BibTeX records: David Pointcheval

download as .bib file

@article{DBLP:journals/iacr/DelerableeGP24,
  author       = {C{\'{e}}cile Delerabl{\'{e}}e and
                  L{\'{e}}na{\"{\i}}ck Gouriou and
                  David Pointcheval},
  title        = {Attribute-Based Signatures with Advanced Delegation, and Tracing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {328},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/328},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DelerableeGP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Pointcheval23,
  author       = {David Pointcheval},
  title        = {Technical Perspective: What Does Provable Security Mean for Cryptographic
                  Schemes?},
  journal      = {Commun. {ACM}},
  volume       = {66},
  number       = {6},
  pages        = {106},
  year         = {2023},
  url          = {https://doi.org/10.1145/3592836},
  doi          = {10.1145/3592836},
  timestamp    = {Tue, 18 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/Pointcheval23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/HebantP23,
  author       = {Chlo{\'{e}} H{\'{e}}bant and
                  David Pointcheval},
  title        = {Traceable constant-size multi-authority credentials},
  journal      = {Inf. Comput.},
  volume       = {293},
  pages        = {105060},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ic.2023.105060},
  doi          = {10.1016/J.IC.2023.105060},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/HebantP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/PointchevalS23,
  author       = {David Pointcheval and
                  Nigel P. Smart},
  title        = {Topical Collection on Computing on Encrypted Data},
  journal      = {J. Cryptol.},
  volume       = {36},
  number       = {2},
  pages        = {4},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00145-023-09444-8},
  doi          = {10.1007/S00145-023-09444-8},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/PointchevalS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NguyenPP23,
  author       = {Ky Nguyen and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Mehdi Tibouchi and
                  Xiaofeng Wang},
  title        = {Optimal Security Notion for Decentralized Multi-Client Functional
                  Encryption},
  booktitle    = {Applied Cryptography and Network Security - 21st International Conference,
                  {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13906},
  pages        = {336--365},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-33491-7\_13},
  doi          = {10.1007/978-3-031-33491-7\_13},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/NguyenPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BeguinetCPRR23,
  author       = {Hugo Beguinet and
                  C{\'{e}}line Chevalier and
                  David Pointcheval and
                  Thomas Ricosset and
                  M{\'{e}}lissa Rossi},
  editor       = {Mehdi Tibouchi and
                  Xiaofeng Wang},
  title        = {GeT a {CAKE:} Generic Transformations from Key Encaspulation Mechanisms
                  to Password Authenticated Key Exchanges},
  booktitle    = {Applied Cryptography and Network Security - 21st International Conference,
                  {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13906},
  pages        = {516--538},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-33491-7\_19},
  doi          = {10.1007/978-3-031-33491-7\_19},
  timestamp    = {Wed, 31 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BeguinetCPRR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/NguyenPP23,
  author       = {Dinh Duy Nguyen and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Verifiable Decentralized Multi-client Functional Encryption for Inner
                  Product},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14442},
  pages        = {33--65},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8733-7\_2},
  doi          = {10.1007/978-981-99-8733-7\_2},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/NguyenPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BrezotPP23,
  author       = {Th{\'{e}}ophile Br{\'{e}}zot and
                  Paola de Perthuis and
                  David Pointcheval},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Covercrypt: An Efficient Early-Abort {KEM} for Hidden Access Policies
                  with Traceability from the {DDH} and {LWE}},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14344},
  pages        = {372--392},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50594-2\_19},
  doi          = {10.1007/978-3-031-50594-2\_19},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/BrezotPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HebantPS23,
  author       = {Chlo{\'{e}} H{\'{e}}bant and
                  David Pointcheval and
                  Robert Sch{\"{a}}dlich},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Tracing a Linear Subspace: Application to Linearly-Homomorphic Group
                  Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {312--341},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_12},
  doi          = {10.1007/978-3-031-31368-4\_12},
  timestamp    = {Fri, 05 May 2023 22:44:30 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HebantPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HebantPS23,
  author       = {Chlo{\'{e}} H{\'{e}}bant and
                  David Pointcheval and
                  Robert Sch{\"{a}}dlich},
  title        = {Tracing a Linear Subspace: Application to Linearly-Homomorphic Group
                  Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {138},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/138},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HebantPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenPP23,
  author       = {Dinh Duy Nguyen and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Verifiable Multi-Client Functional Encryption for Inner Product},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {268},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/268},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenPP23a,
  author       = {Ky Nguyen and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Optimal Security Notion for Decentralized Multi-Client Functional
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {435},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/435},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenPP23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeguinetCPRR23,
  author       = {Hugo Beguinet and
                  C{\'{e}}line Chevalier and
                  David Pointcheval and
                  Thomas Ricosset and
                  M{\'{e}}lissa Rossi},
  title        = {GeT a {CAKE:} Generic Transformations from Key Encaspulation Mechanisms
                  to Password Authenticated Key Exchanges},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {470},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/470},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeguinetCPRR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrezotPP23,
  author       = {Th{\'{e}}ophile Br{\'{e}}zot and
                  Paola de Perthuis and
                  David Pointcheval},
  title        = {Covercrypt: an Efficient Early-Abort {KEM} for Hidden Access Policies
                  with Traceability from the {DDH} and {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {836},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/836},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrezotPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pointcheval23,
  author       = {David Pointcheval},
  title        = {Linearly-Homomorphic Signatures for Short Randomizable Proofs of Subset
                  Membership},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1499},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1499},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pointcheval23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonPR23,
  author       = {Nicolas Bon and
                  David Pointcheval and
                  Matthieu Rivain},
  title        = {Optimized Homomorphic Evaluation of Boolean Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1589},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1589},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BonPR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/RyffelTPB22,
  author       = {Th{\'{e}}o Ryffel and
                  Pierre Tholoniat and
                  David Pointcheval and
                  Francis R. Bach},
  title        = {AriaNN: Low-Interaction Privacy-Preserving Deep Learning via Function
                  Secret Sharing},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {1},
  pages        = {291--316},
  year         = {2022},
  url          = {https://doi.org/10.2478/popets-2022-0015},
  doi          = {10.2478/POPETS-2022-0015},
  timestamp    = {Mon, 06 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/RyffelTPB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/NguyenPP22,
  author       = {Ky Nguyen and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Multi-Client Functional Encryption with Fine-Grained Access Control},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13791},
  pages        = {95--125},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22963-3\_4},
  doi          = {10.1007/978-3-031-22963-3\_4},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/NguyenPP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PerthuisP22,
  author       = {Paola de Perthuis and
                  David Pointcheval},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Two-Client Inner-Product Functional Encryption with an Application
                  to Money-Laundering Detection},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {725--737},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3559374},
  doi          = {10.1145/3548606.3559374},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PerthuisP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/CottierP22,
  author       = {Baptiste Cottier and
                  David Pointcheval},
  editor       = {Guy{-}Vincent Jourdan and
                  Laurent Mounier and
                  Carlisle M. Adams and
                  Florence S{\`{e}}des and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Security Analysis of Improved {EDHOC} Protocol},
  booktitle    = {Foundations and Practice of Security - 15th International Symposium,
                  {FPS} 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13877},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-30122-3\_1},
  doi          = {10.1007/978-3-031-30122-3\_1},
  timestamp    = {Sat, 27 May 2023 15:23:45 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/CottierP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/BettaiebBBCP22,
  author       = {Slim Bettaieb and
                  Lo{\"{\i}}c Bidoux and
                  Olivier Blazy and
                  Baptiste Cottier and
                  David Pointcheval},
  editor       = {Guy{-}Vincent Jourdan and
                  Laurent Mounier and
                  Carlisle M. Adams and
                  Florence S{\`{e}}des and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Post-quantum and UC-Secure Oblivious Transfer from {SPHF} with Grey
                  Zone},
  booktitle    = {Foundations and Practice of Security - 15th International Symposium,
                  {FPS} 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13877},
  pages        = {54--70},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-30122-3\_4},
  doi          = {10.1007/978-3-031-30122-3\_4},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/BettaiebBBCP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DelerableeGP22,
  author       = {C{\'{e}}cile Delerabl{\'{e}}e and
                  L{\'{e}}na{\"{\i}}ck Gouriou and
                  David Pointcheval},
  editor       = {Clemente Galdi and
                  Stanislaw Jarecki},
  title        = {Key-Policy {ABE} with Switchable Attributes},
  booktitle    = {Security and Cryptography for Networks - 13th International Conference,
                  {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13409},
  pages        = {147--171},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-14791-3\_7},
  doi          = {10.1007/978-3-031-14791-3\_7},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DelerableeGP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/HebantP22,
  author       = {Chlo{\'{e}} H{\'{e}}bant and
                  David Pointcheval},
  editor       = {Clemente Galdi and
                  Stanislaw Jarecki},
  title        = {Traceable Constant-Size Multi-authority Credentials},
  booktitle    = {Security and Cryptography for Networks - 13th International Conference,
                  {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13409},
  pages        = {411--434},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-14791-3\_18},
  doi          = {10.1007/978-3-031-14791-3\_18},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/HebantP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/IzabacheneNPP22,
  author       = {Malika Izabach{\`{e}}ne and
                  Anca Nitulescu and
                  Paola de Perthuis and
                  David Pointcheval},
  editor       = {Clemente Galdi and
                  Stanislaw Jarecki},
  title        = {MyOPE: Malicious SecuritY for Oblivious Polynomial Evaluation},
  booktitle    = {Security and Cryptography for Networks - 13th International Conference,
                  {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13409},
  pages        = {663--686},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-14791-3\_29},
  doi          = {10.1007/978-3-031-14791-3\_29},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/IzabacheneNPP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-11980,
  author       = {Th{\'{e}}o Ryffel and
                  Francis R. Bach and
                  David Pointcheval},
  title        = {Differential Privacy Guarantees for Stochastic Gradient Langevin Dynamics},
  journal      = {CoRR},
  volume       = {abs/2201.11980},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.11980},
  eprinttype    = {arXiv},
  eprint       = {2201.11980},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-11980.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-03599,
  author       = {Baptiste Cottier and
                  David Pointcheval},
  title        = {Security Analysis of the {EDHOC} protocol},
  journal      = {CoRR},
  volume       = {abs/2209.03599},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.03599},
  doi          = {10.48550/ARXIV.2209.03599},
  eprinttype    = {arXiv},
  eprint       = {2209.03599},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-03599.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-04149,
  author       = {Slim Bettaieb and
                  Lo{\"{\i}}c Bidoux and
                  Olivier Blazy and
                  Baptiste Cottier and
                  David Pointcheval},
  title        = {Post-Quantum Oblivious Transfer from Smooth Projective Hash Functions
                  with Grey Zone},
  journal      = {CoRR},
  volume       = {abs/2209.04149},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.04149},
  doi          = {10.48550/ARXIV.2209.04149},
  eprinttype    = {arXiv},
  eprint       = {2209.04149},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-04149.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenPP22,
  author       = {Ky Nguyen and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Multi-Client Functional Encryption with Fine-Grained Access Control},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {215},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/215},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenPP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PerthuisP22,
  author       = {Paola de Perthuis and
                  David Pointcheval},
  title        = {Two-Client Inner-Product Functional Encryption, with an Application
                  to Money-Laundering Detection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {441},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/441},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PerthuisP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenPS22,
  author       = {Ky Nguyen and
                  David Pointcheval and
                  Robert Sch{\"{a}}dlich},
  title        = {Function-Hiding Decentralized Multi-Client Functional Encryption for
                  Inner Products},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1532},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1532},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BettaiebBBCP21,
  author       = {Slim Bettaieb and
                  Lo{\"{\i}}c Bidoux and
                  Olivier Blazy and
                  Baptiste Cottier and
                  David Pointcheval},
  editor       = {Delphine Reinhardt and
                  Tilo M{\"{u}}ller},
  title        = {Secure Decision Forest Evaluation},
  booktitle    = {{ARES} 2021: The 16th International Conference on Availability, Reliability
                  and Security, Vienna, Austria, August 17-20, 2021},
  pages        = {24:1--24:12},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3465481.3465763},
  doi          = {10.1145/3465481.3465763},
  timestamp    = {Tue, 17 Aug 2021 14:54:34 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BettaiebBBCP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-08546,
  author       = {Slim Bettaieb and
                  Lo{\"{\i}}c Bidoux and
                  Olivier Blazy and
                  Baptiste Cottier and
                  David Pointcheval},
  title        = {Secure Decision Forest Evaluation},
  journal      = {CoRR},
  volume       = {abs/2108.08546},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.08546},
  eprinttype    = {arXiv},
  eprint       = {2108.08546},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-08546.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaPS21,
  author       = {Michel Abdalla and
                  David Pointcheval and
                  Azam Soleimanian},
  title        = {2-Step Multi-Client Quadratic Functional Encryption from Decentralized
                  Function-Hiding Inner-Product},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/001},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DelerableeGP21,
  author       = {C{\'{e}}cile Delerabl{\'{e}}e and
                  L{\'{e}}na{\"{\i}}ck Gouriou and
                  David Pointcheval},
  title        = {Key-Policy {ABE} with Delegation of Rights},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {867},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/867},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DelerableeGP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IzabacheneNPP21,
  author       = {Malika Izabach{\`{e}}ne and
                  Anca Nitulescu and
                  Paola de Perthuis and
                  David Pointcheval},
  title        = {MyOPE: Malicious securitY for Oblivious Polynomial Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1291},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1291},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IzabacheneNPP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/AbdallaBP20,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  title        = {Corrigendum: Public-key encryption indistinguishable under plaintext-checkable
                  attacks},
  journal      = {{IET} Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {365--366},
  year         = {2020},
  url          = {https://doi.org/10.1049/iet-ifs.2019.0200},
  doi          = {10.1049/IET-IFS.2019.0200},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/AbdallaBP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChotardDGPP20,
  author       = {J{\'{e}}r{\'{e}}my Chotard and
                  Edouard Dufour{-}Sans and
                  Romain Gay and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Dynamic Decentralized Functional Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {747--775},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_25},
  doi          = {10.1007/978-3-030-56784-2\_25},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChotardDGPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DoPP20,
  author       = {Xuan Thanh Do and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Stanislaw Jarecki},
  title        = {Traceable Inner Product Functional Encryption},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2020 - The Cryptographers' Track at
                  the {RSA} Conference 2020, San Francisco, CA, USA, February 24-28,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12006},
  pages        = {564--585},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-40186-3\_24},
  doi          = {10.1007/978-3-030-40186-3\_24},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DoPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FioreNP20,
  author       = {Dario Fiore and
                  Anca Nitulescu and
                  David Pointcheval},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Boosting Verifiable Computation on Encrypted Data},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {124--154},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_5},
  doi          = {10.1007/978-3-030-45388-6\_5},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FioreNP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HebantPP20,
  author       = {Chlo{\'{e}} H{\'{e}}bant and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Linearly-Homomorphic Signatures and Scalable Mix-Nets},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {597--627},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_21},
  doi          = {10.1007/978-3-030-45388-6\_21},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HebantPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/AbdallaBMPSW20,
  author       = {Michel Abdalla and
                  Florian Bourse and
                  Hugo Marival and
                  David Pointcheval and
                  Azam Soleimanian and
                  Hendrik Waldner},
  editor       = {Clemente Galdi and
                  Vladimir Kolesnikov},
  title        = {Multi-Client Inner-Product Functional Encryption in the Random-Oracle
                  Model},
  booktitle    = {Security and Cryptography for Networks - 12th International Conference,
                  {SCN} 2020, Amalfi, Italy, September 14-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12238},
  pages        = {525--545},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57990-6\_26},
  doi          = {10.1007/978-3-030-57990-6\_26},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/AbdallaBMPSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-04593,
  author       = {Th{\'{e}}o Ryffel and
                  David Pointcheval and
                  Francis R. Bach},
  title        = {{ARIANN:} Low-Interaction Privacy-Preserving Deep Learning via Function
                  Secret Sharing},
  journal      = {CoRR},
  volume       = {abs/2006.04593},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.04593},
  eprinttype    = {arXiv},
  eprint       = {2006.04593},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-04593.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FioreNP20,
  author       = {Dario Fiore and
                  Anca Nitulescu and
                  David Pointcheval},
  title        = {Boosting Verifiable Computation on Encrypted Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {132},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/132},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FioreNP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChotardDGPP20,
  author       = {J{\'{e}}r{\'{e}}my Chotard and
                  Edouard Dufour{-}Sans and
                  Romain Gay and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Dynamic Decentralized Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {197},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/197},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChotardDGPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HebantP20,
  author       = {Chlo{\'{e}} H{\'{e}}bant and
                  David Pointcheval},
  title        = {Traceable Attribute-Based Anonymous Credentials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {657},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/657},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HebantP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBMPSW20,
  author       = {Michel Abdalla and
                  Florian Bourse and
                  Hugo Marival and
                  David Pointcheval and
                  Azam Soleimanian and
                  Hendrik Waldner},
  title        = {Multi-Client Inner-Product Functional Encryption in the Random-Oracle
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {788},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/788},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBMPSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbdallaBP19,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  title        = {On the Tightness of Forward-Secure Signature Reductions},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {1},
  pages        = {84--150},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9283-2},
  doi          = {10.1007/S00145-018-9283-2},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbdallaBP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SansP19,
  author       = {Edouard Dufour Sans and
                  David Pointcheval},
  editor       = {Robert H. Deng and
                  Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
                  Mart{\'{\i}}n Ochoa and
                  Moti Yung},
  title        = {Unbounded Inner-Product Functional Encryption with Succinct Keys},
  booktitle    = {Applied Cryptography and Network Security - 17th International Conference,
                  {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11464},
  pages        = {426--441},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21568-2\_21},
  doi          = {10.1007/978-3-030-21568-2\_21},
  timestamp    = {Wed, 29 May 2019 12:25:55 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/SansP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BoursePS19,
  author       = {Florian Bourse and
                  David Pointcheval and
                  Olivier Sanders},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Divisible E-Cash from Constrained Pseudo-Random Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11921},
  pages        = {679--708},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34578-5\_24},
  doi          = {10.1007/978-3-030-34578-5\_24},
  timestamp    = {Tue, 26 Nov 2019 14:11:51 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BoursePS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/HebantPP19,
  author       = {Chlo{\'{e}} H{\'{e}}bant and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Zhiqiang Lin and
                  Charalampos Papamanthou and
                  Michalis Polychronakis},
  title        = {Decentralized Evaluation of Quadratic Polynomials on Encrypted Data},
  booktitle    = {Information Security - 22nd International Conference, {ISC} 2019,
                  New York City, NY, USA, September 16-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11723},
  pages        = {87--106},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30215-3\_5},
  doi          = {10.1007/978-3-030-30215-3\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/HebantPP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/RyffelPBDG19,
  author       = {Th{\'{e}}o Ryffel and
                  David Pointcheval and
                  Francis R. Bach and
                  Edouard Dufour{-}Sans and
                  Romain Gay},
  editor       = {Hanna M. Wallach and
                  Hugo Larochelle and
                  Alina Beygelzimer and
                  Florence d'Alch{\'{e}}{-}Buc and
                  Emily B. Fox and
                  Roman Garnett},
  title        = {Partially Encrypted Deep Learning using Functional Encryption},
  booktitle    = {Advances in Neural Information Processing Systems 32: Annual Conference
                  on Neural Information Processing Systems 2019, NeurIPS 2019, December
                  8-14, 2019, Vancouver, BC, Canada},
  pages        = {4519--4530},
  year         = {2019},
  url          = {https://proceedings.neurips.cc/paper/2019/hash/9d28de8ff9bb6a3fa41fddfdc28f3bc1-Abstract.html},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/RyffelPBDG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-10214,
  author       = {Th{\'{e}}o Ryffel and
                  Edouard Dufour Sans and
                  Romain Gay and
                  Francis R. Bach and
                  David Pointcheval},
  title        = {Partially Encrypted Machine Learning using Functional Encryption},
  journal      = {CoRR},
  volume       = {abs/1905.10214},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.10214},
  eprinttype    = {arXiv},
  eprint       = {1905.10214},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-10214.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HebantPP19,
  author       = {Chlo{\'{e}} H{\'{e}}bant and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Linearly-Homomorphic Signatures and Scalable Mix-Nets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {547},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/547},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HebantPP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoPP19,
  author       = {Xuan Thanh Do and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Traceable Inner Product Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1358},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1358},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoPP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/CanardPPT18,
  author       = {S{\'{e}}bastien Canard and
                  Duong Hieu Phan and
                  David Pointcheval and
                  Viet Cuong Trinh},
  title        = {A new technique for compacting ciphertext in multi-channel broadcast
                  encryption and attribute-based encryption},
  journal      = {Theor. Comput. Sci.},
  volume       = {723},
  pages        = {51--72},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.tcs.2018.02.036},
  doi          = {10.1016/J.TCS.2018.02.036},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/CanardPPT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CanardPST18,
  author       = {S{\'{e}}bastien Canard and
                  David Pointcheval and
                  Quentin Santos and
                  Jacques Traor{\'{e}}},
  editor       = {Bart Preneel and
                  Frederik Vercauteren},
  title        = {Privacy-Preserving Plaintext-Equality of Low-Entropy Inputs},
  booktitle    = {Applied Cryptography and Network Security - 16th International Conference,
                  {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10892},
  pages        = {262--279},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93387-0\_14},
  doi          = {10.1007/978-3-319-93387-0\_14},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/CanardPST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChotardSGPP18,
  author       = {J{\'{e}}r{\'{e}}my Chotard and
                  Edouard Dufour Sans and
                  Romain Gay and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Decentralized Multi-Client Functional Encryption for Inner Product},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11273},
  pages        = {703--732},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03329-3\_24},
  doi          = {10.1007/978-3-030-03329-3\_24},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChotardSGPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/PointchevalS18,
  author       = {David Pointcheval and
                  Olivier Sanders},
  editor       = {Nigel P. Smart},
  title        = {Reassessing Security of Randomizable Signatures},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at
                  the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10808},
  pages        = {319--338},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76953-0\_17},
  doi          = {10.1007/978-3-319-76953-0\_17},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/PointchevalS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CanardPST18,
  author       = {S{\'{e}}bastien Canard and
                  David Pointcheval and
                  Quentin Santos and
                  Jacques Traor{\'{e}}},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Practical Strategy-Resistant Privacy-Preserving Elections},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11099},
  pages        = {331--349},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98989-1\_17},
  doi          = {10.1007/978-3-319-98989-1\_17},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CanardPST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DupontHPRY18,
  author       = {Pierre{-}Alain Dupont and
                  Julia Hesse and
                  David Pointcheval and
                  Leonid Reyzin and
                  Sophia Yakoubov},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Fuzzy Password-Authenticated Key Exchange},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10822},
  pages        = {393--424},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78372-7\_13},
  doi          = {10.1007/978-3-319-78372-7\_13},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DupontHPRY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/DupinPB18,
  author       = {Aur{\'{e}}lien Dupin and
                  David Pointcheval and
                  Christophe Bidan},
  editor       = {Joonsang Baek and
                  Willy Susilo and
                  Jongkil Kim},
  title        = {On the Leakage of Corrupted Garbled Circuits},
  booktitle    = {Provable Security - 12th International Conference, ProvSec 2018, Jeju,
                  South Korea, October 25-28, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11192},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01446-9\_1},
  doi          = {10.1007/978-3-030-01446-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/DupinPB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SansGP18,
  author       = {Edouard Dufour Sans and
                  Romain Gay and
                  David Pointcheval},
  title        = {Reading in the Dark: Classifying Encrypted Digits with Functional
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {206},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/206},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SansGP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SansP18,
  author       = {Edouard Dufour Sans and
                  David Pointcheval},
  title        = {Unbounded Inner Product Functional Encryption, with Succinct Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {487},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/487},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SansP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DupinPB18,
  author       = {Aur{\'{e}}lien Dupin and
                  David Pointcheval and
                  Christophe Bidan},
  title        = {On the Leakage of Corrupted Garbled Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {743},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/743},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DupinPB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanardPST18,
  author       = {S{\'{e}}bastien Canard and
                  David Pointcheval and
                  Quentin Santos and
                  Jacques Traor{\'{e}}},
  title        = {Practical Strategy-Resistant Privacy-Preserving Elections},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {827},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/827},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanardPST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HebantPP18,
  author       = {Chlo{\'{e}} H{\'{e}}bant and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Decentralized Evaluation of Quadratic Polynomials on Encrypted Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1019},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HebantPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChotardSGPP18,
  author       = {J{\'{e}}r{\'{e}}my Chotard and
                  Edouard Dufour Sans and
                  Romain Gay and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Multi-Client Functional Encryption with Repetition for Inner Product},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1021},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChotardSGPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DupontP17,
  author       = {Pierre{-}Alain Dupont and
                  David Pointcheval},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Functional Encryption with Oblivious Helper},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {205--214},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3052996},
  doi          = {10.1145/3052973.3052996},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DupontP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PointchevalW17,
  author       = {David Pointcheval and
                  Guilin Wang},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {{VTBPEKE:} Verifier-based Two-Basis Password Exponential Key Exchange},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {301--312},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053026},
  doi          = {10.1145/3052973.3053026},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PointchevalW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BoldyrevaCDP17,
  author       = {Alexandra Boldyreva and
                  Shan Chen and
                  Pierre{-}Alain Dupont and
                  David Pointcheval},
  title        = {Human Computing for Handling Strong Corruptions in Authenticated Key
                  Exchange},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {159--175},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.31},
  doi          = {10.1109/CSF.2017.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BoldyrevaCDP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CouteauPP17,
  author       = {Geoffroy Couteau and
                  Thomas Peters and
                  David Pointcheval},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Removing the Strong {RSA} Assumption from Arguments over the Integers},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10211},
  pages        = {321--350},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56614-6\_11},
  doi          = {10.1007/978-3-319-56614-6\_11},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CouteauPP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ChotardPP17,
  author       = {J{\'{e}}r{\'{e}}my Chotard and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Phong Q. Nguyen and
                  Jianying Zhou},
  title        = {Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms},
  booktitle    = {Information Security - 20th International Conference, {ISC} 2017,
                  Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10599},
  pages        = {155--172},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69659-1\_9},
  doi          = {10.1007/978-3-319-69659-1\_9},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/ChotardPP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PointchevalST17,
  author       = {David Pointcheval and
                  Olivier Sanders and
                  Jacques Traor{\'{e}}},
  editor       = {Serge Fehr},
  title        = {Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {61--90},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_4},
  doi          = {10.1007/978-3-662-54365-8\_4},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/PointchevalST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaBP17,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  editor       = {Serge Fehr},
  title        = {Removing Erasures with Explainable Hash Proof Systems},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {151--174},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_7},
  doi          = {10.1007/978-3-662-54365-8\_7},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaBP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoldyrevaCDP17,
  author       = {Alexandra Boldyreva and
                  Shan Chen and
                  Pierre{-}Alain Dupont and
                  David Pointcheval},
  title        = {Human Computing for Handling Strong Corruptions in Authenticated Key
                  Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {559},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/559},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoldyrevaCDP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBP17a,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  title        = {On the Tightness of Forward-Secure Signature Reductions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {746},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/746},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBP17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChotardSGPP17,
  author       = {J{\'{e}}r{\'{e}}my Chotard and
                  Edouard Dufour Sans and
                  Romain Gay and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Decentralized Multi-Client Functional Encryption for Inner Product},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {989},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/989},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChotardSGPP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DupontHPRY17,
  author       = {Pierre{-}Alain Dupont and
                  Julia Hesse and
                  David Pointcheval and
                  Leonid Reyzin and
                  Sophia Yakoubov},
  title        = {Fuzzy Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1111},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1111},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DupontHPRY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PointchevalS17,
  author       = {David Pointcheval and
                  Olivier Sanders},
  title        = {Reassessing Security of Randomizable Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1197},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1197},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PointchevalS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/AbdallaBP16,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  title        = {Public-key encryption indistinguishable under plaintext-checkable
                  attacks},
  journal      = {{IET} Inf. Secur.},
  volume       = {10},
  number       = {6},
  pages        = {288--303},
  year         = {2016},
  url          = {https://doi.org/10.1049/iet-ifs.2015.0500},
  doi          = {10.1049/IET-IFS.2015.0500},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/AbdallaBP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/CanardPST16,
  author       = {S{\'{e}}bastien Canard and
                  David Pointcheval and
                  Olivier Sanders and
                  Jacques Traor{\'{e}}},
  title        = {Divisible e-cash made practical},
  journal      = {{IET} Inf. Secur.},
  volume       = {10},
  number       = {6},
  pages        = {332--347},
  year         = {2016},
  url          = {https://doi.org/10.1049/iet-ifs.2015.0485},
  doi          = {10.1049/IET-IFS.2015.0485},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/CanardPST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/FerradiGMNP16,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Diana Maimut and
                  David Naccache and
                  David Pointcheval},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Legally Fair Contract Signing Without Keystones},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {175--190},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_10},
  doi          = {10.1007/978-3-319-39555-5\_10},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/FerradiGMNP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CouteauPP16,
  author       = {Geoffroy Couteau and
                  Thomas Peters and
                  David Pointcheval},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Encryption Switching Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {308--338},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_12},
  doi          = {10.1007/978-3-662-53018-4\_12},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CouteauPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/PointchevalS16,
  author       = {David Pointcheval and
                  Olivier Sanders},
  editor       = {Kazue Sako},
  title        = {Short Randomizable Signatures},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
                  the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
                  4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9610},
  pages        = {111--126},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29485-8\_7},
  doi          = {10.1007/978-3-319-29485-8\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/PointchevalS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AbdallaCNP16,
  author       = {Michel Abdalla and
                  Mario Cornejo and
                  Anca Nitulescu and
                  David Pointcheval},
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {Robust Password-Protected Secret Sharing},
  booktitle    = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9879},
  pages        = {61--79},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45741-3\_4},
  doi          = {10.1007/978-3-319-45741-3\_4},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AbdallaCNP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/PinoLP16,
  author       = {Rafa{\"{e}}l del Pino and
                  Vadim Lyubashevsky and
                  David Pointcheval},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {The Whole is Less Than the Sum of Its Parts: Constructing More Efficient
                  Lattice-Based AKEs},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {273--291},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_15},
  doi          = {10.1007/978-3-319-44618-9\_15},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/PinoLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2016,
  editor       = {David Pointcheval and
                  Abderrahmane Nitaj and
                  Tajjeeddine Rachidi},
  title        = {Progress in Cryptology - {AFRICACRYPT} 2016 - 8th International Conference
                  on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9646},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-31517-1},
  doi          = {10.1007/978-3-319-31517-1},
  isbn         = {978-3-319-31516-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/Fischlin0PR16,
  author       = {Marc Fischlin and
                  Alexander May and
                  David Pointcheval and
                  Tal Rabin},
  title        = {Public-Key Cryptography (Dagstuhl Seminar 16371)},
  journal      = {Dagstuhl Reports},
  volume       = {6},
  number       = {9},
  pages        = {46--58},
  year         = {2016},
  url          = {https://doi.org/10.4230/DagRep.6.9.46},
  doi          = {10.4230/DAGREP.6.9.46},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/Fischlin0PR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBCP16,
  author       = {Michel Abdalla and
                  Florian Bourse and
                  Angelo De Caro and
                  David Pointcheval},
  title        = {Better Security for Functional Encryption for Inner Product Evaluations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBCP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BostFP16,
  author       = {Raphael Bost and
                  Pierre{-}Alain Fouque and
                  David Pointcheval},
  title        = {Verifiable Dynamic Symmetric Searchable Encryption: Optimality and
                  Forward Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {62},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/062},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BostFP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaCNP16,
  author       = {Michel Abdalla and
                  Mario Cornejo and
                  Anca Nitulescu and
                  David Pointcheval},
  title        = {Robust Password-Protected Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {123},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/123},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaCNP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauPP16,
  author       = {Geoffroy Couteau and
                  Thomas Peters and
                  David Pointcheval},
  title        = {Removing the Strong {RSA} Assumption from Arguments over the Integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {128},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/128},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CouteauPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerradiGMNP16,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Diana Maimut and
                  David Naccache and
                  David Pointcheval},
  title        = {Legally Fair Contract Signing Without Keystones},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/363},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FerradiGMNP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PinoLP16,
  author       = {Rafa{\"{e}}l Del Pino and
                  Vadim Lyubashevsky and
                  David Pointcheval},
  title        = {The Whole is Less than the Sum of its Parts: Constructing More Efficient
                  Lattice-Based AKEs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {435},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/435},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PinoLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChotardPP16,
  author       = {J{\'{e}}r{\'{e}}my Chotard and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1089},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChotardPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CanardPST15,
  author       = {S{\'{e}}bastien Canard and
                  David Pointcheval and
                  Olivier Sanders and
                  Jacques Traor{\'{e}}},
  editor       = {Tal Malkin and
                  Vladimir Kolesnikov and
                  Allison Bishop Lewko and
                  Michalis Polychronakis},
  title        = {Scalable Divisible E-cash},
  booktitle    = {Applied Cryptography and Network Security - 13th International Conference,
                  {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9092},
  pages        = {287--306},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28166-7\_14},
  doi          = {10.1007/978-3-319-28166-7\_14},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/CanardPST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AbdallaBPRV15,
  author       = {Michel Abdalla and
                  Sonia Bela{\"{\i}}d and
                  David Pointcheval and
                  Sylvain Ruhault and
                  Damien Vergnaud},
  editor       = {Tal Malkin and
                  Vladimir Kolesnikov and
                  Allison Bishop Lewko and
                  Michalis Polychronakis},
  title        = {Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel
                  Attacks},
  booktitle    = {Applied Cryptography and Network Security - 13th International Conference,
                  {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9092},
  pages        = {635--654},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28166-7\_31},
  doi          = {10.1007/978-3-319-28166-7\_31},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/AbdallaBPRV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BenhamoudaCPW15,
  author       = {Fabrice Benhamouda and
                  Geoffroy Couteau and
                  David Pointcheval and
                  Hoeteck Wee},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Implicit Zero-Knowledge Arguments and Applications to the Malicious
                  Setting},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {107--129},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_6},
  doi          = {10.1007/978-3-662-48000-7\_6},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BenhamoudaCPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AbdallaBP15,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {Disjunctions for Hash Proof Systems: New Constructions and Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9057},
  pages        = {69--100},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46803-6\_3},
  doi          = {10.1007/978-3-662-46803-6\_3},
  timestamp    = {Thu, 14 Oct 2021 09:58:15 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AbdallaBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/CouteauPP15,
  author       = {Geoffroy Couteau and
                  Thomas Peters and
                  David Pointcheval},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Evangelos Kranakis and
                  Guillaume Bonfante},
  title        = {Secure Distributed Computation on Private Inputs},
  booktitle    = {Foundations and Practice of Security - 8th International Symposium,
                  {FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9482},
  pages        = {14--26},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-30303-1\_2},
  doi          = {10.1007/978-3-319-30303-1\_2},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/CouteauPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CanardPST15,
  author       = {S{\'{e}}bastien Canard and
                  David Pointcheval and
                  Olivier Sanders and
                  Jacques Traor{\'{e}}},
  editor       = {Jonathan Katz},
  title        = {Divisible E-Cash Made Practical},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {77--100},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_4},
  doi          = {10.1007/978-3-662-46447-2\_4},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CanardPST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaBP15,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  editor       = {Jonathan Katz},
  title        = {Public-Key Encryption Indistinguishable Under Plaintext-Checkable
                  Attacks},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {332--352},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_15},
  doi          = {10.1007/978-3-662-46447-2\_15},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaBCP15,
  author       = {Michel Abdalla and
                  Florian Bourse and
                  Angelo De Caro and
                  David Pointcheval},
  editor       = {Jonathan Katz},
  title        = {Simple Functional Encryption Schemes for Inner Products},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {733--751},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_33},
  doi          = {10.1007/978-3-662-46447-2\_33},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaBCP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBCP15,
  author       = {Michel Abdalla and
                  Florian Bourse and
                  Angelo De Caro and
                  David Pointcheval},
  title        = {Simple Functional Encryption Schemes for Inner Products},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBCP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaBCPV15,
  author       = {Fabrice Benhamouda and
                  Olivier Blazy and
                  C{\'{e}}line Chevalier and
                  David Pointcheval and
                  Damien Vergnaud},
  title        = {New Techniques for SPHFs and Efficient One-Round {PAKE} Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaBCPV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBP15,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  title        = {Tighter Reductions for Forward-Secure Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {196},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaCPW15,
  author       = {Fabrice Benhamouda and
                  Geoffroy Couteau and
                  David Pointcheval and
                  Hoeteck Wee},
  title        = {Implicit Zero-Knowledge Arguments and Applications to the Malicious
                  Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {246},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/246},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaCPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanardPS15,
  author       = {S{\'{e}}bastien Canard and
                  David Pointcheval and
                  Olivier Sanders},
  title        = {Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly
                  Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {278},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/278},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanardPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanardPST15,
  author       = {S{\'{e}}bastien Canard and
                  David Pointcheval and
                  Olivier Sanders and
                  Jacques Traor{\'{e}}},
  title        = {Scalable Divisible E-cash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {300},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/300},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanardPST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PointchevalS15,
  author       = {David Pointcheval and
                  Olivier Sanders},
  title        = {Short Randomizable Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {525},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/525},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PointchevalS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PointchevalST15,
  author       = {David Pointcheval and
                  Olivier Sanders and
                  Jacques Traor{\'{e}}},
  title        = {Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {972},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/972},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PointchevalST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauPP15,
  author       = {Geoffroy Couteau and
                  Thomas Peters and
                  David Pointcheval},
  title        = {Encryption Switching Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {990},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/990},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CouteauPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauPP15a,
  author       = {Geoffroy Couteau and
                  Thomas Peters and
                  David Pointcheval},
  title        = {Secure Distributed Computation on Private Inputs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1196},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CouteauPP15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBPRV15,
  author       = {Michel Abdalla and
                  Sonia Bela{\"{\i}}d and
                  David Pointcheval and
                  Sylvain Ruhault and
                  Damien Vergnaud},
  title        = {Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1219},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBPRV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CanardPS14,
  author       = {S{\'{e}}bastien Canard and
                  David Pointcheval and
                  Olivier Sanders},
  editor       = {Hugo Krawczyk},
  title        = {Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly
                  Setting},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {167--184},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_10},
  doi          = {10.1007/978-3-642-54631-0\_10},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CanardPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/PointchevalS14,
  author       = {David Pointcheval and
                  Olivier Sanders},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Forward Secure Non-Interactive Key Exchange},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {21--39},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_2},
  doi          = {10.1007/978-3-319-10879-7\_2},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/PointchevalS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2014,
  editor       = {David Pointcheval and
                  Damien Vergnaud},
  title        = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
                  on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8469},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06734-6},
  doi          = {10.1007/978-3-319-06734-6},
  isbn         = {978-3-319-06733-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBP14,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  title        = {Removing Erasures with Explainable Hash Proof Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {125},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/125},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBP14a,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  title        = {Disjunctions for Hash Proof Systems: New Constructions and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {483},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/483},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBP14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBP14b,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  title        = {{SPOKE:} Simple Password-Only Key Exchange in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {609},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/609},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBP14b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanardPST14,
  author       = {S{\'{e}}bastien Canard and
                  David Pointcheval and
                  Olivier Sanders and
                  Jacques Traor{\'{e}}},
  title        = {Divisible E-Cash Made Practical},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {785},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/785},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanardPST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/NgoPP13,
  author       = {Hung Q. Ngo and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Black-Box Trace{\&}Revoke Codes},
  journal      = {Algorithmica},
  volume       = {67},
  number       = {3},
  pages        = {418--448},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00453-012-9702-y},
  doi          = {10.1007/S00453-012-9702-Y},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/NgoPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/PhanPSS13,
  author       = {Duong Hieu Phan and
                  David Pointcheval and
                  Siamak Fayyaz Shahandashti and
                  Mario Strefler},
  title        = {Adaptive {CCA} broadcast encryption with constant-size secret keys
                  and ciphertexts},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {4},
  pages        = {251--265},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-013-0190-0},
  doi          = {10.1007/S10207-013-0190-0},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/PhanPSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BlazyFPV13,
  author       = {Olivier Blazy and
                  Georg Fuchsbauer and
                  David Pointcheval and
                  Damien Vergnaud},
  title        = {Short blind signatures},
  journal      = {J. Comput. Secur.},
  volume       = {21},
  number       = {5},
  pages        = {627--661},
  year         = {2013},
  url          = {https://doi.org/10.3233/JCS-130477},
  doi          = {10.3233/JCS-130477},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BlazyFPV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BlazyCPV13,
  author       = {Olivier Blazy and
                  C{\'{e}}line Chevalier and
                  David Pointcheval and
                  Damien Vergnaud},
  editor       = {Michael J. Jacobson Jr. and
                  Michael E. Locasto and
                  Payman Mohassel and
                  Reihaneh Safavi{-}Naini},
  title        = {Analysis and Improvement of Lindell's UC-Secure Commitment Schemes},
  booktitle    = {Applied Cryptography and Network Security - 11th International Conference,
                  {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7954},
  pages        = {534--551},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38980-1\_34},
  doi          = {10.1007/978-3-642-38980-1\_34},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/BlazyCPV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbdallaBBCP13,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Olivier Blazy and
                  C{\'{e}}line Chevalier and
                  David Pointcheval},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {SPHF-Friendly Non-interactive Commitments},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8269},
  pages        = {214--234},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42033-7\_12},
  doi          = {10.1007/978-3-642-42033-7\_12},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbdallaBBCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PhanPT13,
  author       = {Duong Hieu Phan and
                  David Pointcheval and
                  Viet Cuong Trinh},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {Multi-channel broadcast encryption},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {277--286},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484348},
  doi          = {10.1145/2484313.2484348},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/PhanPT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DodisPRVW13,
  author       = {Yevgeniy Dodis and
                  David Pointcheval and
                  Sylvain Ruhault and
                  Damien Vergnaud and
                  Daniel Wichs},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Security analysis of pseudo-random number generators with input: /dev/random
                  is not robust},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {647--658},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516653},
  doi          = {10.1145/2508859.2516653},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DodisPRVW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BenhamoudaBCPV13,
  author       = {Fabrice Benhamouda and
                  Olivier Blazy and
                  C{\'{e}}line Chevalier and
                  David Pointcheval and
                  Damien Vergnaud},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {New Techniques for SPHFs and Efficient One-Round {PAKE} Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {449--475},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_25},
  doi          = {10.1007/978-3-642-40041-4\_25},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BenhamoudaBCPV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HamoudaBCPV13,
  author       = {Fabrice Ben Hamouda and
                  Olivier Blazy and
                  C{\'{e}}line Chevalier and
                  David Pointcheval and
                  Damien Vergnaud},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {272--291},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_18},
  doi          = {10.1007/978-3-642-36362-7\_18},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HamoudaBCPV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaHP13,
  author       = {Michel Abdalla and
                  Fabrice Ben Hamouda and
                  David Pointcheval},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Tighter Reductions for Forward-Secure Signature Schemes},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {292--311},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_19},
  doi          = {10.1007/978-3-642-36362-7\_19},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaHP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HamoudaBCPV13,
  author       = {Fabrice Ben Hamouda and
                  Olivier Blazy and
                  C{\'{e}}line Chevalier and
                  David Pointcheval and
                  Damien Vergnaud},
  title        = {New Smooth Projective Hash Functions and One-Round Authenticated Key
                  Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HamoudaBCPV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlazyCPV13,
  author       = {Olivier Blazy and
                  C{\'{e}}line Chevalier and
                  David Pointcheval and
                  Damien Vergnaud},
  title        = {Analysis and Improvement of Lindell's UC-Secure Commitment Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {123},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/123},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlazyCPV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisPRVW13,
  author       = {Yevgeniy Dodis and
                  David Pointcheval and
                  Sylvain Ruhault and
                  Damien Vergnaud and
                  Daniel Wichs},
  title        = {Security Analysis of Pseudo-Random Number Generators with Input: /dev/random
                  is not Robust},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {338},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/338},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisPRVW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HamoudaP13,
  author       = {Fabrice Ben Hamouda and
                  David Pointcheval},
  title        = {Trapdoor Smooth Projective Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {341},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/341},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HamoudaP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBBCP13,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Olivier Blazy and
                  C{\'{e}}line Chevalier and
                  David Pointcheval},
  title        = {SPHF-Friendly Non-Interactive Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {588},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/588},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBBCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaP13,
  author       = {Fabrice Benhamouda and
                  David Pointcheval},
  title        = {Verifier-Based Password-Authenticated Key Exchange: New Models and
                  Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {833},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/833},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PhanPSS12,
  author       = {Duong Hieu Phan and
                  David Pointcheval and
                  Siamak Fayyaz Shahandashti and
                  Mario Strefler},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Adaptive {CCA} Broadcast Encryption with Constant-Size Secret Keys
                  and Ciphertexts},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {308--321},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_23},
  doi          = {10.1007/978-3-642-31448-3\_23},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PhanPSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/BlazyP12,
  author       = {Olivier Blazy and
                  David Pointcheval},
  editor       = {David Naccache},
  title        = {Traceable Signature with Stepping Capabilities},
  booktitle    = {Cryptography and Security: From Theory to Applications - Essays Dedicated
                  to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {6805},
  pages        = {108--131},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28368-0\_10},
  doi          = {10.1007/978-3-642-28368-0\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/BlazyP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/NaccacheP12,
  author       = {David Naccache and
                  David Pointcheval},
  editor       = {David Naccache},
  title        = {Autotomic Signatures},
  booktitle    = {Cryptography and Security: From Theory to Applications - Essays Dedicated
                  to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {6805},
  pages        = {143--155},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28368-0\_12},
  doi          = {10.1007/978-3-642-28368-0\_12},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/birthday/NaccacheP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BarthePB12,
  author       = {Gilles Barthe and
                  David Pointcheval and
                  Santiago Zanella B{\'{e}}guelin},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Verified security of redundancy-free encryption from Rabin and {RSA}},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {724--735},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382272},
  doi          = {10.1145/2382196.2382272},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BarthePB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/PhanPS12,
  author       = {Duong Hieu Phan and
                  David Pointcheval and
                  Mario Strefler},
  editor       = {Alejandro Hevia and
                  Gregory Neven},
  title        = {Message-Based Traitor Tracing with Optimal Ciphertext Rate},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2012 - 2nd International Conference
                  on Cryptology and Information Security in Latin America, Santiago,
                  Chile, October 7-10, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7533},
  pages        = {56--77},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33481-8\_4},
  doi          = {10.1007/978-3-642-33481-8\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/PhanPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Pointcheval12,
  author       = {David Pointcheval},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Password-Based Authenticated Key Exchange},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {390--397},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_23},
  doi          = {10.1007/978-3-642-30057-8\_23},
  timestamp    = {Mon, 16 Nov 2020 15:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Pointcheval12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BlazyPV12,
  author       = {Olivier Blazy and
                  David Pointcheval and
                  Damien Vergnaud},
  editor       = {Ivan Visconti and
                  Roberto De Prisco},
  title        = {Compact Round-Optimal Partially-Blind Signatures},
  booktitle    = {Security and Cryptography for Networks - 8th International Conference,
                  {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7485},
  pages        = {95--112},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32928-9\_6},
  doi          = {10.1007/978-3-642-32928-9\_6},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BlazyPV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/PhanPS12,
  author       = {Duong Hieu Phan and
                  David Pointcheval and
                  Mario Strefler},
  editor       = {Ivan Visconti and
                  Roberto De Prisco},
  title        = {Decentralized Dynamic Broadcast Encryption},
  booktitle    = {Security and Cryptography for Networks - 8th International Conference,
                  {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7485},
  pages        = {166--183},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32928-9\_10},
  doi          = {10.1007/978-3-642-32928-9\_10},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/PhanPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BlazyPV12,
  author       = {Olivier Blazy and
                  David Pointcheval and
                  Damien Vergnaud},
  editor       = {Ronald Cramer},
  title        = {Round-Optimal Privacy-Preserving Protocols with Smooth Projective
                  Hash Functions},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {94--111},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_6},
  doi          = {10.1007/978-3-642-28914-9\_6},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BlazyPV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2012,
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4},
  doi          = {10.1007/978-3-642-29011-4},
  isbn         = {978-3-642-29010-7},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PhanPSS12,
  author       = {Duong Hieu Phan and
                  David Pointcheval and
                  Siamak Fayyaz Shahandashti and
                  Mario Strefler},
  title        = {Adaptive {CCA} Broadcast Encryption with Constant-Size Secret Keys
                  and Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {216},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/216},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PhanPSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlazyCPV12,
  author       = {Olivier Blazy and
                  C{\'{e}}line Chevalier and
                  David Pointcheval and
                  Damien Vergnaud},
  title        = {Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {284},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/284},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlazyCPV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PhanPT12,
  author       = {Duong Hieu Phan and
                  David Pointcheval and
                  Viet Cuong Trinh},
  title        = {Multi-Channel Broadcast Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {307},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/307},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PhanPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarthePB12,
  author       = {Gilles Barthe and
                  David Pointcheval and
                  Santiago Zanella B{\'{e}}guelin},
  title        = {Verified Security of Redundancy-Free Encryption from Rabin and {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {308},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/308},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarthePB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/PhanPS11,
  author       = {Duong Hieu Phan and
                  David Pointcheval and
                  Mario Strefler},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Security Notions for Broadcast Encryption},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {377--394},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_22},
  doi          = {10.1007/978-3-642-21554-4\_22},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/PhanPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AbdallaCGP11,
  author       = {Michel Abdalla and
                  C{\'{e}}line Chevalier and
                  Louis Granboulan and
                  David Pointcheval},
  editor       = {Aggelos Kiayias},
  title        = {Contributory Password-Authenticated Group Key Exchange with Join Capability},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at
                  the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18,
                  2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6558},
  pages        = {142--160},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19074-2\_11},
  doi          = {10.1007/978-3-642-19074-2\_11},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AbdallaCGP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BlazyFPV11,
  author       = {Olivier Blazy and
                  Georg Fuchsbauer and
                  David Pointcheval and
                  Damien Vergnaud},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Signatures on Randomizable Ciphertexts},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {403--422},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_25},
  doi          = {10.1007/978-3-642-19379-8\_25},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BlazyFPV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2011,
  editor       = {Abderrahmane Nitaj and
                  David Pointcheval},
  title        = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference
                  on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6737},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21969-6},
  doi          = {10.1007/978-3-642-21969-6},
  isbn         = {978-3-642-21968-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Pointcheval11,
  author       = {David Pointcheval},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{OAEP:} Optimal Asymmetric Encryption Padding},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {882--884},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_150},
  doi          = {10.1007/978-1-4419-5906-5\_150},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Pointcheval11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Pointcheval11a,
  author       = {David Pointcheval},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Rabin Cryptosystem},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1013--1014},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_151},
  doi          = {10.1007/978-1-4419-5906-5\_151},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Pointcheval11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Pointcheval11b,
  author       = {David Pointcheval},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{RSA} Public-Key Encryption},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1069--1072},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_153},
  doi          = {10.1007/978-1-4419-5906-5\_153},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Pointcheval11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PhanPS11,
  author       = {Duong Hieu Phan and
                  David Pointcheval and
                  Mario Strefler},
  title        = {Adaptively Secure Broadcast Encryption with Forward Secrecy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {463},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/463},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PhanPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BoyenCFP10,
  author       = {Xavier Boyen and
                  C{\'{e}}line Chevalier and
                  Georg Fuchsbauer and
                  David Pointcheval},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Strong Cryptography from Weak Secrets},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {297--315},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_18},
  doi          = {10.1007/978-3-642-12678-9\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/BoyenCFP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/AbdallaCMP10,
  author       = {Michel Abdalla and
                  C{\'{e}}line Chevalier and
                  Mark Manulis and
                  David Pointcheval},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Flexible Group Key Exchange with On-demand Computation of Subgroup
                  Keys},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {351--368},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_21},
  doi          = {10.1007/978-3-642-12678-9\_21},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/AbdallaCMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/IzabachenePV10,
  author       = {Malika Izabach{\`{e}}ne and
                  David Pointcheval and
                  Damien Vergnaud},
  editor       = {Michel Abdalla and
                  Paulo S. L. M. Barreto},
  title        = {Mediated Traceable Anonymous Encryption},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2010, First International Conference
                  on Cryptology and Information Security in Latin America, Puebla, Mexico,
                  August 8-11, 2010, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6212},
  pages        = {40--60},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14712-8\_3},
  doi          = {10.1007/978-3-642-14712-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/IzabachenePV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wote/Chevallier-MamesFPST10,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Pierre{-}Alain Fouque and
                  David Pointcheval and
                  Julien Stern and
                  Jacques Traor{\'{e}}},
  editor       = {David Chaum and
                  Markus Jakobsson and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Josh Benaloh and
                  Miroslaw Kutylowski and
                  Ben Adida},
  title        = {On Some Incompatible Properties of Voting Schemes},
  booktitle    = {Towards Trustworthy Elections, New Directions in Electronic Voting},
  series       = {Lecture Notes in Computer Science},
  volume       = {6000},
  pages        = {191--199},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12980-3\_11},
  doi          = {10.1007/978-3-642-12980-3\_11},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/wote/Chevallier-MamesFPST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/PieprzykP10,
  author       = {Josef Pieprzyk and
                  David Pointcheval},
  editor       = {Alexander W. Dent and
                  Yuliang Zheng},
  title        = {Parallel Signcryption},
  booktitle    = {Practical Signcryption},
  series       = {Information Security and Cryptography},
  pages        = {175--192},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-540-89411-7\_9},
  doi          = {10.1007/978-3-540-89411-7\_9},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/series/isc/PieprzykP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2010,
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7},
  doi          = {10.1007/978-3-642-13013-7},
  isbn         = {978-3-642-13012-0},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/AbdallaCCP09,
  author       = {Michel Abdalla and
                  Dario Catalano and
                  C{\'{e}}line Chevalier and
                  David Pointcheval},
  editor       = {Bart Preneel},
  title        = {Password-Authenticated Group Key Agreement with Adaptive Security
                  and Contributiveness},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International
                  Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5580},
  pages        = {254--271},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02384-2\_16},
  doi          = {10.1007/978-3-642-02384-2\_16},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/AbdallaCCP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/FuchsbauerPV09,
  author       = {Georg Fuchsbauer and
                  David Pointcheval and
                  Damien Vergnaud},
  editor       = {Juan A. Garay and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {Transferable Constant-Size Fair E-Cash},
  booktitle    = {Cryptology and Network Security, 8th International Conference, {CANS}
                  2009, Kanazawa, Japan, December 12-14, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5888},
  pages        = {226--247},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10433-6\_15},
  doi          = {10.1007/978-3-642-10433-6\_15},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/FuchsbauerPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbdallaCP09,
  author       = {Michel Abdalla and
                  C{\'{e}}line Chevalier and
                  David Pointcheval},
  editor       = {Shai Halevi},
  title        = {Smooth Projective Hashing for Conditionally Extractable Commitments},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {671--689},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_39},
  doi          = {10.1007/978-3-642-03356-8\_39},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AbdallaCP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChevalierFPZ09,
  author       = {C{\'{e}}line Chevalier and
                  Pierre{-}Alain Fouque and
                  David Pointcheval and
                  S{\'{e}}bastien Zimmer},
  editor       = {Antoine Joux},
  title        = {Optimal Randomness Extraction from a Diffie-Hellman Element},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {572--589},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_33},
  doi          = {10.1007/978-3-642-01001-9\_33},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ChevalierFPZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/FuchsbauerP09,
  author       = {Georg Fuchsbauer and
                  David Pointcheval},
  editor       = {Hovav Shacham and
                  Brent Waters},
  title        = {Proofs on Encrypted Values in Bilinear Groups and an Application to
                  Anonymity of Signatures},
  booktitle    = {Pairing-Based Cryptography - Pairing 2009, Third International Conference,
                  Palo Alto, CA, USA, August 12-14, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5671},
  pages        = {132--149},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03298-1\_10},
  doi          = {10.1007/978-3-642-03298-1\_10},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/FuchsbauerP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaBCP09,
  author       = {Michel Abdalla and
                  Xavier Boyen and
                  C{\'{e}}line Chevalier and
                  David Pointcheval},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Distributed Public-Key Cryptography from Weak Secrets},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {139--159},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_9},
  doi          = {10.1007/978-3-642-00468-1\_9},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaBCP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/psec/FuchsbauerP09,
  author       = {Georg Fuchsbauer and
                  David Pointcheval},
  editor       = {V{\'{e}}ronique Cortier and
                  Claude Kirchner and
                  Mitsuhiro Okada and
                  Hideki Sakurada},
  title        = {Anonymous Consecutive Delegation of Signing Rights: Unifying Group
                  and Proxy Signatures},
  booktitle    = {Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese
                  Collaboration},
  series       = {Lecture Notes in Computer Science},
  volume       = {5458},
  pages        = {95--115},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02002-5\_6},
  doi          = {10.1007/978-3-642-02002-5\_6},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/psec/FuchsbauerP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/psec/IzabacheneP09,
  author       = {Malika Izabach{\`{e}}ne and
                  David Pointcheval},
  editor       = {V{\'{e}}ronique Cortier and
                  Claude Kirchner and
                  Mitsuhiro Okada and
                  Hideki Sakurada},
  title        = {New Anonymity Notions for Identity-Based Encryption},
  booktitle    = {Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese
                  Collaboration},
  series       = {Lecture Notes in Computer Science},
  volume       = {5458},
  pages        = {138--157},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02002-5\_8},
  doi          = {10.1007/978-3-642-02002-5\_8},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/psec/IzabacheneP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2009,
  editor       = {Michel Abdalla and
                  David Pointcheval and
                  Pierre{-}Alain Fouque and
                  Damien Vergnaud},
  title        = {Applied Cryptography and Network Security, 7th International Conference,
                  {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5536},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01957-9},
  doi          = {10.1007/978-3-642-01957-9},
  isbn         = {978-3-642-01956-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerPV09,
  author       = {Georg Fuchsbauer and
                  David Pointcheval and
                  Damien Vergnaud},
  title        = {Transferable Constant-Size Fair E-Cash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuchsbauerPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/ChenSWWDLMMMPPS08,
  author       = {Liqun Chen and
                  Willy Susilo and
                  Huaxiong Wang and
                  Duncan S. Wong and
                  Ed Dawson and
                  Xuejia Lai and
                  Masahiro Mambo and
                  Atsuko Miyaji and
                  Yi Mu and
                  David Pointcheval and
                  Bart Preneel and
                  Nigel P. Smart},
  title        = {Cryptography in Computer System Security},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {14},
  number       = {3},
  pages        = {314--317},
  year         = {2008},
  url          = {http://www.jucs.org/jucs\_14\_3/cryptography\_in\_computer\_system},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/ChenSWWDLMMMPPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/PointchevalZ08,
  author       = {David Pointcheval and
                  S{\'{e}}bastien Zimmer},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Multi-factor Authenticated Key Exchange},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {277--295},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_17},
  doi          = {10.1007/978-3-540-68914-0\_17},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/PointchevalZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/AbdallaIP08,
  author       = {Michel Abdalla and
                  Malika Izabach{\`{e}}ne and
                  David Pointcheval},
  editor       = {Matthew K. Franklin and
                  Lucas Chi Kwong Hui and
                  Duncan S. Wong},
  title        = {Anonymous and Transparent Gateway-Based Password-Authenticated Key
                  Exchange},
  booktitle    = {Cryptology and Network Security, 7th International Conference, {CANS}
                  2008, Hong-Kong, China, December 2-4, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5339},
  pages        = {133--148},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89641-8\_10},
  doi          = {10.1007/978-3-540-89641-8\_10},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/AbdallaIP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FouquePZ08,
  author       = {Pierre{-}Alain Fouque and
                  David Pointcheval and
                  S{\'{e}}bastien Zimmer},
  editor       = {Masayuki Abe and
                  Virgil D. Gligor},
  title        = {{HMAC} is a randomness extractor and applications to {TLS}},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
                  2008},
  pages        = {21--32},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368310.1368317},
  doi          = {10.1145/1368310.1368317},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FouquePZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DelerableeP08,
  author       = {C{\'{e}}cile Delerabl{\'{e}}e and
                  David Pointcheval},
  editor       = {David A. Wagner},
  title        = {Dynamic Threshold Public-Key Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5157},
  pages        = {317--334},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85174-5\_18},
  doi          = {10.1007/978-3-540-85174-5\_18},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DelerableeP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AbdallaCCP08,
  author       = {Michel Abdalla and
                  Dario Catalano and
                  C{\'{e}}line Chevalier and
                  David Pointcheval},
  editor       = {Tal Malkin},
  title        = {Efficient Two-Party Password-Based Key Exchange Protocols in the {UC}
                  Framework},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
                  the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4964},
  pages        = {335--351},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79263-5\_22},
  doi          = {10.1007/978-3-540-79263-5\_22},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AbdallaCCP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/TangBCP08,
  author       = {Qiang Tang and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  David Pointcheval},
  editor       = {Liqun Chen and
                  Yi Mu and
                  Willy Susilo},
  title        = {A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication
                  Schemes},
  booktitle    = {Information Security Practice and Experience, 4th International Conference,
                  {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4991},
  pages        = {56--70},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79104-1\_5},
  doi          = {10.1007/978-3-540-79104-1\_5},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/TangBCP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BringerCPZ08,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  David Pointcheval and
                  S{\'{e}}bastien Zimmer},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {An Application of the Boneh and Shacham Group Signature Scheme to
                  Biometric Authentication},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {219--230},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_15},
  doi          = {10.1007/978-3-540-89598-5\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BringerCPZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/FuchsbauerP08,
  author       = {Georg Fuchsbauer and
                  David Pointcheval},
  editor       = {Rafail Ostrovsky and
                  Roberto De Prisco and
                  Ivan Visconti},
  title        = {Anonymous Proxy Signatures},
  booktitle    = {Security and Cryptography for Networks, 6th International Conference,
                  {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5229},
  pages        = {201--217},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85855-3\_14},
  doi          = {10.1007/978-3-540-85855-3\_14},
  timestamp    = {Tue, 25 Feb 2020 11:33:46 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/FuchsbauerP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/IzabacheneP08,
  author       = {Malika Izabach{\`{e}}ne and
                  David Pointcheval},
  editor       = {Rafail Ostrovsky and
                  Roberto De Prisco and
                  Ivan Visconti},
  title        = {New Anonymity Notions for Identity-Based Encryption},
  booktitle    = {Security and Cryptography for Networks, 6th International Conference,
                  {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5229},
  pages        = {375--391},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85855-3\_25},
  doi          = {10.1007/978-3-540-85855-3\_25},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/IzabacheneP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerP08,
  author       = {Georg Fuchsbauer and
                  David Pointcheval},
  title        = {Anonymous Consecutive Delegation of Signing Rights: Unifying Group
                  and Proxy Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuchsbauerP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerP08a,
  author       = {Georg Fuchsbauer and
                  David Pointcheval},
  title        = {Encrypting Proofs on Pairings and Its Application to Anonymity for
                  Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {528},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/528},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuchsbauerP08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AbdallaBCMP07,
  author       = {Michel Abdalla and
                  Emmanuel Bresson and
                  Olivier Chevassut and
                  Bodo M{\"{o}}ller and
                  David Pointcheval},
  title        = {Strong password-based authentication in {TLS} using the three-party
                  group Diffie?Hellman protocol},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {3/4},
  pages        = {284--296},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.013181},
  doi          = {10.1504/IJSN.2007.013181},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AbdallaBCMP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwmc/BressonCP07,
  author       = {Emmanuel Bresson and
                  Olivier Chevassut and
                  David Pointcheval},
  title        = {A security solution for {IEEE} 802.11's ad hoc mode: password-authentication
                  and group DiffieHellman key exchange},
  journal      = {Int. J. Wirel. Mob. Comput.},
  volume       = {2},
  number       = {1},
  pages        = {4--13},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJWMC.2007.013791},
  doi          = {10.1504/IJWMC.2007.013791},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwmc/BressonCP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CatalanoPP07,
  author       = {Dario Catalano and
                  David Pointcheval and
                  Thomas Pornin},
  title        = {Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to
                  Password-Based Authentication},
  journal      = {J. Cryptol.},
  volume       = {20},
  number       = {1},
  pages        = {115--149},
  year         = {2007},
  url          = {https://doi.org/10.1007/s00145-006-0431-8},
  doi          = {10.1007/S00145-006-0431-8},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CatalanoPP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BressonCP07,
  author       = {Emmanuel Bresson and
                  Olivier Chevassut and
                  David Pointcheval},
  title        = {Provably secure authenticated group Diffie-Hellman key exchange},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {10},
  year         = {2007},
  url          = {https://doi.org/10.1145/1266977.1266979},
  doi          = {10.1145/1266977.1266979},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BressonCP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BringerCIPTZ07,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Malika Izabach{\`{e}}ne and
                  David Pointcheval and
                  Qiang Tang and
                  S{\'{e}}bastien Zimmer},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {An Application of the Goldwasser-Micali Cryptosystem to Biometric
                  Authentication},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {96--106},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_8},
  doi          = {10.1007/978-3-540-73458-1\_8},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BringerCIPTZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/BringerCPT07,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  David Pointcheval and
                  Qiang Tang},
  editor       = {Feng Bao and
                  San Ling and
                  Tatsuaki Okamoto and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {Extended Private Information Retrieval and Its Application in Biometrics
                  Authentications},
  booktitle    = {Cryptology and Network Security, 6th International Conference, {CANS}
                  2007, Singapore, December 8-10, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4856},
  pages        = {175--193},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76969-9\_12},
  doi          = {10.1007/978-3-540-76969-9\_12},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/BringerCPT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/DelerableePP07,
  author       = {C{\'{e}}cile Delerabl{\'{e}}e and
                  Pascal Paillier and
                  David Pointcheval},
  editor       = {Tsuyoshi Takagi and
                  Tatsuaki Okamoto and
                  Eiji Okamoto and
                  Takeshi Okamoto},
  title        = {Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size
                  Ciphertexts or Decryption Keys},
  booktitle    = {Pairing-Based Cryptography - Pairing 2007, First International Conference,
                  Tokyo, Japan, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4575},
  pages        = {39--59},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73489-5\_4},
  doi          = {10.1007/978-3-540-73489-5\_4},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/DelerableePP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbdallaP06,
  author       = {Michel Abdalla and
                  David Pointcheval},
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {A Scalable Password-Based Group Key Exchange Protocol in the Standard
                  Model},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  pages        = {332--347},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230\_22},
  doi          = {10.1007/11935230\_22},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbdallaP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AbdallaBCMP06,
  author       = {Michel Abdalla and
                  Emmanuel Bresson and
                  Olivier Chevassut and
                  Bodo M{\"{o}}ller and
                  David Pointcheval},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {Provably secure password-based authentication in {TLS}},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {35--45},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128827},
  doi          = {10.1145/1128817.1128827},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AbdallaBCMP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlanchetP06,
  author       = {Bruno Blanchet and
                  David Pointcheval},
  editor       = {Cynthia Dwork},
  title        = {Automated Security Proofs with Sequences of Games},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {537--554},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_32},
  doi          = {10.1007/11818175\_32},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BlanchetP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/FouquePSZ06,
  author       = {Pierre{-}Alain Fouque and
                  David Pointcheval and
                  Jacques Stern and
                  S{\'{e}}bastien Zimmer},
  editor       = {Michele Bugliesi and
                  Bart Preneel and
                  Vladimiro Sassone and
                  Ingo Wegener},
  title        = {Hardness of Distinguishing the {MSB} or {LSB} of Secret Keys in Diffie-Hellman
                  Schemes},
  booktitle    = {Automata, Languages and Programming, 33rd International Colloquium,
                  {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4052},
  pages        = {240--251},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11787006\_21},
  doi          = {10.1007/11787006\_21},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/FouquePSZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Chevallier-MamesPP06,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Pascal Paillier and
                  David Pointcheval},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Encoding-Free ElGamal Encryption Without Random Oracles},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {91--104},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_7},
  doi          = {10.1007/11745853\_7},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Chevallier-MamesPP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChevassutFGP06,
  author       = {Olivier Chevassut and
                  Pierre{-}Alain Fouque and
                  Pierrick Gaudry and
                  David Pointcheval},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {The Twist-AUgmented Technique for Key Exchange},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {410--426},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_27},
  doi          = {10.1007/11745853\_27},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/ChevassutFGP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaBCP06,
  author       = {Michel Abdalla and
                  Emmanuel Bresson and
                  Olivier Chevassut and
                  David Pointcheval},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Password-Based Group Key Exchange in a Constant Number of Rounds},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {427--442},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_28},
  doi          = {10.1007/11745853\_28},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaBCP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Kunz-JacquesP06,
  author       = {S{\'{e}}bastien Kunz{-}Jacques and
                  David Pointcheval},
  editor       = {Roberto De Prisco and
                  Moti Yung},
  title        = {About the Security of {MTI/C0} and {MQV}},
  booktitle    = {Security and Cryptography for Networks, 5th International Conference,
                  {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4116},
  pages        = {156--172},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11832072\_11},
  doi          = {10.1007/11832072\_11},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Kunz-JacquesP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Kunz-JacquesP06a,
  author       = {S{\'{e}}bastien Kunz{-}Jacques and
                  David Pointcheval},
  editor       = {Roberto De Prisco and
                  Moti Yung},
  title        = {A New Key Exchange Protocol Based on {MQV} Assuming Public Computations},
  booktitle    = {Security and Cryptography for Networks, 5th International Conference,
                  {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4116},
  pages        = {186--200},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11832072\_13},
  doi          = {10.1007/11832072\_13},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/Kunz-JacquesP06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vietcrypt/DelerableeP06,
  author       = {C{\'{e}}cile Delerabl{\'{e}}e and
                  David Pointcheval},
  editor       = {Phong Q. Nguyen},
  title        = {Dynamic Fully Anonymous Short Group Signatures},
  booktitle    = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference
                  on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4341},
  pages        = {193--210},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11958239\_13},
  doi          = {10.1007/11958239\_13},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/vietcrypt/DelerableeP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2006,
  editor       = {David Pointcheval and
                  Yi Mu and
                  Kefei Chen},
  title        = {Cryptology and Network Security, 5th International Conference, {CANS}
                  2006, Suzhou, China, December 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4301},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935070},
  doi          = {10.1007/11935070},
  isbn         = {3-540-49462-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2006,
  editor       = {David Pointcheval},
  title        = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at
                  the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3860},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11605805},
  doi          = {10.1007/11605805},
  isbn         = {3-540-31033-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlanchetP06,
  author       = {Bruno Blanchet and
                  David Pointcheval},
  title        = {Automated Security Proofs with Sequences of Games},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlanchetP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0018105,
  author       = {Dario Catalano and
                  Ronald Cramer and
                  Ivan Bjerre Damg{\aa}rd and
                  Giovanni Di Crescenzo and
                  David Pointcheval},
  title        = {Contemporary cryptology},
  series       = {Advanced courses in mathematics : {CRM} Barcelona},
  publisher    = {Birkh{\"{a}}user},
  year         = {2005},
  isbn         = {978-3-7643-7294-1},
  timestamp    = {Fri, 12 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0018105.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Chevallier-MamesPP05,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Optimal Asymmetric Encryption and Signature Paddings},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {254--268},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_18},
  doi          = {10.1007/11496137\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Chevallier-MamesPP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbdallaCFP05,
  author       = {Michel Abdalla and
                  Olivier Chevassut and
                  Pierre{-}Alain Fouque and
                  David Pointcheval},
  editor       = {Bimal K. Roy},
  title        = {A Simple Threshold Authenticated Key Exchange from Short Secrets},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Chennai, India, December 4-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3788},
  pages        = {566--584},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593447\_31},
  doi          = {10.1007/11593447\_31},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbdallaCFP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AbdallaP05,
  author       = {Michel Abdalla and
                  David Pointcheval},
  editor       = {Alfred Menezes},
  title        = {Simple Password-Based Encrypted Key Exchange Protocols},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at
                  the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3376},
  pages        = {191--208},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30574-3\_14},
  doi          = {10.1007/978-3-540-30574-3\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AbdallaP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChabannePP05,
  author       = {Herv{\'{e}} Chabanne and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Ronald Cramer},
  title        = {Public Traceability in Traitor Tracing Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {542--558},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_32},
  doi          = {10.1007/11426639\_32},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ChabannePP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AbdallaP05,
  author       = {Michel Abdalla and
                  David Pointcheval},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Interactive Diffie-Hellman Assumptions with Applications to Password-Based
                  Authentication},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {341--356},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_31},
  doi          = {10.1007/11507840\_31},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/AbdallaP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaCP05,
  author       = {Michel Abdalla and
                  Olivier Chevassut and
                  David Pointcheval},
  editor       = {Serge Vaudenay},
  title        = {One-Time Verifier-Based Encrypted Key Exchange},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {47--64},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_5},
  doi          = {10.1007/978-3-540-30580-4\_5},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaCP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaFP05,
  author       = {Michel Abdalla and
                  Pierre{-}Alain Fouque and
                  David Pointcheval},
  editor       = {Serge Vaudenay},
  title        = {Password-Based Authenticated Key Exchange in the Three-Party Setting},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {65--84},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_6},
  doi          = {10.1007/978-3-540-30580-4\_6},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaFP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Pointcheval05,
  author       = {David Pointcheval},
  editor       = {Henk C. A. van Tilborg},
  title        = {{OAEP:} Optimal Asymmetric Encryption Padding},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_284},
  doi          = {10.1007/0-387-23483-7\_284},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Pointcheval05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Pointcheval05a,
  author       = {David Pointcheval},
  editor       = {Henk C. A. van Tilborg},
  title        = {Rabin Cryptosystem},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_339},
  doi          = {10.1007/0-387-23483-7\_339},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Pointcheval05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Pointcheval05b,
  author       = {David Pointcheval},
  editor       = {Henk C. A. van Tilborg},
  title        = {{RSA} Public-Key Encryption},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_364},
  doi          = {10.1007/0-387-23483-7\_364},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Pointcheval05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChevassutFGP05,
  author       = {Olivier Chevassut and
                  Pierre{-}Alain Fouque and
                  Pierrick Gaudry and
                  David Pointcheval},
  title        = {Key Derivation and Randomness Extraction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {61},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/061},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChevassutFGP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/BressonCEP04,
  author       = {Emmanuel Bresson and
                  Olivier Chevassut and
                  Abdelilah Essiari and
                  David Pointcheval},
  title        = {Mutual authentication and group key agreement for low-power mobile
                  devices},
  journal      = {Comput. Commun.},
  volume       = {27},
  number       = {17},
  pages        = {1730--1737},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.comcom.2004.05.023},
  doi          = {10.1016/J.COMCOM.2004.05.023},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/BressonCEP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FujisakiOPS04,
  author       = {Eiichiro Fujisaki and
                  Tatsuaki Okamoto and
                  David Pointcheval and
                  Jacques Stern},
  title        = {{RSA-OAEP} Is Secure under the {RSA} Assumption},
  journal      = {J. Cryptol.},
  volume       = {17},
  number       = {2},
  pages        = {81--104},
  year         = {2004},
  url          = {https://doi.org/10.1007/s00145-002-0204-y},
  doi          = {10.1007/S00145-002-0204-Y},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/FujisakiOPS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PhanP04,
  author       = {Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Pil Joong Lee},
  title        = {{OAEP} 3-Round: {A} Generic and Secure Asymmetric Encryption Padding},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Jeju Island, Korea, December 5-9, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3329},
  pages        = {63--77},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30539-2\_5},
  doi          = {10.1007/978-3-540-30539-2\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PhanP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Chevallier-MamesNPP04,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  David Naccache and
                  Pascal Paillier and
                  David Pointcheval},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {How to Disembed a Program?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {441--454},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_32},
  doi          = {10.1007/978-3-540-28632-5\_32},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Chevallier-MamesNPP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CatalanoPP04,
  author       = {Dario Catalano and
                  David Pointcheval and
                  Thomas Pornin},
  editor       = {Matthew K. Franklin},
  title        = {{IPAKE:} Isomorphisms for Password-Based Authenticated Key Exchange},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
                  CryptologyConference, Santa Barbara, California, USA, August 15-19,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3152},
  pages        = {477--493},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28628-8\_29},
  doi          = {10.1007/978-3-540-28628-8\_29},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CatalanoPP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BressonCP04,
  author       = {Emmanuel Bresson and
                  Olivier Chevassut and
                  David Pointcheval},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {New Security Results on Encrypted Key Exchange},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {145--158},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_11},
  doi          = {10.1007/978-3-540-24632-9\_11},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BressonCP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/PhanP04,
  author       = {Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Helena Handschuh and
                  M. Anwar Hasan},
  title        = {About the Security of Ciphers (Semantic Security and Pseudo-Random
                  Permutations)},
  booktitle    = {Selected Areas in Cryptography, 11th International Workshop, {SAC}
                  2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3357},
  pages        = {182--197},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30564-4\_13},
  doi          = {10.1007/978-3-540-30564-4\_13},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/PhanP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/PhanP04,
  author       = {Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Carlo Blundo and
                  Stelvio Cimato},
  title        = {On the Security Notions for Public-Key Encryption Schemes},
  booktitle    = {Security in Communication Networks, 4th International Conference,
                  {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3352},
  pages        = {33--46},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30598-9\_3},
  doi          = {10.1007/978-3-540-30598-9\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/PhanP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chevallier-MamesNPP04,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  David Naccache and
                  Pascal Paillier and
                  David Pointcheval},
  title        = {How to Disembed a Program?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {138},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/138},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chevallier-MamesNPP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaFP04,
  author       = {Michel Abdalla and
                  Pierre{-}Alain Fouque and
                  David Pointcheval},
  title        = {Password-Based Authenticated Key Exchange in the Three-Party Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {233},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/233},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaFP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PointchevalP03,
  author       = {David Pointcheval and
                  Guillaume Poupard},
  title        = {A New NP-Complete Problem and Public-Key Identification},
  journal      = {Des. Codes Cryptogr.},
  volume       = {28},
  number       = {1},
  pages        = {5--31},
  year         = {2003},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PointchevalP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BellareNPS03,
  author       = {Mihir Bellare and
                  Chanathip Namprempre and
                  David Pointcheval and
                  Michael Semanko},
  title        = {The One-More-RSA-Inversion Problems and the Security of Chaum's Blind
                  Signature Scheme},
  journal      = {J. Cryptol.},
  volume       = {16},
  number       = {3},
  pages        = {185--215},
  year         = {2003},
  url          = {https://doi.org/10.1007/s00145-002-0120-1},
  doi          = {10.1007/S00145-002-0120-1},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BellareNPS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PieprzykP03,
  author       = {Josef Pieprzyk and
                  David Pointcheval},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Josef Pieprzyk, David Pointcheval},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {387--401},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_33},
  doi          = {10.1007/3-540-45067-X\_33},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PieprzykP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PhanP03,
  author       = {Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Chi{-}Sung Laih},
  title        = {Chosen-Ciphertext Security without Redundancy},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2894},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40061-5\_1},
  doi          = {10.1007/978-3-540-40061-5\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PhanP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BressonCP03,
  author       = {Emmanuel Bresson and
                  Dario Catalano and
                  David Pointcheval},
  editor       = {Chi{-}Sung Laih},
  title        = {A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption
                  Mechanism and Its Applications},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2894},
  pages        = {37--54},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40061-5\_3},
  doi          = {10.1007/978-3-540-40061-5\_3},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BressonCP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BressonCP03,
  author       = {Emmanuel Bresson and
                  Olivier Chevassut and
                  David Pointcheval},
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {Security proofs for an efficient password-based key exchange},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages        = {241--250},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948109.948142},
  doi          = {10.1145/948109.948142},
  timestamp    = {Tue, 10 Nov 2020 20:00:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BressonCP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Howgrave-GrahamNPPSSW03,
  author       = {Nick Howgrave{-}Graham and
                  Phong Q. Nguyen and
                  David Pointcheval and
                  John Proos and
                  Joseph H. Silverman and
                  Ari Singer and
                  William Whyte},
  editor       = {Dan Boneh},
  title        = {The Impact of Decryption Failures on the Security of {NTRU} Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 17-21,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2729},
  pages        = {226--246},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45146-4\_14},
  doi          = {10.1007/978-3-540-45146-4\_14},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Howgrave-GrahamNPPSSW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mwcn/BressonCEP03,
  author       = {Emmanuel Bresson and
                  Olivier Chevassut and
                  Abdelilah Essiari and
                  David Pointcheval},
  editor       = {Khaldoun Al Agha and
                  Cambyse Guy Omidyar},
  title        = {Mutual Authentication and Group Key Agreement for low-Power Mobile
                  Devices},
  booktitle    = {Mobile and Wireless Communications Networks - Proceedings of the Fifth
                  {IFIP-TC6} International Conference, Singapore, October 27-29, 2003},
  publisher    = {World Scientific},
  year         = {2003},
  url          = {https://doi.org/10.1142/9789812791146\_0013},
  doi          = {10.1142/9789812791146\_0013},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mwcn/BressonCEP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rivf/PhanP03,
  author       = {Duong Hieu Phan and
                  David Pointcheval},
  title        = {Une comparaison entre deux m{\'{e}}thodes de preuve de s{\'{e}}curit{\'{e}}},
  booktitle    = {Actes de la Premi{\`{e}}re Conf{\'{e}}rence Internationale RIVF'03
                  Rencontres en Informatique Vietnam-France, RIVF'03, Hanoi, Vietnam,
                  10-13 F{\'{e}}vrier, 2003},
  pages        = {105--110},
  publisher    = {Editions Suger, Paris},
  year         = {2003},
  url          = {http://www.e-ifi.org/rivf2003/proceedings/p105-110.pdf},
  timestamp    = {Mon, 06 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rivf/PhanP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BressonCP02,
  author       = {Emmanuel Bresson and
                  Olivier Chevassut and
                  David Pointcheval},
  editor       = {Yuliang Zheng},
  title        = {Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2501},
  pages        = {497--514},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36178-2\_31},
  doi          = {10.1007/3-540-36178-2\_31},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BressonCP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SternPMS02,
  author       = {Jacques Stern and
                  David Pointcheval and
                  John Malone{-}Lee and
                  Nigel P. Smart},
  editor       = {Moti Yung},
  title        = {Flaws in Applying Proof Methodologies to Signature Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 18-22,
                  2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2442},
  pages        = {93--110},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45708-9\_7},
  doi          = {10.1007/3-540-45708-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/SternPMS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NguyenP02,
  author       = {Phong Q. Nguyen and
                  David Pointcheval},
  editor       = {Moti Yung},
  title        = {Analysis and Improvements of {NTRU} Encryption Paddings},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 18-22,
                  2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2442},
  pages        = {210--225},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45708-9\_14},
  doi          = {10.1007/3-540-45708-9\_14},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/NguyenP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/CoronHJPPT02,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Helena Handschuh and
                  Marc Joye and
                  Pascal Paillier and
                  David Pointcheval and
                  Christophe Tymen},
  editor       = {Bart Preneel},
  title        = {{GEM:} {A} Generic Chosen-Ciphertext Secure Encryption Method},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
                  the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2271},
  pages        = {263--276},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45760-7\_18},
  doi          = {10.1007/3-540-45760-7\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/CoronHJPPT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BressonCP02,
  author       = {Emmanuel Bresson and
                  Olivier Chevassut and
                  David Pointcheval},
  editor       = {Lars R. Knudsen},
  title        = {Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {321--336},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_21},
  doi          = {10.1007/3-540-46035-7\_21},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BressonCP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CoronHJPPT02,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Helena Handschuh and
                  Marc Joye and
                  Pascal Paillier and
                  David Pointcheval and
                  Christophe Tymen},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {17--33},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_2},
  doi          = {10.1007/3-540-45664-3\_2},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CoronHJPPT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BressonCP02,
  author       = {Emmanuel Bresson and
                  Olivier Chevassut and
                  David Pointcheval},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {The Group Diffie-Hellman Problems},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {325--338},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_21},
  doi          = {10.1007/3-540-36492-7\_21},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BressonCP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronHJPPT02,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Helena Handschuh and
                  Marc Joye and
                  Pascal Paillier and
                  David Pointcheval and
                  Christophe Tymen},
  title        = {Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronHJPPT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BressonCP02,
  author       = {Emmanuel Bresson and
                  Olivier Chevassut and
                  David Pointcheval},
  title        = {Security Proofs for an Efficient Password-Based Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {192},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/192},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BressonCP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BressonCP01,
  author       = {Emmanuel Bresson and
                  Olivier Chevassut and
                  David Pointcheval},
  editor       = {Colin Boyd},
  title        = {Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic
                  Case},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Gold Coast, Australia, December 9-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2248},
  pages        = {290--309},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45682-1\_18},
  doi          = {10.1007/3-540-45682-1\_18},
  timestamp    = {Tue, 01 Jun 2021 15:22:33 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BressonCP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FouqueP01,
  author       = {Pierre{-}Alain Fouque and
                  David Pointcheval},
  editor       = {Colin Boyd},
  title        = {Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Gold Coast, Australia, December 9-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2248},
  pages        = {351--368},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45682-1\_21},
  doi          = {10.1007/3-540-45682-1\_21},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FouqueP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BellareBDP01,
  author       = {Mihir Bellare and
                  Alexandra Boldyreva and
                  Anand Desai and
                  David Pointcheval},
  editor       = {Colin Boyd},
  title        = {Key-Privacy in Public-Key Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Gold Coast, Australia, December 9-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2248},
  pages        = {566--582},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45682-1\_33},
  doi          = {10.1007/3-540-45682-1\_33},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BellareBDP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NaccachePS01,
  author       = {David Naccache and
                  David Pointcheval and
                  Jacques Stern},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Twin signatures: an alternative to the hash-and-sign paradigm},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {20--27},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.501987},
  doi          = {10.1145/501983.501987},
  timestamp    = {Tue, 10 Nov 2020 20:00:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NaccachePS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BressonCPQ01,
  author       = {Emmanuel Bresson and
                  Olivier Chevassut and
                  David Pointcheval and
                  Jean{-}Jacques Quisquater},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Provably authenticated group Diffie-Hellman key exchange},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {255--264},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.502018},
  doi          = {10.1145/501983.502018},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BressonCPQ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FujisakiOPS01,
  author       = {Eiichiro Fujisaki and
                  Tatsuaki Okamoto and
                  David Pointcheval and
                  Jacques Stern},
  editor       = {Joe Kilian},
  title        = {{RSA-OAEP} Is Secure under the {RSA} Assumption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 19-23,
                  2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  pages        = {260--274},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44647-8\_16},
  doi          = {10.1007/3-540-44647-8\_16},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FujisakiOPS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/JakobssonPY01,
  author       = {Markus Jakobsson and
                  David Pointcheval and
                  Adam L. Young},
  editor       = {David Naccache},
  title        = {Secure Mobile Gambling},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
                  {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  pages        = {110--125},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45353-9\_10},
  doi          = {10.1007/3-540-45353-9\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/JakobssonPY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/OkamotoP01,
  author       = {Tatsuaki Okamoto and
                  David Pointcheval},
  editor       = {David Naccache},
  title        = {{REACT:} Rapid Enhanced-Security Asymmetric Cryptosystem Transform},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
                  {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  pages        = {159--175},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45353-9\_13},
  doi          = {10.1007/3-540-45353-9\_13},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/OkamotoP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JakobssonP01,
  author       = {Markus Jakobsson and
                  David Pointcheval},
  editor       = {Paul F. Syverson},
  title        = {Mutual Authentication for Low-Power Mobile Devices},
  booktitle    = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand
                  Cayman, British West Indies, February 19-22, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2339},
  pages        = {169--186},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-46088-8\_17},
  doi          = {10.1007/3-540-46088-8\_17},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/JakobssonP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/NaccachePT01,
  author       = {David Naccache and
                  David Pointcheval and
                  Christophe Tymen},
  editor       = {Paul F. Syverson},
  title        = {Monotone Signatures},
  booktitle    = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand
                  Cayman, British West Indies, February 19-22, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2339},
  pages        = {295--308},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-46088-8\_24},
  doi          = {10.1007/3-540-46088-8\_24},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/NaccachePT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BellareNPS01,
  author       = {Mihir Bellare and
                  Chanathip Namprempre and
                  David Pointcheval and
                  Michael Semanko},
  editor       = {Paul F. Syverson},
  title        = {The Power of {RSA} Inversion Oracles and the Security of Chaum's RSA-Based
                  Blind Signature Scheme},
  booktitle    = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand
                  Cayman, British West Indies, February 19-22, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2339},
  pages        = {309--328},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-46088-8\_25},
  doi          = {10.1007/3-540-46088-8\_25},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/BellareNPS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Pointcheval01,
  author       = {David Pointcheval},
  editor       = {Kwangjo Kim},
  title        = {Practical Security in Public-Key Cryptography},
  booktitle    = {Information Security and Cryptology - {ICISC} 2001, 4th International
                  Conference Seoul, Korea, December 6-7, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2288},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45861-1\_1},
  doi          = {10.1007/3-540-45861-1\_1},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Pointcheval01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/OkamotoP01,
  author       = {Tatsuaki Okamoto and
                  David Pointcheval},
  editor       = {Kwangjo Kim},
  title        = {The Gap-Problems: {A} New Class of Problems for the Security of Cryptographic
                  Schemes},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {104--118},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_8},
  doi          = {10.1007/3-540-44586-2\_8},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/OkamotoP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/BaudronFPSP01,
  author       = {Olivier Baudron and
                  Pierre{-}Alain Fouque and
                  David Pointcheval and
                  Jacques Stern and
                  Guillaume Poupard},
  editor       = {Ajay D. Kshemkalyani and
                  Nir Shavit},
  title        = {Practical multi-candidate election system},
  booktitle    = {Proceedings of the Twentieth Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} 2001, Newport, Rhode Island, USA,
                  August 26-29, 2001},
  pages        = {274--283},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/383962.384044},
  doi          = {10.1145/383962.384044},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/BaudronFPSP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareNPS01,
  author       = {Mihir Bellare and
                  Chanathip Namprempre and
                  David Pointcheval and
                  Michael Semanko},
  title        = {The One-More-RSA-Inversion Problems and the Security of Chaum's Blind
                  Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareNPS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/PointchevalS00,
  author       = {David Pointcheval and
                  Jacques Stern},
  title        = {Security Arguments for Digital Signatures and Blind Signatures},
  journal      = {J. Cryptol.},
  volume       = {13},
  number       = {3},
  pages        = {361--396},
  year         = {2000},
  url          = {https://doi.org/10.1007/s001450010003},
  doi          = {10.1007/S001450010003},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/PointchevalS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BellarePR00,
  author       = {Mihir Bellare and
                  David Pointcheval and
                  Phillip Rogaway},
  editor       = {Bart Preneel},
  title        = {Authenticated Key Exchange Secure against Dictionary Attacks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
                  on the Theory and Application of Cryptographic Techniques, Bruges,
                  Belgium, May 14-18, 2000, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1807},
  pages        = {139--155},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45539-6\_11},
  doi          = {10.1007/3-540-45539-6\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BellarePR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Pointcheval00,
  author       = {David Pointcheval},
  editor       = {Yair Frankel},
  title        = {Self-Scrambling Anonymizers},
  booktitle    = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla,
                  British West Indies, February 20-24, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1962},
  pages        = {259--275},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45472-1\_18},
  doi          = {10.1007/3-540-45472-1\_18},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Pointcheval00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/BaudronPS00,
  author       = {Olivier Baudron and
                  David Pointcheval and
                  Jacques Stern},
  editor       = {Ugo Montanari and
                  Jos{\'{e}} D. P. Rolim and
                  Emo Welzl},
  title        = {Extended Notions of Security for Multicast Public Key Cryptosystems},
  booktitle    = {Automata, Languages and Programming, 27th International Colloquium,
                  {ICALP} 2000, Geneva, Switzerland, July 9-15, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1853},
  pages        = {499--511},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45022-X\_42},
  doi          = {10.1007/3-540-45022-X\_42},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/BaudronPS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Pointcheval00,
  author       = {David Pointcheval},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {The Composite Discrete Logarithm and Secure Authentication},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {113--128},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_9},
  doi          = {10.1007/978-3-540-46588-1\_9},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Pointcheval00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Pointcheval00a,
  author       = {David Pointcheval},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Chosen-Ciphertext Security for Any One-Way Cryptosystem},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {129--146},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_10},
  doi          = {10.1007/978-3-540-46588-1\_10},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Pointcheval00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrickellPVY00,
  author       = {Ernest F. Brickell and
                  David Pointcheval and
                  Serge Vaudenay and
                  Moti Yung},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Design Validations for Discrete Logarithm Based Signature Schemes},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {276--292},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_19},
  doi          = {10.1007/978-3-540-46588-1\_19},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BrickellPVY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellarePR00,
  author       = {Mihir Bellare and
                  David Pointcheval and
                  Phillip Rogaway},
  title        = {Authenticated Key Exchange Secure Against Dictionary Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellarePR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FujisakiOPS00,
  author       = {Eiichiro Fujisaki and
                  Tatsuaki Okamoto and
                  David Pointcheval and
                  Jacques Stern},
  title        = {{RSA-OAEP} is Secure under the {RSA} Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {61},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/061},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FujisakiOPS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PaillierP99,
  author       = {Pascal Paillier and
                  David Pointcheval},
  editor       = {Kwok{-}Yan Lam and
                  Eiji Okamoto and
                  Chaoping Xing},
  title        = {Efficient Public-Key Cryptosystems Provably Secure Against Active
                  Adversaries},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '99, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Singapore, November 14-18, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1716},
  pages        = {165--179},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-48000-6\_14},
  doi          = {10.1007/978-3-540-48000-6\_14},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PaillierP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Pointcheval99,
  author       = {David Pointcheval},
  editor       = {Jacques Stern},
  title        = {New Public Key Cryptosystems Based on the Dependent-RSA Problems},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {239--254},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_17},
  doi          = {10.1007/3-540-48910-X\_17},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Pointcheval99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareDPR98,
  author       = {Mihir Bellare and
                  Anand Desai and
                  David Pointcheval and
                  Phillip Rogaway},
  editor       = {Hugo Krawczyk},
  title        = {Relations Among Notions of Security for Public-Key Encryption Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1462},
  pages        = {26--45},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055718},
  doi          = {10.1007/BFB0055718},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareDPR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Pointcheval98,
  author       = {David Pointcheval},
  editor       = {Kaisa Nyberg},
  title        = {Strengthened Security for Blind Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {391--405},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054141},
  doi          = {10.1007/BFB0054141},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Pointcheval98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MRaihiP98,
  author       = {David M'Ra{\"{\i}}hi and
                  David Pointcheval},
  editor       = {Rafael Hirschfeld},
  title        = {Distributed Trustees and Revocability: {A} Framework for Internet
                  Payment},
  booktitle    = {Financial Cryptography, Second International Conference, FC'98, Anguilla,
                  British West Indies, February 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1465},
  pages        = {28--42},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055471},
  doi          = {10.1007/BFB0055471},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MRaihiP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/MRaihiNPV98,
  author       = {David M'Ra{\"{\i}}hi and
                  David Naccache and
                  David Pointcheval and
                  Serge Vaudenay},
  editor       = {Stafford E. Tavares and
                  Henk Meijer},
  title        = {Computational Alternatives to Random Number Generators},
  booktitle    = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada,
                  August 17-18, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1556},
  pages        = {72--80},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48892-8\_6},
  doi          = {10.1007/3-540-48892-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/MRaihiNPV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareDPR98,
  author       = {Mihir Bellare and
                  Anand Desai and
                  David Pointcheval and
                  Phillip Rogaway},
  title        = {Relations among Notions of Security for Public-Key Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareDPR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PointchevalS97,
  author       = {David Pointcheval and
                  Jacques Stern},
  editor       = {Richard Graveman and
                  Philippe A. Janson and
                  Clifford Neuman and
                  Li Gong},
  title        = {New Blind Signatures Equivalent to Factorization (extended abstract)},
  booktitle    = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and
                  Communications Security, Zurich, Switzerland, April 1-4, 1997},
  pages        = {92--99},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/266420.266440},
  doi          = {10.1145/266420.266440},
  timestamp    = {Tue, 10 Nov 2020 20:00:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PointchevalS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PointchevalS96,
  author       = {David Pointcheval and
                  Jacques Stern},
  editor       = {Kwangjo Kim and
                  Tsutomu Matsumoto},
  title        = {Provably Secure Blind Signature Schemes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '96, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Kyongju, Korea, November 3-7, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1163},
  pages        = {252--265},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/BFb0034852},
  doi          = {10.1007/BFB0034852},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PointchevalS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/PointchevalS96,
  author       = {David Pointcheval and
                  Jacques Stern},
  editor       = {Ueli M. Maurer},
  title        = {Security Proofs for Signature Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saragossa,
                  Spain, May 12-16, 1996, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1070},
  pages        = {387--398},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68339-9\_33},
  doi          = {10.1007/3-540-68339-9\_33},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/PointchevalS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Pointcheval95,
  author       = {David Pointcheval},
  editor       = {Louis C. Guillou and
                  Jean{-}Jacques Quisquater},
  title        = {A New Identification Scheme Based on the Perceptrons Problem},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '95, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saint-Malo,
                  France, May 21-25, 1995, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {921},
  pages        = {319--328},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-49264-X\_26},
  doi          = {10.1007/3-540-49264-X\_26},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Pointcheval95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics