David Pointcheval
#108,632
Most Influential Person Now
French cryptographer
David Pointcheval's AcademicInfluence.com Rankings
David Pointchevalmathematics Degrees
Mathematics
#6047
World Rank
#8441
Historical Rank
Group Theory
#70
World Rank
#89
Historical Rank
Measure Theory
#1302
World Rank
#1644
Historical Rank
Download Badge
Computer Science Mathematics
David Pointcheval's Degrees
- PhD Computer Science University of Bordeaux
- Masters Computer Science University of Bordeaux
- Bachelors Mathematics University of Bordeaux
Similar Degrees You Can Earn
Why Is David Pointcheval Influential?
(Suggest an Edit or Addition)According to Wikipedia, David Pointcheval is a French cryptographer. He is currently a Senior Researcher at CNRS. He is head of the Computer Science Department and Cryptography Laboratory at the École normale supérieure. He is mainly known for his contributions in the area of provable security, including the Forking lemma, the Pointcheval-Stern signature algorithm, and his contributions to Password-authenticated key agreement.
David Pointcheval's Published Works
Published Works
- Authenticated Key Exchange Secure against Dictionary Attacks (2000) (1490)
- Relations among Notions of Security for Public-Key Encryption Schemes (1998) (1148)
- Security Arguments for Digital Signatures and Blind Signatures (2015) (1138)
- Security Proofs for Signature Schemes (1996) (1114)
- Password-Based Authenticated Key Exchange in the Three-Party Setting (2005) (693)
- The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes (2001) (492)
- Key-Privacy in Public-Key Encryption (2001) (451)
- Provably authenticated group Diffie-Hellman key exchange (2001) (432)
- RSA-OAEP Is Secure under the RSA Assumption (2001) (420)
- The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme (2003) (344)
- Practical multi-candidate election system (2001) (327)
- Simple Password-Based Encrypted Key Exchange Protocols (2005) (321)
- Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys (2007) (313)
- Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions (2002) (295)
- A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications (2003) (276)
- Provably Secure Blind Signature Schemes (1996) (268)
- REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform (2001) (265)
- Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case (2001) (253)
- Simple Functional Encryption Schemes for Inner Products (2015) (229)
- Security proofs for an efficient password-based key exchange (2003) (205)
- Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings (2006) (197)
- Short Randomizable Signatures (2016) (184)
- New Security Results on Encrypted Key Exchange (2003) (175)
- Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries (1999) (164)
- Dynamic Fully Anonymous Short Group Signatures (2006) (158)
- An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication (2007) (141)
- Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks (2002) (139)
- Mutual authentication and group key agreement for low-power mobile devices (2003) (138)
- Chosen-Ciphertext Security for Any One-Way Cryptosystem (2000) (137)
- Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks (2001) (130)
- Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication (2005) (128)
- The Impact of Decryption Failures on the Security of NTRU Encryption (2003) (127)
- Flaws in Applying Proof Methodologies to Signature Schemes (2002) (124)
- One-Time Verifier-Based Encrypted Key Exchange (2005) (115)
- Password-Based Group Key Exchange in a Constant Number of Rounds (2006) (114)
- Security analysis of pseudo-random number generators with input: /dev/random is not robust (2013) (113)
- New Techniques for SPHFs and Efficient One-Round PAKE Protocols (2013) (111)
- Dynamic Threshold Public-Key Encryption (2008) (111)
- Automated Security Proofs with Sequences of Games (2006) (111)
- Design Validations for Discrete Logarithm Based Signature Schemes (2000) (108)
- Public Traceability in Traitor Tracing Schemes (2005) (107)
- Mutual Authentication for Low-Power Mobile Devices (2002) (106)
- Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts (2012) (97)
- Smooth Projective Hashing for Conditionally Extractable Commitments (2009) (97)
- Multi-factor Authenticated Key Exchange (2008) (96)
- The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme (2002) (94)
- Provably secure authenticated group Diffie-Hellman key exchange (2007) (89)
- Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security (2016) (85)
- New Public Key Cryptosystems Based on the Dependent-RSA Problems (1999) (85)
- A New Identification Scheme Based on the Perceptrons Problem (1995) (85)
- On Some Incompatible Properties of Voting Schemes (2010) (77)
- Extended Notions of Security for Multicast Public Key Cryptosystems (2000) (76)
- Disjunctions for Hash Proof Systems: New Constructions and Applications (2015) (70)
- Signatures on Randomizable Ciphertexts (2011) (70)
- About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations) (2004) (68)
- Decentralized Multi-Client Functional Encryption for Inner Product (2018) (68)
- Strengthened Security for Blind Signatures (1998) (67)
- Transferable Constant-Size Fair E-Cash (2009) (65)
- Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework (2008) (64)
- GEM: A Generic Chosen-Ciphertext Secure Encryption Method (2002) (64)
- A Simple Threshold Authenticated Key Exchange from Short Secrets (2005) (63)
- A Scalable Password-Based Group Key Exchange Protocol in the Standard Model (2006) (59)
- Anonymous Proxy Signatures (2008) (59)
- Analysis and Improvements of NTRU Encryption Paddings (2002) (57)
- Provably secure password-based authentication in TLS (2005) (55)
- Self-Scrambling Anonymizers (2000) (55)
- Progress in Cryptology - AFRICACRYPT 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings (2011) (53)
- Public-key encryption indistinguishable under plaintext-checkable attacks (2015) (53)
- Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions (2012) (53)
- Extended Private Information Retrieval and Its Application in Biometrics Authentications (2007) (51)
- The Group Diffie-Hellman Problems (2002) (49)
- SPHF-Friendly Non-interactive Commitments (2013) (48)
- Chosen-Ciphertext Security without Redundancy (2003) (48)
- New blind signatures equivalent to factorization (extended abstract) (1997) (47)
- A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes (2008) (46)
- The Twist-AUgmented Technique for Key Exchange (2006) (46)
- Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange (2008) (46)
- OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding (2004) (46)
- The Composite Discrete Logarithm and Secure Authentication (2000) (45)
- Password-Based Authenticated Key Exchange (2012) (44)
- AriaNN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing (2020) (42)
- HMAC is a randomness extractor and applications to TLS (2008) (42)
- On Provable Security for Digital Signature Algorithms (1996) (42)
- About the Security of MTI/C0 and MQV (2006) (42)
- Advances in Cryptology – EUROCRYPT 2012 (2012) (41)
- Optimal Randomness Extraction from a Diffie-Hellman Element (2009) (41)
- Twin signatures: an alternative to the hash-and-sign paradigm (2001) (41)
- Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions (2013) (40)
- Divisible e-cash made practical (2015) (40)
- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages (2013) (38)
- Encoding-Free ElGamal Encryption Without Random Oracles (2006) (36)
- New Blind Signatures Equivalent to Factorization (1997) (35)
- Better Security for Functional Encryption for Inner Product Evaluations (2016) (35)
- Parallel authentication and public-key encryption (2003) (34)
- Provable Security for Public Key Schemes (2005) (34)
- Computational Alternatives to Random Number Generators (1998) (34)
- Key Derivation and Randomness Extraction (2005) (33)
- Strong password-based authentication in TLS using the three-party group Diffie?Hellman protocol (2007) (32)
- An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication (2008) (32)
- Contemporary Cryptology (Advanced Courses in Mathematics - CRM Barcelona) (2005) (32)
- Report on the AES Candidates (1999) (30)
- Security Notions for Broadcast Encryption (2011) (29)
- Reading in the Dark: Classifying Encrypted Digits with Functional Encryption (2018) (29)
- Distributed Public-Key Cryptography from Weak Secrets (2009) (29)
- Encryption Switching Protocols (2016) (29)
- How to Encrypt Properly with RSA (2002) (28)
- Tighter Reductions for Forward-Secure Signature Schemes (2013) (28)
- Analysis and Improvement of Lindell's UC-Secure Commitment Schemes (2013) (28)
- New Anonymity Notions for Identity-Based Encryption (2008) (28)
- Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures (2009) (28)
- Reassessing Security of Randomizable Signatures (2018) (28)
- Decentralized Dynamic Broadcast Encryption (2012) (26)
- Contemporary cryptology (2005) (24)
- Partially Encrypted Machine Learning using Functional Encryption (2019) (24)
- Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication (2006) (24)
- Flexible Group Key Exchange with On-demand Computation of Subgroup Keys (2010) (24)
- IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange (2004) (24)
- Fuzzy Password-Authenticated Key Exchange (2018) (24)
- Neural Networks and their Cryptographic Applications (1994) (23)
- Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness (2009) (23)
- Contributory Password-Authenticated Group Key Exchange with Join Capability (2011) (23)
- Partially Encrypted Deep Learning using Functional Encryption (2019) (22)
- The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs (2016) (22)
- Boosting Verifiable Computation on Encrypted Data (2020) (22)
- Multi-channel broadcast encryption (2013) (21)
- Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes (2006) (21)
- Removing the Strong RSA Assumption from Arguments over the Integers (2017) (21)
- Security Proofs for an Ecien t Password-Based Key Exchange (2003) (19)
- Dynamic Decentralized Functional Encryption (2020) (19)
- Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting (2015) (19)
- Forward Secure Non-Interactive Key Exchange (2014) (18)
- VTBPEKE: Verifier-based Two-Basis Password Exponential Key Exchange (2017) (18)
- Strong Cryptography from Weak Secrets (2010) (18)
- New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange (2013) (17)
- Robust Password-Protected Secret Sharing (2016) (16)
- A New NP-Complete Problem and Public-Key Identification (2003) (16)
- A security solution for IEEE 802.11's ad hoc mode: password-authentication and group DiffieHellman key exchange (2007) (16)
- Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages (2002) (15)
- A New $$\mathcal{N}\mathcal{P} $$ -Complete Problem and Public-Key Identification (2003) (15)
- Asymmetric Cryptography and Practical Security (2002) (14)
- Short blind signatures (2013) (14)
- On the Security Notions for Public-Key Encryption Schemes (2004) (14)
- Compact Round-Optimal Partially-Blind Signatures (2012) (14)
- Multi-Client Functional Encryption with Repetition for Inner Product (2018) (13)
- Optimal Asymmetric Encryption and Signature Paddings (2005) (13)
- Verified security of redundancy-free encryption from Rabin and RSA (2012) (13)
- Unbounded Inner Product Functional Encryption, with Succinct Keys (2019) (12)
- Removing Erasures with Explainable Hash Proof Systems (2017) (12)
- Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks (2015) (12)
- Mediated Traceable Anonymous Encryption (2010) (12)
- A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption (2018) (11)
- Advances in Cryptology : EUROCRYPT 2012 : 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15-19, 2012 : Proceedings (2012) (11)
- Practical Strategy-Resistant Privacy-Preserving Elections (2018) (10)
- Linearly-Homomorphic Signatures and Scalable Mix-Nets (2020) (10)
- PSEC{3: Provably Secure Elliptic Curve Encryption Scheme { V3 (Submission to P1363a) (2000) (10)
- Legally Fair Contract Signing Without Keystones (2016) (10)
- Distributed Trustees and Revocability: A Framework for Internet Payment (1998) (10)
- Traceable Signature with Stepping Capabilities (2012) (9)
- RSA{REACT: An Alternative to RSA{OAEP (2001) (9)
- Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures (2009) (9)
- Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash (2017) (9)
- Message-Based Traitor Tracing with Optimal Ciphertext Rate (2012) (8)
- How to Disembed a Program? (2004) (8)
- Scalable Divisible E-cash (2015) (7)
- Secure Mobile Gambling (2001) (7)
- Differential Privacy Guarantees for Stochastic Gradient Langevin Dynamics (2022) (7)
- Progress in Cryptology – AFRICACRYPT 2014 (2014) (7)
- HD-RSA: Hybrid Dependent RSA a New Public-Key Encryption Scheme (1999) (7)
- On the Tightness of Forward-Secure Signature Reductions (2018) (7)
- Trapdoor Smooth Projective Hash Functions (2013) (7)
- A New Key Exchange Protocol Based on MQV Assuming Public Computations (2006) (7)
- Traceable Inner Product Functional Encryption (2020) (6)
- Advanced Course on Contemporary Cryptology (2005) (6)
- Encyclopedia of Cryptography and Security (2nd Edition) (2011) (6)
- Progress in cryptology : AFRICACRYPT 2014 : 7th international conference on cryptology in Africa Marrakesh, Morocco, May 28-30, 2014 : proceedings (2014) (5)
- Cryptography in Computer System Security (2008) (5)
- Adaptively Secure Broadcast Encryption with Forward Secrecy (2011) (5)
- Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting (2014) (5)
- New Security Results on Encrypted Key Exchange (Extended abstract) (2004) (5)
- Traceable Constant-Size Multi-authority Credentials (2022) (5)
- Secure Distributed Computation on Private Inputs (2015) (5)
- Provably Authenticated Group Die-Hellman Key Exchange { The Dynamic Case (Full version) (2001) (5)
- Practical Security in Public-Key Cryptography (2001) (5)
- Contemporary Cryptology Provable Security for Public Key Schemes (2005) (5)
- Provably Secure Password-Based Authentication in TLS (Extended abstract) (2006) (4)
- Encrypting Proofs on Pairings and Its Application to Anonymity for Signatures (2008) (4)
- Two Formal Views of Authenticated Group Die-Hellman Key Exchange (2002) (4)
- Human Computing for Handling Strong Corruptions in Authenticated Key Exchange (2017) (4)
- About Generic Conversions from any Weakly Secure Encryption Scheme into a Chosen-Ciphertext Secure Scheme (2001) (4)
- PSEC : Provably Secure Elliptic Curve Encryption Scheme ( Submission to NESSIE ) (2000) (4)
- SPOKE: Simple Password-Only Key Exchange in the Standard Model (2014) (4)
- Dfc Update (1999) (4)
- Privacy-Preserving Plaintext-Equality of Low-Entropy Inputs (2018) (4)
- Remote Attestation (2011) (3)
- RSA Public-Key Encryption (2005) (3)
- Advances in Cryptology – CRYPTO 2018 (2018) (3)
- Proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography (PKC '10) (2010) (3)
- Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms (2017) (3)
- Encrypted Key Exchange Protocols (2005) (3)
- (Semantic Security and Pseudo-Random Permutations) (2004) (3)
- Building Efficient PKE and IBE from Distributed Passwords (2010) (3)
- About the Security of Ciphers (3)
- On the Leakage of Corrupted Garbled Circuits (2018) (3)
- The computational and decisional Diffie-Hellman assumptions in CryptoVerif (2010) (3)
- 2-Step Multi-Client Quadratic Functional Encryption from Decentralized Function-Hiding Inner-Product (2021) (3)
- Group Die-Hellman Key Exchange Secure Against Dictionary Attacks (Extended abstract) (2002) (3)
- Number Theory and Public-Key Cryptography (2001) (2)
- Progress in Cryptology AFRICACRYPT 2016 : 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings (2016) (2)
- Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface (2007) (2)
- Key-Policy ABE with Delegation of Rights (2021) (2)
- Multi-Client Functional Encryption with Fine-Grained Access Control (2022) (2)
- Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings (2010) (2)
- New Technical Trends in Asymmetric Cryptography (2005) (2)
- OAEP: Optimal Asymmetric Encryption Padding (2011) (2)
- Encyclopedia of Cryptography and Security (2005) (2)
- Functional Encryption with Oblivious Helper (2017) (2)
- About the Security of MTI / C 0 and MQV (2)
- Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings (2006) (2)
- Parallel Signcryption (2010) (2)
- Traceable Attribute-Based Anonymous Credentials (2020) (2)
- How to Disembed a Program? Full Version? (2004) (1)
- Black-Box Trace&Revoke Codes (2013) (1)
- Public Key Cryptography - PKC 2011 (2011) (1)
- Applied Cryptography and Network Security (2009) (1)
- Fuzzy Authenticated Key Exchange (2017) (1)
- Decentralized Evaluation of Quadratic Polynomials on Encrypted Data (2019) (1)
- Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts (2013) (1)
- SPHF-Friendly Non-Interactive Commitment Schemes (2013) (1)
- Computational Security for Cryptography (2009) (1)
- Cryptographic Protocols For Privacy Enhancing Identity Management (2010) (1)
- Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques (2012) (1)
- MyOPE: Malicious securitY for Oblivious Polynomial Evaluation (2021) (1)
- Two-Client Inner-Product Functional Encryption with an Application to Money-Laundering Detection (2022) (1)
- Research Agenda for the Future of Cryptology † (2003) (1)
- Security Analysis of the EDHOC protocol (2022) (1)
- Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology (2006) (1)
- Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography (2010) (0)
- Verifiable Multi-Client Functional Encryption for Inner Product (2023) (0)
- Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman (2008) (0)
- Proceedings of the 4th international conference on Progress in cryptology in Africa (2011) (0)
- Lawrence Berkeley National Laboratory Lawrence Berkeley National Laboratory Title Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group (2008) (0)
- Optimal Security Notion for Decentralized Multi-Client Functional Encryption (2023) (0)
- Interactive Di-e-HellmanAssumptionsWith Applicationsto Password-BasedAuthentication (2005) (0)
- On the Tightness of Forward-Secure Signature Reductions (2018) (0)
- S. Babbage 7, (2003) (0)
- 8th International Conference on Cryptology in Africa - Africacrypt 2016 (2016) (0)
- Report on the Aes Candidates 1 on the Aes Candidates 1.1 on the Aes Evaluation Platform (1999) (0)
- How to Disembed a Program? (Extended Abstract) (2004) (0)
- Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey Zone (2022) (0)
- Public-Key Cryptography (Dagstuhl Seminar 16371) (2016) (0)
- public key certification proceeds by a non accredited provider (2006) (0)
- Asymmetric Cryptography (2022) (0)
- Function-Hiding Decentralized Multi-Client Functional Encryption for Inner Products (2022) (0)
- Topical Collection on Computing on Encrypted Data (2023) (0)
- Contracts and Grants with Industry - Contracts with Industrial Partners (2009) (0)
- Method for identifying a public key (1997) (0)
- Security Notions for Broadcast Encryption ACNS ’ 11 Best Student Paper Award (2011) (0)
- Financial Cryptography (1999) (0)
- Method for identifying a public key using two hash functions (1997) (0)
- for Inner Products (2015) (0)
- Identifying method public key using two hash functions (1998) (0)
- Dynamic Group Die-Hellman Key Exchange under Standard Assumptions (Extended abstract) (2002) (0)
- Proceedings of the 8th International Conference on Progress in Cryptology --- AFRICACRYPT 2016 - Volume 9646 (2016) (0)
- Post-Quantum Oblivious Transfer from Smooth Projective Hash Functions with Grey Zone (2022) (0)
- Secure Decision Forest Evaluation (2021) (0)
- Method of cryptography using a symmetric cryptographic algorithm and application flow has a chip because you have (2002) (0)
- Control and Cybernetics Contemporary Cryptology (2008) (0)
- Partnerships and Cooperations - ANR Projects within Academics (2012) (0)
- Editorial - Group-oriented cryptographic protocols (2008) (0)
- Key-Policy ABE with Switchable Attributes (2022) (0)
- Chosen-Ciphertext Security Chosen-Ciphertext Security without Redundancy without Redundancy (2003) (0)
- Contracts and Grants with Industry - ANR Projects within Academics (2011) (0)
- Tracing a Linear Subspace: Application to Linearly-Homomorphic Group Signatures (2023) (0)
- Method for cryptographic message signature has strengthened security, signature verification process, devices and products corresponding computer programs. (2009) (0)
- Black-Box Trace&Revoke Codes (2012) (0)
- Runtime Analysis (2011) (0)
- New Results - New Primitives (2008) (0)
- Public key identification method for authentication of bank cards or identity cards (1997) (0)
- Josef Pieprzyk, David Pointcheval (2003) (0)
- Epoc: Ecient Probabilistic Public-key Encryption (submission to Nessie) (2007) (0)
- Progress in Cryptology – AFRICACRYPT 2016 (2016) (0)
- 2 2 Formal Framework In (2013) (0)
- Partnerships and Cooperations - ANR Projects with Industrials (2012) (0)
- Security Analysis of Improved EDHOC Protocol (2022) (0)
- Security and Cryptography for Networks (2012) (0)
This paper list is powered by the following services:
Other Resources About David Pointcheval
What Schools Are Affiliated With David Pointcheval?
David Pointcheval is affiliated with the following schools: