Damien Vergnaud

From MaRDI portal
Person:269478

Available identifiers

zbMath Open vergnaud.damienDBLP04/4983WikidataQ57772678 ScholiaQ57772678MaRDI QIDQ269478

List of research outcomes





PublicationDate of PublicationType
Cryptanalysis of a generalized subset-sum pseudorandom generator2024-12-03Paper
Quantum security of subset cover problems2024-11-22Paper
Commitments with efficient zero-knowledge arguments from subset sum problems2024-06-05Paper
Efficient zero-knowledge arguments and digital signatures \textit{via} sharing conversion \textit{in the head}2024-06-05Paper
Zero-knowledge protocols for the subset sum problem from MPC-in-the-head with rejection2023-08-16Paper
Dynamic random probing expansion with quasi linear asymptotic complexity2023-05-12Paper
Succinct Diophantine-satisfiability arguments2023-03-29Paper
Public-key generation with verifiable randomness2023-03-21Paper
Secure storage -- confidentiality and authentication2022-09-16Paper
Reusing nonces in Schnorr signatures (and keeping it secure...)2022-08-25Paper
The key-dependent message security of key-alternating Feistel ciphers2021-12-20Paper
Hardware security without secure hardware: how to decrypt with a password and a server2021-11-18Paper
Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND2021-03-30Paper
Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions2021-02-01Paper
Speeding-up verification of digital signatures2021-01-22Paper
Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures2020-06-24Paper
Inferring sequences produced by elliptic curve generators using Coppersmith's methods2020-05-26Paper
Lower and upper bounds on the randomness complexity of private computations of AND2020-04-30Paper
Analysis and improvement of an authentication scheme in incremental cryptography2019-02-20Paper
Polynomial interpolation of the generalized Diffie-Hellman and Naor-Reingold functions2019-01-11Paper
Lattice attacks on pairing-based signatures2018-04-20Paper
Lattice attacks against elliptic-curve signatures with blinded scalar multiplication2018-02-16Paper
Practical key recovery for discrete-logarithm based authentication schemes from random nonce bits2018-02-14Paper
Private multiplication over finite fields2017-10-27Paper
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption2017-07-27Paper
Polynomial interpolation of the Naor-Reingold pseudo-random function2017-07-19Paper
Towards Practical Black-Box Accountable Authority IBE: Weak Black-Box Traceability With Short Ciphertexts and Private Keys2017-07-12Paper
Distribution and Polynomial Interpolation of the Dodis-Yampolskiy Pseudo-Random Function2017-06-13Paper
Full Disk Encryption: Bridging Theory and Practice2017-04-12Paper
Randomness Complexity of Private Circuits for Multiplication2016-07-15Paper
Comment on ``A strong provably secure IBE scheme without bilinear map by M. Zheng, Y. Xiang and H. Zhou2016-04-18Paper
Easing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness2016-04-13Paper
Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions2016-04-08Paper
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks2016-03-10Paper
Non-Interactive Zero-Knowledge Proofs of Non-Membership2016-03-02Paper
Analysis and Improvement of Lindell’s UC-Secure Commitment Schemes2014-01-24Paper
New Techniques for SPHFs and Efficient One-Round PAKE Protocols2013-09-02Paper
Time/Memory/Data Tradeoffs for Variants of the RSA Problem2013-06-11Paper
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages2013-04-19Paper
Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions2013-04-04Paper
Enumeration formula for \((2,n)\)-cubes in discrete planes2012-10-26Paper
Compact Round-Optimal Partially-Blind Signatures2012-09-25Paper
Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith’s Methods2012-07-20Paper
Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions2012-06-15Paper
Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes2011-12-16Paper
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security2011-12-02Paper
Efficient and Secure Generalized Pattern Matching via Fast Fourier Transform2011-06-29Paper
Signatures on Randomizable Ciphertexts2011-03-15Paper
Huff’s Model for Elliptic Curves2010-09-29Paper
Mediated Traceable Anonymous Encryption2010-08-31Paper
Time-selective convertible undeniable signatures with short conversion receipts2010-07-20Paper
Batch Groth–Sahai2010-07-06Paper
On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption2010-07-06Paper
Fair Blind Signatures without Random Oracles2010-05-04Paper
Multi-designated verifiers signatures: anonymity without encryption2010-01-29Paper
Provably Secure Code-Based Threshold Ring Signatures2010-01-07Paper
Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model2009-11-26Paper
Linear independence measure for squares of periods and quasi-periods of elliptic curves2009-05-28Paper
Adaptive-ID Secure Revocable Identity-Based Encryption2009-04-29Paper
NEW EXTENSIONS OF PAIRING-BASED SIGNATURES INTO UNIVERSAL (MULTI) DESIGNATED VERIFIER SIGNATURES2009-04-14Paper
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys2009-03-24Paper
Gradually Convertible Undeniable Signatures2009-03-10Paper
Tracing Malicious Proxies in Proxy Re-encryption2009-02-10Paper
On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures2008-06-24Paper
Trapdoor Permutation Polynomials of ℤ/nℤ and Public Key Cryptosystems2008-06-24Paper
Separation Results on the “One-More” Computational Problems2008-04-24Paper
Universally Convertible Directed Signatures2008-03-18Paper
Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log2008-03-18Paper
Short Undeniable Signatures Without Random Oracles: The Missing Link2008-03-17Paper
Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption2008-03-05Paper
On Kabatianskii-Krouk-Smeets Signatures2007-11-15Paper
New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures2007-09-11Paper
Coding and Cryptography2007-05-02Paper
Security in Communication Networks2006-10-10Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
Information and Communications Security2005-08-19Paper
Universal forgery on Sekhar's signature scheme with message recovery2005-02-28Paper

Research outcomes over time

This page was built for person: Damien Vergnaud