Name
Affiliation
Papers
DAVID POINTCHEVAL
École normale supérieure-CNRS-INRIA 45 rue d’Ulm 75320 Paris Cedex 05 France
34
Collaborators
Citations 
PageRank 
44
781
33.25
Referers 
Referees 
References 
1180
568
588
Search Limit
1001000
Title
Citations
PageRank
Year
Two-Client Inner-Product Functional Encryption with an Application to Money-Laundering Detection00.342022
Multi-Client Functional Encryption with Fine-Grained Access Control.00.342022
Unbounded Inner-Product Functional Encryption with Succinct Keys.00.342019
Linearly-Homomorphic Signatures and Scalable Mix-Nets.20.372019
Traceable Inner Product Functional Encryption00.342019
Partially Encrypted Deep Learning using Functional Encryption20.352019
Partially Encrypted Machine Learning using Functional Encryption.00.342019
Fuzzy Password-Authenticated Key Exchange.10.352018
Privacy-Preserving Plaintext-Equality of Low-Entropy Inputs.00.342018
Decentralized Multi-Client Functional Encryption for Inner Product.10.352018
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange10.362017
Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security.100.492016
SPOKE: Simple Password-Only Key Exchange in the Standard Model.20.362014
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.00.342013
Round-Optimal privacy-preserving protocols with smooth projective hash functions200.682012
Verified security of redundancy-free encryption from Rabin and RSA60.462012
On some incompatible properties of voting schemes260.992010
Mediated Traceable Anonymous Encryption30.402010
Optimal Randomness Extraction from a Diffie-Hellman Element170.802009
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness80.442009
Distributed Public-Key Cryptography from Weak Secrets102.622009
HMAC is a randomness extractor and applications to TLS240.962008
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange180.682008
An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication170.722008
Efficient two-party password-based key exchange protocols in the UC framework290.782008
Extended private information retrieval and its application in biometrics authentications291.232007
An application of the Goldwasser-Micali cryptosystem to biometric authentication621.952007
Strong password-based authentication in TLS using the three-party group Diffie Hellman protocol140.562007
Hardness of distinguishing the MSB or LSB of secret keys in diffie-hellman schemes70.552006
A scalable password-based group key exchange protocol in the standard model300.822006
Password-Based authenticated key exchange in the three-party setting2195.762005
Simple password-based encrypted key exchange protocols1304.072005
Twin signatures: an alternative to the hash-and-sign paradigm241.092001
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks692.722001