Damien Vergnaud

From MaRDI portal
Person:269478

Available identifiers

zbMath Open vergnaud.damienWikidataQ57772678 ScholiaQ57772678MaRDI QIDQ269478

List of research outcomes

PublicationDate of PublicationType
Zero-knowledge protocols for the subset sum problem from MPC-in-the-head with rejection2023-08-16Paper
Dynamic random probing expansion with quasi linear asymptotic complexity2023-05-12Paper
Succinct Diophantine-satisfiability arguments2023-03-29Paper
Public-key generation with verifiable randomness2023-03-21Paper
Secure storage -- confidentiality and authentication2022-09-16Paper
Reusing nonces in Schnorr signatures (and keeping it secure...)2022-08-25Paper
The key-dependent message security of key-alternating Feistel ciphers2021-12-20Paper
Hardware security without secure hardware: how to decrypt with a password and a server2021-11-18Paper
Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND2021-03-30Paper
Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions2021-02-01Paper
Speeding-up verification of digital signatures2021-01-22Paper
Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures2020-06-24Paper
Inferring sequences produced by elliptic curve generators using Coppersmith's methods2020-05-26Paper
Lower and upper bounds on the randomness complexity of private computations of AND2020-04-30Paper
Analysis and improvement of an authentication scheme in incremental cryptography2019-02-20Paper
Polynomial interpolation of the generalized Diffie-Hellman and Naor-Reingold functions2019-01-11Paper
Lattice attacks on pairing-based signatures2018-04-20Paper
Lattice attacks against elliptic-curve signatures with blinded scalar multiplication2018-02-16Paper
Practical key recovery for discrete-logarithm based authentication schemes from random nonce bits2018-02-14Paper
Private multiplication over finite fields2017-10-27Paper
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption2017-07-27Paper
Polynomial interpolation of the Naor-Reingold pseudo-random function2017-07-19Paper
Towards Practical Black-Box Accountable Authority IBE: Weak Black-Box Traceability With Short Ciphertexts and Private Keys2017-07-12Paper
Distribution and Polynomial Interpolation of the Dodis-Yampolskiy Pseudo-Random Function2017-06-13Paper
Full Disk Encryption: Bridging Theory and Practice2017-04-12Paper
Randomness Complexity of Private Circuits for Multiplication2016-07-15Paper
Comment on ``A strong provably secure IBE scheme without bilinear map by M. Zheng, Y. Xiang and H. Zhou2016-04-18Paper
Easing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness2016-04-13Paper
Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions2016-04-08Paper
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks2016-03-10Paper
Non-Interactive Zero-Knowledge Proofs of Non-Membership2016-03-02Paper
Analysis and Improvement of Lindell’s UC-Secure Commitment Schemes2014-01-24Paper
New Techniques for SPHFs and Efficient One-Round PAKE Protocols2013-09-02Paper
Time/Memory/Data Tradeoffs for Variants of the RSA Problem2013-06-11Paper
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages2013-04-19Paper
Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions2013-04-04Paper
Enumeration formula for \((2,n)\)-cubes in discrete planes2012-10-26Paper
Compact Round-Optimal Partially-Blind Signatures2012-09-25Paper
Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith’s Methods2012-07-20Paper
Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions2012-06-15Paper
Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes2011-12-16Paper
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security2011-12-02Paper
Efficient and Secure Generalized Pattern Matching via Fast Fourier Transform2011-06-29Paper
Signatures on Randomizable Ciphertexts2011-03-15Paper
Huff’s Model for Elliptic Curves2010-09-29Paper
Mediated Traceable Anonymous Encryption2010-08-31Paper
Time-selective convertible undeniable signatures with short conversion receipts2010-07-20Paper
On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption2010-07-06Paper
Batch Groth–Sahai2010-07-06Paper
Fair Blind Signatures without Random Oracles2010-05-04Paper
Multi-designated verifiers signatures: anonymity without encryption2010-01-29Paper
Provably Secure Code-Based Threshold Ring Signatures2010-01-07Paper
Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model2009-11-26Paper
Linear independence measure for squares of periods and quasi-periods of elliptic curves2009-05-28Paper
Adaptive-ID Secure Revocable Identity-Based Encryption2009-04-29Paper
NEW EXTENSIONS OF PAIRING-BASED SIGNATURES INTO UNIVERSAL (MULTI) DESIGNATED VERIFIER SIGNATURES2009-04-14Paper
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys2009-03-24Paper
Gradually Convertible Undeniable Signatures2009-03-10Paper
Tracing Malicious Proxies in Proxy Re-encryption2009-02-10Paper
On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures2008-06-24Paper
Trapdoor Permutation Polynomials of ℤ/nℤ and Public Key Cryptosystems2008-06-24Paper
Separation Results on the “One-More” Computational Problems2008-04-24Paper
Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log2008-03-18Paper
Universally Convertible Directed Signatures2008-03-18Paper
Short Undeniable Signatures Without Random Oracles: The Missing Link2008-03-17Paper
Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption2008-03-05Paper
On Kabatianskii-Krouk-Smeets Signatures2007-11-15Paper
New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures2007-09-11Paper
Coding and Cryptography2007-05-02Paper
Security in Communication Networks2006-10-10Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
Information and Communications Security2005-08-19Paper
Universal forgery on Sekhar's signature scheme with message recovery2005-02-28Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Damien Vergnaud