dblp.uni-trier.dewww.uni-trier.de

David Naccache

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
62 Luca Breveglieri, Shay Gueron, Israel Koren, David Naccache, Jean-Pierre Seifert: Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008, FDTC 2008, Washington, DC, USA, 10 August 2008 IEEE Computer Society 2008
61EEÉric Levieil, David Naccache: Cryptographic Test Correction. Public Key Cryptography 2008: 85-100
60EEBenoît Chevallier-Mames, David Naccache, Jacques Stern: Linear Bandwidth Naccache-Stern Encryption. SCN 2008: 327-339
59EEDavid Naccache, Igor Shparlinski: Divisibility, Smoothness and Cryptographic Applications CoRR abs/0810.2067: (2008)
58EEDon Coppersmith, Jean-Sébastien Coron, François Grieu, Shai Halevi, Charanjit S. Jutla, David Naccache, Julien P. Stern: Cryptanalysis of ISO/IEC 9796-1. J. Cryptology 21(1): 27-51 (2008)
2007
57 Luca Breveglieri, Shay Gueron, Israel Koren, David Naccache, Jean-Pierre Seifert: Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007, FDTC 2007: Vienna, Austria, 10 September 2007 IEEE Computer Society 2007
56EEAntoine Joux, David Naccache, Emmanuel Thomé: When e-th Roots Become Easier Than Factoring. ASIACRYPT 2007: 13-28
2006
55 Luca Breveglieri, Israel Koren, David Naccache, Jean-Pierre Seifert: Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings Springer 2006
54EEVanessa Gratzer, David Naccache: Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry's Crypt. EUROCRYPT 2006: 48-58
53EEVanessa Gratzer, David Naccache, David Znaty: Law Enforcement, Forensics and Mobile Communications. PerCom Workshops 2006: 256-260
52EEJean-Sébastien Coron, David Naccache, Yvo Desmedt, Andrew M. Odlyzko, Julien P. Stern: Index Calculation Attacks on RSA Signature and Encryption. Des. Codes Cryptography 38(1): 41-53 (2006)
2005
51EEDavid Naccache: National Security, Forensics and Mobile Communications. ICISC 2005: 1
50EEDavid Naccache, Phong Q. Nguyen, Michael Tunstall, Claire Whelan: Experimenting with Faults, Lattices and the DSA. Public Key Cryptography 2005: 16-28
49EEJulien Cathalo, Jean-Sébastien Coron, David Naccache: From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited. Public Key Cryptography 2005: 234-243
48EEDavid Naccache: Secure and {\sl Practical} Identity-Based Encryption CoRR abs/cs/0510042: (2005)
47EEPeter Gutmann, David Naccache, Charles C. Palmer: When Hashes Collide. IEEE Security & Privacy 3(3): 68-71 (2005)
46EEDavid Naccache: Finding Faults. IEEE Security & Privacy 3(5): 61-65 (2005)
2004
45EEBenoît Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval: How to Disembed a Program? CHES 2004: 441-454
44EEJean-Sébastien Coron, David Naccache: Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95. CT-RSA 2004: 157-162
43EEDavid Naccache, Nigel P. Smart, Jacques Stern: Projective Coordinates Leak. EUROCRYPT 2004: 257-267
42EEClaude Barral, Jean-Sébastien Coron, David Naccache: Externalized Fingerprint Matching. ICBA 2004: 309-315
41EEJean-Sébastien Coron, David Naccache, Paul C. Kocher: Statistics and secret leakage. ACM Trans. Embedded Comput. Syst. 3(3): 492-508 (2004)
2003
40EEJean-Sébastien Coron, David Naccache: Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption. ASIACRYPT 2003: 392-397
39EEKonstantin Hyppönen, David Naccache, Elena Trichina, Alexei Tchoulkine: Trading-Off Type-Inference Memory Complexity against Communication. ICICS 2003: 60-71
2002
38 David Naccache, Pascal Paillier: Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002, Proceedings Springer 2002
37EEHelena Handschuh, David Naccache, Pascal Paillier, Christophe Tymen: Provably Secure Chipcard Personalization, or, How to Fool Malicious Insiders. CARDIS 2002
36EEJean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier: Universal Padding Schemes for RSA. CRYPTO 2002: 226-241
35EEDavid Naccache, Alexei Tchoulkine, Christophe Tymen, Elena Trichina: Reducing the Memory Complexity of Type-Inference Algorithms. ICICS 2002: 109-121
34EESerge Lefranc, David Naccache: Cut-&-Paste Attacks with JAVA. ICISC 2002: 1-15
33EENils Maltesson, David Naccache, Elena Trichina, Christophe Tymen: Applet Verification Strategiesfor RAM-Constrained Devices. ICISC 2002: 118-137
2001
32 David Naccache: Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings Springer 2001
31 Çetin Kaya Koç, David Naccache, Christof Paar: Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings Springer 2001
30EEDavid Naccache, David Pointcheval, Jacques Stern: Twin signatures: an alternative to the hash-and-sign paradigm. ACM Conference on Computer and Communications Security 2001: 20-27
29EEEric Brier, Christophe Clavier, Jean-Sébastien Coron, David Naccache: Cryptanalysis of RSA Signatures with Fixed-Pattern Padding. CRYPTO 2001: 433-439
28EEDavid Naccache, David Pointcheval, Christophe Tymen: Monotone Signatures. Financial Cryptography 2001: 295-308
2000
27EEJean-Sébastien Coron, François Koeune, David Naccache: From Fixed-Length to Arbitrary-Length RSA Padding Schemes. ASIACRYPT 2000: 90-96
26EEDavid Naccache, Michael Tunstall: How to Explain Side-Channel Leakage to Your Kids. CHES 2000: 229-230
25EEJean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier: New Attacks on PKCS#1 v1.5 Encryption. EUROCRYPT 2000: 369-381
24EEJean-Sébastien Coron, David Naccache: Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme. EUROCRYPT 2000: 91-101
23EEDavid Naccache, Jacques Stern: Signing on a Postcard. Financial Cryptography 2000: 121-135
22EEJean-Sébastien Coron, Paul C. Kocher, David Naccache: Statistics and Secret Leakage. Financial Cryptography 2000: 157-173
21EEDavid M'Raïhi, David Naccache, Michael Tunstall: Asymmetric Currency Rounding. Financial Cryptography 2000: 192-201
1999
20 Jean-Sébastien Coron, Helena Handschuh, David Naccache: ECC: Do We Need to Count? ASIACRYPT 1999: 122-134
19EEJean-Sébastien Coron, David Naccache, Julien P. Stern: On the Security of RSA Padding. CRYPTO 1999: 1-18
18EEDavid Naccache, Adi Shamir, Julien P. Stern: How to Copyright a Function? Public Key Cryptography 1999: 188-196
17EEJean-Sébastien Coron, David Naccache: On the Security of RSA Screening. Public Key Cryptography 1999: 197-203
1998
16EEDavid Naccache, Jacques Stern: A New Public Key Cryptosystem Based on Higher Residues. ACM Conference on Computer and Communications Security 1998: 59-66
15EEGérard D. Cohen, Antoine Lobstein, David Naccache, Gilles Zémor: How to Improve an Exponentiation Black-Box. EUROCRYPT 1998: 211-220
14EEJean-Sébastien Coron, David Naccache: An Accurate Evaluation of Maurer's Universal Test. Selected Areas in Cryptography 1998: 57-71
13EEDavid M'Raïhi, David Naccache, David Pointcheval, Serge Vaudenay: Computational Alternatives to Random Number Generators. Selected Areas in Cryptography 1998: 72-80
1997
12EEDavid Naccache, Jacques Stern: A New Public-Key Cryptosystem. EUROCRYPT 1997: 27-36
11EEDavid M'Raïhi, David Naccache, Jacques Stern, Serge Vaudenay: XMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications. FSE 1997: 166-171
1996
10EEDavid M'Raïhi, David Naccache: Batch Exponentiation: A Fast DLP-Based Signature Generation Strategy. ACM Conference on Computer and Communications Security 1996: 58-61
9 David Naccache, David M'Raïhi: Arithmetic co-processors for public-key cryptography: The state of the art. CARDIS 1996
8EEMarkus Michels, David Naccache, Holger Petersen: GOST 34.10 - A brief overview of Russia's DSA. Computers & Security 15(8): 725-732 (1996)
1995
7EEDavid Naccache, David M'Raïhi, William Wolfowicz, Adina di Porto: Are Crypto-Accelerators Really Inevitable? 20Bit Zero-Knowledge in Less than a Second on Simple 8-bit Microcontrollers EUROCRYPT 1995: 404-409
6 David Naccache, David M'Raïhi, Dan Raphaeli: Can Montgomery Parasites Be Avoided? A Design Methodology Based on Key and Cryptosystem Modifications. Des. Codes Cryptography 5(1): 73-80 (1995)
1994
5EEDavid Naccache, David M'Raïhi, Serge Vaudenay, Dan Raphaeli: Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard. EUROCRYPT 1994: 77-85
1993
4 David Naccache, David M'Raïhi: Montgomery-Suitable Cryptosystems. Algebraic Coding 1993: 75-81
3EEDavid Naccache: Can O.S.S. be Repaired? Proposal for a New Practical Signature Scheme. EUROCRYPT 1993: 233-239
1992
2EEDavid Naccache: A Montgomery-Suitable Fiat-Shamir-like Authenication Scheme. EUROCRYPT 1992: 488-491
1EESebastiaan H. von Solms, David Naccache: On blind signatures and perfect crimes. Computers & Security 11(6): 581-583 (1992)

Coauthor Index

1Claude Barral [42]
2Luca Breveglieri [55] [57] [62]
3Eric Brier [29]
4Julien Cathalo [49]
5Benoît Chevallier-Mames [45] [60]
6Christophe Clavier [29]
7Gérard D. Cohen [15]
8Don Coppersmith [58]
9Jean-Sébastien Coron [14] [17] [19] [20] [22] [24] [25] [27] [29] [36] [40] [41] [42] [44] [49] [52] [58]
10Yvo Desmedt [52]
11Vanessa Gratzer [53] [54]
12François Grieu [58]
13Shay Gueron [57] [62]
14Peter Gutmann [47]
15Shai Halevi [58]
16Helena Handschuh [20] [37]
17Konstantin Hyppönen [39]
18Antoine Joux [56]
19Marc Joye [25] [36]
20Charanjit S. Jutla [58]
21Çetin Kaya Koç [31]
22Paul C. Kocher [22] [41]
23François Koeune [27]
24Israel Koren [55] [57] [62]
25Serge Lefranc [34]
26Éric Levieil [61]
27Antoine Lobstein [15]
28David M'Raïhi [4] [5] [6] [7] [9] [10] [11] [13] [21]
29Nils Maltesson [33]
30Markus Michels [8]
31Phong Q. Nguyen [50]
32Andrew M. Odlyzko [52]
33Christof Paar [31]
34Pascal Paillier [25] [36] [37] [38] [45]
35Charles C. Palmer [47]
36Holger Petersen [8]
37David Pointcheval [13] [28] [30] [45]
38Adina di Porto [7]
39Dan Raphaeli [5] [6]
40Jean-Pierre Seifert [55] [57] [62]
41Adi Shamir [18]
42Igor Shparlinski [59]
43Nigel P. Smart [43]
44Sebastiaan H. von Solms (Basie von Solms) [1]
45Jacques Stern [11] [12] [16] [23] [30] [43] [60]
46Julien P. Stern [18] [19] [52] [58]
47Alexei Tchoulkine [35] [39]
48Emmanuel Thomé [56]
49Elena Trichina [33] [35] [39]
50Michael Tunstall [21] [26] [50]
51Christophe Tymen [28] [33] [35] [37]
52Serge Vaudenay [5] [11] [13]
53Claire Whelan [50]
54William Wolfowicz [7]
55Gilles Zémor [15]
56David Znaty [53]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)