David Pointcheval
Orcid: 0000-0002-6668-683XAffiliations:
- ENS Paris, France
According to our database1,
David Pointcheval
authored at least 218 papers
between 1995 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on di.ens.fr
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
IACR Commun. Cryptol., 2025
Dynamic Decentralized Functional Encryption: Generic Constructions with Strong Security.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025
Proceedings of the Public-Key Cryptography - PKC 2025, 2025
Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies.
Proceedings of the Computer Security - ESORICS 2025, 2025
2024
IACR Cryptol. ePrint Arch., 2024
IACR Commun. Cryptol., 2024
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024
Proceedings of the Topics in Cryptology - CT-RSA 2024, 2024
2023
Commun. ACM, June, 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Public-Key Cryptography - PKC 2023, 2023
Proceedings of the Eight International Joint Conference on Electronic Voting, 2023
Covercrypt: An Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE.
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
Proceedings of the Applied Cryptography and Network Security, 2023
GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges.
Proceedings of the Applied Cryptography and Network Security, 2023
2022
AriaNN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing.
Proc. Priv. Enhancing Technol., 2022
IACR Cryptol. ePrint Arch., 2022
Post-Quantum Oblivious Transfer from Smooth Projective Hash Functions with Grey Zone.
CoRR, 2022
CoRR, 2022
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022
Two-Client Inner-Product Functional Encryption with an Application to Money-Laundering Detection.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2021
2-Step Multi-Client Quadratic Functional Encryption from Decentralized Function-Hiding Inner-Product.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Corrigendum: Public-key encryption indistinguishable under plaintext-checkable attacks.
IET Inf. Secur., 2020
ARIANN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing.
CoRR, 2020
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
2019
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019
Proceedings of the Information Security - 22nd International Conference, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
2018
A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption.
Theor. Comput. Sci., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Provable Security, 2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Proceedings of the Computer Security, 2018
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
Proceedings of the Applied Cryptography and Network Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the Information Security - 20th International Conference, 2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
Proceedings of the Applied Cryptography and Network Security, 2016
2015
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks.
Proceedings of the Applied Cryptography and Network Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Security analysis of pseudo-random number generators with input: /dev/random is not robust.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010
Proceedings of the Progress in Cryptology, 2010
Proceedings of the Progress in Cryptology, 2010
Proceedings of the Progress in Cryptology, 2010
2009
Proceedings of the Formal to Practical Security, 2009
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures.
Proceedings of the Formal to Practical Security, 2009
Proceedings of the Public Key Cryptography, 2009
Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures.
Proceedings of the Pairing-Based Cryptography, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness.
Proceedings of the Progress in Cryptology, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication.
Proceedings of the Advances in Information and Computer Security, 2008
A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes.
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the Topics in Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
ACM Trans. Inf. Syst. Secur., 2007
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication.
J. Cryptol., 2007
A security solution for IEEE 802.11's ad hoc mode: password-authentication and group DiffieHellman key exchange.
Int. J. Wirel. Mob. Comput., 2007
Strong password-based authentication in TLS using the three-party group Diffie?Hellman protocol.
Int. J. Secur. Networks, 2007
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys.
Proceedings of the Pairing-Based Cryptography, 2007
Extended Private Information Retrieval and Its Application in Biometrics Authentications.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Proceedings of the Progressin Cryptology, 2006
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the Public Key Cryptography, 2006
Proceedings of the Public Key Cryptography, 2006
Proceedings of the Public Key Cryptography, 2006
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
Proceedings of the Advances in Cryptology, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the Advances in Cryptology, 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Public Key Cryptography, 2005
Proceedings of the Public Key Cryptography, 2005
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication.
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Topics in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
Contemporary cryptology.
Advanced courses in mathematics : CRM Barcelona, Birkhäuser, ISBN: 978-3-7643-7294-1, 2005
2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004
Proceedings of the Public Key Cryptography, 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004
Proceedings of the Advances in Cryptology, 2004
2003
A New NP-Complete Problem and Public-Key Identification.
Des. Codes Cryptogr., 2003
Proceedings of the Actes de la Première Conférence Internationale RIVF'03 Rencontres en Informatique Vietnam-France, 2003
Proceedings of the Mobile and Wireless Communications Networks, 2003
Proceedings of the Advances in Cryptology, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
Proceedings of the Selected Areas in Cryptography, 2002
Proceedings of the Public Key Cryptography, 2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
Proceedings of the Topics in Cryptology, 2002
Proceedings of the Advances in Cryptology, 2002
Proceedings of the Advances in Cryptology, 2002
Proceedings of the Advances in Cryptology, 2002
2001
The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme.
IACR Cryptol. ePrint Arch., 2001
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001
Proceedings of the Public Key Cryptography, 2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Financial Cryptography, 2001
The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme.
Proceedings of the Financial Cryptography, 2001
Proceedings of the Topics in Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the CCS 2001, 2001
Proceedings of the CCS 2001, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
2000
Proceedings of the Public Key Cryptography, 2000
Proceedings of the Public Key Cryptography, 2000
Proceedings of the Public Key Cryptography, 2000
Proceedings of the Automata, Languages and Programming, 27th International Colloquium, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
1998
Proceedings of the Selected Areas in Cryptography '98, 1998
Proceedings of the Financial Cryptography, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
Proceedings of the Advances in Cryptology, 1998
1997
Proceedings of the CCS '97, 1997
1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Advances in Cryptology, 1996
1995
Proceedings of the Advances in Cryptology, 1995