Research Papers

| 07/10/2025
Proving Faster Implementations Faster: Combining Deductive and Circuit-Based Reasoning in EasyCrypt
We propose a hybrid formal verification approach that combines high-level deductive reasoning and circuit-based reasoning and apply it to highly optimized cryptographic assembly code.
| 10/08/2025
Continuous Group-Key Agreement: Concurrent Updates without Pruning
Continuous Group Key Agreement (CGKA) is the primitive underlying secure group messaging. It allows a large group of N users to maintain a shared secret key that is frequently rotated by the group members in order to achieve forward secrecy and post compromise security.
| 17/07/2025
Unmasking TRaccoon: A Lattice-Based Threshold Signature with An Efficient Identifiable Abort Protocol
In this work, we propose TRaccoon-IA, a TRaccoon with an efficient identifiable abort protocol, allowing to identify malicious signers when the signing protocol fails.
| 17/07/2025
Comprehensive Deniability Analysis of Signal Handshake Protocols: X3DH, PQXDH to Fully Post-Quantum with Deniable Ring Signatures
We analyze Signal's classically secure X3DH and harvest-now-decrypt-later-secure PQXDH, and show the settings for which PQXDH is (un)deniable against harvest-now--later attacks..and more.
| 17/07/2025
Exploring How to Authenticate Application Messages in MLS: More Efficient, Post-Quantum, and Anonymous Blocklistable
In this work, we focus on the authenticity of the application messages exchanged in MLS.
| 17/07/2025
Bundled Authenticated Key Exchange: A Concrete Treatment of Signal’s Handshake Protocol and Post-Quantum Security
In this work, which was accepted at USENIX Security 2025, we propose a new way of modeling Signal handshake protocols.
| 15/07/2025
More Efficient Protocols for Post-Quantum Secure Messaging
More Efficient Protocols for Post-Quantum Secure Messaging is a talk presented by Thomas Prest at RWC 2024. This was the third talk in a session on post-quantum messaging, chaired by Dan Boneh.
| 09/06/2025
Share the MAYO: thresholdizing MAYO
We present the first comprehensive study on thresholdizing practical OV-based signature schemes, specifically focusing on MAYO and UOV.
| 09/06/2025
A reduction from Hawk to the principal ideal problem in a quaternion algebra
In this article we present a non-uniform reduction from rank-2 module-LIP over Complex Multiplication fields, to a variant of the Principal Ideal Problem, in some fitting quaternion algebra.
| 09/06/2025
Cryptanalysis of rank-2 module-LIP: a single real embedding is all it takes
In this work, we generalize the attack of Mureau et al. against rank-2module-LIP to the family of all number fields with at least one real embedding, which contains the NTRU Prime fields.
| 09/06/2025
Triple Ratchet: A Bandwidth Efficient Hybrid-Secure Signal Protocol
Due to the imminent threat of a "Harvest Now, Decrypt Later" attack, secure messaging providers must react know in order to make their protocols : at least as secure as before, but now also post-quantum (PQ) secure.
| 09/06/2025
Finally! A Compact Lattice-Based Threshold Signature
We propose a novel very efficient threshold signature scheme, with a signature size close to that of a single Dilithium signature for any threshold T of at most 8 users.