publications

publications in reversed chronological order

2024

  1. Towards the Impossibility of Quantum Public Key Encryption with Classical Keys from One-Way Functions
    Samuel Bouaziz-Ermann, Alex B. Grilo, Damien Vergnaud, and Quoc-Huy Vu
    IACR Comm. in Cryptology. 1 (to appear), 1, (2024).
    open access
  2. Secure Multi-Party Linear Algebra with Perfect Correctness
    Jules Maire, and Damien Vergnaud
    IACR Comm. in Cryptology. 1 (to appear), 1, (2024).
  3. Lattice attacks on pairing-based signatures
    Thierry Mefenza, and Damien Vergnaud
    Inf. Secur. J. A Glob. Perspect. 33, 2, pp. 138-157 (2024).
    open access doi

2023

  1. Exploiting Intermediate Value Leakage in Dilithium: A Template-Based Approach
    Alexandre Berzati, Andersson Calle Viera, Maya Chartouny, Steven Madec, Damien Vergnaud, and David Vigilant
    IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023, 4, pp. 188–210 (2023).
    open access doi
  2. Cryptanalysis of a Generalized Subset-Sum Pseudorandom Generator
    Charles Bouillaguet, Florette Martinez, and Damien Vergnaud
    In 48th International Symposium on Mathematical Foundations of Computer Science, MFCS 2023, August 28 to September 1, 2023, Bordeaux, France (Jérôme Leroux, Sylvain Lombardy, and David Peleg, eds), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, LIPIcs, vol. 272, pp. 23:1–23:15 (2023).
    open access doi
  3. Quantum security of subset cover problems
    Samuel Bouaziz-Ermann, Alex B. Grilo, and Damien Vergnaud
    In 4th Conference on Information-Theoretic Cryptography, ITC 2023, June 6-8, 2023, Aarhus, Denmark (Kai-Min Chung, ed), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Leibniz International Proceedings in Informatics (LIPIcs), vol. 267, pp. 9:1–9:17 (2023).
    open access doi
  4. Commitments with Efficient Zero-Knowledge Arguments from Subset Sum Problems
    Jules Maire, and Damien Vergnaud
    In Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I (Gene Tsudik, Mauro Conti, Kaitai Liang, and Georgios Smaragdakis, eds), Springer, Lecture Notes in Computer Science, vol. 14344, pp. 189–208 (2023).
    open access doi
  5. Efficient Zero-Knowledge Arguments and Digital Signatures via Sharing Conversion in the Head
    Jules Maire, and Damien Vergnaud
    In Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I (Gene Tsudik, Mauro Conti, Kaitai Liang, and Georgios Smaragdakis, eds), Springer, Lecture Notes in Computer Science, vol. 14344, pp. 435–454 (2023).
    open access doi

2022

  1. Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection
    Thibauld Feneuil, Jules Maire, Matthieu Rivain, and Damien Vergnaud
    In Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings (Shweta Agrawal, and Dongdai Lin, eds), Springer, Lecture Notes in Computer Science, vol. 13792, pp. 371–402 (2022).
    open access doi
  2. Secure storage - Confidentiality and Authentication
    Ryad Benadjila, Louiza Khati, and Damien Vergnaud
    Comput. Sci. Rev. 44, pp. 100465 (2022).
    open access doi
  3. Cryptanalysis of Modular Exponentiation Outsourcing Protocols
    Charles Bouillaguet, Florette Martinez, and Damien Vergnaud
    Comput. J. 65, 9, pp. 2299-2314 (2022).
    open access doi

2021

  1. Hardware Security without Secure Hardware: How to Decrypt with a Password and a Server
    Olivier Blazy, Laura Brouilhet, Céline Chevalier, Patrick Towa, Ida Tucker, and Damien Vergnaud
    Theor. Comput. Sci. 895, pp. 178–211 (2021).
    open access doi
  2. Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity
    Sonia Belaı̈d, Matthieu Rivain, Abdul Rahman Taleb, and Damien Vergnaud
    In Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part II (Mehdi Tibouchi, and Huaxiong Wang, eds), Springer, Lecture Notes in Computer Science, vol. 13091, pp. 157–188 (2021).
    open access doi video
  3. Probing Security through Input-Output Separation and Revisited Quasilinear Masking
    Dahmun Goudarzi, Thomas Prest, Matthieu Rivain, and Damien Vergnaud
    IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021, 3, pp. 599–640 (2021).
    open access doi video
  4. The Key-Dependent Message Security of Key-Alternating Feistel Ciphers
    Pooya Farshim, Louiza Khati, Yannick Seurin, and Damien Vergnaud
    In Topics in Cryptology - CT-RSA 2021 - Cryptographers’ Track at the RSA Conference 2021, Virtual Event, May 17-20, 2021, Proceedings (Kenneth G. Paterson, ed), Springer, Lecture Notes in Computer Science, vol. 12704, pp. 351–374 (2021).
    open access doi
  5. Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND
    Eyal Kushilevitz, Rafail Ostrovsky, Emmanuel Prouff, Adi Rosén, Adrian Thillard, and Damien Vergnaud
    SIAM J. Discret. Math. 35, 1, pp. 465-484 (2021).
    open access doi
  6. Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions
    Céline Chevalier, Fabien Laguillaumie, and Damien Vergnaud
    Algorithmica 83, 1, pp. 72-115 (2021).
    open access doi
  7. Speeding-Up Verification of Digital Signatures
    Abdul Rahman Taleb, and Damien Vergnaud
    J. Comput. Syst. Sci. 116, pp. 22-39 (2021).
    open access doi

2020

  1. Public-Key Generation with Verifiable Randomness
    Olivier Blazy, Patrick Towa, and Damien Vergnaud
    In Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I (Shiho Moriai, and Huaxiong Wang, eds), Springer, Lecture Notes in Computer Science, vol. 12491, pp. 97–127 (2020).
    open access doi video
  2. Succinct Diophantine-Satisfiability Arguments
    Patrick Towa, and Damien Vergnaud
    In Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part III (Shiho Moriai, and Huaxiong Wang, eds), Springer, Lecture Notes in Computer Science, vol. 12493, pp. 774–804 (2020).
    open access doi video
  3. Comment on "Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things"
    Damien Vergnaud
    IEEE Internet Things J. 7, 11, pp. 11327-11329 (2020).
    open access doi
  4. Inferring sequences produced by elliptic curve generators using Coppersmith’s methods
    Thierry Mefenza, and Damien Vergnaud
    Theor. Comput. Sci. 830-831, pp. 20-42 (2020).
    open access doi

2019

  1. Cryptanalysis of Server-Aided RSA Protocols with Private-Key Splitting
    Thierry Mefenza, and Damien Vergnaud
    Comput. J. 62, 8, pp. 1194–1213 (2019).
    open access doi
  2. Polynomial interpolation of the generalized Diffie-Hellman and Naor-Reingold functions
    Thierry Mefenza, and Damien Vergnaud
    Des. Codes Cryptogr. 87, 1, pp. 75–85 (2019).
    open access doi
  3. Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND
    Eyal Kushilevitz, Rafail Ostrovsky, Emmanuel Prouff, Adi Rosén, Adrian Thillard, and Damien Vergnaud
    In Theory of Cryptography - 17th International Conference, TCC 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part II (Dennis Hofheinz, and Alon Rosen, eds), Springer, Lecture Notes in Computer Science, vol. 11892, pp. 386–406 (2019).
    open access doi

2018

  1. Analysis and Improvement of an Authentication Scheme in Incremental Cryptography
    Louiza Khati, and Damien Vergnaud
    In Selected Areas in Cryptography - SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers (Carlos Cid, and Michael J. Jacobson Jr., eds), Springer, Lecture Notes in Computer Science, vol. 11349, pp. 50–70 (2019).
    open access doi

2017

  1. Polynomial interpolation of the Naor-Reingold pseudo-random function
    Thierry Mefenza, and Damien Vergnaud
    Appl. Algebra Eng. Commun. Comput. 28, 3, pp. 237–255 (2017).
    open access doi
  2. Comment on ’Attribute-Based Signatures for Supporting Anonymous Certification’ by N. Kaaniche and M. Laurent (ESORICS 2016)
    Damien Vergnaud
    Comput. J. 60, 12, pp. 1801–1808 (2017).
    open access doi
  3. Security of Even-Mansour Ciphers under Key-Dependent Messages
    Pooya Farshim, Louiza Khati, and Damien Vergnaud
    IACR Trans. Symmetric Cryptol. 2017, 2, pp. 84–104 (2017).
    open access doi
  4. Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures
    Dahmun Goudarzi, Matthieu Rivain, Damien Vergnaud, and Srinivas Vivek
    In Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings (Wieland Fischer, and Naofumi Homma, eds), Springer, Lecture Notes in Computer Science, vol. 10529, pp. 154–171 (2017).
    open access doi
  5. Private Multiplication over Finite Fields
    Sonia Belaı̈d, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, and Damien Vergnaud
    In Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III (Jonathan Katz, and Hovav Shacham, eds), Springer, Lecture Notes in Computer Science, vol. 10403, pp. 397–426 (2017).
    open access doi video
  6. Full Disk Encryption: Bridging Theory and Practice
    Louiza Khati, Nicky Mouha, and Damien Vergnaud
    In Topics in Cryptology - CT-RSA 2017 - The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings (Helena Handschuh, ed), Springer, Lecture Notes in Computer Science, vol. 10159, pp. 241–257 (2017).
    open access doi
  7. Reusing Nonces in Schnorr Signatures - (and Keeping It Secure...)
    Marc Beunardeau, Aisling Connolly, Houda Ferradi, Rémi Géraud, David Naccache, and Damien Vergnaud
    In Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I (Simon N. Foley, Dieter Gollmann, and Einar Snekkenes, eds), Springer, Lecture Notes in Computer Science, vol. 10492, pp. 224–241 (2017).
    open access doi
  8. Lattice Attacks on Pairing-Based Signatures
    Thierry Mefenza, and Damien Vergnaud
    In Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings (Máire O’Neill, ed), Springer, Lecture Notes in Computer Science, vol. 10655, pp. 352–370 (2017).
    open access doi

2016

  1. Comment on "A strong provably secure IBE scheme without bilinear map" by M. Zheng, Y. Xiang and H. Zhou [J. Comput. Syst. Sci. 81 (2015) 125-131]
    Damien Vergnaud
    J. Comput. Syst. Sci. 82, 5, pp. 756–757 (2016).
    open access doi
  2. Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions
    Olivier Blazy, Céline Chevalier, and Damien Vergnaud
    In Topics in Cryptology - CT-RSA 2016 - The Cryptographers’ Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings (Kazue Sako, ed), Springer, Lecture Notes in Computer Science, vol. 9610, pp. 3–18 (2016).
    open access doi
  3. Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions
    Céline Chevalier, Fabien Laguillaumie, and Damien Vergnaud
    In Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I (Ioannis G. Askoxylakis, Sotiris Ioannidis, Sokratis K. Katsikas, and Catherine A. Meadows, eds), Springer, Lecture Notes in Computer Science, vol. 9878, pp. 261–278 (2016).
    open access doi
  4. Randomness Complexity of Private Circuits for Multiplication
    Sonia Belaı̈d, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, and Damien Vergnaud
    In Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II (Marc Fischlin, and Jean-Sébastien Coron, eds), Springer, Lecture Notes in Computer Science, vol. 9666, pp. 616–648 (2016).
    open access doi video
  5. Easing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness
    Fabrice Benhamouda, Céline Chevalier, Adrian Thillard, and Damien Vergnaud
    In Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II (Chen-Mou Cheng, Kai-Min Chung, Giuseppe Persiano, and Bo-Yin Yang, eds), Springer, Lecture Notes in Computer Science, vol. 9615, pp. 36–66 (2016).
    open access doi
  6. Lattice Attacks Against Elliptic-Curve Signatures with Blinded Scalar Multiplication
    Dahmun Goudarzi, Matthieu Rivain, and Damien Vergnaud
    In Selected Areas in Cryptography - SAC 2016 - 23rd International Conference, St. John’s, NL, Canada, August 10-12, 2016, Revised Selected Papers (Roberto Avanzi, and Howard M. Heys, eds), Springer, Lecture Notes in Computer Science, vol. 10532, pp. 120–139 (2017).
    open access doi
  7. Distribution and Polynomial Interpolation of the Dodis-Yampolskiy Pseudo-Random Function
    Thierry Mefenza, and Damien Vergnaud
    In Arithmetic of Finite Fields - 6th International Workshop, WAIFI 2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers (Sylvain Duquesne, and Svetla Petkova-Nikova, eds), Lecture Notes in Computer Science, vol. 10064, pp. 125–140 (2016).
    open access doi

2015

  1. Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks
    Michel Abdalla, Sonia Belaı̈d, David Pointcheval, Sylvain Ruhault, and Damien Vergnaud
    In Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers (Tal Malkin, Vladimir Kolesnikov, Allison Bishop Lewko, and Michalis Polychronakis, eds), Springer, Lecture Notes in Computer Science, vol. 9092, pp. 635–654 (2015).
    open access doi
  2. Practical Key Recovery for Discrete-Logarithm Based Authentication Schemes from Random Nonce Bits
    Aurélie Bauer, and Damien Vergnaud
    In Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings (Tim Güneysu, and Helena Handschuh, eds), Springer, Lecture Notes in Computer Science, vol. 9293, pp. 287–306 (2015).
    open access doi
  3. Non-Interactive Zero-Knowledge Proofs of Non-Membership
    Olivier Blazy, Céline Chevalier, and Damien Vergnaud
    In Topics in Cryptology - CT-RSA 2015, The Cryptographer’s Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings (Kaisa Nyberg, ed), Springer, Lecture Notes in Computer Science, vol. 9048, pp. 145–164 (2015).
    open access doi

2014

  1. Algorithms for Outsourcing Pairing Computation
    Aurore Guillevic, and Damien Vergnaud
    In Smart Card Research and Advanced Applications - 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers (Marc Joye, and Amir Moradi, eds), Springer, Lecture Notes in Computer Science, vol. 8968, pp. 193–211 (2015).
    open access doi
  2. Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings
    David Pointcheval, and Damien Vergnaud (editors)
    Springer, Lecture Notes in Computer Science, vol. 8469, (2014).
    doi

2013

  1. Short blind signatures
    Olivier Blazy, Georg Fuchsbauer, David Pointcheval, and Damien Vergnaud
    Journal of Computer Security 21, 5, pp. 627–661 (2013).
    open access doi
  2. Analysis and Improvement of Lindell’s UC-Secure Commitment Schemes
    Olivier Blazy, Céline Chevalier, David Pointcheval, and Damien Vergnaud
    In Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings (Michael J. Jacobson Jr., Michael E. Locasto, Payman Mohassel, and Reihaneh Safavi-Naini, eds), Springer, Lecture Notes in Computer Science, vol. 7954, pp. 534–551 (2013).
    open access doi
  3. Security analysis of pseudo-random number generators with input: /dev/random is not robust
    Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, and Daniel Wichs
    In 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS’13, Berlin, Germany, November 4-8, 2013 (Ahmad-Reza Sadeghi, Virgil D. Gligor, and Moti Yung, eds), ACM, pp. 647–658 (2013).
    open access doi
  4. Time/Memory/Data Tradeoffs for Variants of the RSA Problem
    Pierre-Alain Fouque, Damien Vergnaud, and Jean-Christophe Zapalowicz
    In Computing and Combinatorics, 19th International Conference, COCOON 2013, Hangzhou, China, June 21-23, 2013. Proceedings (Ding-Zhu Du, and Guochuan Zhang, eds), Springer, Lecture Notes in Computer Science, vol. 7936, pp. 651–662 (2013).
    open access doi
  5. New Techniques for SPHFs and Efficient One-Round PAKE Protocols
    Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, and Damien Vergnaud
    In Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I (Ran Canetti, and Juan A. Garay, eds), Springer, Lecture Notes in Computer Science, vol. 8042, pp. 449–475 (2013).
    open access doi
  6. Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
    Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, and Damien Vergnaud
    In Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings (Kaoru Kurosawa, and Goichiro Hanaoka, eds), Springer, Lecture Notes in Computer Science, vol. 7778, pp. 272–291 (2013).
    open access doi

2012

  1. Enumeration formula for (2, n)-cubes in discrete planes
    Eric Domenjoud, Damien Jamet, Damien Vergnaud, and Laurent Vuillon
    Discret. Appl. Math. 160, 15, pp. 2158–2171 (2012).
    open access doi
  2. Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions
    Aurore Guillevic, and Damien Vergnaud
    In Pairing-Based Cryptography - Pairing 2012 - 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers (Michel Abdalla, and Tanja Lange, eds), Springer, Lecture Notes in Computer Science, vol. 7708, pp. 234–253 (2013).
    open access doi
  3. Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith’s Methods
    Aurélie Bauer, Damien Vergnaud, and Jean-Christophe Zapalowicz
    In Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings (Marc Fischlin, Johannes A. Buchmann, and Mark Manulis, eds), Springer, Lecture Notes in Computer Science, vol. 7293, pp. 609–626 (2012).
    open access doi
  4. Compact Round-Optimal Partially-Blind Signatures
    Olivier Blazy, David Pointcheval, and Damien Vergnaud
    In Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings (Ivan Visconti, and Roberto De Prisco, eds), Springer, Lecture Notes in Computer Science, vol. 7485, pp. 95–112 (2012).
    open access doi
  5. Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions
    Olivier Blazy, David Pointcheval, and Damien Vergnaud
    In Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings (Ronald Cramer, ed), Springer, Lecture Notes in Computer Science, vol. 7194, pp. 94–111 (2012).
    open access doi

2011

  1. Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
    Benoı̂t Libert, and Damien Vergnaud
    IEEE Trans. Inf. Theory 57, 3, pp. 1786–1802 (2011).
    open access doi
  2. Towards Practical Black-Box Accountable Authority IBE: Weak Black-Box Traceability With Short Ciphertexts and Private Keys
    Benoı̂t Libert, and Damien Vergnaud
    IEEE Trans. Inf. Theory 57, 10, pp. 7189–7204 (2011).
    open access doi
  3. Efficient and Secure Generalized Pattern Matching via Fast Fourier Transform
    Damien Vergnaud
    In Progress in Cryptology - AFRICACRYPT 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings (Abderrahmane Nitaj, and David Pointcheval, eds), Springer, Lecture Notes in Computer Science, vol. 6737, pp. 41–58 (2011).
    open access doi
  4. Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
    Brett Hemenway, Benoı̂t Libert, Rafail Ostrovsky, and Damien Vergnaud
    In Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings (Dong Hoon Lee, and Xiaoyun Wang, eds), Springer, Lecture Notes in Computer Science, vol. 7073, pp. 70–88 (2011).
    open access doi
  5. Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes
    Malika Izabachène, Benoı̂t Libert, and Damien Vergnaud
    In Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings (Liqun Chen, ed), Springer, Lecture Notes in Computer Science, vol. 7089, pp. 431–450 (2011).
    open access doi
  6. Signatures on Randomizable Ciphertexts
    Olivier Blazy, Georg Fuchsbauer, David Pointcheval, and Damien Vergnaud
    In Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings (Dario Catalano, Nelly Fazio, Rosario Gennaro, and Antonio Nicolosi, eds), Springer, Lecture Notes in Computer Science, vol. 6571, pp. 403–422 (2011).
    open access doi

2010

  1. Time-selective convertible undeniable signatures with short conversion receipts
    Fabien Laguillaumie, and Damien Vergnaud
    Inf. Sci. 180, 12, pp. 2458–2475 (2010).
    open access doi
  2. On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption
    Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, and Damien Vergnaud
    In Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings (Jianying Zhou, and Moti Yung, eds), Lecture Notes in Computer Science, vol. 6123, pp. 1–18 (2010).
    open access doi
    Mehdi Tibouchi received the Best Student Paper Award
  3. Batch Groth-Sahai
    Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert, Hervé Sibert, and Damien Vergnaud
    In Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings (Jianying Zhou, and Moti Yung, eds), Lecture Notes in Computer Science, vol. 6123, pp. 218–235 (2010).
    open access doi
  4. Fair Blind Signatures without Random Oracles
    Georg Fuchsbauer, and Damien Vergnaud
    In Progress in Cryptology - AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings (Daniel J. Bernstein, and Tanja Lange, eds), Springer, Lecture Notes in Computer Science, vol. 6055, pp. 16–33 (2010).
    open access doi
  5. Huff’s Model for Elliptic Curves
    Marc Joye, Mehdi Tibouchi, and Damien Vergnaud
    In Algorithmic Number Theory, 9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010. Proceedings (Guillaume Hanrot, François Morain, and Emmanuel Thomé, eds), Springer, Lecture Notes in Computer Science, vol. 6197, pp. 234–250 (2010).
    open access doi
  6. Mediated Traceable Anonymous Encryption
    Malika Izabachène, David Pointcheval, and Damien Vergnaud
    In Progress in Cryptology - LATINCRYPT 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings (Michel Abdalla, and Paulo S. L. M. Barreto, eds), Springer, Lecture Notes in Computer Science, vol. 6212, pp. 40–60 (2010).
    open access doi

2009

  1. Mesures d’indépendance linéaire de carrés de périodes et quasi-périodes de courbes elliptiques
    Damien Vergnaud
    J. Number Theory 129, 6, pp. 1212-1233 (2009).
    doi
  2. New Extensions of Pairing-Based Signatures into Universal (Multi) Designated Verifier Signatures
    Damien Vergnaud
    Int. J. Found. Comput. Sci. 20, 1, pp. 109–133 (2009).
    open access doi
  3. Transferable Constant-Size Fair E-Cash
    Georg Fuchsbauer, David Pointcheval, and Damien Vergnaud
    In Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings (Juan A. Garay, Atsuko Miyaji, and Akira Otsuka, eds), Springer, Lecture Notes in Computer Science, vol. 5888, pp. 226–247 (2009).
    open access doi
  4. Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model
    Benoı̂t Libert, and Damien Vergnaud
    In Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings (Juan A. Garay, Atsuko Miyaji, and Akira Otsuka, eds), Springer, Lecture Notes in Computer Science, vol. 5888, pp. 498–517 (2009).
    open access doi
  5. Adaptive-ID Secure Revocable Identity-Based Encryption
    Benoı̂t Libert, and Damien Vergnaud
    In Topics in Cryptology - CT-RSA 2009, The Cryptographers’ Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings (Marc Fischlin, ed), Springer, Lecture Notes in Computer Science, vol. 5473, pp. 1–15 (2009).
    open access doi
  6. Provably Secure Code-Based Threshold Ring Signatures
    Léonard Dallot, and Damien Vergnaud
    In Cryptography and Coding, 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings (Matthew G. Parker, ed), Springer, Lecture Notes in Computer Science, vol. 5921, pp. 222–235 (2009).
    open access doi
  7. Fair E-Cash: Be Compact, Spend Faster
    Sébastien Canard, Cécile Delerablée, Aline Gouget, Emeline Hufschmitt, Fabien Laguillaumie, Hervé Sibert, Jacques Traoré, and Damien Vergnaud
    In Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings (Pierangela Samarati, Moti Yung, Fabio Martinelli, and Claudio Agostino Ardagna, eds), Springer, Lecture Notes in Computer Science, vol. 5735, pp. 294–309 (2009).
    open access doi
  8. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
    Benoı̂t Libert, and Damien Vergnaud
    In Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings (Stanislaw Jarecki, and Gene Tsudik, eds), Springer, Lecture Notes in Computer Science, vol. 5443, pp. 235–255 (2009).
    open access doi
  9. Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings
    Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, and Damien Vergnaud (editors)
    Lecture Notes in Computer Science, vol. 5536, (2009).
    doi

2008

  1. Multi-use unidirectional proxy re-signatures
    Benoı̂t Libert, and Damien Vergnaud
    In Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008 (Peng Ning, Paul F. Syverson, and Somesh Jha, eds), ACM, pp. 511–520 (2008).
    open access doi
  2. Separation Results on the "One-More" Computational Problems
    Emmanuel Bresson, Jean Monnerat, and Damien Vergnaud
    In Topics in Cryptology - CT-RSA 2008, The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings (Tal Malkin, ed), Springer, Lecture Notes in Computer Science, vol. 4964, pp. 71–87 (2008).
    open access doi
  3. Tracing Malicious Proxies in Proxy Re-encryption
    Benoı̂t Libert, and Damien Vergnaud
    In Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings (Steven D. Galbraith, and Kenneth G. Paterson, eds), Springer, Lecture Notes in Computer Science, vol. 5209, pp. 332–353 (2008).
    open access doi
  4. Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
    Benoı̂t Libert, and Damien Vergnaud
    In Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings (Ronald Cramer, ed), Springer, Lecture Notes in Computer Science, vol. 4939, pp. 360–379 (2008).
    open access doi
    winner of PKC Test-of-Time Award

2007

  1. Multi-designated verifiers signatures: anonymity without encryption
    Fabien Laguillaumie, and Damien Vergnaud
    Inf. Process. Lett. 102, 2-3, pp. 127–132 (2007).
    doi
  2. Gradually Convertible Undeniable Signatures
    Laila El Aimani, and Damien Vergnaud
    In Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings (Jonathan Katz, and Moti Yung, eds), Springer, Lecture Notes in Computer Science, vol. 4521, pp. 478–496 (2007).
    open access doi
  3. Trapdoor Permutation Polynomials of Z/ \emphn Z and Public Key Cryptosystems
    Guilhem Castagnos, and Damien Vergnaud
    In Information Security, 10th International Conference, ISC 2007, Valparaı́so, Chile, October 9-12, 2007, Proceedings (Juan A. Garay, Arjen K. Lenstra, Masahiro Mambo, and René Peralta, eds), Springer, Lecture Notes in Computer Science, vol. 4779, pp. 333–350 (2007).
    doi
  4. On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures
    Fabien Laguillaumie, and Damien Vergnaud
    In Information Security, 10th International Conference, ISC 2007, Valparaı́so, Chile, October 9-12, 2007, Proceedings (Juan A. Garay, Arjen K. Lenstra, Masahiro Mambo, and René Peralta, eds), Springer, Lecture Notes in Computer Science, vol. 4779, pp. 175–188 (2007).
    open access doi
  5. On Kabatianskii-Krouk-Smeets Signatures
    Pierre-Louis Cayrel, Ayoub Otmani, and Damien Vergnaud
    In Arithmetic of Finite Fields, First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007, Proceedings (Claude Carlet, and Berk Sunar, eds), Springer, Lecture Notes in Computer Science, vol. 4547, pp. 237–251 (2007).
    open access doi

2006

  1. New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures
    Damien Vergnaud
    In Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II (Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener, eds), Springer, Lecture Notes in Computer Science, vol. 4052, pp. 58–69 (2006).
    open access doi

2005

  1. Universally Convertible Directed Signatures
    Fabien Laguillaumie, Pascal Paillier, and Damien Vergnaud
    In Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings (Bimal K. Roy, ed), Springer, Lecture Notes in Computer Science, vol. 3788, pp. 682–701 (2005).
    open access doi
  2. Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log
    Pascal Paillier, and Damien Vergnaud
    In Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings (Bimal K. Roy, ed), Springer, Lecture Notes in Computer Science, vol. 3788, pp. 1–20 (2005).
    open access doi
    winner of the Best Paper Award
    winner of IACR Test-of-Time Award
  3. Time-Selective Convertible Undeniable Signatures
    Fabien Laguillaumie, and Damien Vergnaud
    In Topics in Cryptology - CT-RSA 2005, The Cryptographers’ Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings (Alfred Menezes, ed), Springer, Lecture Notes in Computer Science, vol. 3376, pp. 154–171 (2005).
    doi
  4. Short Undeniable Signatures Without Random Oracles: The Missing Link
    Fabien Laguillaumie, and Damien Vergnaud
    In Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings (Subhamoy Maitra, C. E. Veni Madhavan, and Ramarathnam Venkatesan, eds), Springer, Lecture Notes in Computer Science, vol. 3797, pp. 283–296 (2005).
    open access doi
  5. RSA-Based Secret Handshakes
    Damien Vergnaud
    In Coding and Cryptography, International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papers (Oyvind Ytrehus, ed), Springer, Lecture Notes in Computer Science, vol. 3969, pp. 252–274 (2006).
    open access doi

2004

  1. Universal forgery on Sekhar’s signature scheme with message recovery
    Fabien Laguillaumie, Jacques Traoré, and Damien Vergnaud
    Int. J. Comput. Math. 81, 12, pp. 1493–1495 (2004).
    doi
  2. Multi-designated Verifiers Signatures
    Fabien Laguillaumie, and Damien Vergnaud
    In Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings (Javier López, Sihan Qing, and Eiji Okamoto, eds), Springer, Lecture Notes in Computer Science, vol. 3269, pp. 495–507 (2004).
    open access doi
  3. Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map
    Fabien Laguillaumie, and Damien Vergnaud
    In Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers (Carlo Blundo, and Stelvio Cimato, eds), Springer, Lecture Notes in Computer Science, vol. 3352, pp. 105–119 (2005).
    open access doi