Removing the Strong {RSA} Assumption from Arguments over the Integers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {321--350}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_11}, doi = {10.1007/978-3-319-56614-6\_11}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CouteauPP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ChotardPP17, author = {J{\'{e}}r{\'{e}}my Chotard and Duong Hieu Phan and David Pointcheval}, editor = {Phong Q. Nguyen and Jianying Zhou}, title = {Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms}, booktitle = {Information Security - 20th International Conference, {ISC} 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10599}, pages = {155--172}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69659-1\_9}, doi = {10.1007/978-3-319-69659-1\_9}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/ChotardPP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PointchevalST17, author = {David Pointcheval and Olivier Sanders and Jacques Traor{\'{e}}}, editor = {Serge Fehr}, title = {Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {61--90}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_4}, doi = {10.1007/978-3-662-54365-8\_4}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PointchevalST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaBP17, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, editor = {Serge Fehr}, title = {Removing Erasures with Explainable Hash Proof Systems}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {151--174}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_7}, doi = {10.1007/978-3-662-54365-8\_7}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaBP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoldyrevaCDP17, author = {Alexandra Boldyreva and Shan Chen and Pierre{-}Alain Dupont and David Pointcheval}, title = {Human Computing for Handling Strong Corruptions in Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {559}, year = {2017}, url = {http://eprint.iacr.org/2017/559}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoldyrevaCDP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBP17a, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, title = {On the Tightness of Forward-Secure Signature Reductions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {746}, year = {2017}, url = {http://eprint.iacr.org/2017/746}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBP17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChotardSGPP17, author = {J{\'{e}}r{\'{e}}my Chotard and Edouard Dufour Sans and Romain Gay and Duong Hieu Phan and David Pointcheval}, title = {Decentralized Multi-Client Functional Encryption for Inner Product}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {989}, year = {2017}, url = {http://eprint.iacr.org/2017/989}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChotardSGPP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DupontHPRY17, author = {Pierre{-}Alain Dupont and Julia Hesse and David Pointcheval and Leonid Reyzin and Sophia Yakoubov}, title = {Fuzzy Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1111}, year = {2017}, url = {http://eprint.iacr.org/2017/1111}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DupontHPRY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PointchevalS17, author = {David Pointcheval and Olivier Sanders}, title = {Reassessing Security of Randomizable Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1197}, year = {2017}, url = {http://eprint.iacr.org/2017/1197}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PointchevalS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/AbdallaBP16, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, title = {Public-key encryption indistinguishable under plaintext-checkable attacks}, journal = {{IET} Inf. Secur.}, volume = {10}, number = {6}, pages = {288--303}, year = {2016}, url = {https://doi.org/10.1049/iet-ifs.2015.0500}, doi = {10.1049/IET-IFS.2015.0500}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/AbdallaBP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/CanardPST16, author = {S{\'{e}}bastien Canard and David Pointcheval and Olivier Sanders and Jacques Traor{\'{e}}}, title = {Divisible e-cash made practical}, journal = {{IET} Inf. Secur.}, volume = {10}, number = {6}, pages = {332--347}, year = {2016}, url = {https://doi.org/10.1049/iet-ifs.2015.0485}, doi = {10.1049/IET-IFS.2015.0485}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/CanardPST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/FerradiGMNP16, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Diana Maimut and David Naccache and David Pointcheval}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Legally Fair Contract Signing Without Keystones}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {175--190}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_10}, doi = {10.1007/978-3-319-39555-5\_10}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/FerradiGMNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CouteauPP16, author = {Geoffroy Couteau and Thomas Peters and David Pointcheval}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Encryption Switching Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {308--338}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_12}, doi = {10.1007/978-3-662-53018-4\_12}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CouteauPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/PointchevalS16, author = {David Pointcheval and Olivier Sanders}, editor = {Kazue Sako}, title = {Short Randomizable Signatures}, booktitle = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9610}, pages = {111--126}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29485-8\_7}, doi = {10.1007/978-3-319-29485-8\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/PointchevalS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AbdallaCNP16, author = {Michel Abdalla and Mario Cornejo and Anca Nitulescu and David Pointcheval}, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {Robust Password-Protected Secret Sharing}, booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9879}, pages = {61--79}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45741-3\_4}, doi = {10.1007/978-3-319-45741-3\_4}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AbdallaCNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/PinoLP16, author = {Rafa{\"{e}}l del Pino and Vadim Lyubashevsky and David Pointcheval}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {273--291}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_15}, doi = {10.1007/978-3-319-44618-9\_15}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/PinoLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/africacrypt/2016, editor = {David Pointcheval and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Progress in Cryptology - {AFRICACRYPT} 2016 - 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9646}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-31517-1}, doi = {10.1007/978-3-319-31517-1}, isbn = {978-3-319-31516-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/Fischlin0PR16, author = {Marc Fischlin and Alexander May and David Pointcheval and Tal Rabin}, title = {Public-Key Cryptography (Dagstuhl Seminar 16371)}, journal = {Dagstuhl Reports}, volume = {6}, number = {9}, pages = {46--58}, year = {2016}, url = {https://doi.org/10.4230/DagRep.6.9.46}, doi = {10.4230/DAGREP.6.9.46}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/Fischlin0PR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBCP16, author = {Michel Abdalla and Florian Bourse and Angelo De Caro and David Pointcheval}, title = {Better Security for Functional Encryption for Inner Product Evaluations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2016}, url = {http://eprint.iacr.org/2016/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBCP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BostFP16, author = {Raphael Bost and Pierre{-}Alain Fouque and David Pointcheval}, title = {Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {62}, year = {2016}, url = {http://eprint.iacr.org/2016/062}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BostFP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaCNP16, author = {Michel Abdalla and Mario Cornejo and Anca Nitulescu and David Pointcheval}, title = {Robust Password-Protected Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {123}, year = {2016}, url = {http://eprint.iacr.org/2016/123}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaCNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CouteauPP16, author = {Geoffroy Couteau and Thomas Peters and David Pointcheval}, title = {Removing the Strong {RSA} Assumption from Arguments over the Integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {128}, year = {2016}, url = {http://eprint.iacr.org/2016/128}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CouteauPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerradiGMNP16, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Diana Maimut and David Naccache and David Pointcheval}, title = {Legally Fair Contract Signing Without Keystones}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {363}, year = {2016}, url = {http://eprint.iacr.org/2016/363}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FerradiGMNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PinoLP16, author = {Rafa{\"{e}}l Del Pino and Vadim Lyubashevsky and David Pointcheval}, title = {The Whole is Less than the Sum of its Parts: Constructing More Efficient Lattice-Based AKEs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {435}, year = {2016}, url = {http://eprint.iacr.org/2016/435}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PinoLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChotardPP16, author = {J{\'{e}}r{\'{e}}my Chotard and Duong Hieu Phan and David Pointcheval}, title = {Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1089}, year = {2016}, url = {http://eprint.iacr.org/2016/1089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChotardPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CanardPST15, author = {S{\'{e}}bastien Canard and David Pointcheval and Olivier Sanders and Jacques Traor{\'{e}}}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Scalable Divisible E-cash}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {287--306}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_14}, doi = {10.1007/978-3-319-28166-7\_14}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/CanardPST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AbdallaBPRV15, author = {Michel Abdalla and Sonia Bela{\"{\i}}d and David Pointcheval and Sylvain Ruhault and Damien Vergnaud}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {635--654}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_31}, doi = {10.1007/978-3-319-28166-7\_31}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/AbdallaBPRV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BenhamoudaCPW15, author = {Fabrice Benhamouda and Geoffroy Couteau and David Pointcheval and Hoeteck Wee}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {107--129}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_6}, doi = {10.1007/978-3-662-48000-7\_6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BenhamoudaCPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AbdallaBP15, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Disjunctions for Hash Proof Systems: New Constructions and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {69--100}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_3}, doi = {10.1007/978-3-662-46803-6\_3}, timestamp = {Thu, 14 Oct 2021 09:58:15 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AbdallaBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/CouteauPP15, author = {Geoffroy Couteau and Thomas Peters and David Pointcheval}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Evangelos Kranakis and Guillaume Bonfante}, title = {Secure Distributed Computation on Private Inputs}, booktitle = {Foundations and Practice of Security - 8th International Symposium, {FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9482}, pages = {14--26}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-30303-1\_2}, doi = {10.1007/978-3-319-30303-1\_2}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/CouteauPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CanardPST15, author = {S{\'{e}}bastien Canard and David Pointcheval and Olivier Sanders and Jacques Traor{\'{e}}}, editor = {Jonathan Katz}, title = {Divisible E-Cash Made Practical}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {77--100}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_4}, doi = {10.1007/978-3-662-46447-2\_4}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CanardPST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaBP15, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, editor = {Jonathan Katz}, title = {Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {332--352}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_15}, doi = {10.1007/978-3-662-46447-2\_15}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaBCP15, author = {Michel Abdalla and Florian Bourse and Angelo De Caro and David Pointcheval}, editor = {Jonathan Katz}, title = {Simple Functional Encryption Schemes for Inner Products}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {733--751}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_33}, doi = {10.1007/978-3-662-46447-2\_33}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaBCP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBCP15, author = {Michel Abdalla and Florian Bourse and Angelo De Caro and David Pointcheval}, title = {Simple Functional Encryption Schemes for Inner Products}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2015}, url = {http://eprint.iacr.org/2015/017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBCP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaBCPV15, author = {Fabrice Benhamouda and Olivier Blazy and C{\'{e}}line Chevalier and David Pointcheval and Damien Vergnaud}, title = {New Techniques for SPHFs and Efficient One-Round {PAKE} Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2015}, url = {http://eprint.iacr.org/2015/188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaBCPV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBP15, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, title = {Tighter Reductions for Forward-Secure Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {196}, year = {2015}, url = {http://eprint.iacr.org/2015/196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaCPW15, author = {Fabrice Benhamouda and Geoffroy Couteau and David Pointcheval and Hoeteck Wee}, title = {Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {246}, year = {2015}, url = {http://eprint.iacr.org/2015/246}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaCPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanardPS15, author = {S{\'{e}}bastien Canard and David Pointcheval and Olivier Sanders}, title = {Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {278}, year = {2015}, url = {http://eprint.iacr.org/2015/278}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanardPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanardPST15, author = {S{\'{e}}bastien Canard and David Pointcheval and Olivier Sanders and Jacques Traor{\'{e}}}, title = {Scalable Divisible E-cash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {300}, year = {2015}, url = {http://eprint.iacr.org/2015/300}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanardPST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PointchevalS15, author = {David Pointcheval and Olivier Sanders}, title = {Short Randomizable Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {525}, year = {2015}, url = {http://eprint.iacr.org/2015/525}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PointchevalS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PointchevalST15, author = {David Pointcheval and Olivier Sanders and Jacques Traor{\'{e}}}, title = {Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {972}, year = {2015}, url = {http://eprint.iacr.org/2015/972}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PointchevalST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CouteauPP15, author = {Geoffroy Couteau and Thomas Peters and David Pointcheval}, title = {Encryption Switching Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {990}, year = {2015}, url = {http://eprint.iacr.org/2015/990}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CouteauPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CouteauPP15a, author = {Geoffroy Couteau and Thomas Peters and David Pointcheval}, title = {Secure Distributed Computation on Private Inputs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1196}, year = {2015}, url = {http://eprint.iacr.org/2015/1196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CouteauPP15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBPRV15, author = {Michel Abdalla and Sonia Bela{\"{\i}}d and David Pointcheval and Sylvain Ruhault and Damien Vergnaud}, title = {Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1219}, year = {2015}, url = {http://eprint.iacr.org/2015/1219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBPRV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CanardPS14, author = {S{\'{e}}bastien Canard and David Pointcheval and Olivier Sanders}, editor = {Hugo Krawczyk}, title = {Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {167--184}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_10}, doi = {10.1007/978-3-642-54631-0\_10}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CanardPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/PointchevalS14, author = {David Pointcheval and Olivier Sanders}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Forward Secure Non-Interactive Key Exchange}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {21--39}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_2}, doi = {10.1007/978-3-319-10879-7\_2}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/PointchevalS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/africacrypt/2014, editor = {David Pointcheval and Damien Vergnaud}, title = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8469}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06734-6}, doi = {10.1007/978-3-319-06734-6}, isbn = {978-3-319-06733-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBP14, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, title = {Removing Erasures with Explainable Hash Proof Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {125}, year = {2014}, url = {http://eprint.iacr.org/2014/125}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBP14a, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, title = {Disjunctions for Hash Proof Systems: New Constructions and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {483}, year = {2014}, url = {http://eprint.iacr.org/2014/483}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBP14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBP14b, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, title = {{SPOKE:} Simple Password-Only Key Exchange in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {609}, year = {2014}, url = {http://eprint.iacr.org/2014/609}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBP14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanardPST14, author = {S{\'{e}}bastien Canard and David Pointcheval and Olivier Sanders and Jacques Traor{\'{e}}}, title = {Divisible E-Cash Made Practical}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {785}, year = {2014}, url = {http://eprint.iacr.org/2014/785}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanardPST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/NgoPP13, author = {Hung Q. Ngo and Duong Hieu Phan and David Pointcheval}, title = {Black-Box Trace{\&}Revoke Codes}, journal = {Algorithmica}, volume = {67}, number = {3}, pages = {418--448}, year = {2013}, url = {https://doi.org/10.1007/s00453-012-9702-y}, doi = {10.1007/S00453-012-9702-Y}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/NgoPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/PhanPSS13, author = {Duong Hieu Phan and David Pointcheval and Siamak Fayyaz Shahandashti and Mario Strefler}, title = {Adaptive {CCA} broadcast encryption with constant-size secret keys and ciphertexts}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {4}, pages = {251--265}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0190-0}, doi = {10.1007/S10207-013-0190-0}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/PhanPSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BlazyFPV13, author = {Olivier Blazy and Georg Fuchsbauer and David Pointcheval and Damien Vergnaud}, title = {Short blind signatures}, journal = {J. Comput. Secur.}, volume = {21}, number = {5}, pages = {627--661}, year = {2013}, url = {https://doi.org/10.3233/JCS-130477}, doi = {10.3233/JCS-130477}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BlazyFPV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BlazyCPV13, author = {Olivier Blazy and C{\'{e}}line Chevalier and David Pointcheval and Damien Vergnaud}, editor = {Michael J. Jacobson Jr. and Michael E. Locasto and Payman Mohassel and Reihaneh Safavi{-}Naini}, title = {Analysis and Improvement of Lindell's UC-Secure Commitment Schemes}, booktitle = {Applied Cryptography and Network Security - 11th International Conference, {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7954}, pages = {534--551}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38980-1\_34}, doi = {10.1007/978-3-642-38980-1\_34}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/BlazyCPV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbdallaBBCP13, author = {Michel Abdalla and Fabrice Benhamouda and Olivier Blazy and C{\'{e}}line Chevalier and David Pointcheval}, editor = {Kazue Sako and Palash Sarkar}, title = {SPHF-Friendly Non-interactive Commitments}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8269}, pages = {214--234}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42033-7\_12}, doi = {10.1007/978-3-642-42033-7\_12}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbdallaBBCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PhanPT13, author = {Duong Hieu Phan and David Pointcheval and Viet Cuong Trinh}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {Multi-channel broadcast encryption}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {277--286}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484348}, doi = {10.1145/2484313.2484348}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PhanPT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DodisPRVW13, author = {Yevgeniy Dodis and David Pointcheval and Sylvain Ruhault and Damien Vergnaud and Daniel Wichs}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Security analysis of pseudo-random number generators with input: /dev/random is not robust}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {647--658}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516653}, doi = {10.1145/2508859.2516653}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DodisPRVW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BenhamoudaBCPV13, author = {Fabrice Benhamouda and Olivier Blazy and C{\'{e}}line Chevalier and David Pointcheval and Damien Vergnaud}, editor = {Ran Canetti and Juan A. Garay}, title = {New Techniques for SPHFs and Efficient One-Round {PAKE} Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {449--475}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_25}, doi = {10.1007/978-3-642-40041-4\_25}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BenhamoudaBCPV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HamoudaBCPV13, author = {Fabrice Ben Hamouda and Olivier Blazy and C{\'{e}}line Chevalier and David Pointcheval and Damien Vergnaud}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {272--291}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_18}, doi = {10.1007/978-3-642-36362-7\_18}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HamoudaBCPV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaHP13, author = {Michel Abdalla and Fabrice Ben Hamouda and David Pointcheval}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Tighter Reductions for Forward-Secure Signature Schemes}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {292--311}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_19}, doi = {10.1007/978-3-642-36362-7\_19}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaHP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HamoudaBCPV13, author = {Fabrice Ben Hamouda and Olivier Blazy and C{\'{e}}line Chevalier and David Pointcheval and Damien Vergnaud}, title = {New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {34}, year = {2013}, url = {http://eprint.iacr.org/2013/034}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HamoudaBCPV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlazyCPV13, author = {Olivier Blazy and C{\'{e}}line Chevalier and David Pointcheval and Damien Vergnaud}, title = {Analysis and Improvement of Lindell's UC-Secure Commitment Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {123}, year = {2013}, url = {http://eprint.iacr.org/2013/123}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlazyCPV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisPRVW13, author = {Yevgeniy Dodis and David Pointcheval and Sylvain Ruhault and Damien Vergnaud and Daniel Wichs}, title = {Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {338}, year = {2013}, url = {http://eprint.iacr.org/2013/338}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisPRVW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HamoudaP13, author = {Fabrice Ben Hamouda and David Pointcheval}, title = {Trapdoor Smooth Projective Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {341}, year = {2013}, url = {http://eprint.iacr.org/2013/341}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HamoudaP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBBCP13, author = {Michel Abdalla and Fabrice Benhamouda and Olivier Blazy and C{\'{e}}line Chevalier and David Pointcheval}, title = {SPHF-Friendly Non-Interactive Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {588}, year = {2013}, url = {http://eprint.iacr.org/2013/588}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBBCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaP13, author = {Fabrice Benhamouda and David Pointcheval}, title = {Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {833}, year = {2013}, url = {http://eprint.iacr.org/2013/833}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PhanPSS12, author = {Duong Hieu Phan and David Pointcheval and Siamak Fayyaz Shahandashti and Mario Strefler}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Adaptive {CCA} Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {308--321}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_23}, doi = {10.1007/978-3-642-31448-3\_23}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PhanPSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/BlazyP12, author = {Olivier Blazy and David Pointcheval}, editor = {David Naccache}, title = {Traceable Signature with Stepping Capabilities}, booktitle = {Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {6805}, pages = {108--131}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28368-0\_10}, doi = {10.1007/978-3-642-28368-0\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/BlazyP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/NaccacheP12, author = {David Naccache and David Pointcheval}, editor = {David Naccache}, title = {Autotomic Signatures}, booktitle = {Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {6805}, pages = {143--155}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28368-0\_12}, doi = {10.1007/978-3-642-28368-0\_12}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/birthday/NaccacheP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BarthePB12, author = {Gilles Barthe and David Pointcheval and Santiago Zanella B{\'{e}}guelin}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Verified security of redundancy-free encryption from Rabin and {RSA}}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {724--735}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382272}, doi = {10.1145/2382196.2382272}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BarthePB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/PhanPS12, author = {Duong Hieu Phan and David Pointcheval and Mario Strefler}, editor = {Alejandro Hevia and Gregory Neven}, title = {Message-Based Traitor Tracing with Optimal Ciphertext Rate}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2012 - 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7533}, pages = {56--77}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33481-8\_4}, doi = {10.1007/978-3-642-33481-8\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/PhanPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Pointcheval12, author = {David Pointcheval}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Password-Based Authenticated Key Exchange}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {390--397}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_23}, doi = {10.1007/978-3-642-30057-8\_23}, timestamp = {Mon, 16 Nov 2020 15:55:52 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Pointcheval12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BlazyPV12, author = {Olivier Blazy and David Pointcheval and Damien Vergnaud}, editor = {Ivan Visconti and Roberto De Prisco}, title = {Compact Round-Optimal Partially-Blind Signatures}, booktitle = {Security and Cryptography for Networks - 8th International Conference, {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7485}, pages = {95--112}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32928-9\_6}, doi = {10.1007/978-3-642-32928-9\_6}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/BlazyPV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/PhanPS12, author = {Duong Hieu Phan and David Pointcheval and Mario Strefler}, editor = {Ivan Visconti and Roberto De Prisco}, title = {Decentralized Dynamic Broadcast Encryption}, booktitle = {Security and Cryptography for Networks - 8th International Conference, {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7485}, pages = {166--183}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32928-9\_10}, doi = {10.1007/978-3-642-32928-9\_10}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/PhanPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BlazyPV12, author = {Olivier Blazy and David Pointcheval and Damien Vergnaud}, editor = {Ronald Cramer}, title = {Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {94--111}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_6}, doi = {10.1007/978-3-642-28914-9\_6}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BlazyPV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2012, editor = {David Pointcheval and Thomas Johansson}, title = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4}, doi = {10.1007/978-3-642-29011-4}, isbn = {978-3-642-29010-7}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PhanPSS12, author = {Duong Hieu Phan and David Pointcheval and Siamak Fayyaz Shahandashti and Mario Strefler}, title = {Adaptive {CCA} Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {216}, year = {2012}, url = {http://eprint.iacr.org/2012/216}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PhanPSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlazyCPV12, author = {Olivier Blazy and C{\'{e}}line Chevalier and David Pointcheval and Damien Vergnaud}, title = {Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {284}, year = {2012}, url = {http://eprint.iacr.org/2012/284}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlazyCPV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PhanPT12, author = {Duong Hieu Phan and David Pointcheval and Viet Cuong Trinh}, title = {Multi-Channel Broadcast Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {307}, year = {2012}, url = {http://eprint.iacr.org/2012/307}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PhanPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarthePB12, author = {Gilles Barthe and David Pointcheval and Santiago Zanella B{\'{e}}guelin}, title = {Verified Security of Redundancy-Free Encryption from Rabin and {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {308}, year = {2012}, url = {http://eprint.iacr.org/2012/308}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarthePB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/PhanPS11, author = {Duong Hieu Phan and David Pointcheval and Mario Strefler}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Security Notions for Broadcast Encryption}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {377--394}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_22}, doi = {10.1007/978-3-642-21554-4\_22}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/PhanPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AbdallaCGP11, author = {Michel Abdalla and C{\'{e}}line Chevalier and Louis Granboulan and David Pointcheval}, editor = {Aggelos Kiayias}, title = {Contributory Password-Authenticated Group Key Exchange with Join Capability}, booktitle = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6558}, pages = {142--160}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19074-2\_11}, doi = {10.1007/978-3-642-19074-2\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/AbdallaCGP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BlazyFPV11, author = {Olivier Blazy and Georg Fuchsbauer and David Pointcheval and Damien Vergnaud}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Signatures on Randomizable Ciphertexts}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {403--422}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_25}, doi = {10.1007/978-3-642-19379-8\_25}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BlazyFPV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/africacrypt/2011, editor = {Abderrahmane Nitaj and David Pointcheval}, title = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6737}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21969-6}, doi = {10.1007/978-3-642-21969-6}, isbn = {978-3-642-21968-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Pointcheval11, author = {David Pointcheval}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{OAEP:} Optimal Asymmetric Encryption Padding}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {882--884}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_150}, doi = {10.1007/978-1-4419-5906-5\_150}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Pointcheval11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Pointcheval11a, author = {David Pointcheval}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Rabin Cryptosystem}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1013--1014}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_151}, doi = {10.1007/978-1-4419-5906-5\_151}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Pointcheval11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Pointcheval11b, author = {David Pointcheval}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{RSA} Public-Key Encryption}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1069--1072}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_153}, doi = {10.1007/978-1-4419-5906-5\_153}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Pointcheval11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PhanPS11, author = {Duong Hieu Phan and David Pointcheval and Mario Strefler}, title = {Adaptively Secure Broadcast Encryption with Forward Secrecy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {463}, year = {2011}, url = {http://eprint.iacr.org/2011/463}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PhanPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/BoyenCFP10, author = {Xavier Boyen and C{\'{e}}line Chevalier and Georg Fuchsbauer and David Pointcheval}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Strong Cryptography from Weak Secrets}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {297--315}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_18}, doi = {10.1007/978-3-642-12678-9\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/BoyenCFP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/AbdallaCMP10, author = {Michel Abdalla and C{\'{e}}line Chevalier and Mark Manulis and David Pointcheval}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Flexible Group Key Exchange with On-demand Computation of Subgroup Keys}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {351--368}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_21}, doi = {10.1007/978-3-642-12678-9\_21}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/AbdallaCMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/IzabachenePV10, author = {Malika Izabach{\`{e}}ne and David Pointcheval and Damien Vergnaud}, editor = {Michel Abdalla and Paulo S. L. M. Barreto}, title = {Mediated Traceable Anonymous Encryption}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6212}, pages = {40--60}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14712-8\_3}, doi = {10.1007/978-3-642-14712-8\_3}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/IzabachenePV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wote/Chevallier-MamesFPST10, author = {Beno{\^{\i}}t Chevallier{-}Mames and Pierre{-}Alain Fouque and David Pointcheval and Julien Stern and Jacques Traor{\'{e}}}, editor = {David Chaum and Markus Jakobsson and Ronald L. Rivest and Peter Y. A. Ryan and Josh Benaloh and Miroslaw Kutylowski and Ben Adida}, title = {On Some Incompatible Properties of Voting Schemes}, booktitle = {Towards Trustworthy Elections, New Directions in Electronic Voting}, series = {Lecture Notes in Computer Science}, volume = {6000}, pages = {191--199}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12980-3\_11}, doi = {10.1007/978-3-642-12980-3\_11}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/wote/Chevallier-MamesFPST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/PieprzykP10, author = {Josef Pieprzyk and David Pointcheval}, editor = {Alexander W. Dent and Yuliang Zheng}, title = {Parallel Signcryption}, booktitle = {Practical Signcryption}, series = {Information Security and Cryptography}, pages = {175--192}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-540-89411-7\_9}, doi = {10.1007/978-3-540-89411-7\_9}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/series/isc/PieprzykP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2010, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7}, doi = {10.1007/978-3-642-13013-7}, isbn = {978-3-642-13012-0}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/AbdallaCCP09, author = {Michel Abdalla and Dario Catalano and C{\'{e}}line Chevalier and David Pointcheval}, editor = {Bart Preneel}, title = {Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5580}, pages = {254--271}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02384-2\_16}, doi = {10.1007/978-3-642-02384-2\_16}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/AbdallaCCP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/FuchsbauerPV09, author = {Georg Fuchsbauer and David Pointcheval and Damien Vergnaud}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Transferable Constant-Size Fair E-Cash}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {226--247}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_15}, doi = {10.1007/978-3-642-10433-6\_15}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/FuchsbauerPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbdallaCP09, author = {Michel Abdalla and C{\'{e}}line Chevalier and David Pointcheval}, editor = {Shai Halevi}, title = {Smooth Projective Hashing for Conditionally Extractable Commitments}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {671--689}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_39}, doi = {10.1007/978-3-642-03356-8\_39}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AbdallaCP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChevalierFPZ09, author = {C{\'{e}}line Chevalier and Pierre{-}Alain Fouque and David Pointcheval and S{\'{e}}bastien Zimmer}, editor = {Antoine Joux}, title = {Optimal Randomness Extraction from a Diffie-Hellman Element}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {572--589}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_33}, doi = {10.1007/978-3-642-01001-9\_33}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChevalierFPZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/FuchsbauerP09, author = {Georg Fuchsbauer and David Pointcheval}, editor = {Hovav Shacham and Brent Waters}, title = {Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures}, booktitle = {Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5671}, pages = {132--149}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03298-1\_10}, doi = {10.1007/978-3-642-03298-1\_10}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/FuchsbauerP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaBCP09, author = {Michel Abdalla and Xavier Boyen and C{\'{e}}line Chevalier and David Pointcheval}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Distributed Public-Key Cryptography from Weak Secrets}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {139--159}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_9}, doi = {10.1007/978-3-642-00468-1\_9}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaBCP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/psec/FuchsbauerP09, author = {Georg Fuchsbauer and David Pointcheval}, editor = {V{\'{e}}ronique Cortier and Claude Kirchner and Mitsuhiro Okada and Hideki Sakurada}, title = {Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures}, booktitle = {Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese Collaboration}, series = {Lecture Notes in Computer Science}, volume = {5458}, pages = {95--115}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02002-5\_6}, doi = {10.1007/978-3-642-02002-5\_6}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/psec/FuchsbauerP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/psec/IzabacheneP09, author = {Malika Izabach{\`{e}}ne and David Pointcheval}, editor = {V{\'{e}}ronique Cortier and Claude Kirchner and Mitsuhiro Okada and Hideki Sakurada}, title = {New Anonymity Notions for Identity-Based Encryption}, booktitle = {Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese Collaboration}, series = {Lecture Notes in Computer Science}, volume = {5458}, pages = {138--157}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02002-5\_8}, doi = {10.1007/978-3-642-02002-5\_8}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/psec/IzabacheneP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2009, editor = {Michel Abdalla and David Pointcheval and Pierre{-}Alain Fouque and Damien Vergnaud}, title = {Applied Cryptography and Network Security, 7th International Conference, {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5536}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01957-9}, doi = {10.1007/978-3-642-01957-9}, isbn = {978-3-642-01956-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuchsbauerPV09, author = {Georg Fuchsbauer and David Pointcheval and Damien Vergnaud}, title = {Transferable Constant-Size Fair E-Cash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2009}, url = {http://eprint.iacr.org/2009/146}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuchsbauerPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/ChenSWWDLMMMPPS08, author = {Liqun Chen and Willy Susilo and Huaxiong Wang and Duncan S. Wong and Ed Dawson and Xuejia Lai and Masahiro Mambo and Atsuko Miyaji and Yi Mu and David Pointcheval and Bart Preneel and Nigel P. Smart}, title = {Cryptography in Computer System Security}, journal = {J. Univers. Comput. Sci.}, volume = {14}, number = {3}, pages = {314--317}, year = {2008}, url = {http://www.jucs.org/jucs\_14\_3/cryptography\_in\_computer\_system}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/ChenSWWDLMMMPPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/PointchevalZ08, author = {David Pointcheval and S{\'{e}}bastien Zimmer}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Multi-factor Authenticated Key Exchange}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {277--295}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_17}, doi = {10.1007/978-3-540-68914-0\_17}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/PointchevalZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/AbdallaIP08, author = {Michel Abdalla and Malika Izabach{\`{e}}ne and David Pointcheval}, editor = {Matthew K. Franklin and Lucas Chi Kwong Hui and Duncan S. Wong}, title = {Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange}, booktitle = {Cryptology and Network Security, 7th International Conference, {CANS} 2008, Hong-Kong, China, December 2-4, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5339}, pages = {133--148}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89641-8\_10}, doi = {10.1007/978-3-540-89641-8\_10}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/AbdallaIP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FouquePZ08, author = {Pierre{-}Alain Fouque and David Pointcheval and S{\'{e}}bastien Zimmer}, editor = {Masayuki Abe and Virgil D. Gligor}, title = {{HMAC} is a randomness extractor and applications to {TLS}}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20, 2008}, pages = {21--32}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1368310.1368317}, doi = {10.1145/1368310.1368317}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FouquePZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DelerableeP08, author = {C{\'{e}}cile Delerabl{\'{e}}e and David Pointcheval}, editor = {David A. Wagner}, title = {Dynamic Threshold Public-Key Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5157}, pages = {317--334}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85174-5\_18}, doi = {10.1007/978-3-540-85174-5\_18}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DelerableeP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AbdallaCCP08, author = {Michel Abdalla and Dario Catalano and C{\'{e}}line Chevalier and David Pointcheval}, editor = {Tal Malkin}, title = {Efficient Two-Party Password-Based Key Exchange Protocols in the {UC} Framework}, booktitle = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4964}, pages = {335--351}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79263-5\_22}, doi = {10.1007/978-3-540-79263-5\_22}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/AbdallaCCP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/TangBCP08, author = {Qiang Tang and Julien Bringer and Herv{\'{e}} Chabanne and David Pointcheval}, editor = {Liqun Chen and Yi Mu and Willy Susilo}, title = {A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes}, booktitle = {Information Security Practice and Experience, 4th International Conference, {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4991}, pages = {56--70}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79104-1\_5}, doi = {10.1007/978-3-540-79104-1\_5}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/TangBCP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BringerCPZ08, author = {Julien Bringer and Herv{\'{e}} Chabanne and David Pointcheval and S{\'{e}}bastien Zimmer}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {219--230}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_15}, doi = {10.1007/978-3-540-89598-5\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BringerCPZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/FuchsbauerP08, author = {Georg Fuchsbauer and David Pointcheval}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Anonymous Proxy Signatures}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {201--217}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_14}, doi = {10.1007/978-3-540-85855-3\_14}, timestamp = {Tue, 25 Feb 2020 11:33:46 +0100}, biburl = {https://dblp.org/rec/conf/scn/FuchsbauerP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/IzabacheneP08, author = {Malika Izabach{\`{e}}ne and David Pointcheval}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {New Anonymity Notions for Identity-Based Encryption}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {375--391}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_25}, doi = {10.1007/978-3-540-85855-3\_25}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/IzabacheneP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuchsbauerP08, author = {Georg Fuchsbauer and David Pointcheval}, title = {Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2008}, url = {http://eprint.iacr.org/2008/037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuchsbauerP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuchsbauerP08a, author = {Georg Fuchsbauer and David Pointcheval}, title = {Encrypting Proofs on Pairings and Its Application to Anonymity for Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {528}, year = {2008}, url = {http://eprint.iacr.org/2008/528}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuchsbauerP08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AbdallaBCMP07, author = {Michel Abdalla and Emmanuel Bresson and Olivier Chevassut and Bodo M{\"{o}}ller and David Pointcheval}, title = {Strong password-based authentication in {TLS} using the three-party group Diffie?Hellman protocol}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {3/4}, pages = {284--296}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.013181}, doi = {10.1504/IJSN.2007.013181}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AbdallaBCMP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwmc/BressonCP07, author = {Emmanuel Bresson and Olivier Chevassut and David Pointcheval}, title = {A security solution for {IEEE} 802.11's ad hoc mode: password-authentication and group DiffieHellman key exchange}, journal = {Int. J. Wirel. Mob. Comput.}, volume = {2}, number = {1}, pages = {4--13}, year = {2007}, url = {https://doi.org/10.1504/IJWMC.2007.013791}, doi = {10.1504/IJWMC.2007.013791}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwmc/BressonCP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CatalanoPP07, author = {Dario Catalano and David Pointcheval and Thomas Pornin}, title = {Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication}, journal = {J. Cryptol.}, volume = {20}, number = {1}, pages = {115--149}, year = {2007}, url = {https://doi.org/10.1007/s00145-006-0431-8}, doi = {10.1007/S00145-006-0431-8}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CatalanoPP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BressonCP07, author = {Emmanuel Bresson and Olivier Chevassut and David Pointcheval}, title = {Provably secure authenticated group Diffie-Hellman key exchange}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {10}, number = {3}, pages = {10}, year = {2007}, url = {https://doi.org/10.1145/1266977.1266979}, doi = {10.1145/1266977.1266979}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BressonCP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BringerCIPTZ07, author = {Julien Bringer and Herv{\'{e}} Chabanne and Malika Izabach{\`{e}}ne and David Pointcheval and Qiang Tang and S{\'{e}}bastien Zimmer}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {96--106}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_8}, doi = {10.1007/978-3-540-73458-1\_8}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BringerCIPTZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/BringerCPT07, author = {Julien Bringer and Herv{\'{e}} Chabanne and David Pointcheval and Qiang Tang}, editor = {Feng Bao and San Ling and Tatsuaki Okamoto and Huaxiong Wang and Chaoping Xing}, title = {Extended Private Information Retrieval and Its Application in Biometrics Authentications}, booktitle = {Cryptology and Network Security, 6th International Conference, {CANS} 2007, Singapore, December 8-10, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4856}, pages = {175--193}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76969-9\_12}, doi = {10.1007/978-3-540-76969-9\_12}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/BringerCPT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/DelerableePP07, author = {C{\'{e}}cile Delerabl{\'{e}}e and Pascal Paillier and David Pointcheval}, editor = {Tsuyoshi Takagi and Tatsuaki Okamoto and Eiji Okamoto and Takeshi Okamoto}, title = {Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys}, booktitle = {Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4575}, pages = {39--59}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73489-5\_4}, doi = {10.1007/978-3-540-73489-5\_4}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/DelerableePP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbdallaP06, author = {Michel Abdalla and David Pointcheval}, editor = {Xuejia Lai and Kefei Chen}, title = {A Scalable Password-Based Group Key Exchange Protocol in the Standard Model}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4284}, pages = {332--347}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935230\_22}, doi = {10.1007/11935230\_22}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbdallaP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AbdallaBCMP06, author = {Michel Abdalla and Emmanuel Bresson and Olivier Chevassut and Bodo M{\"{o}}ller and David Pointcheval}, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {Provably secure password-based authentication in {TLS}}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, pages = {35--45}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1128817.1128827}, doi = {10.1145/1128817.1128827}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AbdallaBCMP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlanchetP06, author = {Bruno Blanchet and David Pointcheval}, editor = {Cynthia Dwork}, title = {Automated Security Proofs with Sequences of Games}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {537--554}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_32}, doi = {10.1007/11818175\_32}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlanchetP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/FouquePSZ06, author = {Pierre{-}Alain Fouque and David Pointcheval and Jacques Stern and S{\'{e}}bastien Zimmer}, editor = {Michele Bugliesi and Bart Preneel and Vladimiro Sassone and Ingo Wegener}, title = {Hardness of Distinguishing the {MSB} or {LSB} of Secret Keys in Diffie-Hellman Schemes}, booktitle = {Automata, Languages and Programming, 33rd International Colloquium, {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4052}, pages = {240--251}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11787006\_21}, doi = {10.1007/11787006\_21}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/FouquePSZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Chevallier-MamesPP06, author = {Beno{\^{\i}}t Chevallier{-}Mames and Pascal Paillier and David Pointcheval}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Encoding-Free ElGamal Encryption Without Random Oracles}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {91--104}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_7}, doi = {10.1007/11745853\_7}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Chevallier-MamesPP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChevassutFGP06, author = {Olivier Chevassut and Pierre{-}Alain Fouque and Pierrick Gaudry and David Pointcheval}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {The Twist-AUgmented Technique for Key Exchange}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {410--426}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_27}, doi = {10.1007/11745853\_27}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/ChevassutFGP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaBCP06, author = {Michel Abdalla and Emmanuel Bresson and Olivier Chevassut and David Pointcheval}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Password-Based Group Key Exchange in a Constant Number of Rounds}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {427--442}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_28}, doi = {10.1007/11745853\_28}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaBCP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Kunz-JacquesP06, author = {S{\'{e}}bastien Kunz{-}Jacques and David Pointcheval}, editor = {Roberto De Prisco and Moti Yung}, title = {About the Security of {MTI/C0} and {MQV}}, booktitle = {Security and Cryptography for Networks, 5th International Conference, {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4116}, pages = {156--172}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11832072\_11}, doi = {10.1007/11832072\_11}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/Kunz-JacquesP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Kunz-JacquesP06a, author = {S{\'{e}}bastien Kunz{-}Jacques and David Pointcheval}, editor = {Roberto De Prisco and Moti Yung}, title = {A New Key Exchange Protocol Based on {MQV} Assuming Public Computations}, booktitle = {Security and Cryptography for Networks, 5th International Conference, {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4116}, pages = {186--200}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11832072\_13}, doi = {10.1007/11832072\_13}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/Kunz-JacquesP06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vietcrypt/DelerableeP06, author = {C{\'{e}}cile Delerabl{\'{e}}e and David Pointcheval}, editor = {Phong Q. Nguyen}, title = {Dynamic Fully Anonymous Short Group Signatures}, booktitle = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4341}, pages = {193--210}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11958239\_13}, doi = {10.1007/11958239\_13}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/vietcrypt/DelerableeP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cans/2006, editor = {David Pointcheval and Yi Mu and Kefei Chen}, title = {Cryptology and Network Security, 5th International Conference, {CANS} 2006, Suzhou, China, December 8-10, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4301}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935070}, doi = {10.1007/11935070}, isbn = {3-540-49462-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ctrsa/2006, editor = {David Pointcheval}, title = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3860}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11605805}, doi = {10.1007/11605805}, isbn = {3-540-31033-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlanchetP06, author = {Bruno Blanchet and David Pointcheval}, title = {Automated Security Proofs with Sequences of Games}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2006}, url = {http://eprint.iacr.org/2006/069}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlanchetP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0018105, author = {Dario Catalano and Ronald Cramer and Ivan Bjerre Damg{\aa}rd and Giovanni Di Crescenzo and David Pointcheval}, title = {Contemporary cryptology}, series = {Advanced courses in mathematics : {CRM} Barcelona}, publisher = {Birkh{\"{a}}user}, year = {2005}, isbn = {978-3-7643-7294-1}, timestamp = {Fri, 12 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0018105.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Chevallier-MamesPP05, author = {Beno{\^{\i}}t Chevallier{-}Mames and Duong Hieu Phan and David Pointcheval}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Optimal Asymmetric Encryption and Signature Paddings}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {254--268}, year = {2005}, url = {https://doi.org/10.1007/11496137\_18}, doi = {10.1007/11496137\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/Chevallier-MamesPP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbdallaCFP05, author = {Michel Abdalla and Olivier Chevassut and Pierre{-}Alain Fouque and David Pointcheval}, editor = {Bimal K. Roy}, title = {A Simple Threshold Authenticated Key Exchange from Short Secrets}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3788}, pages = {566--584}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593447\_31}, doi = {10.1007/11593447\_31}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbdallaCFP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AbdallaP05, author = {Michel Abdalla and David Pointcheval}, editor = {Alfred Menezes}, title = {Simple Password-Based Encrypted Key Exchange Protocols}, booktitle = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3376}, pages = {191--208}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30574-3\_14}, doi = {10.1007/978-3-540-30574-3\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/AbdallaP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChabannePP05, author = {Herv{\'{e}} Chabanne and Duong Hieu Phan and David Pointcheval}, editor = {Ronald Cramer}, title = {Public Traceability in Traitor Tracing Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {542--558}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_32}, doi = {10.1007/11426639\_32}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChabannePP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AbdallaP05, author = {Michel Abdalla and David Pointcheval}, editor = {Andrew S. Patrick and Moti Yung}, title = {Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {341--356}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_31}, doi = {10.1007/11507840\_31}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/AbdallaP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaCP05, author = {Michel Abdalla and Olivier Chevassut and David Pointcheval}, editor = {Serge Vaudenay}, title = {One-Time Verifier-Based Encrypted Key Exchange}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {47--64}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_5}, doi = {10.1007/978-3-540-30580-4\_5}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaCP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaFP05, author = {Michel Abdalla and Pierre{-}Alain Fouque and David Pointcheval}, editor = {Serge Vaudenay}, title = {Password-Based Authenticated Key Exchange in the Three-Party Setting}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {65--84}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_6}, doi = {10.1007/978-3-540-30580-4\_6}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaFP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Pointcheval05, author = {David Pointcheval}, editor = {Henk C. A. van Tilborg}, title = {{OAEP:} Optimal Asymmetric Encryption Padding}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_284}, doi = {10.1007/0-387-23483-7\_284}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Pointcheval05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Pointcheval05a, author = {David Pointcheval}, editor = {Henk C. A. van Tilborg}, title = {Rabin Cryptosystem}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_339}, doi = {10.1007/0-387-23483-7\_339}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Pointcheval05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Pointcheval05b, author = {David Pointcheval}, editor = {Henk C. A. van Tilborg}, title = {{RSA} Public-Key Encryption}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_364}, doi = {10.1007/0-387-23483-7\_364}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Pointcheval05b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChevassutFGP05, author = {Olivier Chevassut and Pierre{-}Alain Fouque and Pierrick Gaudry and David Pointcheval}, title = {Key Derivation and Randomness Extraction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {61}, year = {2005}, url = {http://eprint.iacr.org/2005/061}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChevassutFGP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/BressonCEP04, author = {Emmanuel Bresson and Olivier Chevassut and Abdelilah Essiari and David Pointcheval}, title = {Mutual authentication and group key agreement for low-power mobile devices}, journal = {Comput. Commun.}, volume = {27}, number = {17}, pages = {1730--1737}, year = {2004}, url = {https://doi.org/10.1016/j.comcom.2004.05.023}, doi = {10.1016/J.COMCOM.2004.05.023}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/BressonCEP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/FujisakiOPS04, author = {Eiichiro Fujisaki and Tatsuaki Okamoto and David Pointcheval and Jacques Stern}, title = {{RSA-OAEP} Is Secure under the {RSA} Assumption}, journal = {J. Cryptol.}, volume = {17}, number = {2}, pages = {81--104}, year = {2004}, url = {https://doi.org/10.1007/s00145-002-0204-y}, doi = {10.1007/S00145-002-0204-Y}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/FujisakiOPS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PhanP04, author = {Duong Hieu Phan and David Pointcheval}, editor = {Pil Joong Lee}, title = {{OAEP} 3-Round: {A} Generic and Secure Asymmetric Encryption Padding}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3329}, pages = {63--77}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30539-2\_5}, doi = {10.1007/978-3-540-30539-2\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PhanP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Chevallier-MamesNPP04, author = {Beno{\^{\i}}t Chevallier{-}Mames and David Naccache and Pascal Paillier and David Pointcheval}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {How to Disembed a Program?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {441--454}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_32}, doi = {10.1007/978-3-540-28632-5\_32}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/Chevallier-MamesNPP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CatalanoPP04, author = {Dario Catalano and David Pointcheval and Thomas Pornin}, editor = {Matthew K. Franklin}, title = {{IPAKE:} Isomorphisms for Password-Based Authenticated Key Exchange}, booktitle = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3152}, pages = {477--493}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28628-8\_29}, doi = {10.1007/978-3-540-28628-8\_29}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CatalanoPP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BressonCP04, author = {Emmanuel Bresson and Olivier Chevassut and David Pointcheval}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {New Security Results on Encrypted Key Exchange}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {145--158}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_11}, doi = {10.1007/978-3-540-24632-9\_11}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BressonCP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/PhanP04, author = {Duong Hieu Phan and David Pointcheval}, editor = {Helena Handschuh and M. Anwar Hasan}, title = {About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations)}, booktitle = {Selected Areas in Cryptography, 11th International Workshop, {SAC} 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3357}, pages = {182--197}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30564-4\_13}, doi = {10.1007/978-3-540-30564-4\_13}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/PhanP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/PhanP04, author = {Duong Hieu Phan and David Pointcheval}, editor = {Carlo Blundo and Stelvio Cimato}, title = {On the Security Notions for Public-Key Encryption Schemes}, booktitle = {Security in Communication Networks, 4th International Conference, {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3352}, pages = {33--46}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30598-9\_3}, doi = {10.1007/978-3-540-30598-9\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/PhanP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chevallier-MamesNPP04, author = {Beno{\^{\i}}t Chevallier{-}Mames and David Naccache and Pascal Paillier and David Pointcheval}, title = {How to Disembed a Program?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {138}, year = {2004}, url = {http://eprint.iacr.org/2004/138}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chevallier-MamesNPP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaFP04, author = {Michel Abdalla and Pierre{-}Alain Fouque and David Pointcheval}, title = {Password-Based Authenticated Key Exchange in the Three-Party Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {233}, year = {2004}, url = {http://eprint.iacr.org/2004/233}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaFP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PointchevalP03, author = {David Pointcheval and Guillaume Poupard}, title = {A New NP-Complete Problem and Public-Key Identification}, journal = {Des. Codes Cryptogr.}, volume = {28}, number = {1}, pages = {5--31}, year = {2003}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PointchevalP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BellareNPS03, author = {Mihir Bellare and Chanathip Namprempre and David Pointcheval and Michael Semanko}, title = {The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme}, journal = {J. Cryptol.}, volume = {16}, number = {3}, pages = {185--215}, year = {2003}, url = {https://doi.org/10.1007/s00145-002-0120-1}, doi = {10.1007/S00145-002-0120-1}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BellareNPS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PieprzykP03, author = {Josef Pieprzyk and David Pointcheval}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Josef Pieprzyk, David Pointcheval}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {387--401}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_33}, doi = {10.1007/3-540-45067-X\_33}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PieprzykP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PhanP03, author = {Duong Hieu Phan and David Pointcheval}, editor = {Chi{-}Sung Laih}, title = {Chosen-Ciphertext Security without Redundancy}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2894}, pages = {1--18}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40061-5\_1}, doi = {10.1007/978-3-540-40061-5\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PhanP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BressonCP03, author = {Emmanuel Bresson and Dario Catalano and David Pointcheval}, editor = {Chi{-}Sung Laih}, title = {A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2894}, pages = {37--54}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40061-5\_3}, doi = {10.1007/978-3-540-40061-5\_3}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BressonCP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BressonCP03, author = {Emmanuel Bresson and Olivier Chevassut and David Pointcheval}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Security proofs for an efficient password-based key exchange}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {241--250}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948142}, doi = {10.1145/948109.948142}, timestamp = {Tue, 10 Nov 2020 20:00:42 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BressonCP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Howgrave-GrahamNPPSSW03, author = {Nick Howgrave{-}Graham and Phong Q. Nguyen and David Pointcheval and John Proos and Joseph H. Silverman and Ari Singer and William Whyte}, editor = {Dan Boneh}, title = {The Impact of Decryption Failures on the Security of {NTRU} Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2729}, pages = {226--246}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45146-4\_14}, doi = {10.1007/978-3-540-45146-4\_14}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Howgrave-GrahamNPPSSW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mwcn/BressonCEP03, author = {Emmanuel Bresson and Olivier Chevassut and Abdelilah Essiari and David Pointcheval}, editor = {Khaldoun Al Agha and Cambyse Guy Omidyar}, title = {Mutual Authentication and Group Key Agreement for low-Power Mobile Devices}, booktitle = {Mobile and Wireless Communications Networks - Proceedings of the Fifth {IFIP-TC6} International Conference, Singapore, October 27-29, 2003}, publisher = {World Scientific}, year = {2003}, url = {https://doi.org/10.1142/9789812791146\_0013}, doi = {10.1142/9789812791146\_0013}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mwcn/BressonCEP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rivf/PhanP03, author = {Duong Hieu Phan and David Pointcheval}, title = {Une comparaison entre deux m{\'{e}}thodes de preuve de s{\'{e}}curit{\'{e}}}, booktitle = {Actes de la Premi{\`{e}}re Conf{\'{e}}rence Internationale RIVF'03 Rencontres en Informatique Vietnam-France, RIVF'03, Hanoi, Vietnam, 10-13 F{\'{e}}vrier, 2003}, pages = {105--110}, publisher = {Editions Suger, Paris}, year = {2003}, url = {http://www.e-ifi.org/rivf2003/proceedings/p105-110.pdf}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rivf/PhanP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BressonCP02, author = {Emmanuel Bresson and Olivier Chevassut and David Pointcheval}, editor = {Yuliang Zheng}, title = {Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2501}, pages = {497--514}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36178-2\_31}, doi = {10.1007/3-540-36178-2\_31}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BressonCP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SternPMS02, author = {Jacques Stern and David Pointcheval and John Malone{-}Lee and Nigel P. Smart}, editor = {Moti Yung}, title = {Flaws in Applying Proof Methodologies to Signature Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2442}, pages = {93--110}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45708-9\_7}, doi = {10.1007/3-540-45708-9\_7}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SternPMS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NguyenP02, author = {Phong Q. Nguyen and David Pointcheval}, editor = {Moti Yung}, title = {Analysis and Improvements of {NTRU} Encryption Paddings}, booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2442}, pages = {210--225}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45708-9\_14}, doi = {10.1007/3-540-45708-9\_14}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/NguyenP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/CoronHJPPT02, author = {Jean{-}S{\'{e}}bastien Coron and Helena Handschuh and Marc Joye and Pascal Paillier and David Pointcheval and Christophe Tymen}, editor = {Bart Preneel}, title = {{GEM:} {A} Generic Chosen-Ciphertext Secure Encryption Method}, booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2271}, pages = {263--276}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45760-7\_18}, doi = {10.1007/3-540-45760-7\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/CoronHJPPT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BressonCP02, author = {Emmanuel Bresson and Olivier Chevassut and David Pointcheval}, editor = {Lars R. Knudsen}, title = {Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {321--336}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_21}, doi = {10.1007/3-540-46035-7\_21}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BressonCP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CoronHJPPT02, author = {Jean{-}S{\'{e}}bastien Coron and Helena Handschuh and Marc Joye and Pascal Paillier and David Pointcheval and Christophe Tymen}, editor = {David Naccache and Pascal Paillier}, title = {Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {17--33}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_2}, doi = {10.1007/3-540-45664-3\_2}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CoronHJPPT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BressonCP02, author = {Emmanuel Bresson and Olivier Chevassut and David Pointcheval}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {The Group Diffie-Hellman Problems}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {325--338}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_21}, doi = {10.1007/3-540-36492-7\_21}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BressonCP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronHJPPT02, author = {Jean{-}S{\'{e}}bastien Coron and Helena Handschuh and Marc Joye and Pascal Paillier and David Pointcheval and Christophe Tymen}, title = {Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2002}, url = {http://eprint.iacr.org/2002/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronHJPPT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BressonCP02, author = {Emmanuel Bresson and Olivier Chevassut and David Pointcheval}, title = {Security Proofs for an Efficient Password-Based Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {192}, year = {2002}, url = {http://eprint.iacr.org/2002/192}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BressonCP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BressonCP01, author = {Emmanuel Bresson and Olivier Chevassut and David Pointcheval}, editor = {Colin Boyd}, title = {Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2248}, pages = {290--309}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45682-1\_18}, doi = {10.1007/3-540-45682-1\_18}, timestamp = {Tue, 01 Jun 2021 15:22:33 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BressonCP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FouqueP01, author = {Pierre{-}Alain Fouque and David Pointcheval}, editor = {Colin Boyd}, title = {Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2248}, pages = {351--368}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45682-1\_21}, doi = {10.1007/3-540-45682-1\_21}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/FouqueP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BellareBDP01, author = {Mihir Bellare and Alexandra Boldyreva and Anand Desai and David Pointcheval}, editor = {Colin Boyd}, title = {Key-Privacy in Public-Key Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2248}, pages = {566--582}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45682-1\_33}, doi = {10.1007/3-540-45682-1\_33}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BellareBDP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NaccachePS01, author = {David Naccache and David Pointcheval and Jacques Stern}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Twin signatures: an alternative to the hash-and-sign paradigm}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {20--27}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.501987}, doi = {10.1145/501983.501987}, timestamp = {Tue, 10 Nov 2020 20:00:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NaccachePS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BressonCPQ01, author = {Emmanuel Bresson and Olivier Chevassut and David Pointcheval and Jean{-}Jacques Quisquater}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Provably authenticated group Diffie-Hellman key exchange}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {255--264}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502018}, doi = {10.1145/501983.502018}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BressonCPQ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FujisakiOPS01, author = {Eiichiro Fujisaki and Tatsuaki Okamoto and David Pointcheval and Jacques Stern}, editor = {Joe Kilian}, title = {{RSA-OAEP} Is Secure under the {RSA} Assumption}, booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {260--274}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44647-8\_16}, doi = {10.1007/3-540-44647-8\_16}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FujisakiOPS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/JakobssonPY01, author = {Markus Jakobsson and David Pointcheval and Adam L. Young}, editor = {David Naccache}, title = {Secure Mobile Gambling}, booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2020}, pages = {110--125}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45353-9\_10}, doi = {10.1007/3-540-45353-9\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/JakobssonPY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/OkamotoP01, author = {Tatsuaki Okamoto and David Pointcheval}, editor = {David Naccache}, title = {{REACT:} Rapid Enhanced-Security Asymmetric Cryptosystem Transform}, booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2020}, pages = {159--175}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45353-9\_13}, doi = {10.1007/3-540-45353-9\_13}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/OkamotoP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/JakobssonP01, author = {Markus Jakobsson and David Pointcheval}, editor = {Paul F. Syverson}, title = {Mutual Authentication for Low-Power Mobile Devices}, booktitle = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2339}, pages = {169--186}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-46088-8\_17}, doi = {10.1007/3-540-46088-8\_17}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/JakobssonP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/NaccachePT01, author = {David Naccache and David Pointcheval and Christophe Tymen}, editor = {Paul F. Syverson}, title = {Monotone Signatures}, booktitle = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2339}, pages = {295--308}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-46088-8\_24}, doi = {10.1007/3-540-46088-8\_24}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/NaccachePT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BellareNPS01, author = {Mihir Bellare and Chanathip Namprempre and David Pointcheval and Michael Semanko}, editor = {Paul F. Syverson}, title = {The Power of {RSA} Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme}, booktitle = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2339}, pages = {309--328}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-46088-8\_25}, doi = {10.1007/3-540-46088-8\_25}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/BellareNPS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Pointcheval01, author = {David Pointcheval}, editor = {Kwangjo Kim}, title = {Practical Security in Public-Key Cryptography}, booktitle = {Information Security and Cryptology - {ICISC} 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2288}, pages = {1--17}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45861-1\_1}, doi = {10.1007/3-540-45861-1\_1}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Pointcheval01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/OkamotoP01, author = {Tatsuaki Okamoto and David Pointcheval}, editor = {Kwangjo Kim}, title = {The Gap-Problems: {A} New Class of Problems for the Security of Cryptographic Schemes}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {104--118}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_8}, doi = {10.1007/3-540-44586-2\_8}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/OkamotoP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/BaudronFPSP01, author = {Olivier Baudron and Pierre{-}Alain Fouque and David Pointcheval and Jacques Stern and Guillaume Poupard}, editor = {Ajay D. Kshemkalyani and Nir Shavit}, title = {Practical multi-candidate election system}, booktitle = {Proceedings of the Twentieth Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2001, Newport, Rhode Island, USA, August 26-29, 2001}, pages = {274--283}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/383962.384044}, doi = {10.1145/383962.384044}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/BaudronFPSP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareNPS01, author = {Mihir Bellare and Chanathip Namprempre and David Pointcheval and Michael Semanko}, title = {The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {2001}, url = {http://eprint.iacr.org/2001/002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareNPS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/PointchevalS00, author = {David Pointcheval and Jacques Stern}, title = {Security Arguments for Digital Signatures and Blind Signatures}, journal = {J. Cryptol.}, volume = {13}, number = {3}, pages = {361--396}, year = {2000}, url = {https://doi.org/10.1007/s001450010003}, doi = {10.1007/S001450010003}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/PointchevalS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellarePR00, author = {Mihir Bellare and David Pointcheval and Phillip Rogaway}, editor = {Bart Preneel}, title = {Authenticated Key Exchange Secure against Dictionary Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1807}, pages = {139--155}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45539-6\_11}, doi = {10.1007/3-540-45539-6\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellarePR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Pointcheval00, author = {David Pointcheval}, editor = {Yair Frankel}, title = {Self-Scrambling Anonymizers}, booktitle = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1962}, pages = {259--275}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45472-1\_18}, doi = {10.1007/3-540-45472-1\_18}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Pointcheval00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/BaudronPS00, author = {Olivier Baudron and David Pointcheval and Jacques Stern}, editor = {Ugo Montanari and Jos{\'{e}} D. P. Rolim and Emo Welzl}, title = {Extended Notions of Security for Multicast Public Key Cryptosystems}, booktitle = {Automata, Languages and Programming, 27th International Colloquium, {ICALP} 2000, Geneva, Switzerland, July 9-15, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1853}, pages = {499--511}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45022-X\_42}, doi = {10.1007/3-540-45022-X\_42}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/BaudronPS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Pointcheval00, author = {David Pointcheval}, editor = {Hideki Imai and Yuliang Zheng}, title = {The Composite Discrete Logarithm and Secure Authentication}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {113--128}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_9}, doi = {10.1007/978-3-540-46588-1\_9}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Pointcheval00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Pointcheval00a, author = {David Pointcheval}, editor = {Hideki Imai and Yuliang Zheng}, title = {Chosen-Ciphertext Security for Any One-Way Cryptosystem}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {129--146}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_10}, doi = {10.1007/978-3-540-46588-1\_10}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Pointcheval00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrickellPVY00, author = {Ernest F. Brickell and David Pointcheval and Serge Vaudenay and Moti Yung}, editor = {Hideki Imai and Yuliang Zheng}, title = {Design Validations for Discrete Logarithm Based Signature Schemes}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {276--292}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_19}, doi = {10.1007/978-3-540-46588-1\_19}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BrickellPVY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellarePR00, author = {Mihir Bellare and David Pointcheval and Phillip Rogaway}, title = {Authenticated Key Exchange Secure Against Dictionary Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {2000}, url = {http://eprint.iacr.org/2000/014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellarePR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FujisakiOPS00, author = {Eiichiro Fujisaki and Tatsuaki Okamoto and David Pointcheval and Jacques Stern}, title = {{RSA-OAEP} is Secure under the {RSA} Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {61}, year = {2000}, url = {http://eprint.iacr.org/2000/061}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FujisakiOPS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PaillierP99, author = {Pascal Paillier and David Pointcheval}, editor = {Kwok{-}Yan Lam and Eiji Okamoto and Chaoping Xing}, title = {Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries}, booktitle = {Advances in Cryptology - {ASIACRYPT} '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1716}, pages = {165--179}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-48000-6\_14}, doi = {10.1007/978-3-540-48000-6\_14}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PaillierP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Pointcheval99, author = {David Pointcheval}, editor = {Jacques Stern}, title = {New Public Key Cryptosystems Based on the Dependent-RSA Problems}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {239--254}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_17}, doi = {10.1007/3-540-48910-X\_17}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Pointcheval99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareDPR98, author = {Mihir Bellare and Anand Desai and David Pointcheval and Phillip Rogaway}, editor = {Hugo Krawczyk}, title = {Relations Among Notions of Security for Public-Key Encryption Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1462}, pages = {26--45}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055718}, doi = {10.1007/BFB0055718}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareDPR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Pointcheval98, author = {David Pointcheval}, editor = {Kaisa Nyberg}, title = {Strengthened Security for Blind Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {391--405}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054141}, doi = {10.1007/BFB0054141}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Pointcheval98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MRaihiP98, author = {David M'Ra{\"{\i}}hi and David Pointcheval}, editor = {Rafael Hirschfeld}, title = {Distributed Trustees and Revocability: {A} Framework for Internet Payment}, booktitle = {Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1465}, pages = {28--42}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055471}, doi = {10.1007/BFB0055471}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/MRaihiP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/MRaihiNPV98, author = {David M'Ra{\"{\i}}hi and David Naccache and David Pointcheval and Serge Vaudenay}, editor = {Stafford E. Tavares and Henk Meijer}, title = {Computational Alternatives to Random Number Generators}, booktitle = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1556}, pages = {72--80}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-48892-8\_6}, doi = {10.1007/3-540-48892-8\_6}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/MRaihiNPV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareDPR98, author = {Mihir Bellare and Anand Desai and David Pointcheval and Phillip Rogaway}, title = {Relations among Notions of Security for Public-Key Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {1998}, url = {http://eprint.iacr.org/1998/021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareDPR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PointchevalS97, author = {David Pointcheval and Jacques Stern}, editor = {Richard Graveman and Philippe A. Janson and Clifford Neuman and Li Gong}, title = {New Blind Signatures Equivalent to Factorization (extended abstract)}, booktitle = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and Communications Security, Zurich, Switzerland, April 1-4, 1997}, pages = {92--99}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/266420.266440}, doi = {10.1145/266420.266440}, timestamp = {Tue, 10 Nov 2020 20:00:22 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PointchevalS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PointchevalS96, author = {David Pointcheval and Jacques Stern}, editor = {Kwangjo Kim and Tsutomu Matsumoto}, title = {Provably Secure Blind Signature Schemes}, booktitle = {Advances in Cryptology - {ASIACRYPT} '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1163}, pages = {252--265}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/BFb0034852}, doi = {10.1007/BFB0034852}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PointchevalS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PointchevalS96, author = {David Pointcheval and Jacques Stern}, editor = {Ueli M. Maurer}, title = {Security Proofs for Signature Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1070}, pages = {387--398}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68339-9\_33}, doi = {10.1007/3-540-68339-9\_33}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PointchevalS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Pointcheval95, author = {David Pointcheval}, editor = {Louis C. Guillou and Jean{-}Jacques Quisquater}, title = {A New Identification Scheme Based on the Perceptrons Problem}, booktitle = {Advances in Cryptology - {EUROCRYPT} '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {921}, pages = {319--328}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-49264-X\_26}, doi = {10.1007/3-540-49264-X\_26}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Pointcheval95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.