Research Papers

| 17/07/2025
Bundled Authenticated Key Exchange: A Concrete Treatment of Signal’s Handshake Protocol and Post-Quantum Security
In this work, which was accepted at USENIX Security 2025, we propose a new way of modeling Signal handshake protocols.
| 15/07/2025
More Efficient Protocols for Post-Quantum Secure Messaging
More Efficient Protocols for Post-Quantum Secure Messaging is a talk presented by Thomas Prest at RWC 2024. This was the third talk in a session on post-quantum messaging, chaired by Dan Boneh.
| 09/06/2025
Share the MAYO: thresholdizing MAYO
We present the first comprehensive study on thresholdizing practical OV-based signature schemes, specifically focusing on MAYO and UOV.
| 09/06/2025
A reduction from Hawk to the principal ideal problem in a quaternion algebra
In this article we present a non-uniform reduction from rank-2 module-LIP over Complex Multiplication fields, to a variant of the Principal Ideal Problem, in some fitting quaternion algebra.
| 09/06/2025
Cryptanalysis of rank-2 module-LIP: a single real embedding is all it takes
In this work, we generalize the attack of Mureau et al. against rank-2module-LIP to the family of all number fields with at least one real embedding, which contains the NTRU Prime fields.
| 09/06/2025
Triple Ratchet: A Bandwidth Efficient Hybrid-Secure Signal Protocol
Due to the imminent threat of a "Harvest Now, Decrypt Later" attack, secure messaging providers must react know in order to make their protocols : at least as secure as before, but now also post-quantum (PQ) secure.
| 09/06/2025
Finally! A Compact Lattice-Based Threshold Signature
We propose a novel very efficient threshold signature scheme, with a signature size close to that of a single Dilithium signature for any threshold T of at most 8 users.
| 30/01/2025
Recursive Lattice Reduction
We propose a recursive lattice reduction framework for finding short non-zero vectors or dense sublattices of a lattice.
| 30/01/2025
A Tight Security Proof for SPHINCS+, Formally Verified
In this work, we formally prove a tight security bound for SPHINCS+ using the EasyCrypt proof assistant, establishing greater confidence in the general security of the scheme and that of the parameter sets considered for standardization.
| 03/01/2025
Group signatures and more from isogenies and lattices: generic, simple, and efficient
We construct an efficient dynamic group signature (or more generally an accountable ring signature) from isogeny and lattice assumptions.
| 03/01/2025
The Cost of Maintaining Keys in Dynamic Groups with Applications to Multicast Encryption and Group Messaging
In this work we prove lower bounds on the (communication) cost of maintaining a shared key among a dynamic group of users. Being "dynamic'' means one can add and remove users from the group.
| 03/01/2025
Tighter Adaptive IBEs and VRFs: Revisiting Waters’ Artificial Abort
In this paper, we analyze proofs based on the partitioning technique through a new lens.