EN FR
EN FR


Bibliography

Major publications by the team in recent years
  • 1M. Abdalla, D. Catalano, D. Fiore.

    Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions, in: Journal of Cryptology, 2014, vol. 27, no 3, pp. 544-593.
  • 2M. Abe, G. Fuchsbauer, J. Groth, K. Haralambiev, M. Ohkubo.

    Structure-Preserving Signatures and Commitments to Group Elements, in: Journal of Cryptology, 2016, vol. 29, no 2, pp. 363–421.
  • 3F. Benhamouda, O. Blazy, C. Chevalier, D. Pointcheval, D. Vergnaud.

    New Techniques for SPHFs and Efficient One-Round PAKE Protocols, in: Advances in Cryptology – Proceedings of CRYPTO '13 (1), R. Canetti, J. A. Garay (editors), Lecture Notes in Computer Science, Springer, 2013, vol. 8042, pp. 449-475.
  • 4P. Chaidos, V. Cortier, G. Fuchsbauer, D. Galindo.

    BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme, in: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16), E. R. Weippl, S. Katzenbeisser, C. Kruegel, A. C. Myers, S. Halevi (editors), ACM Press, 2016, pp. 1614–1625.
  • 5I. Dinur, O. Dunkelman, N. Keller, A. Shamir.

    New Attacks on Feistel Structures with Improved Memory Complexities, in: Advances in Cryptology – Proceedings of CRYPTO '15 (1), R. Gennaro, M. Robshaw (editors), Lecture Notes in Computer Science, Springer, 2015, vol. 9215, pp. 433-454.
  • 6Y. Dodis, D. Pointcheval, S. Ruhault, D. Vergnaud, D. Wichs.

    Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust, in: Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '13), Berlin, Germany, V. D. Gligor, M. Yung (editors), ACM Press, 2013, pp. 647–658.
  • 7R. Gay, D. Hofheinz, E. Kiltz, H. Wee.

    Tightly CCA-Secure Encryption Without Pairings, in: Advances in Cryptology – Proceedings of Eurocrypt '16 (2), M. Fischlin, J.-S. Coron (editors), Lecture Notes in Computer Science, Springer, 2016, vol. 9665, pp. 1–27.
  • 8S. Gorbunov, V. Vaikuntanathan, H. Wee.

    Predicate Encryption for Circuits from LWE, in: Advances in Cryptology – Proceedings of CRYPTO '15 (2), R. Gennaro, M. Robshaw (editors), Lecture Notes in Computer Science, Springer, 2015, vol. 9216, pp. 503-523.
  • 9V. Lyubashevsky, C. Peikert, O. Regev.

    On Ideal Lattices and Learning with Errors over Rings, in: Journal of the ACM, 2013, vol. 60, no 6, pp. 43:1–43:35.
  • 10V. Lyubashevsky, T. Prest.

    Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices, in: Advances in Cryptology – Proceedings of Eurocrypt '15 (1), E. Oswald, M. Fischlin (editors), Lecture Notes in Computer Science, Springer, 2015, vol. 9056, pp. 789-815.
Publications of the year

Doctoral Dissertations and Habilitation Theses

Articles in International Peer-Reviewed Journals

  • 15M. Abdalla, M. Bellare, G. Neven.

    Robust Encryption, in: Journal of Cryptology, June 2017. [ DOI : 10.1007/s00145-017-9258-8 ]

    https://hal.archives-ouvertes.fr/hal-01538113
  • 16C. Carlet, P. Méaux, Y. Rotella.

    Boolean functions with restricted input and their robustness; application to the FLIP cipher, in: IACR Transactions on Symmetric Cryptology, 2017, vol. 2017, no 3, pp. 192–227. [ DOI : 10.13154/tosc.v2017.i3.192-227 ]

    https://hal.inria.fr/hal-01633506
  • 17P. Farshim, L. Khati, D. Vergnaud.

    Security of Even-Mansour Ciphers under Key-Dependent Messages, in: IACR Transactions on Symmetric Cryptology, 2017, vol. 2017, no 2, pp. 84-104. [ DOI : 10.13154/tosc.v2017.i2.84-104 ]

    https://hal.inria.fr/hal-01613782
  • 18P. Farshim, C. Orlandi, R. Roşie.

    Security of Symmetric Primitives under Incorrect Usage of Keys, in: IACR Transactions on Symmetric Cryptology, 2017. [ DOI : 10.13154/tosc.v2017.i1.449-473 ]

    https://hal-ens.archives-ouvertes.fr/hal-01470885
  • 19T. Mefenza, D. Vergnaud.

    Polynomial Interpolation of the Naor-Reingold Pseudo-Random Function, in: Applicable Algebra in Engineering, Communication and Computing, June 2017, vol. 28, no 3, pp. 237-255. [ DOI : 10.1007/s00200-016-0309-4 ]

    https://hal.inria.fr/hal-01550044
  • 20D. Vergnaud.

    Comment on ‘Attribute-Based Signatures for Supporting Anonymous Certification’ by N. Kaaniche and M. Laurent (ESORICS 2016) , in: The Computer Journal (Oxford), 2017. [ DOI : 10.1093/comjnl/bxx058 ]

    https://hal.inria.fr/hal-01613813

International Conferences with Proceedings

  • 21M. Abdalla, F. Benhamouda, D. Pointcheval.

    Removing Erasures with Explainable Hash Proof Systems, in: Public-Key Cryptography - PKC 2017 - 20th International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, Netherlands, S. Fehr (editor), Springer, March 2017, vol. 10174, no Part I, pp. 151-174. [ DOI : 10.1007/978-3-662-54365-8_7 ]

    https://hal.inria.fr/hal-01471896
  • 22M. Abdalla, R. Gay, M. Raykova, H. Wee.

    Multi-Input Inner-Product Functional Encryption from Pairings, in: EUROCRYPT 2017 - Advances in Cryptology, Paris, France, Lecture Notes in Computer Science, April 2017, vol. 10210, pp. 601-626. [ DOI : 10.1007/978-3-319-56620-7_21 ]

    https://hal.archives-ouvertes.fr/hal-01524105
  • 23M. Ambrona, G. Barthe, R. Gay, H. Wee.

    Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions, in: ACM Conference on Computer and Communications Security (CCS) 2017, Dallas, United States, October 2017.

    https://hal.inria.fr/hal-01599851
  • 24S. Belaid, F. Benhamouda, A. Passelègue, E. Prouff, A. Thillard, D. Vergnaud.

    Private Multiplication over Finite Fields, in: Advances in Cryptology - CRYPTO 2017, Santa Barbara, United States, J. Katz, H. Shacham (editors), Lecture Notes in Computer Science, Springer, August 2017, vol. 10403, pp. 397-426. [ DOI : 10.1007/978-3-319-63697-9_14 ]

    https://hal.inria.fr/hal-01613773
  • 25F. Benhamouda, F. Bourse, H. Lipmaa.

    CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions, in: PKC 2017 - IACR International Workshop on Public Key Cryptography, Amsterdam, Netherlands, Lecture Notes in Computer Science, Springer, March 2017, vol. 10175, pp. 36-66. [ DOI : 10.1007/978-3-662-54388-7_2 ]

    https://hal.archives-ouvertes.fr/hal-01613546
  • 26M. Beunardeau, A. Connolly, H. Ferradi, R. Géraud, D. Naccache, D. Vergnaud.

    Reusing Nonces in Schnorr Signatures: (and Keeping It Secure...), in: Computer Security - ESORICS 2017, Oslo, Norway, S. N. Foley, D. Gollmann, E. Snekkenes (editors), Lecture Notes in Computer Science, Springer, September 2017, vol. 10492, pp. 224-241. [ DOI : 10.1007/978-3-319-66402-6_14 ]

    https://hal.inria.fr/hal-01613794
  • 27A. Boldyreva, S. Chen, P.-A. Dupont, D. Pointcheval.

    Human Computing for Handling Strong Corruptions in Authenticated Key Exchange, in: CSF 2017 - 30th IEEE Computer Security Foundations Symposium, Santa Barbara, CA, United States, Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF '17), IEEE, August 2017, pp. 159 - 175. [ DOI : 10.1109/CSF.2017.31 ]

    https://hal.inria.fr/hal-01628797
  • 28E. Boyle, G. Couteau, N. Gilboa, Y. Ishai, M. Orrù.

    Homomorphic Secret Sharing: Optimizations and Applications, in: CCS '17 - ACM SIGSAC Conference on Computer and Communications Security, Dallas, United States, ACM, October 2017.

    https://hal.inria.fr/hal-01614451
  • 29J. Chotard, D. H. Phan, D. Pointcheval.

    Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms, in: 20th International Conference on Information Security (ISC '17), Ho Chi Minh, Vietnam, Proceedings of the 20th International Conference on Information Security (ISC '17), Springer Verlag, November 2017, vol. Lecture Notes in Computer Science, no 10599. [ DOI : 10.1007/978-3-319-69659-1_9 ]

    https://hal.inria.fr/hal-01609278
  • 30G. Couteau, T. Peters, D. Pointcheval.

    Removing the Strong RSA Assumption from Arguments over the Integers, in: EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 2017. [ DOI : 10.1007/978-3-319-56614-6_11 ]

    https://hal.inria.fr/hal-01471901
  • 31P.-A. Dupont, D. Pointcheval.

    Functional Encryption with Oblivious Helper, in: ASIA CCS'17, Abu Dhabi, United Arab Emirates, April 2017. [ DOI : 10.1145/3052973.3052996 ]

    https://hal.inria.fr/hal-01470375
  • 32C. Elisabetta Zaira Baltico, D. Catalano, D. Fiore, R. Gay.

    Practical Functional Encryption for Quadratic Functions withApplications to Predicate Encryption, in: Advances in Cryptology – CRYPTO 2017, Santa Barbara, United States, Springer, August 2017, vol. LNCS, no 10401, pp. 67-98.

    https://hal.inria.fr/hal-01599768
  • 33G. Fuchsbauer, R. Gay, L. Kowalczyk, C. Orlandi.

    Access Control Encryption for Equality, Comparison, and More, in: Public-Key Cryptography - PKC 2017 - 20th International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, Netherlands, March 2017, pp. 88-118. [ DOI : 10.1007/978-3-662-54388-7_4 ]

    https://hal.inria.fr/hal-01470315
  • 34R. Gay, D. Hofheinz, L. Kohl.

    Kurosawa-Desmedt Meets Tight Security, in: CRYPTO 2017 - Advances in Cryptology, Santa Barbara, United States, LNCS, Springer, August 2017, vol. 10403, pp. 133-160. [ DOI : 10.1007 ]

    https://hal.inria.fr/hal-01599757
  • 35D. Goudarzi, M. Rivain.

    How Fast Can Higher-Order Masking Be in Software? , in: Advances in Cryptology - EUROCRYPT 2017, Paris, France, Advances in Cryptology - EUROCRYPT 2017, April 2017, vol. Lecture Notes in Computer Science, no 10210.

    https://hal.archives-ouvertes.fr/hal-01494061
  • 36D. Goudarzi, M. Rivain, D. Vergnaud, S. Vivek.

    Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures, in: Cryptographic Hardware and Embedded Systems - CHES 2017, Taipei, Taiwan, W. Fischer, N. Homma (editors), Lecture Notes in Computer Science, Springer, September 2017, vol. 10529, pp. 154-171. [ DOI : 10.1007/978-3-319-66787-4_8 ]

    https://hal.inria.fr/hal-01613764
  • 37R. Géraud, D. Naccache, R. Roşie.

    Twisting Lattice and Graph Techniques to Compress Transactional Ledgers, in: SecureComm 2017 - 13th EAI International Conference on Security and Privacy in Communication Networks, Niagara Falls, Canada, October 2017, pp. 1-20.

    https://hal.inria.fr/hal-01668213
  • 38L. Khati, N. Mouha, D. Vergnaud.

    Full Disk Encryption: Bridging Theory and Practice, in: CT-RSA 2017 - RSA Conference Cryptographers' Track, San Francisco, United States, H. Handschuh (editor), Lecture Notes in Computer Science, Springer, February 2017, vol. 10159, pp. 241–257. [ DOI : 10.1007/978-3-319-52153-4_14 ]

    https://hal.inria.fr/hal-01403418
  • 39T. Liu, V. Vaikuntanathan, H. Wee.

    Conditional Disclosure of Secrets via Non-linear Reconstruction, in: Advances in Cryptology - CRYPTO 2017, Santa Barbara, United States, August 2017. [ DOI : 10.1007/978-3-319-63688-7_25 ]

    https://hal.archives-ouvertes.fr/hal-01619913
  • 40D. Pointcheval, O. Sanders, J. Traoré.

    Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash, in: Public-Key Cryptography - PKC 2017 - 20th International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, Netherlands, S. Fehr (editor), Springer, March 2017, vol. 10174, no Part I, pp. 61-90. [ DOI : 10.1007/978-3-662-54365-8_4 ]

    https://hal.inria.fr/hal-01471876
  • 41D. Pointcheval, G. Wang.

    VTBPEKE: Verifier-based Two-Basis Password Exponential Key Exchange, in: ASIA CCS'17, Abu Dhabi, United Arab Emirates, April 2017. [ DOI : 10.1145/3052973.3053026 ]

    https://hal.inria.fr/hal-01471737
  • 42M. Rossi, M. Hamburg, M. Hutter, M. E. Marson.

    A Side-Channel Assisted Cryptanalytic Attack Against QcBits, in: CHES 2017 - Conference on Cryptographic Hardware and Embedded Systems, Taipei, Taiwan, Cryptographic Hardware and Embedded Systems - CHES 2017, September 2017, vol. Lecture Notes in Computer Science, no 10529, 22 p. [ DOI : 10.1007/978-3-319-66787-4_1 ]

    https://hal.inria.fr/hal-01614569

Books or Proceedings Editing

Internal Reports

  • 44M. Abdalla, F. Benhamouda, A. Passelègue.

    Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps, IACR Cryptology ePrint Archive, June 2017, no Report 2017/500.

    https://hal.inria.fr/hal-01667132
  • 45M. Abdalla, F. Benhamouda, D. Pointcheval.

    On the Tightness of Forward-Secure Signature Reductions, IACR Cryptology ePrint Archive, August 2017, no Report 2017/746.

    https://hal.inria.fr/hal-01667150
  • 46M. Abdalla, D. Catalano, D. Fiore, R. Gay, B. Ursu.

    Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings, IACR Cryptology ePrint Archive, October 2017, no Report 2017/972.

    https://hal.inria.fr/hal-01667169
  • 47F. Bourse, M. Minelli, M. Minihold, P. Paillier.

    Fast Homomorphic Evaluation of Deep Discretized Neural Networks, IACR Cryptology ePrint Archive, November 2017, no Report 2017/1114.

    https://hal.archives-ouvertes.fr/hal-01665330
  • 48J. Chotard, E. Dufour Sans, D. Pointcheval, D. H. Phan.

    Decentralized Multi-Client Functional Encryption for Inner Product, IACR Cryptology ePrint Archive, October 2017, no 2017/989.

    https://hal.archives-ouvertes.fr/hal-01668020
  • 49P.-A. Dupont, J. Hesse, D. Pointcheval, L. Reyzin, S. Yakoubov.

    Fuzzy Authenticated Key Exchange, IACR Cryptology ePrint Archive, November 2017, no 2017/1111.

    https://hal.archives-ouvertes.fr/hal-01668008