2009 |
41 | EE | Jean-Sébastien Coron:
A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model.
Des. Codes Cryptography 50(1): 115-133 (2009) |
2008 |
40 | EE | Jean-Sébastien Coron,
Christophe Giraud,
Emmanuel Prouff,
Matthieu Rivain:
Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform.
CHES 2008: 1-14 |
39 | EE | Jean-Sébastien Coron,
Jacques Patarin,
Yannick Seurin:
The Random Oracle Model and the Ideal Cipher Model Are Equivalent.
CRYPTO 2008: 1-20 |
38 | EE | Jean-Sébastien Coron:
A New DPA Countermeasure Based on Permutation Tables.
SCN 2008: 278-292 |
37 | EE | Don Coppersmith,
Jean-Sébastien Coron,
François Grieu,
Shai Halevi,
Charanjit S. Jutla,
David Naccache,
Julien P. Stern:
Cryptanalysis of ISO/IEC 9796-1.
J. Cryptology 21(1): 27-51 (2008) |
2007 |
36 | EE | Jean-Sébastien Coron,
Emmanuel Prouff,
Matthieu Rivain:
Side Channel Cryptanalysis of a Higher Order Masking Scheme.
CHES 2007: 28-44 |
35 | EE | Christophe Clavier,
Jean-Sébastien Coron:
On the Implementation of a Fast Prime Generation Algorithm.
CHES 2007: 443-449 |
34 | EE | Jean-Sébastien Coron:
Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach.
CRYPTO 2007: 379-394 |
33 | EE | Jean-Sébastien Coron,
Alexander May:
Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring.
J. Cryptology 20(1): 39-50 (2007) |
2006 |
32 | EE | Jean-Sébastien Coron,
David Naccache,
Yvo Desmedt,
Andrew M. Odlyzko,
Julien P. Stern:
Index Calculation Attacks on RSA Signature and Encryption.
Des. Codes Cryptography 38(1): 41-53 (2006) |
31 | EE | Jean-Sébastien Coron:
What Is Cryptography?
IEEE Security & Privacy 4(1): 70-73 (2006) |
2005 |
30 | EE | Jean-Sébastien Coron,
David Lefranc,
Guillaume Poupard:
A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis.
CHES 2005: 47-60 |
29 | EE | Jean-Sébastien Coron,
Yevgeniy Dodis,
Cécile Malinaud,
Prashant Puniya:
Merkle-Damgård Revisited: How to Construct a Hash Function.
CRYPTO 2005: 430-448 |
28 | EE | Julien Cathalo,
Jean-Sébastien Coron,
David Naccache:
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited.
Public Key Cryptography 2005: 234-243 |
2004 |
27 | EE | Jean-Sébastien Coron,
David Naccache:
Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95.
CT-RSA 2004: 157-162 |
26 | EE | Jean-Sébastien Coron:
Finding Small Roots of Bivariate Integer Polynomial Equations Revisited.
EUROCRYPT 2004: 492-505 |
25 | EE | Claude Barral,
Jean-Sébastien Coron,
David Naccache:
Externalized Fingerprint Matching.
ICBA 2004: 309-315 |
24 | EE | Jean-Sébastien Coron:
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem.
Public Key Cryptography 2004: 14-27 |
23 | EE | Jean-Sébastien Coron,
David Naccache,
Paul C. Kocher:
Statistics and secret leakage.
ACM Trans. Embedded Comput. Syst. 3(3): 492-508 (2004) |
2003 |
22 | EE | Jean-Sébastien Coron,
David Naccache:
Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption.
ASIACRYPT 2003: 392-397 |
21 | EE | Jean-Sébastien Coron,
Alexei Tchulkine:
A New Algorithm for Switching from Arithmetic to Boolean Masking.
CHES 2003: 89-97 |
2002 |
20 | EE | Jean-Sébastien Coron,
Marc Joye,
David Naccache,
Pascal Paillier:
Universal Padding Schemes for RSA.
CRYPTO 2002: 226-241 |
19 | EE | Jean-Sébastien Coron:
Security Proof for Partial-Domain Hash Signature Schemes.
CRYPTO 2002: 613-626 |
18 | EE | Jean-Sébastien Coron,
Helena Handschuh,
Marc Joye,
Pascal Paillier,
David Pointcheval,
Christophe Tymen:
GEM: A Generic Chosen-Ciphertext Secure Encryption Method.
CT-RSA 2002: 263-276 |
17 | EE | Jean-Sébastien Coron:
Optimal Security Proofs for PSS and Other Signature Schemes.
EUROCRYPT 2002: 272-287 |
16 | EE | Jean-Sébastien Coron,
Helena Handschuh,
Marc Joye,
Pascal Paillier,
David Pointcheval,
Christophe Tymen:
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages.
Public Key Cryptography 2002: 17-33 |
2001 |
15 | EE | Eric Brier,
Christophe Clavier,
Jean-Sébastien Coron,
David Naccache:
Cryptanalysis of RSA Signatures with Fixed-Pattern Padding.
CRYPTO 2001: 433-439 |
14 | EE | Jean-Sébastien Coron,
David M'Raïhi,
Christophe Tymen:
Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves.
Selected Areas in Cryptography 2001: 151-164 |
2000 |
13 | EE | Jean-Sébastien Coron,
François Koeune,
David Naccache:
From Fixed-Length to Arbitrary-Length RSA Padding Schemes.
ASIACRYPT 2000: 90-96 |
12 | EE | Jean-Sébastien Coron,
Louis Goubin:
On Boolean and Arithmetic Masking against Differential Power Analysis.
CHES 2000: 231-237 |
11 | EE | Christophe Clavier,
Jean-Sébastien Coron,
Nora Dabbous:
Differential Power Analysis in the Presence of Hardware Countermeasures.
CHES 2000: 252-263 |
10 | EE | Jean-Sébastien Coron:
On the Exact Security of Full Domain Hash.
CRYPTO 2000: 229-235 |
9 | EE | Jean-Sébastien Coron,
Marc Joye,
David Naccache,
Pascal Paillier:
New Attacks on PKCS#1 v1.5 Encryption.
EUROCRYPT 2000: 369-381 |
8 | EE | Jean-Sébastien Coron,
David Naccache:
Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme.
EUROCRYPT 2000: 91-101 |
7 | EE | Jean-Sébastien Coron,
Paul C. Kocher,
David Naccache:
Statistics and Secret Leakage.
Financial Cryptography 2000: 157-173 |
1999 |
6 | | Jean-Sébastien Coron,
Helena Handschuh,
David Naccache:
ECC: Do We Need to Count?
ASIACRYPT 1999: 122-134 |
5 | EE | Jean-Sébastien Coron:
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems.
CHES 1999: 292-302 |
4 | EE | Jean-Sébastien Coron,
David Naccache,
Julien P. Stern:
On the Security of RSA Padding.
CRYPTO 1999: 1-18 |
3 | EE | Jean-Sébastien Coron,
David Naccache:
On the Security of RSA Screening.
Public Key Cryptography 1999: 197-203 |
2 | EE | Jean-Sébastien Coron:
On the Security of Random Sources.
Public Key Cryptography 1999: 29-42 |
1998 |
1 | EE | Jean-Sébastien Coron,
David Naccache:
An Accurate Evaluation of Maurer's Universal Test.
Selected Areas in Cryptography 1998: 57-71 |