Members
Overall Objectives
Research Program
Application Domains
New Results
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Major publications by the team in recent years
  • 1M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, H. Shi.
    Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions, in: Journal of Cryptology, July 2008, vol. 21, no 3, pp. 350–391.
  • 2M. Abdalla, C. Chevalier, D. Pointcheval.
    Smooth Projective Hashing for Conditionally Extractable Commitments, in: Advances in Cryptology – Proceedings of CRYPTO '09, Lecture Notes in Computer Science, Springer, 2009, vol. 5677, pp. 671–689.
  • 3G. Barthe, D. Pointcheval, S. Zanella-Béguelin.
    Verified Security of Redundancy-Free Encryption from Rabin and RSA, in: Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS '12), Raleigh, NC, USA, T. Yu, G. Danezis, V. D. Gligor (editors), ACM Press, 2012, pp. 724–735.
  • 4A. Bauer, D. Vergnaud, J.-C. Zapalowicz.
    Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods, in: Public Key Cryptography (PKC '12), Darmstadt, Germany, M. Fischlin, J. Buchmann, M. Manulis (editors), Lecture Notes in Computer Science, Springer, 2012, vol. 7293, pp. 609-626.
  • 5F. Benhamouda, O. Blazy, C. Chevalier, D. Pointcheval, D. Vergnaud.
    New Techniques for SPHFs and Efficient One-Round PAKE Protocols, in: CRYPTO (1), R. Canetti, J. A. Garay (editors), Lecture Notes in Computer Science, Springer, 2013, vol. 8042, pp. 449-475.
  • 6C. Bouillaguet, P. Derbez, P.-A. Fouque.
    Automatic Search of Attacks on Round-Reduced AES and Applications, in: Advances in Cryptology – Proceedings of CRYPTO '11, Lecture Notes in Computer Science, Springer, 2011, vol. 6841, pp. 169–187.
  • 7J.-S. Coron, A. Mandal, D. Naccache, M. Tibouchi.
    Fully Homomorphic Encryption over the Integers with Shorter Public Keys, in: Advances in Cryptology – Proceedings of CRYPTO '11, Lecture Notes in Computer Science, Springer, 2011, vol. 6841, pp. 487-504.
  • 8J.-S. Coron, D. Naccache, M. Tibouchi, R.-P. Weinmann.
    Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures, in: Advances in Cryptology – Proceedings of CRYPTO '09, Lecture Notes in Computer Science, Springer, 2009, vol. 5677, pp. 428-444.
  • 9E. Fujisaki, T. Okamoto, D. Pointcheval, J. Stern.
    RSA–OAEP is Secure under the RSA Assumption, in: Journal of Cryptology, 2004, vol. 17, no 2, pp. 81–104.
  • 10N. Gama, P. Q. Nguyen.
    Finding Short Lattice Vectors within Mordell's Inequality, in: Proc. 40th ACM Symposium on the Theory of Computing (STOC '08), ACM, 2008, pp. 207–216.
  • 11V. Lyubashevsky.
    Lattice Signatures without Trapdoors, in: Advances in Cryptology – Proc. EUROCRYPT 2012, D. Pointcheval, T. Johansson (editors), Lecture Notes in Computer Science, Springer, 2012, vol. 7237, pp. 738-755.
  • 12P. Q. Nguyen, D. Stehlé.
    An LLL Algorithm with Quadratic Complexity, in: SIAM J. Comput., 2009, vol. 39, no 3, pp. 874-903.
Publications of the year

Doctoral Dissertations and Habilitation Theses

Articles in International Peer-Reviewed Journals

  • 15M. Abdalla, D. Catalano, D. Fiore.
    Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions, in: Journal of Cryptology, July 2014, vol. 27, no 3, pp. 544-593. [ DOI : 10.1007/s00145-013-9153-x ]
    https://hal.inria.fr/hal-00915548
  • 16S. Belaid, V. Grosso, F.-X. Standaert.
    Masking and leakage-resilient primitives: One, the other(s) or both?, in: Cryptography and Communications, 2014, 25 p. [ DOI : 10.1007/s12095-014-0113-6 ]
    https://hal.inria.fr/hal-01093883
  • 17J. Jean, M. Naya-Plasencia, T. Peyrin.
    Improved Cryptanalysis of AES-like Permutations, in: Journal of Cryptology, 2014, pp. 772–798.
    https://hal.inria.fr/hal-01092270

Invited Conferences

  • 18M. Abdalla.
    Password-Based Authenticated Key Exchange: An Overview, in: PROVSEC 2014, Hong Kong, China, S. S. M. Chow, J. K. Liu, L. C. K. Hui, S. M. Yiu (editors), Springer, October 2014, vol. 8782, pp. 1-9. [ DOI : 10.1007/978-3-319-12475-9_1 ]
    https://hal.inria.fr/hal-01071313
  • 19M. Abdalla, H. Chabanne, H. Ferradi, J. Jainski, D. Naccache.
    Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools, in: ISPEC 2014, Fuzhou, China, X. Huang, J. Zhou (editors), Lecture Notes in Computer Science, Springer, May 2014, vol. 8434, pp. 8-14. [ DOI : 10.1007/978-3-319-06320-1_2 ]
    https://hal.inria.fr/hal-01071319
  • 20H. Wee.
    Functional Encryption and Its Impact on Cryptography, in: Security and Cryptography for Networks (SCN 2014), Amalfi, Italy, September 2014. [ DOI : 10.1007/978-3-319-10879-7_18 ]
    https://hal.inria.fr/hal-01094712

International Conferences with Proceedings

  • 21M. Abdalla, F. Benhamouda, A. Passelègue, K. G. Paterson.
    Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier, in: CRYPTO 2014, Santa Barbara, United States, J. A. Garay, R. Gennaro (editors), August 2014, vol. 8616, pp. 77-94. [ DOI : 10.1007/978-3-662-44371-2_5 ]
    https://hal.inria.fr/hal-01068388
  • 22A. Bar-On, I. Dinur, O. Dunkelman, N. Keller, V. Lallemand, B. Tsaban.
    Cryptanalysis of SP Networks with Partial Non-Linear Layers, in: Advances in Cryptology - Eurocrypt 2015, Sofia, Bulgaria, April 2015.
    https://hal.inria.fr/hal-01108331
  • 23S. Belaid, B. Gérard, P.-A. Fouque.
    Side-Channel Analysis of Multiplications in GF(2128), in: Asiacrypt 2014, Kaohsiung, Taiwan, Lecture Notes in Computer Science, Springer, December 2014, vol. 8874. [ DOI : 10.1007/978-3-662-45608-8_17 ]
    https://hal.inria.fr/hal-01093865
  • 24F. Benhamouda, J. Camenisch, S. Krenn, V. Lyubashevsky, G. Neven.
    Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures, in: ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaohsiung, Taiwan, P. Sarkar, T. Iwata (editors), LNCS - Lecture Notes in Computer Science, Springer, December 2014, vol. 8873, pp. 551-572. [ DOI : 10.1007/978-3-662-45611-8_29 ]
    https://hal.archives-ouvertes.fr/hal-01084737
  • 25T. Bourgeat, J. Bringer, H. Chabanne, R. Champenois, J. Clément, H. Ferradi, M. Heinrich, P. Melotti, D. Naccache, A. Voizard.
    New Algorithmic Approaches to Point Constellation Recognition, in: IFIP SEC 2014, Marrakech, Morocco, IFIP SEC 2014, March 2014.
    https://hal.inria.fr/hal-01098401
  • 26S. Canard, J. Devigne, O. Sanders.
    Delegating a Pairing Can Be Both Secure and Efficient, in: Applied Cryptography and Network Security (ACNS) 2014, Lausanne, Switzerland, June 2014. [ DOI : 10.1007/978-3-319-07536-5_32 ]
    https://hal.inria.fr/hal-01091145
  • 27S. Canard, D. Pointcheval, O. Sanders.
    Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting, in: 17th International Conference on Practice and Theory in Public-Key Cryptography (PKC '14), Buenos Aires, Argentina, H. Krawczyk (editor), Springer, March 2014, vol. 8383, pp. 167-183.
    https://hal.inria.fr/hal-00940045
  • 28J.-M. Cioranesco, J.-L. Danger, T. Graba, S. Guilley, Y. Mathieu, D. Naccache, X. T. Ngo.
    Cryptographically secure shields, in: IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), Arlington, VA, United States, Hardware-Oriented Security and Trust (HOST), 2014 IEEE International Symposium on, IEEE, May 2014, 6 p. [ DOI : 10.1109/HST.2014.6855563 ]
    https://hal.inria.fr/hal-01098383
  • 29S. Cogliani, D.-S. Maimut, D. Naccache, R. Portella, R. Reyhanitabar, S. Vaudenay, D. Vizár.
    OMD: A Compression Function Mode of Operation for Authenticated Encryption, in: Selected Areas in Cryptography 2014, Montreal, Quebec, Canada, Selected Areas in Cryptography 2014, Springer, August 2014, vol. Lecture Notes in Computer Science 2014. [ DOI : 10.1007/978-3-319-13051-4_7 ]
    https://hal.inria.fr/hal-01098397
  • 30M. Cornejo, S. Ruhault.
    Characterization of Real-Life PRNGs under Partial State Corruption, in: CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, Arizona, United States, ACM, November 2014, pp. 1004-1015. [ DOI : 10.1145/2660267.2660377 ]
    https://hal.inria.fr/hal-01084490
  • 31N. Desmoulins, R. Lescuyer, O. Sanders, J. Traoré.
    Direct Anonymous Attestations with Dependent Basename Opening, in: Cryptology and Network Security (CANS) 2014, Heraklion, Greece, October 2014. [ DOI : 10.1007/978-3-319-12280-9_14 ]
    https://hal.inria.fr/hal-01091165
  • 32I. Dinur.
    Improved Differential Cryptanalysis of Round-Reduced Speck, in: SAC 2014 - 21st International Conference Selected Areas in Cryptography, Montreal, Canada, August 2014.
    https://hal.archives-ouvertes.fr/hal-01086176
  • 33I. Dinur, O. Dunkelman, N. Keller, A. Shamir.
    Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys, in: ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Kaoshiung, Taiwan, P. Sarkar, T. Iwata (editors), LNCS - Lecture Notes in Computer Science, Springer, December 2014, vol. 8873, pp. 439-457. [ DOI : 10.1007/978-3-662-45611-8_23 ]
    https://hal.archives-ouvertes.fr/hal-01086179
  • 34I. Dinur, O. Dunkelman, N. Keller, A. Shamir.
    Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64, in: FSE 2014 - 21st International Workshop on Fast Software Encryption, London, United Kingdom, March 2014.
    https://hal.archives-ouvertes.fr/hal-01086175
  • 35I. Dinur, J. Jean.
    Cryptanalysis of FIDES, in: FSE 2014 - 21st International Workshop on Fast Software Encryption, London , United Kingdom, March 2014.
    https://hal.archives-ouvertes.fr/hal-01086173
  • 36I. Dinur, G. Leurent.
    Improved Generic Attacks Against Hash-based MACs and HAIFA, in: Advances in Cryptology - CRYPTO 2014, Santa Barbara, CA, United States, LNCS, Springer, August 2014, vol. 8616. [ DOI : 10.1007/978-3-662-44371-2_9 ]
    https://hal.archives-ouvertes.fr/hal-01086177
  • 37L. Ducas, V. Lyubashevsky, T. Prest.
    Efficient identity-based encryption over NTRU lattices, in: Asiacrypt 2014, Kaohsiung, Taiwan, December 2014.
    https://hal.inria.fr/hal-01094814
  • 38J. A. Garay, Y. Ishai, R. Kumaresan, H. Wee.
    On the Complexity of UC Commitments, in: Advances in Cryptology – EUROCRYPT 2014, Copenhagen, Denmark, May 2014. [ DOI : 10.1007/978-3-642-55220-5_37 ]
    https://hal.archives-ouvertes.fr/hal-01094702
  • 39A. Guillevic, D. Vergnaud.
    Algorithms for Outsourcing Pairing Computation, in: CARDIS - 13th Smart Card Research and Advanced Application Conference, Paris, France, M. Joye, A. Moradi (editors), Springer, November 2014.
    https://hal.inria.fr/hal-01084550
  • 40Y. Ishai, H. Wee.
    Partial Garbling Schemes and Their Applications, in: Automata, Languages, and Programming: ICALP, Copenhagen, Denmark, July 2014. [ DOI : 10.1007/978-3-662-43948-7_54 ]
    https://hal.archives-ouvertes.fr/hal-01094699
  • 41T. Lepoint, J.-S. Coron, M. Tibouchi.
    Scale-Invariant Fully-Homomorphic Encryption over the Integers, in: PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, H. Krawczyk (editor), Springer, March 2014, vol. 8383, pp. 311-328. [ DOI : 10.1007/978-3-642-54631-0_18 ]
    https://hal.inria.fr/hal-00950481
  • 42T. Lepoint, M. Naehrig.
    A Comparison of the Homomorphic Encryption Schemes FV and YASHE, in: AFRICACRYPT 2014, Marrakesh, Morocco, D. Pointcheval, D. Vergnaud (editors), Lecture Notes in Computer Science, Springer, May 2014, vol. 8469, pp. 318-335. [ DOI : 10.1007/978-3-319-06734-6_20 ]
    https://hal.archives-ouvertes.fr/hal-01006484
  • 43V. Lomné, E. Prouff, M. Rivain, T. Roche, A. Thillard.
    How to Estimate the Success Rate of Higher Order Side-Channels Attacks, in: Workshop on Cryptographic Hardware and Embedded Systems (CHES), Busan, South Korea, September 2014.
    https://hal.inria.fr/hal-01089215
  • 44M. Mehari, M. Konstantinos, D. Naccache, M. Keith.
    Verifying Software Integrity in Embedded Systems: A Side Channel Approach, in: Constructive Side-Channel Analysis and Secure Design, Paris, France, Constructive Side-Channel Analysis and Secure Design, Springer, April 2014, vol. Lecture Notes in Computer Science 2014, 19 p. [ DOI : 10.1007/978-3-319-10175-0_18 ]
    https://hal.inria.fr/hal-01098381
  • 45D. Naccache, S. Rainer, S. Adriana, M. Yung.
    Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption, in: Security and Cryptography for Networks, Amalfi, Italy, Security and Cryptography for Networks, Springer, October 2014, vol. Lecture Notes in Computer Science Volume 8642, 9 p. [ DOI : 10.1007/978-3-319-10879-7_34 ]
    https://hal.inria.fr/hal-01098406
  • 46D. Pointcheval, O. Sanders.
    Forward Secure Non-Interactive Key Exchange, in: The 9th Conference on Security in Communication Networks (SCN '14), Amalfi, Italy, M. Abdalla, R. D. Prisco (editors), Proceedings of the 9th Conference on Security in Communication Networks (SCN '14), Springer, September 2014, vol. LNCS, no 8642, pp. 21-39. [ DOI : 10.1007/978-3-319-10879-7_2 ]
    https://hal.inria.fr/hal-01089001
  • 47H. Wee.
    Dual System Encryption via Predicate Encodings, in: Theory of Cryptography (TCC 2014), San Diego, United States, February 2014. [ DOI : 10.1007/978-3-642-54242-8_26 ]
    https://hal.archives-ouvertes.fr/hal-01094703

Books or Proceedings Editing

  • 48M. Abdalla, R. D. Prisco (editors)
    Security and Cryptography for Networks - SCN 2014, Lecture Notes in Computer Science, Springer, Amalfi, Italy, September 2014, vol. 8642, 609 p. [ DOI : 10.1007/978-3-319-10879-7 ]
    https://hal.inria.fr/hal-01068374
  • 49D. Naccache, D. Sauveron (editors)
    Information Security Theory and Practice. Securing the Internet of Things , Lecture Notes in Computer Science, Springer, Heraklion, Crete, Greece, June 2014, vol. 8501. [ DOI : 10.1007/978-3-662-43826-8 ]
    https://hal.inria.fr/hal-01098408
  • 50D. Pointcheval, D. Vergnaud (editors)
    Progress in Cryptology – AFRICACRYPT 2014, Lecture Notes in Computer Science, Springer, May 2014, vol. 8469, 476 p. [ DOI : 10.1007/978-3-319-06734-6 ]
    https://hal.inria.fr/hal-01089517

Internal Reports

  • 51M. Abdalla, F. Benhamouda, A. Passelègue, K. G. Paterson.
    Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier, June 2014, no Cryptology ePrint Archive: Report 2014/488.
    https://hal.inria.fr/hal-01068465
  • 52M. Abdalla, F. Benhamouda, D. Pointcheval.
    Disjunctions for Hash Proof Systems: New Constructions and Applications, June 2014, no Cryptology ePrint Archive: Report 2014/483.
    https://hal.inria.fr/hal-01068420
  • 53M. Abdalla, F. Benhamouda, D. Pointcheval.
    Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks, IACR, August 2014, no Cryptology ePrint Archive: Report 2014/609.
    https://hal.inria.fr/hal-01068416
  • 54M. Abdalla, F. Benhamouda, D. Pointcheval.
    Removing Erasures with Explainable Hash Proof Systems, February 2014, no Cryptology ePrint Archive: Report 2014/125.
    https://hal.inria.fr/hal-01068442
  • 55M. Abdalla, B. Florian, A. De Caro, D. Pointcheval.
    Simple Functional Encryption Schemes for Inner Products, IACR, January 2015, no Cryptology ePrint Archive: Report 2015/017.
    https://hal.inria.fr/hal-01108287
  • 56A. Bar-On, I. Dinur, O. Dunkelman, V. Lallemand, B. Tsaban.
    Improved Analysis of Zorro-Like Ciphers, IACR Cryptology ePrint Archive, March 2014, no 2014/228.
    https://hal.inria.fr/hal-01092323
  • 57F. Benhamouda, D. Pointcheval.
    Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions, IACR Cryptology ePrint Archive, October 2014, no Cryptology ePrint Archive: Report 2013/833.
    https://hal.inria.fr/hal-01093876
  • 58T. Bourgeat, J. Bringer, H. Chabanne, R. Champenois, J. Clément, H. Ferradi, M. Heinrich, P. Melotti, D. Naccache, A. Voizard.
    New Algorithmic Approaches to Point Constellation Recogniti, Ecole normale supérieure, March 2014, no CoRR abs/1405.1402 (2014), 14 p.
    https://hal.inria.fr/hal-01098399
  • 59S. Canard, D. Pointcheval, O. Sanders, J. Traoré.
    Divisible E-Cash Made Practical, IACR, October 2014, no Cryptology ePrint Archive: Report 2014/785.
    https://hal.inria.fr/hal-01088999
  • 60R. Gay, P. Méaux, H. Wee.
    Predicate Encryption for Multi-Dimensional Range Queries from Lattices, Inria Paris-Rocquencourt - CASCADE ; ENS Paris - Ecole Normale Supérieure de Paris ; LIENS - Laboratoire d'informatique de l'école normale supérieure , November 2014, no Cryptology ePrint Archive: Report 2014/965.
    https://hal.inria.fr/hal-01094685

Scientific Popularization

  • 61A. Teston, L. Ducas, M. Jouhet, T. Viéville.
    Cryptris 1/2. Comprendre une des techniques les plus sophistiquées de cryptographie en... jouant à Tetris., in: Image des Maths, June 2014.
    https://hal.inria.fr/hal-01009430