| 2008 | 
| 62 |   | Luca Breveglieri,
Shay Gueron,
Israel Koren,
David Naccache,
Jean-Pierre Seifert:
Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008, FDTC 2008, Washington, DC, USA, 10 August 2008
IEEE Computer Society 2008 | 
| 61 | EE | Éric Levieil,
David Naccache:
Cryptographic Test Correction.
Public Key Cryptography 2008: 85-100 | 
| 60 | EE | Benoît Chevallier-Mames,
David Naccache,
Jacques Stern:
Linear Bandwidth Naccache-Stern Encryption.
SCN 2008: 327-339 | 
| 59 | EE | David Naccache,
Igor Shparlinski:
Divisibility, Smoothness and Cryptographic Applications
CoRR abs/0810.2067:  (2008) | 
| 58 | EE | Don Coppersmith,
Jean-Sébastien Coron,
François Grieu,
Shai Halevi,
Charanjit S. Jutla,
David Naccache,
Julien P. Stern:
Cryptanalysis of ISO/IEC 9796-1.
J. Cryptology 21(1): 27-51 (2008) | 
| 2007 | 
| 57 |   | Luca Breveglieri,
Shay Gueron,
Israel Koren,
David Naccache,
Jean-Pierre Seifert:
Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007, FDTC 2007: Vienna, Austria, 10 September 2007
IEEE Computer Society 2007 | 
| 56 | EE | Antoine Joux,
David Naccache,
Emmanuel Thomé:
When e-th Roots Become Easier Than Factoring.
ASIACRYPT 2007: 13-28 | 
| 2006 | 
| 55 |   | Luca Breveglieri,
Israel Koren,
David Naccache,
Jean-Pierre Seifert:
Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings
Springer 2006 | 
| 54 | EE | Vanessa Gratzer,
David Naccache:
Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry's Crypt.
EUROCRYPT 2006: 48-58 | 
| 53 | EE | Vanessa Gratzer,
David Naccache,
David Znaty:
Law Enforcement, Forensics and Mobile Communications.
PerCom Workshops 2006: 256-260 | 
| 52 | EE | Jean-Sébastien Coron,
David Naccache,
Yvo Desmedt,
Andrew M. Odlyzko,
Julien P. Stern:
Index Calculation Attacks on RSA Signature and Encryption.
Des. Codes Cryptography 38(1): 41-53 (2006) | 
| 2005 | 
| 51 | EE | David Naccache:
National Security, Forensics and Mobile Communications.
ICISC 2005: 1 | 
| 50 | EE | David Naccache,
Phong Q. Nguyen,
Michael Tunstall,
Claire Whelan:
Experimenting with Faults, Lattices and the DSA.
Public Key Cryptography 2005: 16-28 | 
| 49 | EE | Julien Cathalo,
Jean-Sébastien Coron,
David Naccache:
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited.
Public Key Cryptography 2005: 234-243 | 
| 48 | EE | David Naccache:
Secure and {\sl Practical} Identity-Based Encryption
CoRR abs/cs/0510042:  (2005) | 
| 47 | EE | Peter Gutmann,
David Naccache,
Charles C. Palmer:
When Hashes Collide.
IEEE Security & Privacy 3(3): 68-71 (2005) | 
| 46 | EE | David Naccache:
Finding Faults.
IEEE Security & Privacy 3(5): 61-65 (2005) | 
| 2004 | 
| 45 | EE | Benoît Chevallier-Mames,
David Naccache,
Pascal Paillier,
David Pointcheval:
How to Disembed a Program?
CHES 2004: 441-454 | 
| 44 | EE | Jean-Sébastien Coron,
David Naccache:
Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95.
CT-RSA 2004: 157-162 | 
| 43 | EE | David Naccache,
Nigel P. Smart,
Jacques Stern:
Projective Coordinates Leak.
EUROCRYPT 2004: 257-267 | 
| 42 | EE | Claude Barral,
Jean-Sébastien Coron,
David Naccache:
Externalized Fingerprint Matching.
ICBA 2004: 309-315 | 
| 41 | EE | Jean-Sébastien Coron,
David Naccache,
Paul C. Kocher:
Statistics and secret leakage.
ACM Trans. Embedded Comput. Syst. 3(3): 492-508 (2004) | 
| 2003 | 
| 40 | EE | Jean-Sébastien Coron,
David Naccache:
Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption.
ASIACRYPT 2003: 392-397 | 
| 39 | EE | Konstantin Hyppönen,
David Naccache,
Elena Trichina,
Alexei Tchoulkine:
Trading-Off Type-Inference Memory Complexity against Communication.
ICICS 2003: 60-71 | 
| 2002 | 
| 38 |   | David Naccache,
Pascal Paillier:
Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002, Proceedings
Springer 2002 | 
| 37 | EE | Helena Handschuh,
David Naccache,
Pascal Paillier,
Christophe Tymen:
Provably Secure Chipcard Personalization, or, How to Fool Malicious Insiders.
CARDIS 2002 | 
| 36 | EE | Jean-Sébastien Coron,
Marc Joye,
David Naccache,
Pascal Paillier:
Universal Padding Schemes for RSA.
CRYPTO 2002: 226-241 | 
| 35 | EE | David Naccache,
Alexei Tchoulkine,
Christophe Tymen,
Elena Trichina:
Reducing the Memory Complexity of Type-Inference Algorithms.
ICICS 2002: 109-121 | 
| 34 | EE | Serge Lefranc,
David Naccache:
Cut-&-Paste Attacks with JAVA.
ICISC 2002: 1-15 | 
| 33 | EE | Nils Maltesson,
David Naccache,
Elena Trichina,
Christophe Tymen:
Applet Verification Strategiesfor RAM-Constrained Devices.
ICISC 2002: 118-137 | 
| 2001 | 
| 32 |   | David Naccache:
Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings
Springer 2001 | 
| 31 |   | Çetin Kaya Koç,
David Naccache,
Christof Paar:
Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings
Springer 2001 | 
| 30 | EE | David Naccache,
David Pointcheval,
Jacques Stern:
Twin signatures: an alternative to the hash-and-sign paradigm.
ACM Conference on Computer and Communications Security 2001: 20-27 | 
| 29 | EE | Eric Brier,
Christophe Clavier,
Jean-Sébastien Coron,
David Naccache:
Cryptanalysis of RSA Signatures with Fixed-Pattern Padding.
CRYPTO 2001: 433-439 | 
| 28 | EE | David Naccache,
David Pointcheval,
Christophe Tymen:
Monotone Signatures.
Financial Cryptography 2001: 295-308 | 
| 2000 | 
| 27 | EE | Jean-Sébastien Coron,
François Koeune,
David Naccache:
From Fixed-Length to Arbitrary-Length RSA Padding Schemes.
ASIACRYPT 2000: 90-96 | 
| 26 | EE | David Naccache,
Michael Tunstall:
How to Explain Side-Channel Leakage to Your Kids.
CHES 2000: 229-230 | 
| 25 | EE | Jean-Sébastien Coron,
Marc Joye,
David Naccache,
Pascal Paillier:
New Attacks on PKCS#1 v1.5 Encryption.
EUROCRYPT 2000: 369-381 | 
| 24 | EE | Jean-Sébastien Coron,
David Naccache:
Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme.
EUROCRYPT 2000: 91-101 | 
| 23 | EE | David Naccache,
Jacques Stern:
Signing on a Postcard.
Financial Cryptography 2000: 121-135 | 
| 22 | EE | Jean-Sébastien Coron,
Paul C. Kocher,
David Naccache:
Statistics and Secret Leakage.
Financial Cryptography 2000: 157-173 | 
| 21 | EE | David M'Raïhi,
David Naccache,
Michael Tunstall:
Asymmetric Currency Rounding.
Financial Cryptography 2000: 192-201 | 
| 1999 | 
| 20 |   | Jean-Sébastien Coron,
Helena Handschuh,
David Naccache:
ECC: Do We Need to Count?
ASIACRYPT 1999: 122-134 | 
| 19 | EE | Jean-Sébastien Coron,
David Naccache,
Julien P. Stern:
On the Security of RSA Padding.
CRYPTO 1999: 1-18 | 
| 18 | EE | David Naccache,
Adi Shamir,
Julien P. Stern:
How to Copyright a Function?
Public Key Cryptography 1999: 188-196 | 
| 17 | EE | Jean-Sébastien Coron,
David Naccache:
On the Security of RSA Screening.
Public Key Cryptography 1999: 197-203 | 
| 1998 | 
| 16 | EE | David Naccache,
Jacques Stern:
A New Public Key Cryptosystem Based on Higher Residues.
ACM Conference on Computer and Communications Security 1998: 59-66 | 
| 15 | EE | Gérard D. Cohen,
Antoine Lobstein,
David Naccache,
Gilles Zémor:
How to Improve an Exponentiation Black-Box.
EUROCRYPT 1998: 211-220 | 
| 14 | EE | Jean-Sébastien Coron,
David Naccache:
An Accurate Evaluation of Maurer's Universal Test.
Selected Areas in Cryptography 1998: 57-71 | 
| 13 | EE | David M'Raïhi,
David Naccache,
David Pointcheval,
Serge Vaudenay:
Computational Alternatives to Random Number Generators.
Selected Areas in Cryptography 1998: 72-80 | 
| 1997 | 
| 12 | EE | David Naccache,
Jacques Stern:
A New Public-Key Cryptosystem.
EUROCRYPT 1997: 27-36 | 
| 11 | EE | David M'Raïhi,
David Naccache,
Jacques Stern,
Serge Vaudenay:
XMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications.
FSE 1997: 166-171 | 
| 1996 | 
| 10 | EE | David M'Raïhi,
David Naccache:
Batch Exponentiation: A Fast DLP-Based Signature Generation Strategy.
ACM Conference on Computer and Communications Security 1996: 58-61 | 
| 9 |   | David Naccache,
David M'Raïhi:
Arithmetic co-processors for public-key cryptography: The state of the art.
CARDIS 1996 | 
| 8 | EE | Markus Michels,
David Naccache,
Holger Petersen:
GOST 34.10 - A brief overview of Russia's DSA.
Computers & Security 15(8): 725-732 (1996) | 
| 1995 | 
| 7 | EE | David Naccache,
David M'Raïhi,
William Wolfowicz,
Adina di Porto:
Are Crypto-Accelerators Really Inevitable? 20Bit Zero-Knowledge in Less than a Second on Simple 8-bit Microcontrollers
EUROCRYPT 1995: 404-409 | 
| 6 |   | David Naccache,
David M'Raïhi,
Dan Raphaeli:
Can Montgomery Parasites Be Avoided? A Design Methodology Based on Key and Cryptosystem Modifications.
Des. Codes Cryptography 5(1): 73-80 (1995) | 
| 1994 | 
| 5 | EE | David Naccache,
David M'Raïhi,
Serge Vaudenay,
Dan Raphaeli:
Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard.
EUROCRYPT 1994: 77-85 | 
| 1993 | 
| 4 |   | David Naccache,
David M'Raïhi:
Montgomery-Suitable Cryptosystems.
Algebraic Coding 1993: 75-81 | 
| 3 | EE | David Naccache:
Can O.S.S. be Repaired? Proposal for a New Practical Signature Scheme.
EUROCRYPT 1993: 233-239 | 
| 1992 | 
| 2 | EE | David Naccache:
A Montgomery-Suitable Fiat-Shamir-like Authenication Scheme.
EUROCRYPT 1992: 488-491 | 
| 1 | EE | Sebastiaan H. von Solms,
David Naccache:
On blind signatures and perfect crimes.
Computers & Security 11(6): 581-583 (1992) |