Belaïd, Sonia; Coron, Jean-Sébastien; Fouque, Pierre-Alain; Gérard, Benoît; Kammerer, Jean-Gabriel; Prouff, Emmanuel Improved side-channel analysis of finite-field multiplication. (English) Zbl 1380.94073 Güneysu, Tim (ed.) et al., Cryptographic hardware and embedded systems – CHES 2015. 17th international workshop, Saint-Malo, France, September 13–16, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-48323-7/pbk; 978-3-662-48324-4/ebook). Lecture Notes in Computer Science 9293, 395-415 (2015). MSC: 94A60 68M07 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien; Lepoint, Tancrède; Tibouchi, Mehdi New multilinear maps over the integers. (English) Zbl 1375.94116 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 267-286 (2015). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien; Gentry, Craig; Halevi, Shai; Lepoint, Tancrède; Maji, Hemanta K.; Miles, Eric; Raykova, Mariana; Sahai, Amit; Tibouchi, Mehdi Zeroizing without low-level zeroes: new MMAP attacks and their limitations. (English) Zbl 1375.94114 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 247-266 (2015). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI Link
Coron, Jean-Sébastien; Großschädl, Johann; Tibouchi, Mehdi; Vadnala, Praveen Kumar Conversion from arithmetic to Boolean masking with logarithmic complexity. (English) Zbl 1367.94305 Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 130-149 (2015). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI Link
Coron, Jean-Sébastien; Prouff, Emmanuel; Rivain, Matthieu; Roche, Thomas Higher-order side channel security and mask refreshing. (English) Zbl 1321.94052 Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 410-424 (2014). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien; Großschädl, Johann; Vadnala, Praveen Kumar Secure conversion between Boolean and arithmetic masking of any order. (English) Zbl 1375.94115 Batina, Lejla (ed.) et al., Cryptographic hardware and embedded systems – CHES 2014. 16th international workshop, Busan, South Korea, September 23–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-662-44708-6/pbk). Lecture Notes in Computer Science 8731, 188-205 (2014). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien; Roy, Arnab; Vivek, Srinivas Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures. (English) Zbl 1375.94117 Batina, Lejla (ed.) et al., Cryptographic hardware and embedded systems – CHES 2014. 16th international workshop, Busan, South Korea, September 23–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-662-44708-6/pbk). Lecture Notes in Computer Science 8731, 170-187 (2014). MSC: 94A60 11T06 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien Higher order masking of look-up tables. (English) Zbl 1326.94082 Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 441-458 (2014). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien; Lepoint, Tancrède; Tibouchi, Mehdi Scale-invariant fully homomorphic encryption over the integers. (English) Zbl 1335.94041 Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 311-328 (2014). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Bi, Jingguo; Coron, Jean-Sébastien; Faugère, Jean-Charles; Nguyen, Phong Q.; Renault, Guénaël; Zeitoun, Rina Rounding and chaining LLL: finding faster small roots of univariate polynomial congruences. (English) Zbl 1335.11102 Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 185-202 (2014). MSC: 11Y16 68W30 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien; Lepoint, Tancrède; Tibouchi, Mehdi Practical multilinear maps over the integers. (English) Zbl 1309.94139 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 476-493 (2013). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Bertoni, Guido (ed.); Coron, Jean-Sébastien (ed.) Cryptographic hardware and embedded systems – CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20–23, 2013. Proceedings. (English) Zbl 1269.68018 Lecture Notes in Computer Science 8086. Berlin: Springer (ISBN 978-3-642-40348-4/pbk). xiii, 490 p. (2013). MSC: 68-06 94-06 68P25 94A60 00B25 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien; Kirichenko, Alexey; Tibouchi, Mehdi A note on the bivariate Coppersmith theorem. (English) Zbl 1330.11078 J. Cryptology 26, No. 2, 246-250 (2013). Reviewer: Juan Tena Ayuso (Valladolid) MSC: 11Y05 94A60 11Y16 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien; Naccache, David; Tibouchi, Mehdi Another look at affine-padding RSA signatures. (English) Zbl 1293.94061 Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 22-32 (2013). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Cheon, Jung Hee; Coron, Jean-Sébastien; Kim, Jinsu; Lee, Moon Sung; Lepoint, Tancrède; Tibouchi, Mehdi; Yun, Aaram Batch fully homomorphic encryption over the integers. (English) Zbl 1306.94040 Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 315-335 (2013). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien; Giraud, Christophe; Prouff, Emmanuel; Renner, Soline; Rivain, Matthieu; Vadnala, Praveen Kumar Conversion of security proofs from one leakage model to another: a new issue. (English) Zbl 1352.94032 Schindler, Werner (ed.) et al., Constructive side-channel analysis and secure design. Third international workshop, COSADE 2012, Darmstadt, Germany, May 3–4, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29911-7/pbk). Lecture Notes in Computer Science 7275, 69-81 (2012). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI Link
Coron, Jean-Sébastien; Naccache, David; Tibouchi, Mehdi Public key compression and modulus switching for fully homomorphic encryption over the integers. (English) Zbl 1297.94062 Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 446-464 (2012). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien; Gouget, Aline; Icart, Thomas; Paillier, Pascal Supplemental access control (PACE v2): security analysis of PACE integrated mapping. (English) Zbl 1301.68117 Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 207-232 (2012). MSC: 68P25 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien; Mandal, Avradip; Naccache, David; Tibouchi, Mehdi Fully homomorphic encryption over the integers with shorter public keys. (English) Zbl 1290.94059 Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 487-504 (2011). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Becker, Anja; Coron, Jean-Sébastien; Joux, Antoine Improved generic algorithms for hard knapsacks. (English) Zbl 1281.94014 Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 364-385 (2011). MSC: 94A60 68Q25 × Cite Format Result Cite Review PDF Full Text: DOI Link
Coron, Jean-Sébastien; Joux, Antoine; Mandal, Avradip; Naccache, David; Tibouchi, Mehdi Cryptanalysis of the RSA subgroup assumption from TCC 2005. (English) Zbl 1291.94070 Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 147-155 (2011). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Brier, Eric; Coron, Jean-Sébastien; Icart, Thomas; Madore, David; Randriam, Hugues; Tibouchi, Mehdi Efficient indifferentiable hashing into ordinary elliptic curves. (English) Zbl 1261.94025 Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 237-254 (2010). MSC: 94A60 14H52 11T71 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien; Kizhvatov, Ilya Analysis and improvement of the random delay countermeasure of CHES 2009. (English) Zbl 1297.94061 Mangard, Stefan (ed.) et al., Cryptographic hardware and embedded systems – CHES 2010. 12th international workshop, Santa Barbara, USA, August 17–20, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15030-2/pbk). Lecture Notes in Computer Science 6225, 95-109 (2010). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Bauer, Aurélie; Coron, Jean-Sébastien; Naccache, David; Tibouchi, Mehdi; Vergnaud, Damien On the broadcast and validity-checking security of pkcs#1 v1.5 encryption. (English) Zbl 1315.94054 Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13707-5/pbk). Lecture Notes in Computer Science 6123, 1-18 (2010). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Chevallier-Mames, Benoît; Coron, Jean-Sébastien; McCullagh, Noel; Naccache, David; Scott, Michael Secure delegation of elliptic-curve pairing. (English) Zbl 1391.94738 Gollmann, Dieter (ed.) et al., Smart card research and advanced application. 9th IFIP WG 8.8/11.2 international conference, CARDIS 2010, Passau, Germany, April 14–16, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12509-6/pbk). Lecture Notes in Computer Science 6035, 24-35 (2010). MSC: 94A60 14G50 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien; Naccache, David; Tibouchi, Mehdi Fault attacks against EMV signatures. (English) Zbl 1274.94133 Pieprzyk, Josef (ed.), Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11924-8/pbk). Lecture Notes in Computer Science 5985, 208-220 (2010). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien; Dodis, Yevgeniy; Mandal, Avradip; Seurin, Yannick A domain extender for the ideal cipher. (English) Zbl 1274.94054 Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 273-289 (2010). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien; Mandal, Avradip PSS is secure against random fault attacks. (English) Zbl 1267.94116 Matsui, Mitsuru (ed.), Advances in cryptology – ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6–10, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10365-0/pbk). Lecture Notes in Computer Science 5912, 653-666 (2009). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien; Joux, Antoine; Kizhvatov, Ilya; Naccache, David; Paillier, Pascal Fault attacks on RSA signatures with partially unknown messages. (English) Zbl 1290.94057 Clavier, Christophe (ed.) et al., Cryptographic hardware and embedded systems – CHES 2009. 11th international workshop Lausanne, Switzerland, September 6–9, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04137-2/pbk). Lecture Notes in Computer Science 5747, 444-456 (2009). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien; Kizhvatov, Ilya An efficient method for random delay generation in embedded software. (English) Zbl 1290.94058 Clavier, Christophe (ed.) et al., Cryptographic hardware and embedded systems – CHES 2009. 11th international workshop Lausanne, Switzerland, September 6–9, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04137-2/pbk). Lecture Notes in Computer Science 5747, 156-170 (2009). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien; Naccache, David; Tibouchi, Mehdi; Weinmann, Ralf-Philipp Practical cryptanalysis of ISO/IEC 9796-2 and EMV signatures. (English) Zbl 1252.94055 Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 428-444 (2009). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model. (English) Zbl 1237.94058 Des. Codes Cryptography 50, No. 1, 115-133 (2009). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien; Patarin, Jacques; Seurin, Yannick The random oracle model and the ideal cipher model are equivalent. (English) Zbl 1183.94026 Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 1-20 (2008). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien A new DPA countermeasure based on permutation tables. (English) Zbl 1180.68149 Ostrovsky, Rafail (ed.) et al., Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85854-6/pbk). Lecture Notes in Computer Science 5229, 278-292 (2008). MSC: 68P25 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien Finding small roots of bivariate integer polynomial equations: a direct approach. (English) Zbl 1215.11120 Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 379-394 (2007). MSC: 11Y16 68Q25 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien; Prouff, Emmanuel; Rivain, Matthieu Side channel cryptanalysis of a higher order masking scheme. (English) Zbl 1300.94048 Paillier, Pascal (ed.) et al., Cryptographic hardware and embedded systems – CHES 2007. 9th international workshop, Vienna, Austria, September 10–13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74734-5/pbk). Lecture Notes in Computer Science 4727, 28-44 (2007). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien; Naccache, David; Desmedt, Yvo; Odlyzko, Andrew; Stern, Julien P. Index calculation attacks on RSA signature and encryption. (English) Zbl 1142.94338 Des. Codes Cryptography 38, No. 1, 41-53 (2006). MSC: 94A60 11T71 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien; Dodis, Yevgeniy; Malinaud, Cécile; Puniya, Prashant Merkle-Damgård revisited: How to construct a hash function. (English) Zbl 1145.94436 Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 430-448 (2005). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Cathalo, Julien; Coron, Jean-Sébastien; Naccache, David From fixed-length to arbitrary-length RSA encoding schemes revisited. (English) Zbl 1081.94018 Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 234-243 (2005). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem. (English) Zbl 1198.94088 Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 14-27 (2004). MSC: 94A60 94B05 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien; Naccache, David Cryptanalysis of a zero-knowledge identification protocol of Eurocrypt ‘95. (English) Zbl 1196.94047 Okamoto, Tatsuaki (ed.), Topics in cryptology – CT-RSA 2004. The cryptographers’ track at the RSA conference 2004, San Francisco, CA, USA, February 23–27, 2004. Proceedings. Berlin: Springer (ISBN 3-540-20996-4/pbk). Lecture Notes in Computer Science 2964, 157-162 (2004). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien Finding small roots of bivariate integer polynomial equations revisited. (English) Zbl 1122.13302 Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 492-505 (2004). MSC: 13P05 14G50 65H05 68Q05 68Q25 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien; Tchulkine, Alexei A new algorithm for switching from arithmetic to Boolean masking. (English) Zbl 1274.94055 Walter, Colin D. (ed.) et al., Cryptographic hardware and embedded systems – CHES 2003. 5th international workshop, Cologne, Germany, September 8–10, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40833-9/pbk). Lect. Notes Comput. Sci. 2779, 89-97 (2003). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sebastien; Naccache, David Boneh et al.’s \(k\)-element aggregate extraction assumption is equivalent to the Diffie-Hellman assumption. (English) Zbl 1205.94080 Laih, Chi Sung (ed.), Advances in cryptology – ASIACRYPT 2003. 9th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20592-6/pbk). Lect. Notes Comput. Sci. 2894, 392-397 (2003). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Coron, Jean-Sébastien Optimal security proofs for PSS and other signature schemes. (English) Zbl 1055.94025 Knudsen, Lars (ed.), Advances in cryptology - EUROCRYPT 2002. 21st international conference on the theory and applications of cryptographic techniques, Amsterdam, the Netherlands, April 28 – May 2, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43553-0). Lect. Notes Comput. Sci. 2332, 272-287 (2002). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF Full Text: Link
Coron, Jean-Sébastien; Handschuh, Helena; Joye, Marc; Paillier, Pascal; Pointcheval, David; Tymen, Christophe Optimal chosen-ciphertext secure encryption of arbitrary-length messages. (English) Zbl 1056.68542 Naccache, David (ed.) et al., Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12–14, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43168-3). Lect. Notes Comput. Sci. 2274, 17-33 (2002). MSC: 68P25 94A60 68Q25 × Cite Format Result Cite Review PDF Full Text: Link
Coron, Jean-Sébastien; Handschuh, Helena; Joye, Marc; Paillier, Pascal; Pointcheval, David; Tymen, Christophe GEM: a Generic chosen-ciphertext secure Ecryption Method. (English) Zbl 1048.94504 Preneel, Bart (ed.), Topics in cryptology - CT-RSA 2002. The cryptographers’ track at the RSA conference 2002, San José, CA, USA, February 18–22, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43224-8). Lect. Notes Comput. Sci. 2271, 263-276 (2002). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: Link
Coron, Jean-Sébastien Security proof for partial-domain hash signature schemes. (English) Zbl 1028.94508 Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 613-626 (2002). MSC: 94A62 68P25 × Cite Format Result Cite Review PDF Full Text: Link
Coron, Jean-Sébastien; Joye, Marc; Naccache, David; Paillier, Pascal Universal padding schemes for RSA. (English) Zbl 1026.94526 Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 226-241 (2002). MSC: 94A60 94A62 68P25 × Cite Format Result Cite Review PDF Full Text: Link
Coron, Jean-Sébastien; M’Raïhi, David; Tymen, Christophe Fast generation of pairs \((k,[k]P)\) – for Koblitz elliptic curves. (English) Zbl 1067.94525 Vaudenay, Serge (ed.) et al., Selected areas in cryptography. 8th annual international workshop, SAC 2001, Toronto, Ontario, Canada, August 16–17, 2001. Revised papers. Berlin: Springer (ISBN 3-540-43066-0). Lect. Notes Comput. Sci. 2259, 151-164 (2001). MSC: 94A60 94A62 14G50 × Cite Format Result Cite Review PDF Full Text: Link
Brier, Eric; Clavier, Christophe; Coron, Jean-Sébastien; Naccache, David Cryptanalysis of RSA signatures with fixed-pattern padding. (English) Zbl 1003.94523 Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 433-439 (2001). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: Link
Coron, Jean-Sébastien; Kocher, Paul; Naccache, David Statistics and secret leakage. (English) Zbl 0999.94579 Frankel, Yair (ed.), Financial cryptography. 4th international conference, FC 2000, Anguilla, British West Indies, February 20-24, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1962, 157-173 (2001). MSC: 94C12 94A60 62P99 × Cite Format Result Cite Review PDF
Coron, Jean-Sébastien; Joye, Marc; Naccache, David; Paillier, Pascal New attacks on PKCS#1 V1.5 encryption. (English) Zbl 1082.94512 Preneel, Bart (ed.), Advances in cryptology - EUROCRYPT 2000. 19th international conference on the theory and application of cryptographic techniques, Bruges, Belgium, May 14–18, 2000. Proceedings. Berlin: Springer (ISBN 3-540-67517-5). Lect. Notes Comput. Sci. 1807, 369-381 (2000). MSC: 94A60 × Cite Format Result Cite Review PDF
Coron, Jean-Sébastien; Naccache, David Security analysis of the Gennaro-Halevi-Rabin signature scheme. (English) Zbl 1082.94513 Preneel, Bart (ed.), Advances in cryptology - EUROCRYPT 2000. 19th international conference on the theory and application of cryptographic techniques, Bruges, Belgium, May 14–18, 2000. Proceedings. Berlin: Springer (ISBN 3-540-67517-5). Lect. Notes Comput. Sci. 1807, 91-101 (2000). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF
Coron, Jean-Sébastien On the exact security of full domain hash. (English) Zbl 0995.94533 Bellare, Mihir (ed.), Advances in cryptology - CRYPTO 2000. 20th annual international conference, Santa Barbara, CA, USA, August 20-24, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1880, 229-235 (2000). MSC: 94A60 × Cite Format Result Cite Review PDF
Clavier, Christophe; Coron, Jean-Sébastien; Dabbous, Nora Differential power analysis in the presence of hardware countermeasures. (English) Zbl 0998.94539 Koç, Çetin K. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2000. 2nd international workshop, Worcester, MA, USA, August 17-18, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1965, 252-263 (2000). MSC: 94A60 × Cite Format Result Cite Review PDF
Coron, Jean-Sébastien; Goubin, Louis On Boolean and arithmetic masking against differential power analysis. (English) Zbl 0998.94537 Koç, Çetin K. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2000. 2nd international workshop, Worcester, MA, USA, August 17-18, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1965, 231-237 (2000). MSC: 94A60 94C10 × Cite Format Result Cite Review PDF
Coron, Jean-Sébastien; Koeune, Francois; Naccache, David From fixed-length to arbitrary-length RSA padding schemes. (English) Zbl 0966.94020 Okamoto, Tatsuaki (ed.), Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1976, 90-96 (2000). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF