2008 |
98 | EE | Pierre-Alain Fouque,
Gilles Macario-Rat,
Jacques Stern:
Key Recovery on Hidden Monomial Multivariate Schemes.
EUROCRYPT 2008: 19-30 |
97 | EE | Pierre-Alain Fouque,
Gilles Macario-Rat,
Ludovic Perret,
Jacques Stern:
Total Break of the l-IC Signature Scheme.
Public Key Cryptography 2008: 1-17 |
96 | EE | Benoît Chevallier-Mames,
David Naccache,
Jacques Stern:
Linear Bandwidth Naccache-Stern Encryption.
SCN 2008: 327-339 |
2007 |
95 | EE | Vivien Dubois,
Pierre-Alain Fouque,
Adi Shamir,
Jacques Stern:
Practical Cryptanalysis of SFLASH.
CRYPTO 2007: 1-12 |
94 | EE | Vivien Dubois,
Pierre-Alain Fouque,
Jacques Stern:
Cryptanalysis of SFLASH with Slightly Modified Parameters.
EUROCRYPT 2007: 264-275 |
93 | EE | Vivien Dubois,
Pierre-Alain Fouque,
Adi Shamir,
Jacques Stern:
Cryptanalysis of the SFLASH Signature Scheme.
Inscrypt 2007: 1-4 |
92 | EE | Vivien Dubois,
Louis Granboulan,
Jacques Stern:
Cryptanalysis of HFE with Internal Perturbation.
Public Key Cryptography 2007: 249-265 |
91 | EE | Thomas Baignères,
Jacques Stern,
Serge Vaudenay:
Linear Cryptanalysis of Non Binary Ciphers.
Selected Areas in Cryptography 2007: 184-211 |
2006 |
90 | EE | Louis Granboulan,
Antoine Joux,
Jacques Stern:
Inverting HFE Is Quasipolynomial.
CRYPTO 2006: 345-356 |
89 | EE | Vivien Dubois,
Louis Granboulan,
Jacques Stern:
An Efficient Provable Distinguisher for HFE.
ICALP (2) 2006: 156-167 |
88 | EE | Pierre-Alain Fouque,
David Pointcheval,
Jacques Stern,
Sébastien Zimmer:
Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes.
ICALP (2) 2006: 240-251 |
87 | EE | Sébastien Kunz-Jacques,
Gwenaëlle Martinet,
Guillaume Poupard,
Jacques Stern:
Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm.
Public Key Cryptography 2006: 27-43 |
86 | EE | Marc Girault,
Guillaume Poupard,
Jacques Stern:
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order.
J. Cryptology 19(4): 463-487 (2006) |
2005 |
85 | EE | Phong Q. Nguyen,
Jacques Stern:
Adapting Density Attacks to Low-Weight Knapsacks.
ASIACRYPT 2005: 41-58 |
84 | EE | Pierre-Alain Fouque,
Louis Granboulan,
Jacques Stern:
Differential Cryptanalysis for Multivariate Schemes.
EUROCRYPT 2005: 341-353 |
2004 |
83 | EE | David Naccache,
Nigel P. Smart,
Jacques Stern:
Projective Coordinates Leak.
EUROCRYPT 2004: 257-267 |
82 | EE | Jacques Stern:
Cryptography and the French Banking Cards: Past, Present, Future.
Financial Cryptography 2004: 68-69 |
81 | EE | Eiichiro Fujisaki,
Tatsuaki Okamoto,
David Pointcheval,
Jacques Stern:
RSA-OAEP Is Secure under the RSA Assumption.
J. Cryptology 17(2): 81-104 (2004) |
2003 |
80 | EE | Jacques Stern:
Cryptography and the Methodology of Provable Security.
AAECC 2003: 1-5 |
79 | EE | Tatsuaki Okamoto,
Jacques Stern:
Almost Uniform Density of Power Residues and the Provable Security of ESIGN.
ASIACRYPT 2003: 287-301 |
78 | EE | Jacques Stern:
Why Provable Security Matters?
EUROCRYPT 2003: 449-461 |
77 | EE | Antoine Joux,
Guillaume Poupard,
Jacques Stern:
New Attacks against Standardized MACs.
FSE 2003: 170-181 |
76 | EE | Jacques Stern,
Julien P. Stern:
Cryptanalysis of the OTM Signature Scheme from FC'02.
Financial Cryptography 2003: 138-148 |
2002 |
75 | EE | Dario Catalano,
Phong Q. Nguyen,
Jacques Stern:
The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm.
ASIACRYPT 2002: 299-310 |
74 | EE | Emmanuel Bresson,
Jacques Stern,
Michael Szydlo:
Threshold Ring Signatures and Applications to Ad-hoc Groups.
CRYPTO 2002: 465-480 |
73 | EE | Jacques Stern,
David Pointcheval,
John Malone-Lee,
Nigel P. Smart:
Flaws in Applying Proof Methodologies to Signature Schemes.
CRYPTO 2002: 93-110 |
72 | EE | Pierre-Alain Fouque,
Jacques Stern,
Jan-Geert Wackers:
CryptoComputing with Rationals.
Financial Cryptography 2002: 136-146 |
71 | EE | Emmanuel Bresson,
Jacques Stern:
Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications.
ISC 2002: 272-288 |
2001 |
70 | EE | David Naccache,
David Pointcheval,
Jacques Stern:
Twin signatures: an alternative to the hash-and-sign paradigm.
ACM Conference on Computer and Communications Security 2001: 20-27 |
69 | EE | Craig Gentry,
Jakob Jonsson,
Jacques Stern,
Michael Szydlo:
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001.
ASIACRYPT 2001: 1-20 |
68 | EE | Pierre-Alain Fouque,
Jacques Stern:
Fully Distributed Threshold RSA under Standard Assumptions.
ASIACRYPT 2001: 310-330 |
67 | EE | Eiichiro Fujisaki,
Tatsuaki Okamoto,
David Pointcheval,
Jacques Stern:
RSA-OAEP Is Secure under the RSA Assumption.
CRYPTO 2001: 260-274 |
66 | EE | Phong Q. Nguyen,
Jacques Stern:
The Two Faces of Lattices in Cryptology.
CaLC 2001: 146-180 |
65 | EE | Olivier Baudron,
Jacques Stern:
Non-interactive Private Auctions.
Financial Cryptography 2001: 354- |
64 | EE | Olivier Baudron,
Pierre-Alain Fouque,
David Pointcheval,
Jacques Stern,
Guillaume Poupard:
Practical multi-candidate election system.
PODC 2001: 274-283 |
63 | EE | Emmanuel Bresson,
Jacques Stern:
Efficient Revocation in Group Signatures.
Public Key Cryptography 2001: 190-206 |
62 | EE | Pierre-Alain Fouque,
Jacques Stern:
One Round Threshold Discrete-Log Key Generation without Private Channels.
Public Key Cryptography 2001: 300-316 |
2000 |
61 | | Phong Q. Nguyen,
Jacques Stern:
Lattice Reduction in Cryptology: An Update.
ANTS 2000: 85-112 |
60 | EE | Thomas Pornin,
Jacques Stern:
Software-Hardware Trade-Offs: Application to A5/1 Cryptanalysis.
CHES 2000: 318-327 |
59 | EE | Guillaume Poupard,
Jacques Stern:
Fair Encryption of RSA Keys.
EUROCRYPT 2000: 172-189 |
58 | EE | David Naccache,
Jacques Stern:
Signing on a Postcard.
Financial Cryptography 2000: 121-135 |
57 | EE | Pierre-Alain Fouque,
Guillaume Poupard,
Jacques Stern:
Sharing Decryption in the Context of Voting or Lotteries.
Financial Cryptography 2000: 90-104 |
56 | EE | Olivier Baudron,
David Pointcheval,
Jacques Stern:
Extended Notions of Security for Multicast Public Key Cryptosystems.
ICALP 2000: 499-511 |
55 | | Guillaume Poupard,
Jacques Stern:
Short Proofs of Knowledge for Factoring.
Public Key Cryptography 2000: 147-166 |
54 | EE | David Pointcheval,
Jacques Stern:
Security Arguments for Digital Signatures and Blind Signatures.
J. Cryptology 13(3): 361-396 (2000) |
1999 |
53 | | Jacques Stern:
Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding
Springer 1999 |
52 | EE | Guillaume Poupard,
Jacques Stern:
On the Fly Signatures Based on Factoring.
ACM Conference on Computer and Communications Security 1999: 37-45 |
51 | EE | Helena Handschuh,
Pascal Paillier,
Jacques Stern:
Probing Attacks on Tamper-Resistant Devices.
CHES 1999: 303-315 |
50 | EE | Phong Q. Nguyen,
Jacques Stern:
The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications.
CRYPTO 1999: 31-46 |
49 | EE | Christophe Coupé,
Phong Q. Nguyen,
Jacques Stern:
The Effectiveness of Lattice Attacks Against Low-Exponent RSA.
Public Key Cryptography 1999: 204-218 |
1998 |
48 | EE | David Naccache,
Jacques Stern:
A New Public Key Cryptosystem Based on Higher Residues.
ACM Conference on Computer and Communications Security 1998: 59-66 |
47 | EE | Guillaume Poupard,
Jacques Stern:
Generation of Shared RSA Keys by Two Parties.
ASIACRYPT 1998: 11-24 |
46 | EE | Phong Q. Nguyen,
Jacques Stern:
The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure.
ASIACRYPT 1998: 372-379 |
45 | EE | Phong Q. Nguyen,
Jacques Stern:
Cryptanalysis of the Ajtai-Dwork Cryptosystem.
CRYPTO 1998: 223-242 |
44 | EE | Guillaume Poupard,
Jacques Stern:
Security Analysis of a Practical "on the fly" Authentication and Signature Generation.
EUROCRYPT 1998: 422-436 |
43 | EE | Jacques Stern,
Serge Vaudenay:
CS-Cipher.
FSE 1998: 189-205 |
42 | EE | Jacques Stern:
Lattices and Cryptography: An Overview.
Public Key Cryptography 1998: 50-54 |
41 | EE | Phong Q. Nguyen,
Jacques Stern:
Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC '97.
Selected Areas in Cryptography 1998: 213-218 |
40 | EE | Phong Q. Nguyen,
Jacques Stern:
A Converse to the Ajtai-Dwork Security Proof and its Cryptographic Implications
Electronic Colloquium on Computational Complexity (ECCC) 5(10): (1998) |
39 | EE | Antoine Joux,
Jacques Stern:
Lattice Reduction: A Toolbox for the Cryptanalyst.
J. Cryptology 11(3): 161-185 (1998) |
38 | | Joel Friedman,
Antoine Joux,
Yuval Roichman,
Jacques Stern,
Jean-Pierre Tillich:
The action of a few permutations on r-tuples is quickly transitive.
Random Struct. Algorithms 12(4): 335-350 (1998) |
1997 |
37 | EE | David Pointcheval,
Jacques Stern:
New Blind Signatures Equivalent to Factorization (extended abstract).
ACM Conference on Computer and Communications Security 1997: 92-99 |
36 | EE | Phong Q. Nguyen,
Jacques Stern:
Merkle-Hellman Revisited: A Cryptoanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizations.
CRYPTO 1997: 198-212 |
35 | EE | David Naccache,
Jacques Stern:
A New Public-Key Cryptosystem.
EUROCRYPT 1997: 27-36 |
34 | EE | David M'Raïhi,
David Naccache,
Jacques Stern,
Serge Vaudenay:
XMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications.
FSE 1997: 166-171 |
33 | | Jacques Stern,
Serge Vaudenay:
SVP: A Flexible Micropayment Scheme.
Financial Cryptography 1997: 161-172 |
32 | | Sanjeev Arora,
László Babai,
Jacques Stern,
Z. Sweedyk:
The Hardness of Approximate Optima in Lattices, Codes, and Systems of Linear Equations.
J. Comput. Syst. Sci. 54(2): 317-331 (1997) |
31 | | Don Coppersmith,
Jacques Stern,
Serge Vaudenay:
The Security of the Birational Permutation Signature Schemes.
J. Cryptology 10(3): 207-221 (1997) |
1996 |
30 | | David Pointcheval,
Jacques Stern:
Provably Secure Blind Signature Schemes.
ASIACRYPT 1996: 252-265 |
29 | | Jacques Stern:
The Validation of Cryptographic Algorithms.
ASIACRYPT 1996: 301-310 |
28 | | Florent Chabaud,
Jacques Stern:
The Cryptographic Security of the Syndrome Decoding Problem for Rank Distance Codes.
ASIACRYPT 1996: 368-381 |
27 | EE | Jean-Bernard Fischer,
Jacques Stern:
An Efficient Pseudo-Random Generator Provably as Secure as Syndrome Decoding.
EUROCRYPT 1996: 245-255 |
26 | EE | David Pointcheval,
Jacques Stern:
Security Proofs for Signature Schemes.
EUROCRYPT 1996: 387-398 |
25 | | Joel Friedman,
Antoine Joux,
Yuval Roichman,
Jacques Stern,
Jean-Pierre Tillich:
The Action of a Few Random Permutations on r-Tuples and an Application to Cryptography.
STACS 1996: 375-386 |
1995 |
24 | | Simon R. Blackburn,
Sean Murphy,
Jacques Stern:
The Cryptanalysis of a Public-Key Implementation of Finite Group Mappings.
J. Cryptology 8(3): 157-166 (1995) |
1994 |
23 | | Jacques Stern:
Can One Design a Signature Scheme Based on Error-Correctin Codes?
ASIACRYPT 1994: 424-426 |
22 | EE | Jacques Stern:
Designing Identification Schemes with Keys of Short Size.
CRYPTO 1994: 164-173 |
21 | EE | Marc Girault,
Jacques Stern:
On the Length of Cryptographic Hash-Values Used in Identification Schemes.
CRYPTO 1994: 202-215 |
20 | | Gilles Lachaud,
Jacques Stern:
Polynomial-time construction of codes II. Spherical codes and the kissing number of spheres.
IEEE Transactions on Information Theory 40(4): 1140-1146 (1994) |
1993 |
19 | | Jacques Stern:
Approximating the Number of Error Locations within a Constant Ratio is NP-complete.
AAECC 1993: 325-331 |
18 | EE | Jacques Stern:
A New Identification Scheme Based on Syndrome Decoding.
CRYPTO 1993: 13-21 |
17 | EE | Don Coppersmith,
Jacques Stern,
Serge Vaudenay:
Attacks on the Birational Permutation Signature Schemes.
CRYPTO 1993: 435-443 |
16 | EE | Simon R. Blackburn,
Sean Murphy,
Jacques Stern:
Weakness of a Public-Key Cryptosystem Based on Factorizations of Finite Groups.
EUROCRYPT 1993: 50-54 |
15 | | Sanjeev Arora,
László Babai,
Jacques Stern,
Z. Sweedyk:
The Hardness of Approximate Optimia in Lattices, Codes, and Systems of Linear Equations
FOCS 1993: 724-733 |
1992 |
14 | | Gilles Lachaud,
Jacques Stern:
Polynomial-Time Construction of Codes I: Linear Codes with Almost Equal Weights.
Appl. Algebra Eng. Commun. Comput. 3: 151-161 (1992) |
13 | | Matthijs J. Coster,
Antoine Joux,
Brian A. LaMacchia,
Andrew M. Odlyzko,
Claus-Peter Schnorr,
Jacques Stern:
Improved Low-Density Subset Sum Algorithms.
Computational Complexity 2: 111-128 (1992) |
1991 |
12 | | Gilles Lachaud,
Jacques Stern:
Polynomial-Time Construction of Spherical Codes.
AAECC 1991: 218-223 |
11 | | Antoine Joux,
Jacques Stern:
Cryptanalysis of Another Knapsack Cryptosystem.
ASIACRYPT 1991: 470-476 |
10 | EE | Yeow Meng Chee,
Antoine Joux,
Jacques Stern:
The Cryptoanalysis of a New Public-Key Cryptosystem Based on Modular Knapsacks.
CRYPTO 1991: 204-212 |
9 | | Antoine Joux,
Jacques Stern:
Improving the Critical Density of the Lagarias-Odlyzko Attack Against Subset Sum Problems.
FCT 1991: 258-264 |
1990 |
8 | EE | Jacques Stern,
Philippe Toffin:
Cryptanalysis of a Public-Key Cryptosystem Based on Approximations by Rational Numbers.
EUROCRYPT 1990: 313-317 |
1989 |
7 | EE | Jacques Stern:
An Alternative to the Fiat-Shamir Protocol.
EUROCRYPT 1989: 173-180 |
1988 |
6 | | Jacques Stern:
A method for finding codewords of small weight.
Coding Theory and Applications 1988: 106-113 |
1987 |
5 | | Jacques Stern:
Secret Linear Congruential Generators Are Not Cryptographically Secure
FOCS 1987: 421-426 |
1985 |
4 | | Jacques Stern:
Complexity of Some Problems from the Theory of Automata
Information and Control 66(3): 163-176 (1985) |
3 | | Jacques Stern:
Characterizations of Some Classes of Regular Events.
Theor. Comput. Sci. 35: 17-42 (1985) |
1978 |
2 | | Jacques Stern:
Communication Systems.
Jerusalem Conference on Information Technology 1978: 271-277 |
1975 |
1 | | Jacques Stern:
A New Look at the Interpolation Problem.
J. Symb. Log. 40(1): 1-13 (1975) |