The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

David Pointcheval: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Josef Pieprzyk, David Pointcheval
    Josef Pieprzyk, David Pointcheval. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:387-401 [Conf]
  2. Benoît Chevallier-Mames, Duong Hieu Phan, David Pointcheval
    Optimal Asymmetric Encryption and Signature Paddings. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:254-268 [Conf]
  3. Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval
    A Simple Threshold Authenticated Key Exchange from Short Secrets. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:566-584 [Conf]
  4. Michel Abdalla, David Pointcheval
    A Scalable Password-Based Group Key Exchange Protocol in the Standard Model. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2006, pp:332-347 [Conf]
  5. Emmanuel Bresson, Olivier Chevassut, David Pointcheval
    Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:290-309 [Conf]
  6. Emmanuel Bresson, Olivier Chevassut, David Pointcheval
    Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:497-514 [Conf]
  7. Emmanuel Bresson, Dario Catalano, David Pointcheval
    A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:37-54 [Conf]
  8. Mihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval
    Key-Privacy in Public-Key Encryption. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:566-582 [Conf]
  9. Pierre-Alain Fouque, David Pointcheval
    Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:351-368 [Conf]
  10. Pascal Paillier, David Pointcheval
    Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:165-179 [Conf]
  11. Duong Hieu Phan, David Pointcheval
    Chosen-Ciphertext Security without Redundancy. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:1-18 [Conf]
  12. Duong Hieu Phan, David Pointcheval
    OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:63-77 [Conf]
  13. David Pointcheval, Jacques Stern
    Provably Secure Blind Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:252-265 [Conf]
  14. Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval
    Provably secure password-based authentication in TLS. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:35-45 [Conf]
  15. Emmanuel Bresson, Olivier Chevassut, David Pointcheval
    Security proofs for an efficient password-based key exchange. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:241-250 [Conf]
  16. Emmanuel Bresson, Olivier Chevassut, David Pointcheval, Jean-Jacques Quisquater
    Provably authenticated group Diffie-Hellman key exchange. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:255-264 [Conf]
  17. David Pointcheval, Jacques Stern
    New Blind Signatures Equivalent to Factorization (extended abstract). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:92-99 [Conf]
  18. David Naccache, David Pointcheval, Jacques Stern
    Twin signatures: an alternative to the hash-and-sign paradigm. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:20-27 [Conf]
  19. Benoît Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval
    How to Disembed a Program? [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:441-454 [Conf]
  20. Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway
    Relations Among Notions of Security for Public-Key Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:26-45 [Conf]
  21. Nick Howgrave-Graham, Phong Q. Nguyen, David Pointcheval, John Proos, Joseph H. Silverman, Ari Singer, William Whyte
    The Impact of Decryption Failures on the Security of NTRU Encryption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:226-246 [Conf]
  22. Dario Catalano, David Pointcheval, Thomas Pornin
    IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2004, pp:477-493 [Conf]
  23. Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern
    RSA-OAEP Is Secure under the RSA Assumption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2001, pp:260-274 [Conf]
  24. Phong Q. Nguyen, David Pointcheval
    Analysis and Improvements of NTRU Encryption Paddings. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:210-225 [Conf]
  25. Jacques Stern, David Pointcheval, John Malone-Lee, Nigel P. Smart
    Flaws in Applying Proof Methodologies to Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:93-110 [Conf]
  26. Bruno Blanchet, David Pointcheval
    Automated Security Proofs with Sequences of Games. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2006, pp:537-554 [Conf]
  27. Markus Jakobsson, David Pointcheval, Adam Young
    Secure Mobile Gambling. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:110-125 [Conf]
  28. Michel Abdalla, David Pointcheval
    Simple Password-Based Encrypted Key Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:191-208 [Conf]
  29. Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen
    GEM: A Generic Chosen-Ciphertext Secure Encryption Method. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:263-276 [Conf]
  30. Tatsuaki Okamoto, David Pointcheval
    REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:159-175 [Conf]
  31. Mihir Bellare, David Pointcheval, Phillip Rogaway
    Authenticated Key Exchange Secure against Dictionary Attacks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2000, pp:139-155 [Conf]
  32. Emmanuel Bresson, Olivier Chevassut, David Pointcheval
    Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:321-336 [Conf]
  33. Hervé Chabanne, Duong Hieu Phan, David Pointcheval
    Public Traceability in Traitor Tracing Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:542-558 [Conf]
  34. David Pointcheval, Jacques Stern
    Security Proofs for Signature Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:387-398 [Conf]
  35. David Pointcheval
    A New Identification Scheme Based on the Perceptrons Problem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:319-328 [Conf]
  36. David Pointcheval
    Strengthened Security for Blind Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:391-405 [Conf]
  37. David Pointcheval
    New Public Key Cryptosystems Based on the Dependent-RSA Problems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:239-254 [Conf]
  38. David M'Raïhi, David Pointcheval
    Distributed Trustees and Revocability: A Framework for Internet Payment. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1998, pp:28-42 [Conf]
  39. Michel Abdalla, David Pointcheval
    Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:341-356 [Conf]
  40. Mihir Bellare, Chanathip Namprempre, David Pointcheval, Michael Semanko
    The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2001, pp:309-328 [Conf]
  41. Markus Jakobsson, David Pointcheval
    Mutual Authentication for Low-Power Mobile Devices. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2001, pp:169-186 [Conf]
  42. David Naccache, David Pointcheval, Christophe Tymen
    Monotone Signatures. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2001, pp:295-308 [Conf]
  43. David Pointcheval
    Self-Scrambling Anonymizers. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:259-275 [Conf]
  44. Olivier Baudron, David Pointcheval, Jacques Stern
    Extended Notions of Security for Multicast Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ICALP, 2000, pp:499-511 [Conf]
  45. Pierre-Alain Fouque, David Pointcheval, Jacques Stern, Sébastien Zimmer
    Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:240-251 [Conf]
  46. David Pointcheval
    Practical Security in Public-Key Cryptography. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:1-17 [Conf]
  47. Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, David Pointcheval
    Password-Based Group Key Exchange in a Constant Number of Rounds. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:427-442 [Conf]
  48. Michel Abdalla, Olivier Chevassut, David Pointcheval
    One-Time Verifier-Based Encrypted Key Exchange. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:47-64 [Conf]
  49. Michel Abdalla, Pierre-Alain Fouque, David Pointcheval
    Password-Based Authenticated Key Exchange in the Three-Party Setting. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:65-84 [Conf]
  50. Emmanuel Bresson, Olivier Chevassut, David Pointcheval
    New Security Results on Encrypted Key Exchange. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:145-158 [Conf]
  51. Ernest F. Brickell, David Pointcheval, Serge Vaudenay, Moti Yung
    Design Validations for Discrete Logarithm Based Signature Schemes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:276-292 [Conf]
  52. Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen
    Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:17-33 [Conf]
  53. Benoît Chevallier-Mames, Pascal Paillier, David Pointcheval
    Encoding-Free ElGamal Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:91-104 [Conf]
  54. Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval
    The Twist-AUgmented Technique for Key Exchange. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:410-426 [Conf]
  55. Tatsuaki Okamoto, David Pointcheval
    The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:104-118 [Conf]
  56. David Pointcheval
    The Composite Discrete Logarithm and Secure Authentication. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:113-128 [Conf]
  57. David Pointcheval
    Chosen-Ciphertext Security for Any One-Way Cryptosystem. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:129-146 [Conf]
  58. Olivier Baudron, Pierre-Alain Fouque, David Pointcheval, Jacques Stern, Guillaume Poupard
    Practical multi-candidate election system. [Citation Graph (0, 0)][DBLP]
    PODC, 2001, pp:274-283 [Conf]
  59. Duong Hieu Phan, David Pointcheval
    Une comparaison entre deux méthodes de preuve de sécurité. [Citation Graph (0, 0)][DBLP]
    RIVF, 2003, pp:105-110 [Conf]
  60. Emmanuel Bresson, Olivier Chevassut, David Pointcheval
    The Group Diffie-Hellman Problems. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:325-338 [Conf]
  61. David M'Raïhi, David Naccache, David Pointcheval, Serge Vaudenay
    Computational Alternatives to Random Number Generators. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:72-80 [Conf]
  62. Duong Hieu Phan, David Pointcheval
    About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations). [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:182-197 [Conf]
  63. Duong Hieu Phan, David Pointcheval
    On the Security Notions for Public-Key Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:33-46 [Conf]
  64. Sébastien Kunz-Jacques, David Pointcheval
    A New Key Exchange Protocol Based on MQV Assuming Public Computations. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:186-200 [Conf]
  65. Sébastien Kunz-Jacques, David Pointcheval
    About the Security of MTI/C0 and MQV. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:156-172 [Conf]
  66. Cécile Delerablée, David Pointcheval
    Dynamic Fully Anonymous Short Group Signatures. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:193-210 [Conf]
  67. Emmanuel Bresson, Olivier Chevassut, Abdelilah Essiari, David Pointcheval
    Mutual authentication and group key agreement for low-power mobile devices. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:17, pp:1730-1737 [Journal]
  68. David Pointcheval, Guillaume Poupard
    A New NP-Complete Problem and Public-Key Identification. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2003, v:28, n:1, pp:5-31 [Journal]
  69. Mihir Bellare, Chanathip Namprempre, David Pointcheval, Michael Semanko
    The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2003, v:16, n:3, pp:185-215 [Journal]
  70. Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern
    RSA-OAEP Is Secure under the RSA Assumption. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2004, v:17, n:2, pp:81-104 [Journal]
  71. David Pointcheval, Jacques Stern
    Security Arguments for Digital Signatures and Blind Signatures. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2000, v:13, n:3, pp:361-396 [Journal]
  72. Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang, Sébastien Zimmer
    An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:96-106 [Conf]
  73. Julien Bringer, Hervé Chabanne, David Pointcheval, Qiang Tang
    Extended Private Information Retrieval and Its Application in Biometrics Authentications. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:175-193 [Conf]
  74. Cécile Delerablée, Pascal Paillier, David Pointcheval
    Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys. [Citation Graph (0, 0)][DBLP]
    Pairing, 2007, pp:39-59 [Conf]
  75. Dario Catalano, David Pointcheval, Thomas Pornin
    Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2007, v:20, n:1, pp:115-149 [Journal]
  76. Emmanuel Bresson, Olivier Chevassut, David Pointcheval
    Provably secure authenticated group Diffie-Hellman key exchange. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2007, v:10, n:3, pp:- [Journal]

  77. Multi-factor Authenticated Key Exchange. [Citation Graph (, )][DBLP]


  78. Transferable Constant-Size Fair E-Cash. [Citation Graph (, )][DBLP]


  79. Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange. [Citation Graph (, )][DBLP]


  80. HMAC is a randomness extractor and applications to TLS. [Citation Graph (, )][DBLP]


  81. Smooth Projective Hashing for Conditionally Extractable Commitments. [Citation Graph (, )][DBLP]


  82. Dynamic Threshold Public-Key Encryption. [Citation Graph (, )][DBLP]


  83. Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework. [Citation Graph (, )][DBLP]


  84. Optimal Randomness Extraction from a Diffie-Hellman Element. [Citation Graph (, )][DBLP]


  85. A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. [Citation Graph (, )][DBLP]


  86. An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication. [Citation Graph (, )][DBLP]


  87. Distributed Public-Key Cryptography from Weak Secrets. [Citation Graph (, )][DBLP]


  88. Anonymous Proxy Signatures. [Citation Graph (, )][DBLP]


  89. New Anonymity Notions for Identity-Based Encryption. [Citation Graph (, )][DBLP]


  90. Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures. [Citation Graph (, )][DBLP]


  91. Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness. [Citation Graph (, )][DBLP]


  92. Strong Cryptography from Weak Secrets. [Citation Graph (, )][DBLP]


  93. Flexible Group Key Exchange with On-demand Computation of Subgroup Keys. [Citation Graph (, )][DBLP]


  94. Mediated Traceable Anonymous Encryption. [Citation Graph (, )][DBLP]


  95. Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures. [Citation Graph (, )][DBLP]


  96. New Anonymity Notions for Identity-Based Encryption. [Citation Graph (, )][DBLP]


  97. On Some Incompatible Properties of Voting Schemes. [Citation Graph (, )][DBLP]


Search in 0.300secs, Finished in 0.305secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002