2008 |
62 | | Luca Breveglieri,
Shay Gueron,
Israel Koren,
David Naccache,
Jean-Pierre Seifert:
Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008, FDTC 2008, Washington, DC, USA, 10 August 2008
IEEE Computer Society 2008 |
61 | EE | Éric Levieil,
David Naccache:
Cryptographic Test Correction.
Public Key Cryptography 2008: 85-100 |
60 | EE | Benoît Chevallier-Mames,
David Naccache,
Jacques Stern:
Linear Bandwidth Naccache-Stern Encryption.
SCN 2008: 327-339 |
59 | EE | David Naccache,
Igor Shparlinski:
Divisibility, Smoothness and Cryptographic Applications
CoRR abs/0810.2067: (2008) |
58 | EE | Don Coppersmith,
Jean-Sébastien Coron,
François Grieu,
Shai Halevi,
Charanjit S. Jutla,
David Naccache,
Julien P. Stern:
Cryptanalysis of ISO/IEC 9796-1.
J. Cryptology 21(1): 27-51 (2008) |
2007 |
57 | | Luca Breveglieri,
Shay Gueron,
Israel Koren,
David Naccache,
Jean-Pierre Seifert:
Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007, FDTC 2007: Vienna, Austria, 10 September 2007
IEEE Computer Society 2007 |
56 | EE | Antoine Joux,
David Naccache,
Emmanuel Thomé:
When e-th Roots Become Easier Than Factoring.
ASIACRYPT 2007: 13-28 |
2006 |
55 | | Luca Breveglieri,
Israel Koren,
David Naccache,
Jean-Pierre Seifert:
Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings
Springer 2006 |
54 | EE | Vanessa Gratzer,
David Naccache:
Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry's Crypt.
EUROCRYPT 2006: 48-58 |
53 | EE | Vanessa Gratzer,
David Naccache,
David Znaty:
Law Enforcement, Forensics and Mobile Communications.
PerCom Workshops 2006: 256-260 |
52 | EE | Jean-Sébastien Coron,
David Naccache,
Yvo Desmedt,
Andrew M. Odlyzko,
Julien P. Stern:
Index Calculation Attacks on RSA Signature and Encryption.
Des. Codes Cryptography 38(1): 41-53 (2006) |
2005 |
51 | EE | David Naccache:
National Security, Forensics and Mobile Communications.
ICISC 2005: 1 |
50 | EE | David Naccache,
Phong Q. Nguyen,
Michael Tunstall,
Claire Whelan:
Experimenting with Faults, Lattices and the DSA.
Public Key Cryptography 2005: 16-28 |
49 | EE | Julien Cathalo,
Jean-Sébastien Coron,
David Naccache:
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited.
Public Key Cryptography 2005: 234-243 |
48 | EE | David Naccache:
Secure and {\sl Practical} Identity-Based Encryption
CoRR abs/cs/0510042: (2005) |
47 | EE | Peter Gutmann,
David Naccache,
Charles C. Palmer:
When Hashes Collide.
IEEE Security & Privacy 3(3): 68-71 (2005) |
46 | EE | David Naccache:
Finding Faults.
IEEE Security & Privacy 3(5): 61-65 (2005) |
2004 |
45 | EE | Benoît Chevallier-Mames,
David Naccache,
Pascal Paillier,
David Pointcheval:
How to Disembed a Program?
CHES 2004: 441-454 |
44 | EE | Jean-Sébastien Coron,
David Naccache:
Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95.
CT-RSA 2004: 157-162 |
43 | EE | David Naccache,
Nigel P. Smart,
Jacques Stern:
Projective Coordinates Leak.
EUROCRYPT 2004: 257-267 |
42 | EE | Claude Barral,
Jean-Sébastien Coron,
David Naccache:
Externalized Fingerprint Matching.
ICBA 2004: 309-315 |
41 | EE | Jean-Sébastien Coron,
David Naccache,
Paul C. Kocher:
Statistics and secret leakage.
ACM Trans. Embedded Comput. Syst. 3(3): 492-508 (2004) |
2003 |
40 | EE | Jean-Sébastien Coron,
David Naccache:
Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption.
ASIACRYPT 2003: 392-397 |
39 | EE | Konstantin Hyppönen,
David Naccache,
Elena Trichina,
Alexei Tchoulkine:
Trading-Off Type-Inference Memory Complexity against Communication.
ICICS 2003: 60-71 |
2002 |
38 | | David Naccache,
Pascal Paillier:
Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002, Proceedings
Springer 2002 |
37 | EE | Helena Handschuh,
David Naccache,
Pascal Paillier,
Christophe Tymen:
Provably Secure Chipcard Personalization, or, How to Fool Malicious Insiders.
CARDIS 2002 |
36 | EE | Jean-Sébastien Coron,
Marc Joye,
David Naccache,
Pascal Paillier:
Universal Padding Schemes for RSA.
CRYPTO 2002: 226-241 |
35 | EE | David Naccache,
Alexei Tchoulkine,
Christophe Tymen,
Elena Trichina:
Reducing the Memory Complexity of Type-Inference Algorithms.
ICICS 2002: 109-121 |
34 | EE | Serge Lefranc,
David Naccache:
Cut-&-Paste Attacks with JAVA.
ICISC 2002: 1-15 |
33 | EE | Nils Maltesson,
David Naccache,
Elena Trichina,
Christophe Tymen:
Applet Verification Strategiesfor RAM-Constrained Devices.
ICISC 2002: 118-137 |
2001 |
32 | | David Naccache:
Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings
Springer 2001 |
31 | | Çetin Kaya Koç,
David Naccache,
Christof Paar:
Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings
Springer 2001 |
30 | EE | David Naccache,
David Pointcheval,
Jacques Stern:
Twin signatures: an alternative to the hash-and-sign paradigm.
ACM Conference on Computer and Communications Security 2001: 20-27 |
29 | EE | Eric Brier,
Christophe Clavier,
Jean-Sébastien Coron,
David Naccache:
Cryptanalysis of RSA Signatures with Fixed-Pattern Padding.
CRYPTO 2001: 433-439 |
28 | EE | David Naccache,
David Pointcheval,
Christophe Tymen:
Monotone Signatures.
Financial Cryptography 2001: 295-308 |
2000 |
27 | EE | Jean-Sébastien Coron,
François Koeune,
David Naccache:
From Fixed-Length to Arbitrary-Length RSA Padding Schemes.
ASIACRYPT 2000: 90-96 |
26 | EE | David Naccache,
Michael Tunstall:
How to Explain Side-Channel Leakage to Your Kids.
CHES 2000: 229-230 |
25 | EE | Jean-Sébastien Coron,
Marc Joye,
David Naccache,
Pascal Paillier:
New Attacks on PKCS#1 v1.5 Encryption.
EUROCRYPT 2000: 369-381 |
24 | EE | Jean-Sébastien Coron,
David Naccache:
Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme.
EUROCRYPT 2000: 91-101 |
23 | EE | David Naccache,
Jacques Stern:
Signing on a Postcard.
Financial Cryptography 2000: 121-135 |
22 | EE | Jean-Sébastien Coron,
Paul C. Kocher,
David Naccache:
Statistics and Secret Leakage.
Financial Cryptography 2000: 157-173 |
21 | EE | David M'Raïhi,
David Naccache,
Michael Tunstall:
Asymmetric Currency Rounding.
Financial Cryptography 2000: 192-201 |
1999 |
20 | | Jean-Sébastien Coron,
Helena Handschuh,
David Naccache:
ECC: Do We Need to Count?
ASIACRYPT 1999: 122-134 |
19 | EE | Jean-Sébastien Coron,
David Naccache,
Julien P. Stern:
On the Security of RSA Padding.
CRYPTO 1999: 1-18 |
18 | EE | David Naccache,
Adi Shamir,
Julien P. Stern:
How to Copyright a Function?
Public Key Cryptography 1999: 188-196 |
17 | EE | Jean-Sébastien Coron,
David Naccache:
On the Security of RSA Screening.
Public Key Cryptography 1999: 197-203 |
1998 |
16 | EE | David Naccache,
Jacques Stern:
A New Public Key Cryptosystem Based on Higher Residues.
ACM Conference on Computer and Communications Security 1998: 59-66 |
15 | EE | Gérard D. Cohen,
Antoine Lobstein,
David Naccache,
Gilles Zémor:
How to Improve an Exponentiation Black-Box.
EUROCRYPT 1998: 211-220 |
14 | EE | Jean-Sébastien Coron,
David Naccache:
An Accurate Evaluation of Maurer's Universal Test.
Selected Areas in Cryptography 1998: 57-71 |
13 | EE | David M'Raïhi,
David Naccache,
David Pointcheval,
Serge Vaudenay:
Computational Alternatives to Random Number Generators.
Selected Areas in Cryptography 1998: 72-80 |
1997 |
12 | EE | David Naccache,
Jacques Stern:
A New Public-Key Cryptosystem.
EUROCRYPT 1997: 27-36 |
11 | EE | David M'Raïhi,
David Naccache,
Jacques Stern,
Serge Vaudenay:
XMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications.
FSE 1997: 166-171 |
1996 |
10 | EE | David M'Raïhi,
David Naccache:
Batch Exponentiation: A Fast DLP-Based Signature Generation Strategy.
ACM Conference on Computer and Communications Security 1996: 58-61 |
9 | | David Naccache,
David M'Raïhi:
Arithmetic co-processors for public-key cryptography: The state of the art.
CARDIS 1996 |
8 | EE | Markus Michels,
David Naccache,
Holger Petersen:
GOST 34.10 - A brief overview of Russia's DSA.
Computers & Security 15(8): 725-732 (1996) |
1995 |
7 | EE | David Naccache,
David M'Raïhi,
William Wolfowicz,
Adina di Porto:
Are Crypto-Accelerators Really Inevitable? 20Bit Zero-Knowledge in Less than a Second on Simple 8-bit Microcontrollers
EUROCRYPT 1995: 404-409 |
6 | | David Naccache,
David M'Raïhi,
Dan Raphaeli:
Can Montgomery Parasites Be Avoided? A Design Methodology Based on Key and Cryptosystem Modifications.
Des. Codes Cryptography 5(1): 73-80 (1995) |
1994 |
5 | EE | David Naccache,
David M'Raïhi,
Serge Vaudenay,
Dan Raphaeli:
Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard.
EUROCRYPT 1994: 77-85 |
1993 |
4 | | David Naccache,
David M'Raïhi:
Montgomery-Suitable Cryptosystems.
Algebraic Coding 1993: 75-81 |
3 | EE | David Naccache:
Can O.S.S. be Repaired? Proposal for a New Practical Signature Scheme.
EUROCRYPT 1993: 233-239 |
1992 |
2 | EE | David Naccache:
A Montgomery-Suitable Fiat-Shamir-like Authenication Scheme.
EUROCRYPT 1992: 488-491 |
1 | EE | Sebastiaan H. von Solms,
David Naccache:
On blind signatures and perfect crimes.
Computers & Security 11(6): 581-583 (1992) |