P. Article-publié-jean-lancrenon, R. Gillard, T. Fournel-jean-lancrenon, R. Gillard, and T. Fournel, Remote object authentication : confidence model, cryptosystem, and protocol", dans Data Mining, Intrusion Detection, Information Security and Assurance, and Data Network Security 10 pages Article en cours de publicationRemote object authentication against counterfeiting using elliptic curves", qui sera présenté à la conférence SPIE Defense, Security, and Sensing in Orlando, Florida Etats-Unis d'Amérique, 10 pages Article en préparation : "Isolating partial information of indistinguishable encryptions" (titre provisoire) pour les résultats de sécurité théorique Public-key encryption in a multi-user setting : security proofs and improvements, Belur V. Dasarathy, Proceedings of SPIE Advances in cryptology -EUROCRYPT 2000, pp.25-29, 2000.

I. F. Blake, G. Seroussi, and N. Smart, Elliptic Curves in Cryptography, 1999.
DOI : 10.1017/CBO9781107360211

I. F. Blake, G. Seroussi, and N. Smart, Advances in Elliptic Curve Cryptography, p.317, 2005.
DOI : 10.1017/CBO9780511546570

R. M. Bolle, J. H. Connel, S. Pankanti, N. K. Ratha, and A. W. Senior, Guide to biometrics, 2003.
DOI : 10.1007/978-1-4757-4036-3

J. Bringer, H. Chabanne, M. Izabachène, D. Pointcheval, Q. Tang et al., An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication, Proceedings of ACISP '07, pp.96-106, 2007.
DOI : 10.1007/978-3-540-73458-1_8

J. Bringer and H. Chabanne, An authentication protocol with encrypted biometric data, Progress in cryptology, AFRICACRYPT 2008, pp.109-124, 2008.

J. Bringer, H. Chabanne, D. Pointcheval, and Q. Tang, Extended private information retrieval and its application in biometrics authentication, Cryptology and Network Security, LNCS, vol.4856, pp.175-193, 2007.

D. Boneh, The Decision Diffie-Hellman problem, Proceedings of the Third Algorithmic Number Theory Symposium, pp.48-63, 1998.
DOI : 10.1007/BFb0054851

B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, Private Information Retrieval, Proceedings of the 36th annual IEEE Conference on Foundations of Computer Science, pp.41-50, 1995.

T. Elgamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, vol.31, issue.4, pp.469-472, 1985.
DOI : 10.1109/TIT.1985.1057074

T. Fournel, D. Coltuc, J. Becker, Y. Boutant, T. Fournel et al., Multiscale extraction of uncompressive bitstrings from speckle patterns Morphocryptography : a new way for securing both information and storage media, Proc. Workshop on Information Optics Proc. SAR-SSI 2007, pp.12-15, 2007.

G. Frey and H. Rück, A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves, Mathematics of Computation, vol.62, pp.865-874, 1994.

P. Gaudry, F. Hess, and N. Smart, Constructive and destructive facets of Weil descent on elliptic curves, Journal of Cryptology, vol.44, issue.1, pp.19-34, 2002.
DOI : 10.1007/s00145-001-0011-x

URL : https://hal.archives-ouvertes.fr/inria-00512763

O. Goldreich, Foundations of cryptography I : basic tools, 2001.

O. Goldreich, Foundations of cryptography II : basic applications, 2004.

S. Goldwasser and S. Micali, Probabilistic encryption & how to play mental poker keeping secret all partial information, Proceedings of the fourteenth annual ACM symposium on Theory of computing , STOC '82, pp.365-377, 1982.
DOI : 10.1145/800070.802212

D. Gordon, Discrete Logarithms in $GF ( P )$ Using the Number Field Sieve, SIAM Journal on Discrete Mathematics, vol.6, issue.1, pp.124-138, 1993.
DOI : 10.1137/0406010

F. Hess, Abstract, LMS Journal of Computation and Mathematics, vol.18, pp.167-192, 2004.
DOI : 10.1109/18.259647

D. Hankerson, A. Menezes, and S. Vanstone, Guide to elliptic curve cryptography, 2003.

A. Joux and K. Nguyen, Separating Decision Diffie?Hellman from Computational Diffie?Hellman in Cryptographic Groups, Journal of Cryptology, vol.16, issue.4, pp.239-247, 2003.
DOI : 10.1007/s00145-003-0052-4

N. Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, vol.48, issue.177, pp.203-209, 1987.
DOI : 10.1090/S0025-5718-1987-0866109-5

E. Kushilevitz and R. Ostrovsky, Elliptic curve cryptography : the serpentine course of a paradigm shift Replication is not needed : single database , computationally-private information retrieval, Journal of Number Theory, pp.364-373, 1997.

H. W. Lenstra and . Jr, Factoring Integers with Elliptic Curves, The Annals of Mathematics, vol.126, issue.3, pp.649-673, 1987.
DOI : 10.2307/1971363

A. Lenstra and H. Lenstra, The developement of the number field sieve, 1993.

H. Lipmaa, An Oblivious Transfer Protocol with Log-Squared Communication, ISC 2005, pp.314-328, 2005.
DOI : 10.1007/11556992_23

A. Menezes, T. Okamoto, and S. Vanstone, Reducing elliptic curve logarithms to logarithms in a finite field, IEEE Transactions on Information Theory, vol.39, issue.5, pp.1639-1646, 1993.
DOI : 10.1109/18.259647

V. Miller, Use of Elliptic Curves in Cryptography, 1985.
DOI : 10.1007/3-540-39799-X_31

R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld, Physical One-Way Functions, Science, vol.297, issue.5589, pp.2026-2030, 2002.
DOI : 10.1126/science.1074376

J. Pollard, A. Lenstra, and H. Et-lenstra, Factoring with cubic integers, The development of the number field sieve, pp.4-10, 1993.

J. Pollard, Theorems on factorization and primality testing, Proc. Cambridge Philos. Soc. 76, pp.521-528, 1974.
DOI : 10.2307/2003473

J. Rothe, Complexity theory and cryptology : an introduction to cryptocomplexity, 2005.

V. Shoup, Sequences of games : a tool for taming complexity in security proofs, manuscript, 2006.

J. Silverman, The arithmetic of ellipitic curves, 1986.

N. Smart, The Discrete Logarithm Problem on Elliptic Curves of Trace One, Journal of Cryptology, vol.12, issue.3, pp.193-196, 1999.
DOI : 10.1007/s001459900052

J. Talbot and D. Welsh, Complexity and cryptography : an introduction, 2006.
DOI : 10.1017/CBO9780511755286

Y. Tsiounis and M. Yung, On the security of ElGamal based encryption, Proceedings of the First Annual Workshop on Practice and Theory in Public-Key Crypotography : Public Key Cryptography, pp.117-134, 1998.
DOI : 10.1007/BFb0054019