Applied Crypto Group Publications
-
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13.
Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi.
Proceedings of PKC 2017.
-
How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction.
Jean-Sébastien Coron, Thomas Holenstein, Robin Künzler, Jacques Patarin, Yannick Seurin, Stefano Tessaro.
J. Cryptology 2016.
-
Practical Cryptanalysis of ISO 9796-2 and EMV Signatures.
Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann.
J. Cryptology 2016.
-
Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol.
Jean-Sébastien Coron.
Proceedings of The New Codebreakers 2016.
-
Factoring N=p^rq^s for Large r and s.
Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun.
Proceedings of CT-RSA 2016.
-
Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme.
Alberto Battistello, Jean-Sébastien Coron, Emmanuel Prouff, Rina Zeitoun.
Proceedings of CHES 2016.
-
Faster Evaluation of SBoxes via Common Shares.
Jean-Sébastien Coron, Aurélien Greuet, Emmanuel Prouff, Rina Zeitoun.
Proceedings of CHES 2016.
-
Cryptanalysis of GGH15 Multilinear Maps.
Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi.
Proceedings of CRYPTO 2016.
-
Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures.
Jean-Sébastien Coron, Arnab Roy, Srinivas Vivek.
J. Cryptographic Engineering 2015.
-
A Number-Theoretic Error-Correcting Code.
Eric Brier, Jean-Sébastien Coron, Rémi Géraud, Diana Maimut, David Naccache.
CoRR 2015.
-
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity.
Jean-Sébastien Coron, Johann Großschädl, Mehdi Tibouchi, Praveen Kumar Vadnala.
Proceedings of FSE 2015.
-
Improved Side-Channel Analysis of Finite-Field Multiplication.
Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff.
Proceedings of CHES 2015.
-
A Number-Theoretic Error-Correcting Code.
Eric Brier, Jean-Sébastien Coron, Rémi Géraud, Diana Maimut, David Naccache.
Proceedings of SECITC 2015.
-
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations.
Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi.
Proceedings of CRYPTO 2015.
-
New Multilinear Maps Over the Integers.
Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi.
Proceedings of CRYPTO 2015.
-
Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives.
Olivier Pereira, François-Xavier Standaert, Srinivas Vivek.
Proceedings of ACM Conference on Computer and Communications Security 2015.
-
Faster Mask Conversion with Lookup Tables.
Praveen Kumar Vadnala, Johann Großschädl.
Proceedings of COSADE 2015.
-
Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON.
Junwei Wang, Praveen Kumar Vadnala, Johann Großschädl, Qiuliang Xu.
Proceedings of CT-RSA 2015.
-
Elliptic curve with Optimal mixed Montgomery-Edwards model for low-end devices.
Zhe Liu, Zhi Hu, Wei Wu.
SCIENCE CHINA Information Sciences 2015.
-
The impact of social cloud reputation and structure on rational computation.
Yilei Wang, Tao Li, Qianqian Liu, Jing Sun, Zhe Liu.
J. High Speed Networks 2015.
-
Optimized Karatsuba squaring on 8-bit AVR processors.
Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim.
Security and Communication Networks 2015.
-
Karatsuba-Block-Comb technique for elliptic curve cryptography over binary fields.
Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim.
Security and Communication Networks 2015.
-
Performance evaluation of twisted Edwards-form elliptic curve cryptography for wireless sensor nodes.
Zhe Liu, Hwajeong Seo, Qiuliang Xu.
Security and Communication Networks 2015.
-
Montgomery multiplication and squaring for Optimal Prime Fields.
Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim.
Computers & Security 2015.
-
Faster ECC over \mathbb F_2^521-1 F 2 521 - 1 (feat. NEON).
Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Lu Zhou, Howon Kim.
Proceedings of ICISC 2015.
-
Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks.
Zhe Liu, Hwajeong Seo, Zhi Hu, Xinyi Huang, Johann Großschädl.
Proceedings of ASIACCS 2015.
-
Efficient Ring-LWE Encryption on 8-Bit AVR Processors.
Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede.
Proceedings of CHES 2015.
-
Compact Implementations of LSH.
Taehwan Park, Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim.
Proceedings of WISA 2015.
-
Open Sesame! Hacking the Password.
Hwajeong Seo, Zhe Liu, Gyuwon Seo, Taehwan Park, Jongseok Choi, Howon Kim.
Proceedings of WISA 2015.
-
Secure Binary Field Multiplication.
Hwajeong Seo, Chien-Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim.
Proceedings of WISA 2015.
-
Compact Implementations of LEA Block Cipher for Low-End Microprocessors.
Hwajeong Seo, Zhe Liu, Jongseok Choi, Taehwan Park, Howon Kim.
Proceedings of WISA 2015.
-
Introduction to the CHES 2013 special issue.
Guido Bertoni, Jean-Sébastien Coron.
J. Cryptographic Engineering 2014.
-
Scale-Invariant Fully Homomorphic Encryption over the Integers.
Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi.
Proceedings of Public Key Cryptography 2014.
-
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences.
Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun.
Proceedings of Public Key Cryptography 2014.
-
Higher Order Masking of Look-Up Tables.
Jean-Sébastien Coron.
Proceedings of EUROCRYPT 2014.
-
Secure Conversion between Boolean and Arithmetic Masking of Any Order.
Jean-Sébastien Coron, Johann Großschädl, Praveen Kumar Vadnala.
Proceedings of CHES 2014.
-
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures.
Jean-Sébastien Coron, Arnab Roy, Srinivas Vivek.
Proceedings of CHES 2014.
-
Cubic Sieve Congruence of the Discrete Logarithm Problem, and fractional part sequences.
Srinivas Vivek, C. E. Veni Madhavan.
J. Symb. Comput. 2014.
-
Limits of a conjecture on a leakage-resilient cryptosystem.
David Galindo, Srinivas Vivek.
Inf. Process. Lett. 2014.
-
New rational parties relying on reputation.
Yilei Wang, Zhe Liu, Qiuliang Xu.
Security and Communication Networks 2014.
-
Social rational secure multi-party computation.
Yilei Wang, Zhe Liu, Hao Wang, Qiuliang Xu.
Concurrency and Computation: Practice and Experience 2014.
-
Small Private Key MQPKS on an Embedded Microprocessor.
Hwajeong Seo, Jihyun Kim, Jongseok Choi, Taehwan Park, Zhe Liu, Howon Kim.
Sensors 2014.
-
MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks.
Zhe Liu, Erich Wenger, Johann Großschädl.
Proceedings of ACNS 2014.
-
Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks.
Yang Yang, Zhi Guan, Zhe Liu, Zhong Chen.
Proceedings of ICICS 2014.
-
Reverse Product-Scanning Multiplication and Squaring on 8-Bit AVR Processors.
Zhe Liu, Hwajeong Seo, Johann Großschädl, Howon Kim.
Proceedings of ICICS 2014.
-
Montgomery Modular Multiplication on ARM-NEON Revisited.
Hwajeong Seo, Zhe Liu, Johann Großschädl, Jongseok Choi, Howon Kim.
Proceedings of ICISC 2014.
-
High-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit.
Shujie Cui, Johann Großschädl, Zhe Liu, Qiuliang Xu.
Proceedings of ISPEC 2014.
-
Rational Secure Two-party Computation in Social Cloud.
Yilei Wang, Zhe Liu, Tao Li, Qiuliang Xu.
Proceedings of NSS 2014.
-
Improved Modular Multiplication for Optimal Prime Fields.
Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim.
Proceedings of WISA 2014.
-
New Speed Records for Montgomery Modular Multiplication on 8-Bit AVR Microcontrollers.
Zhe Liu, Johann Großschädl.
Proceedings of AFRICACRYPT 2014.
-
A Note on the Bivariate Coppersmith Theorem.
Jean-Sébastien Coron, Alexey Kirichenko, Mehdi Tibouchi.
J. Cryptology 2013.
-
Higher-Order Side Channel Security and Mask Refreshing.
Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche.
Proceedings of FSE 2013.
-
Batch Fully Homomorphic Encryption over the Integers.
Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, Aaram Yun.
Proceedings of EUROCRYPT 2013.
-
Practical Multilinear Maps over the Integers.
Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi.
Proceedings of CRYPTO 2013.
-
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012.
Arnab Roy, Srinivas Vivek.
Proceedings of CHES 2013.
-
A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme.
David Galindo, Srinivas Vivek.
Proceedings of IMA Int. Conf. 2013.
-
Algorithms for Switching between Boolean and Arithmetic Masking of Second Order.
Praveen Kumar Vadnala, Johann Großschädl.
Proceedings of SPACE 2013.
-
A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES.
Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Zhe Liu, Jean-François Gallais.
Computers & Security 2013.
-
Fixed-Base Comb with Window-Non-Adjacent Form (NAF) Method for Scalar Multiplication.
Hwajeong Seo, Hyunjin Kim, Taehwan Park, Yeoncheol Lee, Zhe Liu, Howon Kim.
Sensors 2013.
-
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes.
Zhe Liu, Hwajeong Seo, Johann Großschädl, Howon Kim.
Proceedings of ICICS 2013.
-
Parallel Implementations of LEA.
Hwajeong Seo, Zhe Liu, Taehwan Park, Hyunjin Kim, Yeoncheol Lee, Jongseok Choi, Howon Kim.
Proceedings of ICISC 2013.
-
Twisted edwards-form elliptic curve cryptography for 8-bit AVR-based sensor nodes.
Dalin Chu, Johann Großschädl, Zhe Liu, Volker Müller, Yang Zhang.
Proceedings of AsiaPKC@AsiaCCS 2013.
-
Fair Computation with Tit-for-Tat Strategy.
Yilei Wang, Qiuliang Xu, Zhe Liu.
Proceedings of INCoS 2013.
-
Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors.
Zhe Liu, Johann Großschädl, Duncan S. Wong.
Proceedings of Inscrypt 2013.
-
Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors.
Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim.
Proceedings of INDOCRYPT 2013.
-
Conversion of Security Proofs from One Leakage Model to Another: A New Issue.
Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Soline Renner, Matthieu Rivain, Praveen Kumar Vadnala.
Proceedings of COSADE 2012.
-
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping.
Jean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier.
Proceedings of Cryptography and Security 2012.
-
On the Use of Shamir's Secret Sharing against Side-Channel Analysis.
Jean-Sébastien Coron, Emmanuel Prouff, Thomas Roche.
Proceedings of CARDIS 2012.
-
Another Look at Affine-Padding RSA Signatures.
Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi.
Proceedings of ICISC 2012.
-
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers.
Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi.
Proceedings of EUROCRYPT 2012.
-
On the energy cost of authenticated key agreement in wireless sensor networks.
David Galindo, Rodrigo Roman, Javier Lopez.
Wireless Communications and Mobile Computing 2012.
-
A Practical Leakage-Resilient Signature Scheme in the Generic Group Model.
David Galindo, Srinivas Vivek.
Proceedings of Selected Areas in Cryptography 2012.
-
Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience.
David Galindo, Javier Herranz, Jorge L. Villar.
Proceedings of ESORICS 2012.
-
Extended Security Arguments for Signature Schemes.
Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo, Pierre-Louis Cayrel.
Proceedings of AFRICACRYPT 2012.
-
On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction.
Avradip Mandal, Jacques Patarin, Yannick Seurin.
Proceedings of TCC 2012.
-
Multi-party Computation with Social Rational Parties.
Yilei Wang, Qiuliang Xu, Zhe Liu.
Proceedings of INCoS 2012.
-
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005.
Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi.
Proceedings of Public Key Cryptography 2011.
-
Improved Generic Algorithms for Hard Knapsacks.
Anja Becker, Jean-Sébastien Coron, Antoine Joux.
Proceedings of EUROCRYPT 2011.
-
Fully Homomorphic Encryption over the Integers with Shorter Public Keys.
Jean-Sébastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi.
Proceedings of CRYPTO 2011.
-
Non-interactive distributed encryption: a new primitive for revocable privacy.
Jaap-Henk Hoepman, David Galindo.
Proceedings of WPES 2011.
-
Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF.
Alex Biryukov, Ilya Kizhvatov, Bin Zhang.
Proceedings of ACNS 2011.
-
On the Impossibility of Instantiating PSS in the Standard Model.
Rishiraj Bhattacharyya, Avradip Mandal.
Proceedings of Public Key Cryptography 2011.
-
On the Indifferentiability of Fugue and Luffa.
Rishiraj Bhattacharyya, Avradip Mandal.
Proceedings of ACNS 2011.
-
SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications.
Jean-Sébastien Coron, Aline Gouget, Pascal Paillier, Karine Villegas.
Proceedings of Financial Cryptography Workshops 2010.
-
On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption.
Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud.
Proceedings of ACNS 2010.
-
A Domain Extender for the Ideal Cipher.
Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin.
Proceedings of TCC 2010.
-
Secure Delegation of Elliptic-Curve Pairing.
Benoît Chevallier-Mames, Jean-Sébastien Coron, Noel McCullagh, David Naccache, Michael Scott.
Proceedings of CARDIS 2010.
-
Fault Attacks Against emv Signatures.
Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi.
Proceedings of CT-RSA 2010.
-
Analysis and Improvement of the Random Delay Countermeasure of CHES 2009.
Jean-Sébastien Coron, Ilya Kizhvatov.
Proceedings of CHES 2010.
-
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves.
Eric Brier, Jean-Sébastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi.
Proceedings of CRYPTO 2010.
-
Fault Attacks and Countermeasures on Vigilant's RSA-CRT Algorithm.
Jean-Sébastien Coron, Christophe Giraud, Nicolas Morin, Gilles Piret, David Vigilant.
Proceedings of FDTC 2010.
-
Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters.
Julien Bringer, Hervé Chabanne, Thomas Icart.
Proceedings of ACNS 2010.
-
On the generic construction of identity-based signatures with additional properties.
David Galindo, Javier Herranz, Eike Kiltz.
Adv. in Math. of Comm. 2010.
-
Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman.
David Galindo.
Proceedings of Pairing 2010.
-
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
David Galindo, Benoît Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis, Dominique Schröder.
Proceedings of AFRICACRYPT 2010.
-
Combined Implementation Attack Resistant Exponentiation.
Jörn-Marc Schmidt, Michael Tunstall, Roberto Maria Avanzi, Ilya Kizhvatov, Timo Kasper, David Oswald.
Proceedings of LATINCRYPT 2010.
-
Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices.
Johann Großschädl, Ilya Kizhvatov.
Proceedings of CANS 2010.
-
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations.
Jean-François Gallais, Ilya Kizhvatov, Michael Tunstall.
Proceedings of WISA 2010.
-
Security Analysis of the Mode of JH Hash Function.
Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi.
Proceedings of FSE 2010.
-
Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations.
Avradip Mandal, Jacques Patarin, Valérie Nachef.
Proceedings of INDOCRYPT 2010.
-
A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model.
Jean-Sébastien Coron.
Des. Codes Cryptography 2009.
-
Analysis of the split mask countermeasure for embedded systems.
Jean-Sébastien Coron, Ilya Kizhvatov.
Proceedings of WESS 2009.
-
PSS Is Secure against Random Fault Attacks.
Jean-Sébastien Coron, Avradip Mandal.
Proceedings of ASIACRYPT 2009.
-
Fault Attacks on RSA Signatures with Partially Unknown Messages.
Jean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier.
Proceedings of CHES 2009.
-
An Efficient Method for Random Delay Generation in Embedded Software.
Jean-Sébastien Coron, Ilya Kizhvatov.
Proceedings of CHES 2009.
-
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures.
Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann.
Proceedings of CRYPTO 2009.
-
Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis.
Emmanuel Prouff, Matthieu Rivain.
Proceedings of ACNS 2009.
-
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations.
Emmanuelle Dottax, Christophe Giraud, Matthieu Rivain, Yannick Sierra.
Proceedings of WISTP 2009.
-
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation.
Matthieu Rivain.
Proceedings of CT-RSA 2009.
-
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers.
Matthieu Rivain, Emmanuel Prouff, Julien Doget.
Proceedings of CHES 2009.
-
Differential Fault Analysis on DES Middle Rounds.
Matthieu Rivain.
Proceedings of CHES 2009.
-
Efficient zero-knowledge identification schemes which respect privacy.
Julien Bringer, Hervé Chabanne, Thomas Icart.
Proceedings of ASIACCS 2009.
-
How to Hash into Elliptic Curves.
Thomas Icart.
Proceedings of CRYPTO 2009.
-
On Physical Obfuscation of Cryptographic Algorithms.
Julien Bringer, Hervé Chabanne, Thomas Icart.
Proceedings of INDOCRYPT 2009.
-
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles.
Eike Kiltz, David Galindo.
Theor. Comput. Sci. 2009.
-
Improved identity-based identification using correcting codes
Pierre-Louis Cayrel, Philippe Gaborit, David Galindo, Marc Girault.
CoRR 2009.
-
Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening.
David Galindo.
Proceedings of CT-RSA 2009.
-
A Schnorr-Like Lightweight Identity-Based Signature Scheme.
David Galindo, Flavio D. Garcia.
Proceedings of AFRICACRYPT 2009.
-
Side channel analysis of AVR XMEGA crypto engine.
Ilya Kizhvatov.
Proceedings of WESS 2009.
-
Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions.
Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi.
Proceedings of INDOCRYPT 2009.
-
Cryptanalysis of ISO/IEC 9796-1.
Don Coppersmith, Jean-Sébastien Coron, François Grieu, Shai Halevi, Charanjit S. Jutla, David Naccache, Julien P. Stern.
J. Cryptology 2008.
-
A New DPA Countermeasure Based on Permutation Tables.
Jean-Sébastien Coron.
Proceedings of SCN 2008.
-
Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform.
Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Matthieu Rivain.
Proceedings of CHES 2008.
-
The Random Oracle Model and the Ideal Cipher Model Are Equivalent.
Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin.
Proceedings of CRYPTO 2008.
-
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis.
Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff.
Proceedings of FSE 2008.
-
On the Exact Success Rate of Side Channel Analysis in the Gaussian Model.
Matthieu Rivain.
Proceedings of Selected Areas in Cryptography 2008.
-
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function.
Julien Bringer, Hervé Chabanne, Thomas Icart.
Proceedings of SCN 2008.
-
Cryptanalysis of EC-RAC, a RFID Identification Protocol.
Julien Bringer, Hervé Chabanne, Thomas Icart.
Proceedings of CANS 2008.
-
HIP Tags Privacy Architecture.
Pascal Urien, Dorice Nyami, Simon Elrharbi, Hervé Chabanne, Thomas Icart, Cyrille Pepin, Mathieu Bouet, Daniel de Oliveira Cunha, Vincent Guyot, Guy Pujolle, Eric Gressier-Soudan, Jean-Ferdy Susini.
Proceedings of ICSNC 2008.
-
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection.
Andrey Bogdanov, Ilya Kizhvatov, Andrei Pyshkin.
Proceedings of INDOCRYPT 2008.
-
Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring.
Jean-Sébastien Coron, Alexander May.
J. Cryptology 2007.
-
Side Channel Cryptanalysis of a Higher Order Masking Scheme.
Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain.
Proceedings of CHES 2007.
-
On the Implementation of a Fast Prime Generation Algorithm.
Christophe Clavier, Jean-Sébastien Coron.
Proceedings of CHES 2007.
-
Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach.
Jean-Sébastien Coron.
Proceedings of CRYPTO 2007.
-
A Generic Method for Secure SBox Implementation.
Emmanuel Prouff, Matthieu Rivain.
Proceedings of WISA 2007.
-
Index Calculation Attacks on RSA Signature and Encryption.
Jean-Sébastien Coron, David Naccache, Yvo Desmedt, Andrew M. Odlyzko, Julien P. Stern.
Des. Codes Cryptography 2006.
-
What Is Cryptography?
Jean-Sébastien Coron.
IEEE Security & Privacy 2006.
-
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited.
Julien Cathalo, Jean-Sébastien Coron, David Naccache.
Proceedings of Public Key Cryptography 2005.
-
A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis.
Jean-Sébastien Coron, David Lefranc, Guillaume Poupard.
Proceedings of CHES 2005.
-
Merkle-Damgård Revisited: How to Construct a Hash Function.
Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya.
Proceedings of CRYPTO 2005.
-
Statistics and secret leakage.
Jean-Sébastien Coron, David Naccache, Paul C. Kocher.
ACM Trans. Embedded Comput. Syst. 2004.
-
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem.
Jean-Sébastien Coron.
Proceedings of Public Key Cryptography 2004.
-
Externalized Fingerprint Matching.
Claude Barral, Jean-Sébastien Coron, David Naccache.
Proceedings of ICBA 2004.
-
Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95.
Jean-Sébastien Coron, David Naccache.
Proceedings of CT-RSA 2004.
-
Finding Small Roots of Bivariate Integer Polynomial Equations Revisited.
Jean-Sébastien Coron.
Proceedings of EUROCRYPT 2004.
-
Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption.
Jean-Sébastien Coron, David Naccache.
Proceedings of ASIACRYPT 2003.
-
A New Algorithm for Switching from Arithmetic to Boolean Masking.
Jean-Sébastien Coron, Alexei Tchulkine.
Proceedings of CHES 2003.
-
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages.
Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen.
Proceedings of Public Key Cryptography 2002.
-
GEM: A Generic Chosen-Ciphertext Secure Encryption Method.
Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen.
Proceedings of CT-RSA 2002.
-
Optimal Security Proofs for PSS and Other Signature Schemes.
Jean-Sébastien Coron.
Proceedings of EUROCRYPT 2002.
-
Security Proof for Partial-Domain Hash Signature Schemes.
Jean-Sébastien Coron.
Proceedings of CRYPTO 2002.
-
Universal Padding Schemes for RSA.
Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier.
Proceedings of CRYPTO 2002.
-
Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves.
Jean-Sébastien Coron, David M'Raïhi, Christophe Tymen.
Proceedings of Selected Areas in Cryptography 2001.
-
Cryptanalysis of RSA Signatures with Fixed-Pattern Padding.
Eric Brier, Christophe Clavier, Jean-Sébastien Coron, David Naccache.
Proceedings of CRYPTO 2001.
-
Statistics and Secret Leakage.
Jean-Sébastien Coron, Paul C. Kocher, David Naccache.
Proceedings of Financial Cryptography 2000.
-
From Fixed-Length to Arbitrary-Length RSA Padding Schemes.
Jean-Sébastien Coron, François Koeune, David Naccache.
Proceedings of ASIACRYPT 2000.
-
Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme.
Jean-Sébastien Coron, David Naccache.
Proceedings of EUROCRYPT 2000.
-
New Attacks on PKCS#1 v1.5 Encryption.
Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier.
Proceedings of EUROCRYPT 2000.
-
On Boolean and Arithmetic Masking against Differential Power Analysis.
Jean-Sébastien Coron, Louis Goubin.
Proceedings of CHES 2000.
-
Differential Power Analysis in the Presence of Hardware Countermeasures.
Christophe Clavier, Jean-Sébastien Coron, Nora Dabbous.
Proceedings of CHES 2000.
-
On the Exact Security of Full Domain Hash.
Jean-Sébastien Coron.
Proceedings of CRYPTO 2000.
-
On the Security of Random Sources.
Jean-Sébastien Coron.
Proceedings of Public Key Cryptography 1999.
-
On the Security of RSA Screening.
Jean-Sébastien Coron, David Naccache.
Proceedings of Public Key Cryptography 1999.
-
ECC: Do We Need to Count?
Jean-Sébastien Coron, Helena Handschuh, David Naccache.
Proceedings of ASIACRYPT 1999.
-
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems.
Jean-Sébastien Coron.
Proceedings of CHES 1999.
-
On the Security of RSA Padding.
Jean-Sébastien Coron, David Naccache, Julien P. Stern.
Proceedings of CRYPTO 1999.
-
An Accurate Evaluation of Maurer's Universal Test.
Jean-Sébastien Coron, David Naccache.
Proceedings of Selected Areas in Cryptography 1998.