2008 | ||
---|---|---|
62 | Luca Breveglieri, Shay Gueron, Israel Koren, David Naccache, Jean-Pierre Seifert: Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008, FDTC 2008, Washington, DC, USA, 10 August 2008 IEEE Computer Society 2008 | |
61 | EE | Éric Levieil, David Naccache: Cryptographic Test Correction. Public Key Cryptography 2008: 85-100 |
60 | EE | Benoît Chevallier-Mames, David Naccache, Jacques Stern: Linear Bandwidth Naccache-Stern Encryption. SCN 2008: 327-339 |
59 | EE | David Naccache, Igor Shparlinski: Divisibility, Smoothness and Cryptographic Applications CoRR abs/0810.2067: (2008) |
58 | EE | Don Coppersmith, Jean-Sébastien Coron, François Grieu, Shai Halevi, Charanjit S. Jutla, David Naccache, Julien P. Stern: Cryptanalysis of ISO/IEC 9796-1. J. Cryptology 21(1): 27-51 (2008) |
2007 | ||
57 | Luca Breveglieri, Shay Gueron, Israel Koren, David Naccache, Jean-Pierre Seifert: Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007, FDTC 2007: Vienna, Austria, 10 September 2007 IEEE Computer Society 2007 | |
56 | EE | Antoine Joux, David Naccache, Emmanuel Thomé: When e-th Roots Become Easier Than Factoring. ASIACRYPT 2007: 13-28 |
2006 | ||
55 | Luca Breveglieri, Israel Koren, David Naccache, Jean-Pierre Seifert: Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings Springer 2006 | |
54 | EE | Vanessa Gratzer, David Naccache: Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry's Crypt. EUROCRYPT 2006: 48-58 |
53 | EE | Vanessa Gratzer, David Naccache, David Znaty: Law Enforcement, Forensics and Mobile Communications. PerCom Workshops 2006: 256-260 |
52 | EE | Jean-Sébastien Coron, David Naccache, Yvo Desmedt, Andrew M. Odlyzko, Julien P. Stern: Index Calculation Attacks on RSA Signature and Encryption. Des. Codes Cryptography 38(1): 41-53 (2006) |
2005 | ||
51 | EE | David Naccache: National Security, Forensics and Mobile Communications. ICISC 2005: 1 |
50 | EE | David Naccache, Phong Q. Nguyen, Michael Tunstall, Claire Whelan: Experimenting with Faults, Lattices and the DSA. Public Key Cryptography 2005: 16-28 |
49 | EE | Julien Cathalo, Jean-Sébastien Coron, David Naccache: From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited. Public Key Cryptography 2005: 234-243 |
48 | EE | David Naccache: Secure and {\sl Practical} Identity-Based Encryption CoRR abs/cs/0510042: (2005) |
47 | EE | Peter Gutmann, David Naccache, Charles C. Palmer: When Hashes Collide. IEEE Security & Privacy 3(3): 68-71 (2005) |
46 | EE | David Naccache: Finding Faults. IEEE Security & Privacy 3(5): 61-65 (2005) |
2004 | ||
45 | EE | Benoît Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval: How to Disembed a Program? CHES 2004: 441-454 |
44 | EE | Jean-Sébastien Coron, David Naccache: Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95. CT-RSA 2004: 157-162 |
43 | EE | David Naccache, Nigel P. Smart, Jacques Stern: Projective Coordinates Leak. EUROCRYPT 2004: 257-267 |
42 | EE | Claude Barral, Jean-Sébastien Coron, David Naccache: Externalized Fingerprint Matching. ICBA 2004: 309-315 |
41 | EE | Jean-Sébastien Coron, David Naccache, Paul C. Kocher: Statistics and secret leakage. ACM Trans. Embedded Comput. Syst. 3(3): 492-508 (2004) |
2003 | ||
40 | EE | Jean-Sébastien Coron, David Naccache: Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption. ASIACRYPT 2003: 392-397 |
39 | EE | Konstantin Hyppönen, David Naccache, Elena Trichina, Alexei Tchoulkine: Trading-Off Type-Inference Memory Complexity against Communication. ICICS 2003: 60-71 |
2002 | ||
38 | David Naccache, Pascal Paillier: Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002, Proceedings Springer 2002 | |
37 | EE | Helena Handschuh, David Naccache, Pascal Paillier, Christophe Tymen: Provably Secure Chipcard Personalization, or, How to Fool Malicious Insiders. CARDIS 2002 |
36 | EE | Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier: Universal Padding Schemes for RSA. CRYPTO 2002: 226-241 |
35 | EE | David Naccache, Alexei Tchoulkine, Christophe Tymen, Elena Trichina: Reducing the Memory Complexity of Type-Inference Algorithms. ICICS 2002: 109-121 |
34 | EE | Serge Lefranc, David Naccache: Cut-&-Paste Attacks with JAVA. ICISC 2002: 1-15 |
33 | EE | Nils Maltesson, David Naccache, Elena Trichina, Christophe Tymen: Applet Verification Strategiesfor RAM-Constrained Devices. ICISC 2002: 118-137 |
2001 | ||
32 | David Naccache: Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings Springer 2001 | |
31 | Çetin Kaya Koç, David Naccache, Christof Paar: Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings Springer 2001 | |
30 | EE | David Naccache, David Pointcheval, Jacques Stern: Twin signatures: an alternative to the hash-and-sign paradigm. ACM Conference on Computer and Communications Security 2001: 20-27 |
29 | EE | Eric Brier, Christophe Clavier, Jean-Sébastien Coron, David Naccache: Cryptanalysis of RSA Signatures with Fixed-Pattern Padding. CRYPTO 2001: 433-439 |
28 | EE | David Naccache, David Pointcheval, Christophe Tymen: Monotone Signatures. Financial Cryptography 2001: 295-308 |
2000 | ||
27 | EE | Jean-Sébastien Coron, François Koeune, David Naccache: From Fixed-Length to Arbitrary-Length RSA Padding Schemes. ASIACRYPT 2000: 90-96 |
26 | EE | David Naccache, Michael Tunstall: How to Explain Side-Channel Leakage to Your Kids. CHES 2000: 229-230 |
25 | EE | Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier: New Attacks on PKCS#1 v1.5 Encryption. EUROCRYPT 2000: 369-381 |
24 | EE | Jean-Sébastien Coron, David Naccache: Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme. EUROCRYPT 2000: 91-101 |
23 | EE | David Naccache, Jacques Stern: Signing on a Postcard. Financial Cryptography 2000: 121-135 |
22 | EE | Jean-Sébastien Coron, Paul C. Kocher, David Naccache: Statistics and Secret Leakage. Financial Cryptography 2000: 157-173 |
21 | EE | David M'Raïhi, David Naccache, Michael Tunstall: Asymmetric Currency Rounding. Financial Cryptography 2000: 192-201 |
1999 | ||
20 | Jean-Sébastien Coron, Helena Handschuh, David Naccache: ECC: Do We Need to Count? ASIACRYPT 1999: 122-134 | |
19 | EE | Jean-Sébastien Coron, David Naccache, Julien P. Stern: On the Security of RSA Padding. CRYPTO 1999: 1-18 |
18 | EE | David Naccache, Adi Shamir, Julien P. Stern: How to Copyright a Function? Public Key Cryptography 1999: 188-196 |
17 | EE | Jean-Sébastien Coron, David Naccache: On the Security of RSA Screening. Public Key Cryptography 1999: 197-203 |
1998 | ||
16 | EE | David Naccache, Jacques Stern: A New Public Key Cryptosystem Based on Higher Residues. ACM Conference on Computer and Communications Security 1998: 59-66 |
15 | EE | Gérard D. Cohen, Antoine Lobstein, David Naccache, Gilles Zémor: How to Improve an Exponentiation Black-Box. EUROCRYPT 1998: 211-220 |
14 | EE | Jean-Sébastien Coron, David Naccache: An Accurate Evaluation of Maurer's Universal Test. Selected Areas in Cryptography 1998: 57-71 |
13 | EE | David M'Raïhi, David Naccache, David Pointcheval, Serge Vaudenay: Computational Alternatives to Random Number Generators. Selected Areas in Cryptography 1998: 72-80 |
1997 | ||
12 | EE | David Naccache, Jacques Stern: A New Public-Key Cryptosystem. EUROCRYPT 1997: 27-36 |
11 | EE | David M'Raïhi, David Naccache, Jacques Stern, Serge Vaudenay: XMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications. FSE 1997: 166-171 |
1996 | ||
10 | EE | David M'Raïhi, David Naccache: Batch Exponentiation: A Fast DLP-Based Signature Generation Strategy. ACM Conference on Computer and Communications Security 1996: 58-61 |
9 | David Naccache, David M'Raïhi: Arithmetic co-processors for public-key cryptography: The state of the art. CARDIS 1996 | |
8 | EE | Markus Michels, David Naccache, Holger Petersen: GOST 34.10 - A brief overview of Russia's DSA. Computers & Security 15(8): 725-732 (1996) |
1995 | ||
7 | EE | David Naccache, David M'Raïhi, William Wolfowicz, Adina di Porto: Are Crypto-Accelerators Really Inevitable? 20Bit Zero-Knowledge in Less than a Second on Simple 8-bit Microcontrollers EUROCRYPT 1995: 404-409 |
6 | David Naccache, David M'Raïhi, Dan Raphaeli: Can Montgomery Parasites Be Avoided? A Design Methodology Based on Key and Cryptosystem Modifications. Des. Codes Cryptography 5(1): 73-80 (1995) | |
1994 | ||
5 | EE | David Naccache, David M'Raïhi, Serge Vaudenay, Dan Raphaeli: Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard. EUROCRYPT 1994: 77-85 |
1993 | ||
4 | David Naccache, David M'Raïhi: Montgomery-Suitable Cryptosystems. Algebraic Coding 1993: 75-81 | |
3 | EE | David Naccache: Can O.S.S. be Repaired? Proposal for a New Practical Signature Scheme. EUROCRYPT 1993: 233-239 |
1992 | ||
2 | EE | David Naccache: A Montgomery-Suitable Fiat-Shamir-like Authenication Scheme. EUROCRYPT 1992: 488-491 |
1 | EE | Sebastiaan H. von Solms, David Naccache: On blind signatures and perfect crimes. Computers & Security 11(6): 581-583 (1992) |