BibTeX records: David Naccache

download as .bib file

@inproceedings{DBLP:conf/c2si/NaccacheY23,
  author       = {David Naccache and
                  Ofer Yifrach{-}Stav},
  editor       = {Said El Hajji and
                  Sihem Mesnager and
                  El Mamoun Souidi},
  title        = {On Catalan Constant Continued Fractions},
  booktitle    = {Codes, Cryptology and Information Security - 4th International Conference,
                  {C2SI} 2023, Rabat, Morocco, May 29-31, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13874},
  pages        = {43--54},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-33017-9\_3},
  doi          = {10.1007/978-3-031-33017-9\_3},
  timestamp    = {Fri, 26 May 2023 22:27:21 +0200},
  biburl       = {https://dblp.org/rec/conf/c2si/NaccacheY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficc/OrcheHHNPRRWW23,
  author       = {Fatima{-}Ezzahra El Orche and
                  Marcel Hollenstein and
                  Sarah Houdaigoui and
                  David Naccache and
                  Daria Pchelina and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Julien Weibel and
                  Robert Weil},
  editor       = {Kohei Arai},
  title        = {Taphonomical Security: {DNA} Information with a Foreseeable Lifespan},
  booktitle    = {Advances in Information and Communication - Proceedings of the 2023
                  Future of Information and Communication Conference (FICC), Volume
                  2, San Francisco, CA, USA, 2-3 March 2023},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {652},
  pages        = {674--694},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-28073-3\_46},
  doi          = {10.1007/978-3-031-28073-3\_46},
  timestamp    = {Fri, 05 May 2023 14:43:05 +0200},
  biburl       = {https://dblp.org/rec/conf/ficc/OrcheHHNPRRWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/BouayedIN23,
  author       = {Aymene Mohammed Bouayed and
                  Adrian Iaccovelli and
                  David Naccache},
  title        = {Sampling From Autoencoders' Latent Space via Quantization And Probability
                  Mass Function Concepts},
  booktitle    = {{IEEE} International Joint Conference on Biometrics, {IJCB} 2023,
                  Ljubljana, Slovenia, September 25-28, 2023},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IJCB57857.2023.10449279},
  doi          = {10.1109/IJCB57857.2023.10449279},
  timestamp    = {Wed, 13 Mar 2024 19:10:51 +0100},
  biburl       = {https://dblp.org/rec/conf/icb/BouayedIN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/GiraudN23,
  author       = {Vincent Giraud and
                  David Naccache},
  editor       = {Junji Shikata and
                  Hiroki Kuzuno},
  title        = {Power Analysis Pushed too Far: Breaking Android-Based Isolation with
                  Fuel Gauges},
  booktitle    = {Advances in Information and Computer Security - 18th International
                  Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31,
                  2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14128},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41326-1\_1},
  doi          = {10.1007/978-3-031-41326-1\_1},
  timestamp    = {Fri, 25 Aug 2023 19:50:15 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/GiraudN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BarralJN23,
  author       = {Hadrien Barral and
                  Georges{-}Axel Jaloyan and
                  David Naccache},
  title        = {Emoji shellcoding in {RISC-V}},
  booktitle    = {2023 {IEEE} Security and Privacy Workshops (SPW), San Francisco, CA,
                  USA, May 25, 2023},
  pages        = {255--263},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SPW59333.2023.00028},
  doi          = {10.1109/SPW59333.2023.00028},
  timestamp    = {Thu, 21 Sep 2023 16:11:09 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BarralJN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-01624,
  author       = {David Naccache and
                  Ofer Yifrach{-}Stav},
  title        = {Pattern Recognition Experiments on Mathematical Expressions},
  journal      = {CoRR},
  volume       = {abs/2301.01624},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.01624},
  doi          = {10.48550/ARXIV.2301.01624},
  eprinttype    = {arXiv},
  eprint       = {2301.01624},
  timestamp    = {Tue, 10 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-01624.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-06489,
  author       = {Aymene Mohammed Bouayed and
                  David Naccache},
  title        = {Simplex Autoencoders},
  journal      = {CoRR},
  volume       = {abs/2301.06489},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.06489},
  doi          = {10.48550/ARXIV.2301.06489},
  eprinttype    = {arXiv},
  eprint       = {2301.06489},
  timestamp    = {Thu, 19 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-06489.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-10704,
  author       = {Aymene Mohammed Bouayed and
                  Adrian Iaccovelli and
                  David Naccache},
  title        = {Sampling From Autoencoders' Latent Space via Quantization And Probability
                  Mass Function Concepts},
  journal      = {CoRR},
  volume       = {abs/2308.10704},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.10704},
  doi          = {10.48550/ARXIV.2308.10704},
  eprinttype    = {arXiv},
  eprint       = {2308.10704},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-10704.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiraudN23,
  author       = {Vincent Giraud and
                  David Naccache},
  title        = {Bypassing Android isolation with fuel gauges: new risks with advanced
                  power ICs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1078},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1078},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GiraudN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerradiHN23,
  author       = {Houda Ferradi and
                  Antoine Houssais and
                  David Naccache},
  title        = {How to Physically Hold Your Bitcoins ?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1485},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1485},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FerradiHN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeraudStewartN23,
  author       = {R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  David Naccache},
  title        = {New Public-Key Cryptosystem Blueprints Using Matrix Products in {\unicode{54589}}\({}_{\mbox{p}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1745},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1745},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GeraudStewartN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JainskyNOY23,
  author       = {Julien S. Jainsky and
                  David Naccache and
                  Bassem Ouni and
                  Ofer Yifrach{-}Stav},
  title        = {Authenticating Medications with QR-Codes and Compact Digital Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1817},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1817},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/JainskyNOY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeraudStewartNY23,
  author       = {R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  David Naccache and
                  Ofer Yifrach{-}Stav},
  title        = {Fiat-Shamir Goes Tropical},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1954},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1954},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GeraudStewartNY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaccacheY23,
  author       = {David Naccache and
                  Ofer Yifrach{-}Stav},
  title        = {On The Practical Advantage of Committing Challenges in Zero-Knowledge
                  Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1961},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1961},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NaccacheY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DutertreMNT22,
  author       = {Jean{-}Max Dutertre and
                  Amir{-}Pasha Mirbaha and
                  David Naccache and
                  Assia Tria},
  title        = {Photonic power firewalls},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {3},
  pages        = {245--254},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-022-00291-0},
  doi          = {10.1007/S13389-022-00291-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/DutertreMNT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoteid/OrcheGRBNRBDW22,
  author       = {Fatima{-}Ezzahra El Orche and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  Peter B. R{\o}nne and
                  Gergei Bana and
                  David Naccache and
                  Peter Y. A. Ryan and
                  Marco Biroli and
                  Megi Dervishi and
                  Hugo Waltsburger},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  David Duenas{-}Cid and
                  Peter B. R{\o}nne and
                  Micha Germann},
  title        = {Time, Privacy, Robustness, Accuracy: Trade-Offs for the Open Vote
                  Network Protocol},
  booktitle    = {Electronic Voting - 7th International Joint Conference, E-Vote-ID
                  2022, Bregenz, Austria, October 4-7, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13553},
  pages        = {19--35},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15911-4\_2},
  doi          = {10.1007/978-3-031-15911-4\_2},
  timestamp    = {Mon, 24 Oct 2022 20:50:57 +0200},
  biburl       = {https://dblp.org/rec/conf/evoteid/OrcheGRBNRBDW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmla/MansourCDN22,
  author       = {Adnan Ben Mansour and
                  Gaia Carenini and
                  Alexandre Duplessis and
                  David Naccache},
  editor       = {M. Arif Wani and
                  Mehmed M. Kantardzic and
                  Vasile Palade and
                  Daniel Neagu and
                  Longzhi Yang and
                  Kit Yan Chan},
  title        = {Federated Learning Aggregation: New Robust Algorithms with Guarantees},
  booktitle    = {21st {IEEE} International Conference on Machine Learning and Applications,
                  {ICMLA} 2022, Nassau, Bahamas, December 12-14, 2022},
  pages        = {721--726},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICMLA55696.2022.00120},
  doi          = {10.1109/ICMLA55696.2022.00120},
  timestamp    = {Wed, 29 Mar 2023 19:23:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icmla/MansourCDN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-10864,
  author       = {Adnan Ben Mansour and
                  Gaia Carenini and
                  Alexandre Duplessis and
                  David Naccache},
  title        = {Federated Learning Aggregation: New Robust Algorithms with Guarantees},
  journal      = {CoRR},
  volume       = {abs/2205.10864},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.10864},
  doi          = {10.48550/ARXIV.2205.10864},
  eprinttype    = {arXiv},
  eprint       = {2205.10864},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-10864.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-14236,
  author       = {Adnan Ben Mansour and
                  Gaia Carenini and
                  Alexandre Duplessis and
                  David Naccache},
  title        = {FedControl: When Control Theory Meets Federated Learning},
  journal      = {CoRR},
  volume       = {abs/2205.14236},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.14236},
  doi          = {10.48550/ARXIV.2205.14236},
  eprinttype    = {arXiv},
  eprint       = {2205.14236},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-14236.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-00856,
  author       = {Hadrien Barral and
                  Georges{-}Axel Jaloyan and
                  Fabien Thomas{-}Brans and
                  Matthieu Regnery and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  Thibaut Heckmann and
                  Thomas R. Souvignet and
                  David Naccache},
  title        = {A forensic analysis of the Google Home: repairing compressed data
                  without error correction},
  journal      = {CoRR},
  volume       = {abs/2210.00856},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.00856},
  doi          = {10.48550/ARXIV.2210.00856},
  eprinttype    = {arXiv},
  eprint       = {2210.00856},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-00856.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-15669,
  author       = {David Naccache and
                  Ofer Yifrach{-}Stav},
  title        = {On Catalan Constant Continued Fractions},
  journal      = {CoRR},
  volume       = {abs/2210.15669},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.15669},
  doi          = {10.48550/ARXIV.2210.15669},
  eprinttype    = {arXiv},
  eprint       = {2210.15669},
  timestamp    = {Wed, 02 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-15669.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-01058,
  author       = {Eric Brier and
                  David Naccache and
                  Ofer Yifrach{-}Stav},
  title        = {A Note on the Ramanujan Machine},
  journal      = {CoRR},
  volume       = {abs/2211.01058},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.01058},
  doi          = {10.48550/ARXIV.2211.01058},
  eprinttype    = {arXiv},
  eprint       = {2211.01058},
  timestamp    = {Fri, 04 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-01058.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MachlerN22,
  author       = {Leon M{\"{a}}chler and
                  David Naccache},
  title        = {A Conjecture on Hermite Constants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {677},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/677},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MachlerN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaccacheY22,
  author       = {David Naccache and
                  Ofer Yifrach{-}Stav},
  title        = {Invisible Formula Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1110},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1110},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaccacheY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaccacheY22a,
  author       = {David Naccache and
                  Ofer Yifrach{-}Stav},
  title        = {On Squaring Modulo Mersenne Numbers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1197},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1197},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaccacheY22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaccacheY22b,
  author       = {David Naccache and
                  Ofer Yifrach{-}Stav},
  title        = {A Conjecture From a Failed Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1273},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1273},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaccacheY22b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShepherdMHAGHN21,
  author       = {Carlton Shepherd and
                  Konstantinos Markantonakis and
                  Nico van Heijningen and
                  Driss Aboulkassimi and
                  Cl{\'{e}}ment Gaine and
                  Thibaut Heckmann and
                  David Naccache},
  title        = {Physical fault injection and side-channel attacks on mobile devices:
                  {A} comprehensive analysis},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102471},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102471},
  doi          = {10.1016/J.COSE.2021.102471},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShepherdMHAGHN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Geraud-StewartN21,
  author       = {R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  David Naccache},
  title        = {A French cipher from the late 19th century},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {4},
  pages        = {342--370},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1753265},
  doi          = {10.1080/01611194.2020.1753265},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Geraud-StewartN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HeckmannSSN21,
  author       = {Thibaut Heckmann and
                  Thomas R. Souvignet and
                  Damien Sauveron and
                  David Naccache},
  title        = {Medical Equipment Used for Forensic Data Extraction: {A} low-cost
                  solution for forensic laboratories not provided with expensive diagnostic
                  or advanced repair equipment},
  journal      = {Digit. Investig.},
  volume       = {36},
  number       = {Supplement},
  pages        = {301092},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301092},
  doi          = {10.1016/J.FSIDI.2020.301092},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HeckmannSSN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/JoyeLNN20,
  author       = {Marc Joye and
                  Oleksandra Lapiha and
                  Ky Nguyen and
                  David Naccache},
  title        = {The Eleventh Power Residue Symbol},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {111--122},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0077},
  doi          = {10.1515/JMC-2020-0077},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/JoyeLNN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cig/MachlerN21,
  author       = {Leon M{\"{a}}chler and
                  David Naccache},
  title        = {Explaining the Entombed Algorithm},
  booktitle    = {2021 {IEEE} Conference on Games (CoG), Copenhagen, Denmark, August
                  17-20, 2021},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CoG52621.2021.9619150},
  doi          = {10.1109/COG52621.2021.9619150},
  timestamp    = {Fri, 10 Dec 2021 10:04:09 +0100},
  biburl       = {https://dblp.org/rec/conf/cig/MachlerN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-01995,
  author       = {Gergei Bana and
                  Wojciech Jamroga and
                  David Naccache and
                  Peter Y. A. Ryan},
  title        = {Convergence Voting: From Pairwise Comparisons to Consensus},
  journal      = {CoRR},
  volume       = {abs/2102.01995},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.01995},
  eprinttype    = {arXiv},
  eprint       = {2102.01995},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-01995.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-08229,
  author       = {Georges{-}Axel Jaloyan and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  David Robin and
                  Keith Mayes and
                  David Naccache},
  title        = {Return-Oriented Programming on {RISC-V}},
  journal      = {CoRR},
  volume       = {abs/2103.08229},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.08229},
  eprinttype    = {arXiv},
  eprint       = {2103.08229},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-08229.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-09982,
  author       = {Leon M{\"{a}}chler and
                  David Naccache},
  title        = {Explaining the Entombed Algorithm},
  journal      = {CoRR},
  volume       = {abs/2104.09982},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.09982},
  eprinttype    = {arXiv},
  eprint       = {2104.09982},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-09982.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-04454,
  author       = {Carlton Shepherd and
                  Konstantinos Markantonakis and
                  Nico van Heijningen and
                  Driss Aboulkassimi and
                  Cl{\'{e}}ment Gaine and
                  Thibaut Heckmann and
                  David Naccache},
  title        = {Physical Fault Injection and Side-Channel Attacks on Mobile Devices:
                  {A} Comprehensive Survey},
  journal      = {CoRR},
  volume       = {abs/2105.04454},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.04454},
  eprinttype    = {arXiv},
  eprint       = {2105.04454},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-04454.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-10971,
  author       = {{\'{E}}ric Brier and
                  Megi Dervishi and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  David Naccache and
                  Ofer Yifrach{-}Stav},
  title        = {Near-Optimal Pool Testing under Urgency Constraints},
  journal      = {CoRR},
  volume       = {abs/2106.10971},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.10971},
  eprinttype    = {arXiv},
  eprint       = {2106.10971},
  timestamp    = {Tue, 29 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-10971.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-07135,
  author       = {Ga{\"{e}}lle Candel and
                  David Naccache},
  title        = {Co-Embedding: Discovering Communities on Bipartite Graphs through
                  Projection},
  journal      = {CoRR},
  volume       = {abs/2109.07135},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.07135},
  eprinttype    = {arXiv},
  eprint       = {2109.07135},
  timestamp    = {Wed, 22 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-07135.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-10007,
  author       = {Ga{\"{e}}lle Candel and
                  David Naccache},
  title        = {Generating Local Maps of Science using Deep Bibliographic Coupling},
  journal      = {CoRR},
  volume       = {abs/2109.10007},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.10007},
  eprinttype    = {arXiv},
  eprint       = {2109.10007},
  timestamp    = {Mon, 27 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-10007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-10538,
  author       = {Ga{\"{e}}lle Candel and
                  David Naccache},
  title        = {Index t-SNE: Tracking Dynamics of High-Dimensional Datasets with Coherent
                  Embeddings},
  journal      = {CoRR},
  volume       = {abs/2109.10538},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.10538},
  eprinttype    = {arXiv},
  eprint       = {2109.10538},
  timestamp    = {Mon, 27 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-10538.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-14925,
  author       = {Antoine Scardigli and
                  Paul Fournier and
                  Matteo Vilucchio and
                  David Naccache},
  title        = {Genealogical Population-Based Training for Hyperparameter Optimization},
  journal      = {CoRR},
  volume       = {abs/2109.14925},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.14925},
  eprinttype    = {arXiv},
  eprint       = {2109.14925},
  timestamp    = {Tue, 31 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-14925.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-09212,
  author       = {Ga{\"{e}}lle Candel and
                  David Naccache},
  title        = {Noise-Resilient Ensemble Learning using Evidence Accumulation Clustering},
  journal      = {CoRR},
  volume       = {abs/2110.09212},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.09212},
  eprinttype    = {arXiv},
  eprint       = {2110.09212},
  timestamp    = {Fri, 22 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-09212.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-11079,
  author       = {Ga{\"{e}}lle Candel and
                  David Naccache},
  title        = {Tagged Documents Co-Clustering},
  journal      = {CoRR},
  volume       = {abs/2110.11079},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.11079},
  eprinttype    = {arXiv},
  eprint       = {2110.11079},
  timestamp    = {Thu, 28 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-11079.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Geraud-StewartN21,
  author       = {R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  David Naccache},
  title        = {Elementary Attestation of Cryptographically Useful Composite Moduli},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/052},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Geraud-StewartN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Geraud-StewartN21a,
  author       = {R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  David Naccache},
  title        = {Magnetic {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {77},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/077},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Geraud-StewartN21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarralBGLNVV21,
  author       = {Hadrien Barral and
                  {\'{E}}ric Brier and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  Arthur L{\'{e}}onard and
                  David Naccache and
                  Quentin Vermande and
                  Samuel Vivien},
  title        = {Discovering New L-Function Relations Using Algebraic Sieving},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1060},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1060},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarralBGLNVV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanaBDOGNRRW21,
  author       = {Gergei Bana and
                  Marco Biroli and
                  Megi Dervishi and
                  Fatima{-}Ezzahra El Orche and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  David Naccache and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Hugo Waltsburger},
  title        = {Time, Privacy, Robustness, Accuracy: Trade Offs for the Open Vote
                  Network Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1065},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1065},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanaBDOGNRRW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OrcheHHNPRRWW21,
  author       = {Fatima{-}Ezzahra El Orche and
                  Marcel Hollenstein and
                  Sarah Houdaigoui and
                  David Naccache and
                  Daria Pchelina and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Julien Weibel and
                  Robert Weil},
  title        = {Taphonomical Security: {(DNA)} Information with Foreseeable Lifespan},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1066},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1066},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OrcheHHNPRRWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrierGJN21,
  author       = {Eric Brier and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  Marc Joye and
                  David Naccache},
  title        = {Primary Elements in Cyclotomic Fields with Applications to Power Residue
                  Symbols, and More},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1106},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1106},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrierGJN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HollensteinNRRW21,
  author       = {Marcel Hollenstein and
                  David Naccache and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Robert Weil and
                  Ofer Yifrach{-}Stav},
  title        = {Preservation of {DNA} Privacy During the Large Scale Detection of
                  {COVID}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1108},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1108},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HollensteinNRRW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Conrad-Frenkiel21,
  author       = {Th{\'{e}}odore Conrad{-}Frenkiel and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  David Naccache},
  title        = {On Unpadded {NTRU} Quantum (In)Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1426},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1426},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Conrad-Frenkiel21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChevignardGHNR21,
  author       = {Cl{\'{e}}mence Chevignard and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  Antoine Houssais and
                  David Naccache and
                  Edmond de Roffignac},
  title        = {How to Claim a Computational Feat},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1554},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1554},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChevignardGHNR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/FerradiGGNT20,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Sylvain Guilley and
                  David Naccache and
                  Mehdi Tibouchi},
  title        = {Recovering Secrets From Prefix-Dependent Leakage},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {15--24},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2015-0048},
  doi          = {10.1515/JMC-2015-0048},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/FerradiGGNT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BrierFJN20,
  author       = {{\'{E}}ric Brier and
                  Houda Ferradi and
                  Marc Joye and
                  David Naccache},
  title        = {New number-theoretic cryptographic primitives},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {224--235},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2019-0035},
  doi          = {10.1515/JMC-2019-0035},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/BrierFJN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JaloyanMARMN20,
  author       = {Georges{-}Axel Jaloyan and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  David Robin and
                  Keith Mayes and
                  David Naccache},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {Return-Oriented Programming on {RISC-V}},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {471--480},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3384738},
  doi          = {10.1145/3320269.3384738},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JaloyanMARMN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/Geraud-StewartL20,
  author       = {R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  Marius Lombard{-}Platet and
                  David Naccache},
  editor       = {Donghyun Kim and
                  R. N. Uma and
                  Zhipeng Cai and
                  Dong Hoon Lee},
  title        = {Approaching Optimal Duplicate Detection in a Sliding Window},
  booktitle    = {Computing and Combinatorics - 26th International Conference, {COCOON}
                  2020, Atlanta, GA, USA, August 29-31, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12273},
  pages        = {64--84},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58150-3\_6},
  doi          = {10.1007/978-3-030-58150-3\_6},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cocoon/Geraud-StewartL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Geraud-StewartN20,
  author       = {R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  David Naccache},
  editor       = {Diana Maimut and
                  Andrei{-}George Oprina and
                  Damien Sauveron},
  title        = {Elementary Attestation of Cryptographically Useful Composite Moduli},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 13th International Conference, SecITC 2020, Bucharest, Romania,
                  November 19-20, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12596},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69255-1\_1},
  doi          = {10.1007/978-3-030-69255-1\_1},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/Geraud-StewartN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-02940,
  author       = {Marc Beunardeau and
                  {\'{E}}ric Brier and
                  No{\'{e}}mie Cartier and
                  Aisling Connolly and
                  Nathana{\"{e}}l Courant and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  David Naccache and
                  Ofer Yifrach{-}Stav},
  title        = {Optimal Covid-19 Pool Testing with a priori Information},
  journal      = {CoRR},
  volume       = {abs/2005.02940},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.02940},
  eprinttype    = {arXiv},
  eprint       = {2005.02940},
  timestamp    = {Sat, 09 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-02940.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-04740,
  author       = {R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  Marius Lombard{-}Platet and
                  David Naccache},
  title        = {Approaching Optimal Duplicate Detection in a Sliding Window},
  journal      = {CoRR},
  volume       = {abs/2005.04740},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.04740},
  eprinttype    = {arXiv},
  eprint       = {2005.04740},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-04740.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-12227,
  author       = {Yao Cheng and
                  Cheng{-}Kang Chu and
                  Hsiao{-}Ying Lin and
                  Marius Lombard{-}Platet and
                  David Naccache},
  title        = {Keyed Non-Parametric Hypothesis Tests},
  journal      = {CoRR},
  volume       = {abs/2005.12227},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.12227},
  eprinttype    = {arXiv},
  eprint       = {2005.12227},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-12227.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-02353,
  author       = {Guillaume Bertholon and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  Axel Kugelmann and
                  Th{\'{e}}o Lenoir and
                  David Naccache},
  title        = {At Most 43 Moves, At Least 29: Optimal Strategies and Bounds for Ultimate
                  Tic-Tac-Toe},
  journal      = {CoRR},
  volume       = {abs/2006.02353},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.02353},
  eprinttype    = {arXiv},
  eprint       = {2006.02353},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-02353.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-06837,
  author       = {{\'{E}}ric Brier and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  David Naccache and
                  Alessandro Pacco and
                  Emanuele Troiani},
  title        = {Stuttering Conway Sequences Are Still Conway Sequences},
  journal      = {CoRR},
  volume       = {abs/2006.06837},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.06837},
  eprinttype    = {arXiv},
  eprint       = {2006.06837},
  timestamp    = {Wed, 17 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-06837.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-07246,
  author       = {{\'{E}}ric Brier and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  David Naccache and
                  Alessandro Pacco and
                  Emanuele Troiani},
  title        = {The Look-and-Say The Biggest Sequence Eventually Cycles},
  journal      = {CoRR},
  volume       = {abs/2006.07246},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.07246},
  eprinttype    = {arXiv},
  eprint       = {2006.07246},
  timestamp    = {Wed, 17 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-07246.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-11634,
  author       = {{\'{E}}ric Brier and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  David Naccache},
  title        = {A Fractional 3n+1 Conjecture},
  journal      = {CoRR},
  volume       = {abs/2006.11634},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.11634},
  eprinttype    = {arXiv},
  eprint       = {2006.11634},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-11634.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-09085,
  author       = {Marcel Hollenstein and
                  David Naccache and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Robert Weil and
                  Ofer Yifrach{-}Stav},
  title        = {Preservation of {DNA} Privacy During the Large Scale Detection of
                  {COVID-19}},
  journal      = {CoRR},
  volume       = {abs/2007.09085},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.09085},
  eprinttype    = {arXiv},
  eprint       = {2007.09085},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-09085.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Geraud-StewartN20,
  author       = {R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  David Naccache},
  title        = {A French cipher from the late 19th century},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {390},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/390},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Geraud-StewartN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaracoGN20,
  author       = {Jean{-}Claude Caraco and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  David Naccache},
  title        = {Kerckhoffs' Legacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {556},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/556},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaracoGN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HeckmannMMAN19,
  author       = {Thibaut Heckmann and
                  James P. McEvoy and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  David Naccache},
  title        = {Removing epoxy underfill between neighbouring components using acid
                  for component chip-off},
  journal      = {Digit. Investig.},
  volume       = {29},
  pages        = {198--209},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.003},
  doi          = {10.1016/J.DIIN.2019.04.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HeckmannMMAN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HeckmannSN19,
  author       = {Thibaut Heckmann and
                  Thomas R. Souvignet and
                  David Naccache},
  title        = {Decrease of energy deposited during laser decapsulation attacks by
                  dyeing and pigmenting the {ECA:} Application to the forensic micro-repair
                  of wire bonding},
  journal      = {Digit. Investig.},
  volume       = {29},
  pages        = {210--218},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.004},
  doi          = {10.1016/J.DIIN.2019.04.004},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HeckmannSN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GeraudN19,
  author       = {R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {Mixed-radix Naccache-Stern encryption},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {3},
  pages        = {277--282},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0188-7},
  doi          = {10.1007/S13389-018-0188-7},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GeraudN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/FerradiN19,
  author       = {Houda Ferradi and
                  David Naccache},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Integer Reconstruction Public-Key Encryption},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {412--433},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_23},
  doi          = {10.1007/978-3-030-31578-8\_23},
  timestamp    = {Thu, 17 Mar 2022 14:41:28 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/FerradiN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GeraudNR19,
  author       = {R{\'{e}}mi G{\'{e}}raud and
                  David Naccache and
                  Razvan Rosie},
  editor       = {Mitsuru Matsui},
  title        = {Robust Encryption, Extended},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at
                  the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11405},
  pages        = {149--168},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12612-4\_8},
  doi          = {10.1007/978-3-030-12612-4\_8},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GeraudNR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ChengCLLN19,
  author       = {Yao Cheng and
                  Cheng{-}Kang Chu and
                  Hsiao{-}Ying Lin and
                  Marius Lombard{-}Platet and
                  David Naccache},
  editor       = {Joseph K. Liu and
                  Xinyi Huang},
  title        = {Keyed Non-parametric Hypothesis Tests},
  booktitle    = {Network and System Security - 13th International Conference, {NSS}
                  2019, Sapporo, Japan, December 15-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11928},
  pages        = {632--645},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36938-5\_39},
  doi          = {10.1007/978-3-030-36938-5\_39},
  timestamp    = {Wed, 17 Aug 2022 14:30:35 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/ChengCLLN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/GeraudLN19,
  author       = {R{\'{e}}mi G{\'{e}}raud and
                  Marius Lombard{-}Platet and
                  David Naccache},
  editor       = {Chih{-}Cheng Hung and
                  George A. Papadopoulos},
  title        = {Quotient hash tables: efficiently detecting duplicates in streaming
                  data},
  booktitle    = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing,
                  {SAC} 2019, Limassol, Cyprus, April 8-12, 2019},
  pages        = {582--589},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3297280.3297335},
  doi          = {10.1145/3297280.3297335},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/GeraudLN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BeunardeauOMNRR19,
  author       = {Marc Beunardeau and
                  Fatima{-}Ezzahra El Orche and
                  Diana Maimut and
                  David Naccache and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan},
  editor       = {Emil Simion and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart},
  title        = {Authenticated Key Distribution: When the Coupon Collector is Your
                  Enemy},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 12th International Conference, SecITC 2019, Bucharest, Romania,
                  November 14-15, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12001},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41025-4\_1},
  doi          = {10.1007/978-3-030-41025-4\_1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/BeunardeauOMNRR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/CandelGN19,
  author       = {Ga{\"{e}}lle Candel and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  David Naccache},
  editor       = {Maryline Laurent and
                  Thanassis Giannetsos},
  title        = {How to Compartment Secrets},
  booktitle    = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12024},
  pages        = {3--11},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41702-4\_1},
  doi          = {10.1007/978-3-030-41702-4\_1},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/CandelGN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/BarralGJN19,
  author       = {Hadrien Barral and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  Georges{-}Axel Jaloyan and
                  David Naccache},
  editor       = {Alex Gantman and
                  Cl{\'{e}}mentine Maurice},
  title        = {{RISC-V:} {\#}AlphanumericShellcoding},
  booktitle    = {13th {USENIX} Workshop on Offensive Technologies, {WOOT} 2019, Santa
                  Clara, CA, USA, August 12-13, 2019},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/woot19/presentation/barral},
  timestamp    = {Mon, 01 Feb 2021 08:41:53 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/BarralGJN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-04358,
  author       = {R{\'{e}}mi G{\'{e}}raud and
                  Marius Lombard{-}Platet and
                  David Naccache},
  title        = {Quotient Hash Tables - Efficiently Detecting Duplicates in Streaming
                  Data},
  journal      = {CoRR},
  volume       = {abs/1901.04358},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.04358},
  eprinttype    = {arXiv},
  eprint       = {1901.04358},
  timestamp    = {Fri, 01 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-04358.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-03819,
  author       = {Hadrien Barral and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  Georges{-}Axel Jaloyan and
                  David Naccache},
  title        = {{RISC-V:} {\#}AlphanumericShellcoding},
  journal      = {CoRR},
  volume       = {abs/1908.03819},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.03819},
  eprinttype    = {arXiv},
  eprint       = {1908.03819},
  timestamp    = {Mon, 19 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-03819.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeraudNR19,
  author       = {R{\'{e}}mi G{\'{e}}raud and
                  David Naccache and
                  Razvan Rosie},
  title        = {Robust Encryption, Extended},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {238},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/238},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeraudNR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrierFJN19,
  author       = {Eric Brier and
                  Houda Ferradi and
                  Marc Joye and
                  David Naccache},
  title        = {New Number-Theoretic Cryptographic Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {484},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/484},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrierFJN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JoyeLNN19,
  author       = {Marc Joye and
                  Oleksandra Lapiha and
                  Ky Nguyen and
                  David Naccache},
  title        = {The Eleventh Power Residue Symbol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {870},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/870},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JoyeLNN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrierN19,
  author       = {Eric Brier and
                  David Naccache},
  title        = {The Thirteenth Power Residue Symbol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1176},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1176},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrierN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CandelGN19,
  author       = {Ga{\"{e}}lle Candel and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  David Naccache},
  title        = {How to compartment secrets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1397},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1397},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CandelGN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeunardeauOMNRR19,
  author       = {Marc Beunardeau and
                  Fatima{-}Ezzahra El Orche and
                  Diana Maimut and
                  David Naccache and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan},
  title        = {Authenticated Key Distribution: When the Coupon Collector is Your
                  Enemy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1499},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1499},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeunardeauOMNRR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/FerradiGMNZ18,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Diana Maimut and
                  David Naccache and
                  Hang Zhou},
  title        = {Backtracking-assisted multiplication},
  journal      = {Cryptogr. Commun.},
  volume       = {10},
  number       = {1},
  pages        = {17--26},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12095-017-0254-5},
  doi          = {10.1007/S12095-017-0254-5},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccds/FerradiGMNZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HeckmannMNS18,
  author       = {Thibaut Heckmann and
                  Konstantinos Markantonakis and
                  David Naccache and
                  Thomas R. Souvignet},
  title        = {Forensic smartphone analysis using adhesives: Transplantation of Package
                  on Package components},
  journal      = {Digit. Investig.},
  volume       = {26},
  pages        = {29--39},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.05.005},
  doi          = {10.1016/J.DIIN.2018.05.005},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HeckmannMNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/FerradiGMNW18,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Diana Maimut and
                  David Naccache and
                  Amaury de Wargny},
  title        = {Regulating the pace of von Neumann correctors},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {1},
  pages        = {85--91},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-017-0153-x},
  doi          = {10.1007/S13389-017-0153-X},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/FerradiGMNW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/LiuLWQNF18,
  author       = {Weiran Liu and
                  Jianwei Liu and
                  Qianhong Wu and
                  Bo Qin and
                  David Naccache and
                  Houda Ferradi},
  title        = {Efficient subtree-based encryption for fuzzy-entity data sharing},
  journal      = {Soft Comput.},
  volume       = {22},
  number       = {23},
  pages        = {7961--7976},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00500-017-2743-z},
  doi          = {10.1007/S00500-017-2743-Z},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/LiuLWQNF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/histocrypt/NaccacheG18,
  author       = {David Naccache and
                  R{\'{e}}mi G{\'{e}}raud},
  editor       = {Be{\'{a}}ta Megyesi},
  title        = {Invited Talk: {A} French Code from the Late 19th Century},
  booktitle    = {Proceedings of the 1st International Conference on Historical Cryptology,
                  HistoCrypt 2018, Uppsala University, English Park Campus, Humanistiska
                  teatern, Uppsala, Sweden, 18-20 June 2018},
  series       = {Link{\"{o}}ping Electronic Conference Proceedings},
  volume       = {149},
  pages        = {149:003},
  publisher    = {Link{\"{o}}ping University Electronic Press},
  year         = {2018},
  url          = {https://ep.liu.se/en/conference-article.aspx?series=ecp\&\#38;issue=149\&\#38;Article\_No=3},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/histocrypt/NaccacheG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/18/Cogliani0FGMNCW18,
  author       = {Simon Cogliani and
                  Feng Bao and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Diana Maimut and
                  David Naccache and
                  Rodrigo Portella do Canto and
                  Guilin Wang},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Public Key-Based Lightweight Swarm Authentication},
  booktitle    = {Cyber-Physical Systems Security},
  pages        = {255--267},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98935-8\_12},
  doi          = {10.1007/978-3-319-98935-8\_12},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/18/Cogliani0FGMNCW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2018,
  editor       = {David Naccache and
                  Shouhuai Xu and
                  Sihan Qing and
                  Pierangela Samarati and
                  Gregory Blanc and
                  Rongxing Lu and
                  Zonghua Zhang and
                  Ahmed Meddahi},
  title        = {Information and Communications Security - 20th International Conference,
                  {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11149},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01950-1},
  doi          = {10.1007/978-3-030-01950-1},
  isbn         = {978-3-030-01949-5},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeunardeauCFGNV18,
  author       = {Marc Beunardeau and
                  Aisling Connolly and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache and
                  Damien Vergnaud},
  title        = {Reusing Nonces in Schnorr Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeunardeauCFGNV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeraudN18,
  author       = {R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {Mixed-radix Naccache-Stern encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {278},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/278},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeraudN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerradiGGNT18,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Sylvain Guilley and
                  David Naccache and
                  Mehdi Tibouchi},
  title        = {Recovering Secrets From Prefix-Dependent Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {798},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/798},
  timestamp    = {Wed, 03 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FerradiGGNT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HeckmannSN17,
  author       = {Thibaut Heckmann and
                  Thomas R. Souvignet and
                  David Naccache},
  title        = {Electrically conductive adhesives, thermally conductive adhesives
                  and {UV} adhesives in data extraction forensics},
  journal      = {Digit. Investig.},
  volume       = {21},
  pages        = {53--64},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.02.009},
  doi          = {10.1016/J.DIIN.2017.02.009},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HeckmannSN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BeunardeauCGN17,
  author       = {Marc Beunardeau and
                  Aisling Connolly and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {The Case for System Command Encryption},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3056129},
  doi          = {10.1145/3052973.3056129},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BeunardeauCGN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BenhamoudaFGN17,
  author       = {Fabrice Benhamouda and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {Non-interactive Provably Secure Attestations for Arbitrary {RSA} Prime
                  Generation Algorithms},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10492},
  pages        = {206--223},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66402-6\_13},
  doi          = {10.1007/978-3-319-66402-6\_13},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/BenhamoudaFGN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BeunardeauCFGNV17,
  author       = {Marc Beunardeau and
                  Aisling Connolly and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache and
                  Damien Vergnaud},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {Reusing Nonces in Schnorr Signatures - (and Keeping It Secure...)},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10492},
  pages        = {224--241},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66402-6\_14},
  doi          = {10.1007/978-3-319-66402-6\_14},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/BeunardeauCFGNV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/BeunardeauCGN17,
  author       = {Marc Beunardeau and
                  Aisling Connolly and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  editor       = {Tanja Lange and
                  Orr Dunkelman},
  title        = {On the Hardness of the Mersenne Low Hamming Ratio Assumption},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2017 - 5th International Conference
                  on Cryptology and Information Security in Latin America, Havana, Cuba,
                  September 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11368},
  pages        = {166--174},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-030-25283-0\_9},
  doi          = {10.1007/978-3-030-25283-0\_9},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/latincrypt/BeunardeauCGN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/GeraudKLNS17,
  author       = {R{\'{e}}mi G{\'{e}}raud and
                  Mirko Koscina and
                  Paul Lenczner and
                  David Naccache and
                  David Saulpic},
  editor       = {Helger Lipmaa and
                  Aikaterini Mitrokotsa and
                  Raimundas Matulevicius},
  title        = {Generating Functionally Equivalent Programs Having Non-isomorphic
                  Control-Flow Graphs},
  booktitle    = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu,
                  Estonia, November 8-10, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10674},
  pages        = {265--279},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70290-2\_16},
  doi          = {10.1007/978-3-319-70290-2\_16},
  timestamp    = {Mon, 26 Jun 2023 20:48:37 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/GeraudKLNS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BrierGN17,
  author       = {{\'{E}}ric Brier and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  editor       = {Pooya Farshim and
                  Emil Simion},
  title        = {Exploring Naccache-Stern Knapsack Encryption},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 10th International Conference, SecITC 2017, Bucharest, Romania,
                  June 8-9, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10543},
  pages        = {67--82},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69284-5\_6},
  doi          = {10.1007/978-3-319-69284-5\_6},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/BrierGN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/GeraudNR17,
  author       = {R{\'{e}}mi G{\'{e}}raud and
                  David Naccache and
                  Razvan Rosie},
  editor       = {Xiaodong Lin and
                  Ali A. Ghorbani and
                  Kui Ren and
                  Sencun Zhu and
                  Aiqing Zhang},
  title        = {Twisting Lattice and Graph Techniques to Compress Transactional Ledgers},
  booktitle    = {Security and Privacy in Communication Networks - 13th International
                  Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25,
                  2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {238},
  pages        = {108--127},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-78813-5\_6},
  doi          = {10.1007/978-3-319-78813-5\_6},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/GeraudNR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-08357,
  author       = {R{\'{e}}mi G{\'{e}}raud and
                  Mirko Koscina and
                  Paul Lenczner and
                  David Naccache and
                  David Saulpic},
  title        = {Generating Functionally Equivalent Programs Having Non-Isomorphic
                  Control-Flow Graphs},
  journal      = {CoRR},
  volume       = {abs/1709.08357},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.08357},
  eprinttype    = {arXiv},
  eprint       = {1709.08357},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-08357.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeunardeauFGN17,
  author       = {Marc Beunardeau and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {Honey Encryption for Language},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {31},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/031},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeunardeauFGN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrierGN17,
  author       = {Eric Brier and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {Exploring Naccache-Stern Knapsack Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {421},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/421},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrierGN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeunardeauCGN17,
  author       = {Marc Beunardeau and
                  Aisling Connolly and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {On the Hardness of the Mersenne Low Hamming Ratio Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {522},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/522},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeunardeauCGN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaFGN17,
  author       = {Fabrice Benhamouda and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {Non-Interactive Provably Secure Attestations for Arbitrary {RSA} Prime
                  Generation Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {640},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/640},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaFGN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeraudNR17,
  author       = {R{\'{e}}mi G{\'{e}}raud and
                  David Naccache and
                  Razvan Rosie},
  title        = {Twisting Lattice and Graph Techniques to Compress Transactional Ledgers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {751},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/751},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeraudNR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerradiN17,
  author       = {Houda Ferradi and
                  David Naccache},
  title        = {Integer Reconstruction Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1231},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1231},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FerradiN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HeckmannSLN16,
  author       = {Thibaut Heckmann and
                  Thomas R. Souvignet and
                  S. Lepeer and
                  David Naccache},
  title        = {Low-temperature low-cost 58 Bismuth - 42 Tin alloy forensic chip re-balling
                  and re-soldering},
  journal      = {Digit. Investig.},
  volume       = {19},
  pages        = {60--68},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.10.003},
  doi          = {10.1016/J.DIIN.2016.10.003},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HeckmannSLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BeunardeauCGN16,
  author       = {Marc Beunardeau and
                  Aisling Connolly and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {Fully Homomorphic Encryption: Computations with a Blindfold},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {1},
  pages        = {63--67},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.8},
  doi          = {10.1109/MSP.2016.8},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BeunardeauCGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BeunardeauCGN16a,
  author       = {Marc Beunardeau and
                  Aisling Connolly and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {Cdoe Obofsucaitn: Securing Software from Within},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {3},
  pages        = {78--81},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.60},
  doi          = {10.1109/MSP.2016.60},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BeunardeauCGN16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BeunardeauCGN16b,
  author       = {Marc Beunardeau and
                  Aisling Connolly and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {White-Box Cryptography: Security in an Insecure Environment},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {5},
  pages        = {88--92},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.100},
  doi          = {10.1109/MSP.2016.100},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BeunardeauCGN16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/FerradiGNT16,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache and
                  Assia Tria},
  title        = {When organized crime applies academic results: a forensic analysis
                  of an in-card listening device},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {1},
  pages        = {49--59},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-015-0112-3},
  doi          = {10.1007/S13389-015-0112-3},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/FerradiGNT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CoronNTW16,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Mehdi Tibouchi and
                  Ralf{-}Philipp Weinmann},
  title        = {Practical Cryptanalysis of {ISO} 9796-2 and {EMV} Signatures},
  journal      = {J. Cryptol.},
  volume       = {29},
  number       = {3},
  pages        = {632--656},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00145-015-9205-5},
  doi          = {10.1007/S00145-015-9205-5},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CoronNTW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/FerradiGMNP16,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Diana Maimut and
                  David Naccache and
                  David Pointcheval},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Legally Fair Contract Signing Without Keystones},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {175--190},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_10},
  doi          = {10.1007/978-3-319-39555-5\_10},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/FerradiGMNP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/CantoKN16,
  author       = {Rodrigo Portella do Canto and
                  Roman Korkikian and
                  David Naccache},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {Buying {AES} Design Resistance with Speed and Energy},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {134--147},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_9},
  doi          = {10.1007/978-3-662-49301-4\_9},
  timestamp    = {Sat, 19 Oct 2019 20:29:10 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/CantoKN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/GeraudMN16,
  author       = {R{\'{e}}mi G{\'{e}}raud and
                  Diana Maimut and
                  David Naccache},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {Double-Speed Barrett Moduli},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {148--158},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_10},
  doi          = {10.1007/978-3-662-49301-4\_10},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/GeraudMN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/AmarilliBGN16,
  author       = {Antoine Amarilli and
                  Marc Beunardeau and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {Failure is Also an Option},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {161--165},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_11},
  doi          = {10.1007/978-3-662-49301-4\_11},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/birthday/AmarilliBGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/ChevalierGNC16,
  author       = {C{\'{e}}line Chevalier and
                  Damien Gaumont and
                  David Naccache and
                  Rodrigo Portella do Canto},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {How to (Carefully) Breach a Service Contract?},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {166--173},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_12},
  doi          = {10.1007/978-3-662-49301-4\_12},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/ChevalierGNC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/DutertreMNT16,
  author       = {Jean{-}Max Dutertre and
                  Amir{-}Pasha Mirbaha and
                  David Naccache and
                  Assia Tria},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {Photonic Power Firewalls},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {342--354},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_21},
  doi          = {10.1007/978-3-662-49301-4\_21},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/DutertreMNT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/DangerGHMN16,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {Improving the Big Mac Attack on Elliptic Curve Cryptography},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {374--386},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_23},
  doi          = {10.1007/978-3-662-49301-4\_23},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/DangerGHMN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/FouqueGMN16,
  author       = {Pierre{-}Alain Fouque and
                  Sylvain Guilley and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {Safe-Errors on {SPA} Protected Implementations with the Atomicity
                  Technique},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {479--493},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_30},
  doi          = {10.1007/978-3-662-49301-4\_30},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/birthday/FouqueGMN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/AerabiAFGNV16,
  author       = {Ehsan Aerabi and
                  A. Elhadi Amirouche and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache and
                  Jean Vuillemin},
  editor       = {William H. Robinson and
                  Swarup Bhunia and
                  Ryan Kastner},
  title        = {The Conjoined Microprocessor},
  booktitle    = {2016 {IEEE} International Symposium on Hardware Oriented Security
                  and Trust, {HOST} 2016, McLean, VA, USA, May 3-5, 2016},
  pages        = {67--70},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/HST.2016.7495558},
  doi          = {10.1109/HST.2016.7495558},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/AerabiAFGNV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/CoglianiFGN16,
  author       = {Simon Cogliani and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {344--353},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_24},
  doi          = {10.1007/978-3-319-49151-6\_24},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/CoglianiFGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/BarralFGJN16,
  author       = {Hadrien Barral and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Georges{-}Axel Jaloyan and
                  David Naccache},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {ARMv8 Shellcodes from 'A' to 'Z'},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {354--377},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_25},
  doi          = {10.1007/978-3-319-49151-6\_25},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/BarralFGJN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/BeunardeauFGN16,
  author       = {Marc Beunardeau and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Honey Encryption for Language - Robbing Shannon to Pay Turing?},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {127--144},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_7},
  doi          = {10.1007/978-3-319-61273-7\_7},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mycrypt/BeunardeauFGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/FerradiGN16,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Human Public-Key Encryption},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {494--505},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_26},
  doi          = {10.1007/978-3-319-61273-7\_26},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mycrypt/FerradiGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/birthday/2016kahn,
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4},
  doi          = {10.1007/978-3-662-49301-4},
  isbn         = {978-3-662-49300-7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/2016kahn.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BarralFGJN16,
  author       = {Hadrien Barral and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Georges{-}Axel Jaloyan and
                  David Naccache},
  title        = {ARMv8 Shellcodes from 'A' to 'Z'},
  journal      = {CoRR},
  volume       = {abs/1608.03415},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.03415},
  eprinttype    = {arXiv},
  eprint       = {1608.03415},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BarralFGJN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CioranescoFGN16,
  author       = {Jean{-}Michel Cioranesco and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {Process Table Covert Channels: Exploitation and Countermeasures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {227},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/227},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CioranescoFGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerradiGMNP16,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Diana Maimut and
                  David Naccache and
                  David Pointcheval},
  title        = {Legally Fair Contract Signing Without Keystones},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/363},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FerradiGMNP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerradiGN16,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {Slow Motion Zero Knowledge Identifying With Colliding Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {399},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/399},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FerradiGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoglianiFGN16,
  author       = {Simon Cogliani and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {443},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/443},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoglianiFGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuLWQNF16,
  author       = {Weiran Liu and
                  Jianwei Liu and
                  Qianhong Wu and
                  Bo Qin and
                  David Naccache and
                  Houda Ferradi},
  title        = {Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption
                  for Fuzzy-entity Data Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {634},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/634},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuLWQNF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoglianiBFGMNCW16,
  author       = {Simon Cogliani and
                  Feng Bao and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Diana Maimut and
                  David Naccache and
                  Rodrigo Portella do Canto and
                  Guilin Wang},
  title        = {Public-Key Based Lightweight Swarm Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {750},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/750},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoglianiBFGMNCW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerradiGN16a,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {Human Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {763},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/763},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FerradiGN16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoglianiGN16,
  author       = {Simon Cogliani and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {A Fiat-Shamir Implementation Note},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1039},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoglianiGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/QinDWDNZ15,
  author       = {Bo Qin and
                  Hua Deng and
                  Qianhong Wu and
                  Josep Domingo{-}Ferrer and
                  David Naccache and
                  Yunya Zhou},
  title        = {Flexible attribute-based encryption applicable to secure e-healthcare
                  records},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {6},
  pages        = {499--511},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0272-7},
  doi          = {10.1007/S10207-014-0272-7},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/QinDWDNZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/FerradiGN15,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  editor       = {Dongdai Lin and
                  XiaoFeng Wang and
                  Moti Yung},
  title        = {Slow Motion Zero Knowledge Identifying with Colliding Commitments},
  booktitle    = {Information Security and Cryptology - 11th International Conference,
                  Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9589},
  pages        = {381--396},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-38898-4\_22},
  doi          = {10.1007/978-3-319-38898-4\_22},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/FerradiGN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isvlsi/ClementMNT15,
  author       = {J{\'{e}}r{\'{e}}mie Cl{\'{e}}ment and
                  Bruno Mussard and
                  David Naccache and
                  Lionel Torres},
  title        = {Implementation of {AES} Using {NVM} Memories Based on Comparison Function},
  booktitle    = {2015 {IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2015,
                  Montpellier, France, July 8-10, 2015},
  pages        = {356--361},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISVLSI.2015.37},
  doi          = {10.1109/ISVLSI.2015.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isvlsi/ClementMNT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BrierCGMN15,
  author       = {Eric Brier and
                  Jean{-}S{\'{e}}bastien Coron and
                  R{\'{e}}mi G{\'{e}}raud and
                  Diana Maimut and
                  David Naccache},
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {A Number-Theoretic Error-Correcting Code},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  pages        = {25--35},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8\_2},
  doi          = {10.1007/978-3-319-27179-8\_2},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/BrierCGMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/GeraudMNCS15,
  author       = {R{\'{e}}mi G{\'{e}}raud and
                  Diana{-}Stefania Maimut and
                  David Naccache and
                  Rodrigo Portella do Canto and
                  Emil Simion},
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {Applying Cryptographic Acceleration Techniques to Error Correction},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  pages        = {150--168},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8\_11},
  doi          = {10.1007/978-3-319-27179-8\_11},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/GeraudMNCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2015,
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1},
  doi          = {10.1007/978-3-319-26823-1},
  isbn         = {978-3-319-26822-4},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secitc/2015,
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8},
  doi          = {10.1007/978-3-319-27179-8},
  isbn         = {978-3-319-27178-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BrierCGMN15,
  author       = {Eric Brier and
                  Jean{-}S{\'{e}}bastien Coron and
                  R{\'{e}}mi G{\'{e}}raud and
                  Diana Maimut and
                  David Naccache},
  title        = {A Number-Theoretic Error-Correcting Code},
  journal      = {CoRR},
  volume       = {abs/1509.00378},
  year         = {2015},
  url          = {http://arxiv.org/abs/1509.00378},
  eprinttype    = {arXiv},
  eprint       = {1509.00378},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BrierCGMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/QinDWDNZ15,
  author       = {Bo Qin and
                  Hua Deng and
                  Qianhong Wu and
                  Josep Domingo{-}Ferrer and
                  David Naccache and
                  Yunya Zhou},
  title        = {Flexible Attribute-Based Encryption Applicable to Secure E-Healthcare
                  Records},
  journal      = {CoRR},
  volume       = {abs/1512.06578},
  year         = {2015},
  url          = {http://arxiv.org/abs/1512.06578},
  eprinttype    = {arXiv},
  eprint       = {1512.06578},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/QinDWDNZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeraudMN15,
  author       = {R{\'{e}}mi G{\'{e}}raud and
                  Diana Maimut and
                  David Naccache},
  title        = {Double-Speed Barrett Moduli},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {785},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/785},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeraudMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CioranescoKNC15,
  author       = {Jean{-}Michel Cioranesco and
                  Roman Korkikian and
                  David Naccache and
                  Rodrigo Portella do Canto},
  title        = {Buying {AES} Design Resistance with Speed and Energy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {786},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/786},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CioranescoKNC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerradiGMNZ15,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Diana Maimut and
                  David Naccache and
                  Hang Zhou},
  title        = {Backtracking-Assisted Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {787},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/787},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FerradiGMNZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FouqueGMN15,
  author       = {Pierre{-}Alain Fouque and
                  Sylvain Guilley and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  title        = {Safe-Errors on {SPA} Protected implementations with the Atomicity
                  Technique},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {794},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/794},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FouqueGMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DangerGHMN15,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  title        = {Improving the Big Mac Attack on Elliptic Curve Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {819},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/819},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DangerGHMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerradiGMNW15,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Diana Maimut and
                  David Naccache and
                  Amaury de Wargny},
  title        = {Regulating the Pace of von Neumann Correctors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {849},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/849},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FerradiGMNW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeraudMNCS15,
  author       = {R{\'{e}}mi G{\'{e}}raud and
                  Diana{-}Stefania Maimut and
                  David Naccache and
                  Rodrigo Portella do Canto and
                  Emil Simion},
  title        = {Applying Cryptographic Acceleration Techniques to Error Correction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {886},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/886},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeraudMNCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerradiGNT15,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache and
                  Assia Tria},
  title        = {When Organized Crime Applies Academic Results - {A} Forensic Analysis
                  of an In-Card Listening Device},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {963},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/963},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FerradiGNT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AerabiAFGNV15,
  author       = {Ehsan Aerabi and
                  A. Elhadi Amirouche and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache and
                  Jean Vuillemin},
  title        = {The Conjoined Microprocessor},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {974},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/974},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AerabiAFGNV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/MsgnaMNM14,
  author       = {Mehari Msgna and
                  Konstantinos Markantonakis and
                  David Naccache and
                  Keith Mayes},
  editor       = {Emmanuel Prouff},
  title        = {Verifying Software Integrity in Embedded Systems: {A} Side Channel
                  Approach},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 5th International
                  Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8622},
  pages        = {261--280},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10175-0\_18},
  doi          = {10.1007/978-3-319-10175-0\_18},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/MsgnaMNM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/KorkikianPN14,
  author       = {Roman Korkikian and
                  Sylvain Pelissier and
                  David Naccache},
  editor       = {Assia Tria and
                  Dooho Choi},
  title        = {Blind Fault Attack against {SPN} Ciphers},
  booktitle    = {2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2014, Busan, South Korea, September 23, 2014},
  pages        = {94--103},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/FDTC.2014.19},
  doi          = {10.1109/FDTC.2014.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/KorkikianPN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/CioranescoDGGMNN14,
  author       = {Jean{-}Michel Cioranesco and
                  Jean{-}Luc Danger and
                  Tarik Graba and
                  Sylvain Guilley and
                  Yves Mathieu and
                  David Naccache and
                  Xuan Thuy Ngo},
  title        = {Cryptographically secure shields},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {25--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855563},
  doi          = {10.1109/HST.2014.6855563},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/CioranescoDGGMNN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/AbdallaCFJN14,
  author       = {Michel Abdalla and
                  Herv{\'{e}} Chabanne and
                  Houda Ferradi and
                  Julien Jainski and
                  David Naccache},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Improving Thomlinson-Walker's Software Patching Scheme Using Standard
                  Cryptographic and Statistical Tools},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {8--14},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_2},
  doi          = {10.1007/978-3-319-06320-1\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/AbdallaCFJN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/CoglianiMNCRVV14,
  author       = {Simon Cogliani and
                  Diana{-}Stefania Maimut and
                  David Naccache and
                  Rodrigo Portella do Canto and
                  Reza Reyhanitabar and
                  Serge Vaudenay and
                  Damian Viz{\'{a}}r},
  editor       = {Antoine Joux and
                  Amr M. Youssef},
  title        = {{OMD:} {A} Compression Function Mode of Operation for Authenticated
                  Encryption},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference,
                  Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8781},
  pages        = {112--128},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13051-4\_7},
  doi          = {10.1007/978-3-319-13051-4\_7},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/CoglianiMNCRVV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/NaccacheSCY14,
  author       = {David Naccache and
                  Rainer Steinwandt and
                  Adriana Su{\'{a}}rez Corona and
                  Moti Yung},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {598--607},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_34},
  doi          = {10.1007/978-3-319-10879-7\_34},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/NaccacheSCY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BourgeatBCCCFHMNV14,
  author       = {Thomas Bourgeat and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Robin Champenois and
                  J{\'{e}}r{\'{e}}mie Cl{\'{e}}ment and
                  Houda Ferradi and
                  Marc Heinrich and
                  Paul Melotti and
                  David Naccache and
                  Antoine Voizard},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {New Algorithmic Approaches to Point Constellation Recognition},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {80--90},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_7},
  doi          = {10.1007/978-3-642-55415-5\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BourgeatBCCCFHMNV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/14/BrierNX14,
  author       = {Eric Brier and
                  David Naccache and
                  Li{-}yao Xia},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {How to Sign Paper Contracts? Conjectures and Evidence Related to Equitable
                  and Efficient Collaborative Task Scheduling},
  booktitle    = {Open Problems in Mathematics and Computational Science},
  pages        = {317--340},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10683-0\_13},
  doi          = {10.1007/978-3-319-10683-0\_13},
  timestamp    = {Tue, 16 May 2017 14:01:44 +0200},
  biburl       = {https://dblp.org/rec/books/sp/14/BrierNX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wistp/2014,
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8},
  doi          = {10.1007/978-3-662-43826-8},
  isbn         = {978-3-662-43825-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BourgeatBCCCFHMNV14,
  author       = {Thomas Bourgeat and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Robin Champenois and
                  J{\'{e}}r{\'{e}}mie Cl{\'{e}}ment and
                  Houda Ferradi and
                  Marc Heinrich and
                  Paul Melotti and
                  David Naccache and
                  Antoine Voizard},
  title        = {New Algorithmic Approaches to Point Constellation Recognition},
  journal      = {CoRR},
  volume       = {abs/1405.1402},
  year         = {2014},
  url          = {http://arxiv.org/abs/1405.1402},
  eprinttype    = {arXiv},
  eprint       = {1405.1402},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BourgeatBCCCFHMNV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CioranescoFN13,
  author       = {Jean{-}Michel Cioranesco and
                  Houda Ferradi and
                  David Naccache},
  title        = {Communicating Covertly through {CPU} Monitoring},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {11},
  number       = {6},
  pages        = {71--73},
  year         = {2013},
  url          = {https://doi.org/10.1109/MSP.2013.140},
  doi          = {10.1109/MSP.2013.140},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CioranescoFN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DangerGHMN13,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  title        = {A synthesis of side-channel attacks on elliptic curve cryptography
                  in smart-cards},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {4},
  pages        = {241--265},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0062-6},
  doi          = {10.1007/S13389-013-0062-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/DangerGHMN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/MaimutMNT13,
  author       = {Diana Maimut and
                  C{\'{e}}dric Murdica and
                  David Naccache and
                  Mehdi Tibouchi},
  editor       = {Emmanuel Prouff},
  title        = {Fault Attacks on Projective-to-Affine Coordinates Conversion},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 4th International
                  Workshop, {COSADE} 2013, Paris, France, March 6-8, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7864},
  pages        = {46--61},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40026-1\_4},
  doi          = {10.1007/978-3-642-40026-1\_4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/MaimutMNT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/KorkikianNAC13,
  author       = {Roman Korkikian and
                  David Naccache and
                  Guilherme Ozari de Almeida and
                  Rodrigo Portella do Canto},
  editor       = {Mohammad S. Obaidat and
                  Joaquim Filipe},
  title        = {Practical Instantaneous Frequency Analysis Experiments},
  booktitle    = {E-Business and Telecommunications - International Joint Conference,
                  {ICETE} 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {456},
  pages        = {17--34},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-44788-8\_2},
  doi          = {10.1007/978-3-662-44788-8\_2},
  timestamp    = {Tue, 16 Aug 2022 23:04:29 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/KorkikianNAC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/Naccache13,
  author       = {David Naccache},
  editor       = {Mohammad S. Obaidat and
                  Jos{\'{e}} Luis Sevillano and
                  Zhaoyang Zhang and
                  David A. Marca and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Piero Castoldi and
                  Victor Torres{-}Padrosa},
  title        = {Instantaneous Frequency Analysis},
  booktitle    = {DCNET, {ICE-B} and {OPTICS} 2013 - Proceedings of the 4th International
                  Conference on Data Communication Networking, 10th International Conference
                  on e-Business and 4th International Conference on Optical Communication
                  Systems, Reykjav{\'{\i}}k, Iceland, 29 - 31 July, 2013},
  pages        = {IS--11},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7220043/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/Naccache13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isspit/DangerGHMN13,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  title        = {Dynamic countermeasure against the Zero Power Analysis},
  booktitle    = {{IEEE} International Symposium on Signal Processing and Information
                  Technology, Athens, Greece, December 12-15, 2013},
  pages        = {140--147},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSPIT.2013.6781869},
  doi          = {10.1109/ISSPIT.2013.6781869},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isspit/DangerGHMN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KorkikianNA13,
  author       = {Roman Korkikian and
                  David Naccache and
                  Guilherme Ozari de Almeida},
  title        = {Instantaneous Frequency Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {320},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/320},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KorkikianNA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrierNX13,
  author       = {Eric Brier and
                  David Naccache and
                  Li{-}yao Xia},
  title        = {How to Sign Paper Contracts? Conjectures {\&} Evidence Related
                  to Equitable {\&} Efficient Collaborative Task Scheduling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {432},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/432},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrierNX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChabanneCDFN13,
  author       = {Herv{\'{e}} Chabanne and
                  Jean{-}Michel Cioranesco and
                  Vincent Despiegel and
                  Jean{-}Christophe Fondeur and
                  David Naccache},
  title        = {Using Hamiltonian Totems as Passwords},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {751},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/751},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChabanneCDFN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DangerGHMN13,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  title        = {Dynamic Countermeasure Against the Zero Power Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {764},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/764},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DangerGHMN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BrierFN12,
  author       = {Eric Brier and
                  Wenjie Fang and
                  David Naccache},
  title        = {How to Scatter a Secret?},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {1},
  pages        = {46--54},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.635100},
  doi          = {10.1080/01611194.2012.635100},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BrierFN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/BarenghiBKN12,
  author       = {Alessandro Barenghi and
                  Luca Breveglieri and
                  Israel Koren and
                  David Naccache},
  title        = {Fault Injection Attacks on Cryptographic Devices: Theory, Practice,
                  and Countermeasures},
  journal      = {Proc. {IEEE}},
  volume       = {100},
  number       = {11},
  pages        = {3056--3076},
  year         = {2012},
  url          = {https://doi.org/10.1109/JPROC.2012.2188769},
  doi          = {10.1109/JPROC.2012.2188769},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/BarenghiBKN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/NaccacheP12,
  author       = {David Naccache and
                  David Pointcheval},
  editor       = {David Naccache},
  title        = {Autotomic Signatures},
  booktitle    = {Cryptography and Security: From Theory to Applications - Essays Dedicated
                  to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {6805},
  pages        = {143--155},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28368-0\_12},
  doi          = {10.1007/978-3-642-28368-0\_12},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/NaccacheP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/ChungMMNS12,
  author       = {Byungchun Chung and
                  Sandra Marcello and
                  Amir{-}Pasha Mirbaha and
                  David Naccache and
                  Karim Sabeg},
  editor       = {David Naccache},
  title        = {Operand Folding Hardware Multipliers},
  booktitle    = {Cryptography and Security: From Theory to Applications - Essays Dedicated
                  to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {6805},
  pages        = {319--328},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28368-0\_21},
  doi          = {10.1007/978-3-642-28368-0\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/ChungMMNS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/GratzerN12,
  author       = {Vanessa Gratzer and
                  David Naccache},
  editor       = {David Naccache},
  title        = {How to Read a Signature?},
  booktitle    = {Cryptography and Security: From Theory to Applications - Essays Dedicated
                  to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {6805},
  pages        = {480--483},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28368-0\_31},
  doi          = {10.1007/978-3-642-28368-0\_31},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/GratzerN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/ClaretMNS12,
  author       = {Guillaume Claret and
                  Micha{\"{e}}l Mathieu and
                  David Naccache and
                  Guillaume Seguin},
  editor       = {David Naccache},
  title        = {Physical Simulation of Inarticulate Robots},
  booktitle    = {Cryptography and Security: From Theory to Applications - Essays Dedicated
                  to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {6805},
  pages        = {491--499},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28368-0\_33},
  doi          = {10.1007/978-3-642-28368-0\_33},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/ClaretMNS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/DangerGHMN12,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  editor       = {Stefan Mangard},
  title        = {Low-Cost Countermeasure against {RPA}},
  booktitle    = {Smart Card Research and Advanced Applications - 11th International
                  Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7771},
  pages        = {106--122},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37288-9\_8},
  doi          = {10.1007/978-3-642-37288-9\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/DangerGHMN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/BrierFKMNAPRV12,
  author       = {Eric Brier and
                  Quentin Fortier and
                  Roman Korkikian and
                  Khalid W. Magld and
                  David Naccache and
                  Guilherme Ozari de Almeida and
                  Adrien Pommellet and
                  A. H. Ragab and
                  Jean Vuillemin},
  editor       = {Stefan Mangard},
  title        = {Defensive Leakage Camouflage},
  booktitle    = {Smart Card Research and Advanced Applications - 11th International
                  Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7771},
  pages        = {277--295},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37288-9\_19},
  doi          = {10.1007/978-3-642-37288-9\_19},
  timestamp    = {Wed, 19 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/BrierFKMNAPRV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BriaisCCDGJMNP12,
  author       = {S{\'{e}}bastien Briais and
                  St{\'{e}}phane Caron and
                  Jean{-}Michel Cioranesco and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Jacques{-}Henri Jourdan and
                  Arthur Milchior and
                  David Naccache and
                  Thibault Porteboeuf},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {3D Hardware Canaries},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {1--22},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_1},
  doi          = {10.1007/978-3-642-33027-8\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BriaisCCDGJMNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/MurdicaGDHN12,
  author       = {C{\'{e}}dric Murdica and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Philippe Hoogvorst and
                  David Naccache},
  editor       = {Werner Schindler and
                  Sorin A. Huss},
  title        = {Same Values Power Analysis Using Special Points on Elliptic Curves},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - Third International
                  Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7275},
  pages        = {183--198},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29912-4\_14},
  doi          = {10.1007/978-3-642-29912-4\_14},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/MurdicaGDHN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CoronNT12,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Mehdi Tibouchi},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Public Key Compression and Modulus Switching for Fully Homomorphic
                  Encryption over the Integers},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {446--464},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_27},
  doi          = {10.1007/978-3-642-29011-4\_27},
  timestamp    = {Sun, 12 Nov 2023 02:15:08 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CoronNT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/BriaisCDGNP12,
  author       = {S{\'{e}}bastien Briais and
                  Jean{-}Michel Cioranesco and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  David Naccache and
                  Thibault Porteboeuf},
  editor       = {Guido Bertoni and
                  Benedikt Gierlichs},
  title        = {Random Active Shield},
  booktitle    = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven,
                  Belgium, September 9, 2012},
  pages        = {103--113},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/FDTC.2012.11},
  doi          = {10.1109/FDTC.2012.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/BriaisCDGNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/DutertreMNRTV12,
  author       = {Jean{-}Max Dutertre and
                  Amir{-}Pasha Mirbaha and
                  David Naccache and
                  Anne{-}Lise Ribotta and
                  Assia Tria and
                  Thierry Vaschalde},
  title        = {Fault Round Modification Analysis of the advanced encryption standard},
  booktitle    = {2012 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2012, San Francisco, CA, USA, June 3-4, 2012},
  pages        = {140--145},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/HST.2012.6224334},
  doi          = {10.1109/HST.2012.6224334},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/DutertreMNRTV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/CoronNT12,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Mehdi Tibouchi},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Another Look at Affine-Padding {RSA} Signatures},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {22--32},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_2},
  doi          = {10.1007/978-3-642-37682-5\_2},
  timestamp    = {Thu, 12 Nov 2020 16:27:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/CoronNT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tgc/AmarilliHBMNR12,
  author       = {Antoine Amarilli and
                  Fabrice Ben Hamouda and
                  Florian Bourse and
                  Robin Morisset and
                  David Naccache and
                  Pablo Rauzy},
  editor       = {Catuscia Palamidessi and
                  Mark Dermot Ryan},
  title        = {From Rational Number Reconstruction to Set Reconciliation and File
                  Synchronization},
  booktitle    = {Trustworthy Global Computing - 7th International Symposium, {TGC}
                  2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8191},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-41157-1\_1},
  doi          = {10.1007/978-3-642-41157-1\_1},
  timestamp    = {Wed, 07 Dec 2022 23:14:04 +0100},
  biburl       = {https://dblp.org/rec/conf/tgc/AmarilliHBMNR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/birthday/2012quisquater,
  editor       = {David Naccache},
  title        = {Cryptography and Security: From Theory to Applications - Essays Dedicated
                  to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {6805},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28368-0},
  doi          = {10.1007/978-3-642-28368-0},
  isbn         = {978-3-642-28367-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/2012quisquater.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BriaisCCDGJMNP12,
  author       = {S{\'{e}}bastien Briais and
                  St{\'{e}}phane Caron and
                  Jean{-}Michel Cioranesco and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Jacques{-}Henri Jourdan and
                  Arthur Milchior and
                  David Naccache and
                  Thibault Porteboeuf},
  title        = {3D Hardware Canaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {324},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/324},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BriaisCCDGJMNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrierFKMNAPRV12,
  author       = {Eric Brier and
                  Quentin Fortier and
                  Roman Korkikian and
                  Khalid W. Magld and
                  David Naccache and
                  Guilherme Ozari de Almeida and
                  Adrien Pommellet and
                  A. H. Ragab and
                  Jean Vuillemin},
  title        = {Defensive Leakage Camouflage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {728},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/728},
  timestamp    = {Wed, 19 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BrierFKMNAPRV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BrierNNT11,
  author       = {Eric Brier and
                  David Naccache and
                  Phong Q. Nguyen and
                  Mehdi Tibouchi},
  title        = {Modulus fault attacks against {RSA-CRT} signatures},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {3},
  pages        = {243--253},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0015-x},
  doi          = {10.1007/S13389-011-0015-X},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BrierNNT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BrierNNT11,
  author       = {Eric Brier and
                  David Naccache and
                  Phong Q. Nguyen and
                  Mehdi Tibouchi},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Modulus Fault Attacks against {RSA-CRT} Signatures},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {192--206},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_13},
  doi          = {10.1007/978-3-642-23951-9\_13},
  timestamp    = {Sat, 19 Oct 2019 20:26:25 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BrierNNT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronMNT11,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Avradip Mandal and
                  David Naccache and
                  Mehdi Tibouchi},
  editor       = {Phillip Rogaway},
  title        = {Fully Homomorphic Encryption over the Integers with Shorter Public
                  Keys},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {487--504},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_28},
  doi          = {10.1007/978-3-642-22792-9\_28},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CoronMNT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/AmarilliNRS11,
  author       = {Antoine Amarilli and
                  David Naccache and
                  Pablo Rauzy and
                  Emil Simion},
  editor       = {Liqun Chen},
  title        = {Can a Program Reverse-Engineer Itself?},
  booktitle    = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC}
                  2011, Oxford, UK, December 12-15, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7089},
  pages        = {1--9},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25516-8\_1},
  doi          = {10.1007/978-3-642-25516-8\_1},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/AmarilliNRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CoronJMNT11,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Antoine Joux and
                  Avradip Mandal and
                  David Naccache and
                  Mehdi Tibouchi},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Cryptanalysis of the {RSA} Subgroup Assumption from {TCC} 2005},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {147--155},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_9},
  doi          = {10.1007/978-3-642-19379-8\_9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/CoronJMNT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/AmarilliMNPRT11,
  author       = {Antoine Amarilli and
                  Sascha M{\"{u}}ller and
                  David Naccache and
                  Dan Page and
                  Pablo Rauzy and
                  Michael Tunstall},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Can Code Polymorphism Limit Information Leakage?},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_1},
  doi          = {10.1007/978-3-642-21040-2\_1},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/AmarilliMNPRT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fdtc/2011,
  editor       = {Luca Breveglieri and
                  Sylvain Guilley and
                  Israel Koren and
                  David Naccache and
                  Junko Takahashi},
  title        = {2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2011, Tokyo, Japan, September 29, 2011},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6075045/proceeding},
  isbn         = {978-1-4577-1463-4},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Naccache11,
  author       = {David Naccache},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Autotomic Signatures},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {68},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_888},
  doi          = {10.1007/978-1-4419-5906-5\_888},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Naccache11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Naccache11a,
  author       = {David Naccache},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Barrett's Algorithm},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {71},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_501},
  doi          = {10.1007/978-1-4419-5906-5\_501},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Naccache11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Naccache11b,
  author       = {David Naccache},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Blackmailing Attacks},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {148},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_889},
  doi          = {10.1007/978-1-4419-5906-5\_889},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Naccache11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Naccache11c,
  author       = {David Naccache},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Chemical Combinatorial Attack},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {200--201},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_890},
  doi          = {10.1007/978-1-4419-5906-5\_890},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Naccache11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Naccache11d,
  author       = {David Naccache},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Cryptophthora},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {284},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_891},
  doi          = {10.1007/978-1-4419-5906-5\_891},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Naccache11d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Naccache11e,
  author       = {David Naccache},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Generic Model},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {512--513},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_507},
  doi          = {10.1007/978-1-4419-5906-5\_507},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Naccache11e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Naccache11f,
  author       = {David Naccache},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Gr{\"{o}}bner Basis},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {519},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_508},
  doi          = {10.1007/978-1-4419-5906-5\_508},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Naccache11f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Naccache11g,
  author       = {David Naccache},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Monotone Signatures},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {799},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_892},
  doi          = {10.1007/978-1-4419-5906-5\_892},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Naccache11g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Naccache11h,
  author       = {David Naccache},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Multiplicative Knapsack Cryptosystem},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {818},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_513},
  doi          = {10.1007/978-1-4419-5906-5\_513},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Naccache11h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Naccache11i,
  author       = {David Naccache},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Naccache-Stern Higher Residues Cryptosystem},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {829},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_893},
  doi          = {10.1007/978-1-4419-5906-5\_893},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Naccache11i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Naccache11j,
  author       = {David Naccache},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Phenotyping},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {927},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_894},
  doi          = {10.1007/978-1-4419-5906-5\_894},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Naccache11j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Naccache11k,
  author       = {David Naccache},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Reverse Public Key Encryption},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1044},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_895},
  doi          = {10.1007/978-1-4419-5906-5\_895},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Naccache11k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Naccache11l,
  author       = {David Naccache},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Standard Model},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1253},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_518},
  doi          = {10.1007/978-1-4419-5906-5\_518},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Naccache11l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Naccache11m,
  author       = {David Naccache},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Temperature Attack},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1283},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_519},
  doi          = {10.1007/978-1-4419-5906-5\_519},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Naccache11m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Naccache11n,
  author       = {David Naccache},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Twin Signatures},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1338},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_896},
  doi          = {10.1007/978-1-4419-5906-5\_896},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Naccache11n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Naccache11o,
  author       = {David Naccache},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {von Neumann Correction},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1364},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_520},
  doi          = {10.1007/978-1-4419-5906-5\_520},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Naccache11o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1104-1533,
  author       = {Byungchun Chung and
                  Sandra Marcello and
                  Amir{-}Pasha Mirbaha and
                  David Naccache and
                  Karim Sabeg},
  title        = {Operand Folding Hardware Multipliers},
  journal      = {CoRR},
  volume       = {abs/1104.1533},
  year         = {2011},
  url          = {http://arxiv.org/abs/1104.1533},
  eprinttype    = {arXiv},
  eprint       = {1104.1533},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1104-1533.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1104-1546,
  author       = {Guillaume Claret and
                  Micha{\"{e}}l Mathieu and
                  David Naccache and
                  Guillaume Seguin},
  title        = {Physical Simulation of Inarticulate Robots},
  journal      = {CoRR},
  volume       = {abs/1104.1546},
  year         = {2011},
  url          = {http://arxiv.org/abs/1104.1546},
  eprinttype    = {arXiv},
  eprint       = {1104.1546},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1104-1546.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronNT11,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Mehdi Tibouchi},
  title        = {Another Look at {RSA} Signatures With Affine Padding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {57},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/057},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronNT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmarilliMNPRT11,
  author       = {Antoine Amarilli and
                  Sascha M{\"{u}}ller and
                  David Naccache and
                  Daniel Page and
                  Pablo Rauzy and
                  Michael Tunstall},
  title        = {Can Code Polymorphism Limit Information Leakage?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {99},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmarilliMNPRT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrierNNT11,
  author       = {Eric Brier and
                  David Naccache and
                  Phong Q. Nguyen and
                  Mehdi Tibouchi},
  title        = {Modulus Fault Attacks Against {RSA-CRT} Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {388},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/388},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrierNNT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronNT11a,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Mehdi Tibouchi},
  title        = {Optimization of Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {440},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/440},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronNT11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronMNT11,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Avradip Mandal and
                  David Naccache and
                  Mehdi Tibouchi},
  title        = {Fully Homomorphic Encryption over the Integers with Shorter Public
                  Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {441},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/441},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronMNT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmarilliNRS11,
  author       = {Antoine Amarilli and
                  David Naccache and
                  Pablo Rauzy and
                  Emil Simion},
  title        = {Can a Program Reverse-Engineer Itself?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {497},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/497},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmarilliNRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc6287,
  author       = {David M'Ra{\"{\i}}hi and
                  Johan Rydell and
                  Siddharth Bajaj and
                  Salah Machani and
                  David Naccache},
  title        = {{OCRA:} {OATH} Challenge-Response Algorithm},
  journal      = {{RFC}},
  volume       = {6287},
  pages        = {1--38},
  year         = {2011},
  url          = {https://doi.org/10.17487/RFC6287},
  doi          = {10.17487/RFC6287},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc6287.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BauerCNTV10,
  author       = {Aur{\'{e}}lie Bauer and
                  Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Mehdi Tibouchi and
                  Damien Vergnaud},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {On the Broadcast and Validity-Checking Security of pkcs{\#}1 v1.5
                  Encryption},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {1--18},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_1},
  doi          = {10.1007/978-3-642-13708-2\_1},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BauerCNTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/JoyeNP10,
  author       = {Marc Joye and
                  David Naccache and
                  St{\'{e}}phanie Porte},
  editor       = {Dieter Gollmann and
                  Jean{-}Louis Lanet and
                  Julien Iguchi{-}Cartigny},
  title        = {The Polynomial Composition Problem in (Z/\emph{n}Z)[\emph{X}]},
  booktitle    = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2010, Passau, Germany, April 14-16,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6035},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12510-2\_1},
  doi          = {10.1007/978-3-642-12510-2\_1},
  timestamp    = {Sat, 30 May 2020 20:05:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/JoyeNP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/Chevallier-MamesCMNS10,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Jean{-}S{\'{e}}bastien Coron and
                  Noel McCullagh and
                  David Naccache and
                  Michael Scott},
  editor       = {Dieter Gollmann and
                  Jean{-}Louis Lanet and
                  Julien Iguchi{-}Cartigny},
  title        = {Secure Delegation of Elliptic-Curve Pairing},
  booktitle    = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2010, Passau, Germany, April 14-16,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6035},
  pages        = {24--35},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12510-2\_3},
  doi          = {10.1007/978-3-642-12510-2\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/Chevallier-MamesCMNS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/AgoyanDNRT10,
  author       = {Michel Agoyan and
                  Jean{-}Max Dutertre and
                  David Naccache and
                  Bruno Robisson and
                  Assia Tria},
  editor       = {Dieter Gollmann and
                  Jean{-}Louis Lanet and
                  Julien Iguchi{-}Cartigny},
  title        = {When Clocks Fail: On Critical Paths and Clock Faults},
  booktitle    = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2010, Passau, Germany, April 14-16,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6035},
  pages        = {182--193},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12510-2\_13},
  doi          = {10.1007/978-3-642-12510-2\_13},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/AgoyanDNRT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/CoronNT10,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Mehdi Tibouchi},
  editor       = {Josef Pieprzyk},
  title        = {Fault Attacks Against emv Signatures},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
                  the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5985},
  pages        = {208--220},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11925-5\_15},
  doi          = {10.1007/978-3-642-11925-5\_15},
  timestamp    = {Sun, 02 Jun 2019 21:22:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/CoronNT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iolts/AgoyanDMNRT10,
  author       = {Michel Agoyan and
                  Jean{-}Max Dutertre and
                  Amir{-}Pasha Mirbaha and
                  David Naccache and
                  Anne{-}Lise Ribotta and
                  Assia Tria},
  title        = {How to flip a bit?},
  booktitle    = {16th {IEEE} International On-Line Testing Symposium {(IOLTS} 2010),
                  5-7 July, 2010, Corfu, Greece},
  pages        = {235--239},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IOLTS.2010.5560194},
  doi          = {10.1109/IOLTS.2010.5560194},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iolts/AgoyanDMNRT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FuchsbauerKN10,
  author       = {Georg Fuchsbauer and
                  Jonathan Katz and
                  David Naccache},
  editor       = {Daniele Micciancio},
  title        = {Efficient Rational Secret Sharing in Standard Communication Networks},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {419--436},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_25},
  doi          = {10.1007/978-3-642-11799-2\_25},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FuchsbauerKN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/BaekGKN10,
  author       = {Yoo{-}Jin Baek and
                  Vanessa Gratzer and
                  Sung{-}Hyun Kim and
                  David Naccache},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Extracting Unknown Keys from Unknown Algorithms Encrypting Unknown
                  Fixed Messages and Returning No Results},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {189--197},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_8},
  doi          = {10.1007/978-3-642-14452-3\_8},
  timestamp    = {Tue, 16 May 2017 14:24:21 +0200},
  biburl       = {https://dblp.org/rec/series/isc/BaekGKN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fdtc/2010,
  editor       = {Luca Breveglieri and
                  Marc Joye and
                  Israel Koren and
                  David Naccache and
                  Ingrid Verbauwhede},
  title        = {2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2010, Santa Barbara, California, USA, 21 August 2010},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5575321/proceeding},
  isbn         = {978-0-7695-4169-3},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/364214451,
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3},
  doi          = {10.1007/978-3-642-14452-3},
  isbn         = {978-3-642-14451-6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/364214451.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BauerCNTV10,
  author       = {Aur{\'{e}}lie Bauer and
                  Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Mehdi Tibouchi and
                  Damien Vergnaud},
  title        = {On The Broadcast and Validity-Checking Security of {PKCS} {\textbackslash}{\#}1
                  v1.5 Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {135},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/135},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BauerCNTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GratzerN10,
  author       = {Vanessa Gratzer and
                  David Naccache},
  title        = {How to Read a Signature?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {530},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/530},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GratzerN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronJMNT10,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Antoine Joux and
                  Avradip Mandal and
                  David Naccache and
                  Mehdi Tibouchi},
  title        = {Cryptanalysis of the {RSA} Subgroup Assumption from {TCC} 2005},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {650},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/650},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronJMNT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BrouchierKMN09,
  author       = {Julien Brouchier and
                  Tom Kean and
                  Carol Marsh and
                  David Naccache},
  title        = {Temperature Attacks},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {7},
  number       = {2},
  pages        = {79--82},
  year         = {2009},
  url          = {https://doi.org/10.1109/MSP.2009.54},
  doi          = {10.1109/MSP.2009.54},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BrouchierKMN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KafiGMN09,
  author       = {Mohaned Kafi and
                  Sylvain Guilley and
                  Sandra Marcello and
                  David Naccache},
  title        = {Deconvolving Protected Signals},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {687--694},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.197},
  doi          = {10.1109/ARES.2009.197},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KafiGMN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biosig/NaccacheSY09,
  author       = {David Naccache and
                  Rainer Steinwandt and
                  Moti Yung},
  editor       = {Arslan Br{\"{o}}mme and
                  Christoph Busch and
                  Detlef H{\"{u}}hnlein},
  title        = {Reverse Public Key Encryption},
  booktitle    = {{BIOSIG} 2009 - Proceedings of the Special Interest Group on Biometrics
                  and Electronic Signatures, 17.-18. September 2009 in Darmstadt, Germany},
  series       = {{LNI}},
  volume       = {{P-155}},
  pages        = {155--169},
  publisher    = {{GI}},
  year         = {2009},
  url          = {https://dl.gi.de/handle/20.500.12116/23181},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/biosig/NaccacheSY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CoronJKNP09,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Antoine Joux and
                  Ilya Kizhvatov and
                  David Naccache and
                  Pascal Paillier},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Fault Attacks on {RSA} Signatures with Partially Unknown Messages},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {444--456},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_31},
  doi          = {10.1007/978-3-642-04138-9\_31},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CoronJKNP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronNTW09,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Mehdi Tibouchi and
                  Ralf{-}Philipp Weinmann},
  editor       = {Shai Halevi},
  title        = {Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {428--444},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_25},
  doi          = {10.1007/978-3-642-03356-8\_25},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CoronNTW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/BrierNT09,
  author       = {Eric Brier and
                  David Naccache and
                  Mehdi Tibouchi},
  editor       = {Dong Hoon Lee and
                  Seokhie Hong},
  title        = {Factoring Unbalanced Moduli with Known Bits},
  booktitle    = {Information, Security and Cryptology - {ICISC} 2009, 12th International
                  Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5984},
  pages        = {65--72},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14423-3\_5},
  doi          = {10.1007/978-3-642-14423-3\_5},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/BrierNT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/CathaloNQ09,
  author       = {Julien Cathalo and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  editor       = {Matthew Geoffrey Parker},
  title        = {Comparing with {RSA}},
  booktitle    = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography
                  and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5921},
  pages        = {326--335},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10868-6\_19},
  doi          = {10.1007/978-3-642-10868-6\_19},
  timestamp    = {Wed, 01 Sep 2021 10:36:08 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/CathaloNQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/JouxLNT09,
  author       = {Antoine Joux and
                  Reynald Lercier and
                  David Naccache and
                  Emmanuel Thom{\'{e}}},
  editor       = {Matthew Geoffrey Parker},
  title        = {Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms},
  booktitle    = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography
                  and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5921},
  pages        = {351--367},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10868-6\_21},
  doi          = {10.1007/978-3-642-10868-6\_21},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/JouxLNT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/natosec/NaccacheS09,
  author       = {David Naccache and
                  Igor E. Shparlinski},
  editor       = {Tanush Shaska and
                  Engjell Hasimaj},
  title        = {Divisibility, Smoothness and Cryptographic Applications},
  booktitle    = {Algebraic Aspects of Digital Communications},
  series       = {{NATO} Science for Peace and Security Series - {D:} Information and
                  Communication Security},
  volume       = {24},
  pages        = {115--173},
  publisher    = {{IOS} Press},
  year         = {2009},
  url          = {https://doi.org/10.3233/978-1-60750-019-3-115},
  doi          = {10.3233/978-1-60750-019-3-115},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/natosec/NaccacheS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fdtc/2009,
  editor       = {Luca Breveglieri and
                  Israel Koren and
                  David Naccache and
                  Elisabeth Oswald and
                  Jean{-}Pierre Seifert},
  title        = {Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography,
                  {FDTC} 2009, Lausanne, Switzerland, 6 September 2009},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5412677/proceeding},
  isbn         = {978-0-7695-3824-2},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrouchierDKMN09,
  author       = {Julien Brouchier and
                  Nora Dabbous and
                  Tom Kean and
                  Carol Marsh and
                  David Naccache},
  title        = {Thermocommunication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrouchierDKMN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CathaloNQ09,
  author       = {Julien Cathalo and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {Comparing With {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CathaloNQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronNTW09,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Mehdi Tibouchi and
                  Ralf{-}Philipp Weinmann},
  title        = {Practical Cryptanalysis of {ISO/IEC} 9796-2 and {EMV} Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {203},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/203},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronNTW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronJKNP09,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Antoine Joux and
                  Ilya Kizhvatov and
                  David Naccache and
                  Pascal Paillier},
  title        = {Fault Attacks on {RSA} Signatures with Partially Unknown Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {309},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/309},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronJKNP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrierNT09,
  author       = {Eric Brier and
                  David Naccache and
                  Mehdi Tibouchi},
  title        = {Factoring Unbalanced Moduli with Known Bits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {323},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/323},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrierNT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronNT09,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Mehdi Tibouchi},
  title        = {Fault Attacks Against {EMV} Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {503},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/503},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronNT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LevieilN08,
  author       = {{\'{E}}ric Levieil and
                  David Naccache},
  title        = {Cryptographic Test Correction},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {6},
  number       = {2},
  pages        = {69--71},
  year         = {2008},
  url          = {https://doi.org/10.1109/MSP.2008.30},
  doi          = {10.1109/MSP.2008.30},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LevieilN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CoppersmithCGHJNS08,
  author       = {Don Coppersmith and
                  Jean{-}S{\'{e}}bastien Coron and
                  Fran{\c{c}}ois Grieu and
                  Shai Halevi and
                  Charanjit S. Jutla and
                  David Naccache and
                  Julien P. Stern},
  title        = {Cryptanalysis of {ISO/IEC} 9796-1},
  journal      = {J. Cryptol.},
  volume       = {21},
  number       = {1},
  pages        = {27--51},
  year         = {2008},
  url          = {https://doi.org/10.1007/s00145-007-9007-5},
  doi          = {10.1007/S00145-007-9007-5},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CoppersmithCGHJNS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LevieilN08,
  author       = {{\'{E}}ric Levieil and
                  David Naccache},
  editor       = {Ronald Cramer},
  title        = {Cryptographic Test Correction},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {85--100},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_6},
  doi          = {10.1007/978-3-540-78440-1\_6},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LevieilN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Chevallier-MamesNS08,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  David Naccache and
                  Jacques Stern},
  editor       = {Rafail Ostrovsky and
                  Roberto De Prisco and
                  Ivan Visconti},
  title        = {Linear Bandwidth Naccache-Stern Encryption},
  booktitle    = {Security and Cryptography for Networks, 6th International Conference,
                  {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5229},
  pages        = {327--339},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85855-3\_22},
  doi          = {10.1007/978-3-540-85855-3\_22},
  timestamp    = {Tue, 25 Feb 2020 11:33:46 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/Chevallier-MamesNS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fdtc/2008,
  editor       = {Luca Breveglieri and
                  Shay Gueron and
                  Israel Koren and
                  David Naccache and
                  Jean{-}Pierre Seifert},
  title        = {Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography,
                  2008, {FDTC} 2008, Washington, DC, USA, 10 August 2008},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/4599542/proceeding},
  isbn         = {978-0-7695-3314-8},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0810-2067,
  author       = {David Naccache and
                  Igor E. Shparlinski},
  title        = {Divisibility, Smoothness and Cryptographic Applications},
  journal      = {CoRR},
  volume       = {abs/0810.2067},
  year         = {2008},
  url          = {http://arxiv.org/abs/0810.2067},
  eprinttype    = {arXiv},
  eprint       = {0810.2067},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0810-2067.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chevallier-MamesNS08,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  David Naccache and
                  Jacques Stern},
  title        = {Linear Bandwidth Naccache-Stern Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {119},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/119},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chevallier-MamesNS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxLNT08,
  author       = {Antoine Joux and
                  Reynald Lercier and
                  David Naccache and
                  Emmanuel Thom{\'{e}}},
  title        = {Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {217},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/217},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxLNT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaccacheS08,
  author       = {David Naccache and
                  Igor E. Shparlinski},
  title        = {Divisibility, Smoothness and Cryptographic Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {437},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/437},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaccacheS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerKN08,
  author       = {Georg Fuchsbauer and
                  Jonathan Katz and
                  David Naccache},
  title        = {Efficient Rational Secret Sharing in Standard Communication Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {488},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/488},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuchsbauerKN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GratzerN07,
  author       = {Vanessa Gratzer and
                  David Naccache},
  title        = {Alien vs. Quine},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {5},
  number       = {2},
  pages        = {26--31},
  year         = {2007},
  url          = {https://doi.org/10.1109/MSP.2007.28},
  doi          = {10.1109/MSP.2007.28},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GratzerN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GratzerN07a,
  author       = {Vanessa Gratzer and
                  David Naccache},
  title        = {Trust on a Nationwide Scale},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {5},
  number       = {5},
  pages        = {69--71},
  year         = {2007},
  url          = {https://doi.org/10.1109/MSP.2007.127},
  doi          = {10.1109/MSP.2007.127},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GratzerN07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Naccache07,
  author       = {David Naccache},
  title        = {Secure and practical identity-based encryption},
  journal      = {{IET} Inf. Secur.},
  volume       = {1},
  number       = {2},
  pages        = {59--64},
  year         = {2007},
  url          = {https://doi.org/10.1049/iet-ifs:20055097},
  doi          = {10.1049/IET-IFS:20055097},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Naccache07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JouxNT07,
  author       = {Antoine Joux and
                  David Naccache and
                  Emmanuel Thom{\'{e}}},
  editor       = {Kaoru Kurosawa},
  title        = {When \emph{e}-th Roots Become Easier Than Factoring},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {13--28},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_2},
  doi          = {10.1007/978-3-540-76900-2\_2},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/JouxNT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fdtc/2007,
  editor       = {Luca Breveglieri and
                  Shay Gueron and
                  Israel Koren and
                  David Naccache and
                  Jean{-}Pierre Seifert},
  title        = {Fourth International Workshop on Fault Diagnosis and Tolerance in
                  Cryptography, 2007, {FDTC} 2007: Vienna, Austria, 10 September 2007},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/4318971/proceeding},
  isbn         = {0-7695-2982-8},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxNT07,
  author       = {Antoine Joux and
                  David Naccache and
                  Emmanuel Thom{\'{e}}},
  title        = {When e-th Roots Become Easier Than Factoring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {424},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/424},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxNT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CoronNDOS06,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Yvo Desmedt and
                  Andrew M. Odlyzko and
                  Julien P. Stern},
  title        = {Index Calculation Attacks on {RSA} Signature and Encryption},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {1},
  pages        = {41--53},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-004-5660-y},
  doi          = {10.1007/S10623-004-5660-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CoronNDOS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GratzerN06,
  author       = {Vanessa Gratzer and
                  David Naccache},
  title        = {Cryptography, Law Enforcement, and Mobile Communications},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {4},
  number       = {6},
  pages        = {67--70},
  year         = {2006},
  url          = {https://doi.org/10.1109/MSP.2006.148},
  doi          = {10.1109/MSP.2006.148},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GratzerN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/Bar-ElCNTW06,
  author       = {Hagai Bar{-}El and
                  Hamid Choukri and
                  David Naccache and
                  Michael Tunstall and
                  Claire Whelan},
  title        = {The Sorcerer's Apprentice Guide to Fault Attacks},
  journal      = {Proc. {IEEE}},
  volume       = {94},
  number       = {2},
  pages        = {370--382},
  year         = {2006},
  url          = {https://doi.org/10.1109/JPROC.2005.862424},
  doi          = {10.1109/JPROC.2005.862424},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/Bar-ElCNTW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GratzerN06,
  author       = {Vanessa Gratzer and
                  David Naccache},
  editor       = {Serge Vaudenay},
  title        = {Alien \emph{vs.} Quine, the Vanishing Circuit and Other Tales from
                  the Industry's Crypt},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {48--58},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_4},
  doi          = {10.1007/11761679\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GratzerN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/GratzerNZ06,
  author       = {Vanessa Gratzer and
                  David Naccache and
                  David Znaty},
  title        = {Law Enforcement, Forensics and Mobile Communications},
  booktitle    = {4th {IEEE} Conference on Pervasive Computing and Communications Workshops
                  (PerCom 2006 Workshops), 13-17 March 2006, Pisa, Italy},
  pages        = {256--260},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/PERCOMW.2006.73},
  doi          = {10.1109/PERCOMW.2006.73},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/GratzerNZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fdtc/2006,
  editor       = {Luca Breveglieri and
                  Israel Koren and
                  David Naccache and
                  Jean{-}Pierre Seifert},
  title        = {Fault Diagnosis and Tolerance in Cryptography, Third International
                  Workshop, {FDTC} 2006, Yokohama, Japan, October 10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4236},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11889700},
  doi          = {10.1007/11889700},
  isbn         = {3-540-46250-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GutmannNP05,
  author       = {Peter Gutmann and
                  David Naccache and
                  Charles C. Palmer},
  title        = {When Hashes Collide},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {3},
  number       = {3},
  pages        = {68--71},
  year         = {2005},
  url          = {https://doi.org/10.1109/MSP.2005.84},
  doi          = {10.1109/MSP.2005.84},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GutmannNP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Naccache05,
  author       = {David Naccache},
  title        = {Finding Faults},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {3},
  number       = {5},
  pages        = {61--65},
  year         = {2005},
  url          = {https://doi.org/10.1109/MSP.2005.122},
  doi          = {10.1109/MSP.2005.122},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Naccache05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Naccache05,
  author       = {David Naccache},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {National Security, Forensics and Mobile Communications},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {1},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_1},
  doi          = {10.1007/11734727\_1},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Naccache05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NaccacheNTW05,
  author       = {David Naccache and
                  Phong Q. Nguyen and
                  Michael Tunstall and
                  Claire Whelan},
  editor       = {Serge Vaudenay},
  title        = {Experimenting with Faults, Lattices and the {DSA}},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {16--28},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_3},
  doi          = {10.1007/978-3-540-30580-4\_3},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/NaccacheNTW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CathaloCN05,
  author       = {Julien Cathalo and
                  Jean{-}S{\'{e}}bastien Coron and
                  David Naccache},
  editor       = {Serge Vaudenay},
  title        = {From Fixed-Length to Arbitrary-Length {RSA} Encoding Schemes Revisited},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {234--243},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_16},
  doi          = {10.1007/978-3-540-30580-4\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CathaloCN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0510042,
  author       = {David Naccache},
  title        = {Secure and \{{\textbackslash}sl Practical\} Identity-Based Encryption},
  journal      = {CoRR},
  volume       = {abs/cs/0510042},
  year         = {2005},
  url          = {http://arxiv.org/abs/cs/0510042},
  eprinttype    = {arXiv},
  eprint       = {cs/0510042},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0510042.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chevallier-MamesCMNS05,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Jean{-}S{\'{e}}bastien Coron and
                  Noel McCullagh and
                  David Naccache and
                  Michael Scott},
  title        = {Secure Delegation of Elliptic-Curve Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {150},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/150},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chevallier-MamesCMNS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Naccache05,
  author       = {David Naccache},
  title        = {Secure and \emph{Practical} Identity-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {369},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/369},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Naccache05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GratzerN05,
  author       = {Vanessa Gratzer and
                  David Naccache},
  title        = {Blind Attacks on Engineering Samples},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {468},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/468},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GratzerN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc4226,
  author       = {David M'Ra{\"{\i}}hi and
                  Mihir Bellare and
                  Frank Hoornaert and
                  David Naccache and
                  Ohad Ranen},
  title        = {{HOTP:} An HMAC-Based One-Time Password Algorithm},
  journal      = {{RFC}},
  volume       = {4226},
  pages        = {1--37},
  year         = {2005},
  url          = {https://doi.org/10.17487/RFC4226},
  doi          = {10.17487/RFC4226},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc4226.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/hal/Naccache04,
  author       = {David Naccache},
  title        = {Security, Cryptography: Theory and Practice. (S{\'{e}}curit{\'{e}},
                  Cryptographie : Th{\'{e}}orie et Pratique)},
  year         = {2004},
  url          = {https://tel.archives-ouvertes.fr/tel-01357506},
  timestamp    = {Thu, 28 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/hal/Naccache04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/CoronNK04,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Paul C. Kocher},
  title        = {Statistics and secret leakage},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {3},
  number       = {3},
  pages        = {492--508},
  year         = {2004},
  url          = {https://doi.org/10.1145/1015047.1015050},
  doi          = {10.1145/1015047.1015050},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tecs/CoronNK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Chevallier-MamesNPP04,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  David Naccache and
                  Pascal Paillier and
                  David Pointcheval},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {How to Disembed a Program?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {441--454},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_32},
  doi          = {10.1007/978-3-540-28632-5\_32},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Chevallier-MamesNPP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/CoronN04,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache},
  editor       = {Tatsuaki Okamoto},
  title        = {Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt
                  '95},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
                  the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2964},
  pages        = {157--162},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24660-2\_13},
  doi          = {10.1007/978-3-540-24660-2\_13},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/CoronN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/NaccacheSS04,
  author       = {David Naccache and
                  Nigel P. Smart and
                  Jacques Stern},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {Projective Coordinates Leak},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {257--267},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_16},
  doi          = {10.1007/978-3-540-24676-3\_16},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/NaccacheSS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icba/BarralCN04,
  author       = {Claude Barral and
                  Jean{-}S{\'{e}}bastien Coron and
                  David Naccache},
  editor       = {David Zhang and
                  Anil K. Jain},
  title        = {Externalized Fingerprint Matching},
  booktitle    = {Biometric Authentication, First International Conference, {ICBA} 2004,
                  Hong Kong, China, July 15-17, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3072},
  pages        = {309--315},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25948-0\_43},
  doi          = {10.1007/978-3-540-25948-0\_43},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icba/BarralCN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarralCN04,
  author       = {Claude Barral and
                  Jean{-}S{\'{e}}bastien Coron and
                  David Naccache},
  title        = {Externalized Fingerprint Matching},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarralCN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bar-ElCNTW04,
  author       = {Hagai Bar{-}El and
                  Hamid Choukri and
                  David Naccache and
                  Michael Tunstall and
                  Claire Whelan},
  title        = {The Sorcerer's Apprentice Guide to Fault Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {100},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/100},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bar-ElCNTW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chevallier-MamesNPP04,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  David Naccache and
                  Pascal Paillier and
                  David Pointcheval},
  title        = {How to Disembed a Program?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {138},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/138},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chevallier-MamesNPP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenoitDGGHNSW04,
  author       = {Olivier Beno{\^{\i}}t and
                  Nora Dabbous and
                  Laurent Gauteron and
                  Pierre Girard and
                  Helena Handschuh and
                  David Naccache and
                  St{\'{e}}phane Soci{\'{e}} and
                  Claire Whelan},
  title        = {Mobile Terminal Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {158},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/158},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenoitDGGHNSW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JoyeNP04,
  author       = {Marc Joye and
                  David Naccache and
                  St{\'{e}}phanie Porte},
  title        = {The Polynomial Composition Problem in (Z/nZ)[X]},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {224},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/224},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JoyeNP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaccacheNTW04,
  author       = {David Naccache and
                  Phong Q. Nguyen and
                  Michael Tunstall and
                  Claire Whelan},
  title        = {Experimenting with Faults, Lattices and the {DSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {277},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/277},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaccacheNTW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CoronN03,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache},
  editor       = {Chi{-}Sung Laih},
  title        = {Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent
                  to the Diffie-Hellman Assumption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2894},
  pages        = {392--397},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40061-5\_25},
  doi          = {10.1007/978-3-540-40061-5\_25},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CoronN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/HypponenNTT03,
  author       = {Konstantin Hypp{\"{o}}nen and
                  David Naccache and
                  Elena Trichina and
                  Alexei Tchoulkine},
  editor       = {Sihan Qing and
                  Dieter Gollmann and
                  Jianying Zhou},
  title        = {Trading-Off Type-Inference Memory Complexity against Communication},
  booktitle    = {Information and Communications Security, 5th International Conference,
                  {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2836},
  pages        = {60--71},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39927-8\_6},
  doi          = {10.1007/978-3-540-39927-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/HypponenNTT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HypponenNTT03,
  author       = {Konstantin Hypp{\"{o}}nen and
                  David Naccache and
                  Elena Trichina and
                  Alexei Tchoulkine},
  title        = {Trading-Off Type-Inference Memory Complexity Against Communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {140},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/140},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HypponenNTT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Naccache03,
  author       = {David Naccache},
  title        = {Double-Speed Safe Prime Generation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Naccache03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaccacheSS03,
  author       = {David Naccache and
                  Nigel P. Smart and
                  Jacques Stern},
  title        = {Projective Coordinates Leak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {191},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/191},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaccacheSS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrierNP03,
  author       = {Eric Brier and
                  David Naccache and
                  Pascal Paillier},
  title        = {Chemical Combinatorial Attacks on Keyboards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {217},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/217},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrierNP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/HandschuhNPT02,
  author       = {Helena Handschuh and
                  David Naccache and
                  Pascal Paillier and
                  Christophe Tymen},
  editor       = {Peter Honeyman},
  title        = {Provably Secure Chipcard Personalization, or, How to Fool Malicious
                  Insiders},
  booktitle    = {Proceedings of the Fifth Smart Card Research and Advanced Application
                  Conference, {CARDIS} '02, November 21-22, 2002, San Jose, CA, {USA}},
  publisher    = {{USENIX}},
  year         = {2002},
  url          = {http://www.usenix.org/publications/library/proceedings/cardis02/handschuh.html},
  timestamp    = {Wed, 04 Jul 2018 13:06:35 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/HandschuhNPT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronJNP02,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Marc Joye and
                  David Naccache and
                  Pascal Paillier},
  editor       = {Moti Yung},
  title        = {Universal Padding Schemes for {RSA}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 18-22,
                  2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2442},
  pages        = {226--241},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45708-9\_15},
  doi          = {10.1007/3-540-45708-9\_15},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CoronJNP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/NaccacheTTT02,
  author       = {David Naccache and
                  Alexei Tchoulkine and
                  Christophe Tymen and
                  Elena Trichina},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Reducing the Memory Complexity of Type-Inference Algorithms},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {109--121},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_10},
  doi          = {10.1007/3-540-36159-6\_10},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/NaccacheTTT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LefrancN02,
  author       = {Serge Lefranc and
                  David Naccache},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Cut-{\&}-Paste Attacks with {JAVA}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_1},
  doi          = {10.1007/3-540-36552-4\_1},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LefrancN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MaltessonNTT02,
  author       = {Nils Maltesson and
                  David Naccache and
                  Elena Trichina and
                  Christophe Tymen},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Applet Verification Strategiesfor RAM-Constrained Devices},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {118--137},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_9},
  doi          = {10.1007/3-540-36552-4\_9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MaltessonNTT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2002,
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3},
  doi          = {10.1007/3-540-45664-3},
  isbn         = {3-540-43168-3},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LefrancN02,
  author       = {Serge Lefranc and
                  David Naccache},
  title        = {Cut and Paste Attacks with Java},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {10},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/010},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LefrancN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronJNP02,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Marc Joye and
                  David Naccache and
                  Pascal Paillier},
  title        = {Universal Padding Schemes for {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {115},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronJNP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NaccachePS01,
  author       = {David Naccache and
                  David Pointcheval and
                  Jacques Stern},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Twin signatures: an alternative to the hash-and-sign paradigm},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {20--27},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.501987},
  doi          = {10.1145/501983.501987},
  timestamp    = {Tue, 10 Nov 2020 20:00:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NaccachePS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrierCCN01,
  author       = {Eric Brier and
                  Christophe Clavier and
                  Jean{-}S{\'{e}}bastien Coron and
                  David Naccache},
  editor       = {Joe Kilian},
  title        = {Cryptanalysis of {RSA} Signatures with Fixed-Pattern Padding},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 19-23,
                  2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  pages        = {433--439},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44647-8\_25},
  doi          = {10.1007/3-540-44647-8\_25},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrierCCN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/NaccachePT01,
  author       = {David Naccache and
                  David Pointcheval and
                  Christophe Tymen},
  editor       = {Paul F. Syverson},
  title        = {Monotone Signatures},
  booktitle    = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand
                  Cayman, British West Indies, February 19-22, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2339},
  pages        = {295--308},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-46088-8\_24},
  doi          = {10.1007/3-540-46088-8\_24},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/NaccachePT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2001,
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  David Naccache and
                  Christof Paar},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
                  Workshop, Paris, France, May 14-16, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2162},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44709-1},
  doi          = {10.1007/3-540-44709-1},
  isbn         = {3-540-42521-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2001,
  editor       = {David Naccache},
  title        = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
                  {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45353-9},
  doi          = {10.1007/3-540-45353-9},
  isbn         = {3-540-41898-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CoronKN00,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Fran{\c{c}}ois Koeune and
                  David Naccache},
  editor       = {Tatsuaki Okamoto},
  title        = {From Fixed-Length to Arbitrary-Length {RSA} Padding Schemes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {90--96},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_8},
  doi          = {10.1007/3-540-44448-3\_8},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CoronKN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/NaccacheT00,
  author       = {David Naccache and
                  Michael Tunstall},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {How to Explain Side-Channel Leakage to Your Kids},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {229--230},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_17},
  doi          = {10.1007/3-540-44499-8\_17},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/NaccacheT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CoronN00,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache},
  editor       = {Bart Preneel},
  title        = {Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
                  on the Theory and Application of Cryptographic Techniques, Bruges,
                  Belgium, May 14-18, 2000, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1807},
  pages        = {91--101},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45539-6\_7},
  doi          = {10.1007/3-540-45539-6\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CoronN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CoronJNP00,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Marc Joye and
                  David Naccache and
                  Pascal Paillier},
  editor       = {Bart Preneel},
  title        = {New Attacks on PKCS{\#}1 v1.5 Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
                  on the Theory and Application of Cryptographic Techniques, Bruges,
                  Belgium, May 14-18, 2000, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1807},
  pages        = {369--381},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45539-6\_25},
  doi          = {10.1007/3-540-45539-6\_25},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CoronJNP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/NaccacheS00,
  author       = {David Naccache and
                  Jacques Stern},
  editor       = {Yair Frankel},
  title        = {Signing on a Postcard},
  booktitle    = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla,
                  British West Indies, February 20-24, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1962},
  pages        = {121--135},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45472-1\_9},
  doi          = {10.1007/3-540-45472-1\_9},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/NaccacheS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CoronKN00,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Paul C. Kocher and
                  David Naccache},
  editor       = {Yair Frankel},
  title        = {Statistics and Secret Leakage},
  booktitle    = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla,
                  British West Indies, February 20-24, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1962},
  pages        = {157--173},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45472-1\_12},
  doi          = {10.1007/3-540-45472-1\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/CoronKN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MRaihiNT00,
  author       = {David M'Ra{\"{\i}}hi and
                  David Naccache and
                  Michael Tunstall},
  editor       = {Yair Frankel},
  title        = {Asymmetric Currency Rounding},
  booktitle    = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla,
                  British West Indies, February 20-24, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1962},
  pages        = {192--201},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45472-1\_14},
  doi          = {10.1007/3-540-45472-1\_14},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/MRaihiNT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Naccache99,
  author       = {David Naccache},
  title        = {Padding attacks on {RSA}},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {4},
  number       = {4},
  pages        = {28--33},
  year         = {1999},
  url          = {https://doi.org/10.1016/S1363-4127(99)80085-5},
  doi          = {10.1016/S1363-4127(99)80085-5},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Naccache99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CoronHN99,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Helena Handschuh and
                  David Naccache},
  editor       = {Kwok{-}Yan Lam and
                  Eiji Okamoto and
                  Chaoping Xing},
  title        = {{ECC:} Do We Need to Count?},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '99, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Singapore, November 14-18, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1716},
  pages        = {122--134},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-48000-6\_11},
  doi          = {10.1007/978-3-540-48000-6\_11},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CoronHN99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronNS99,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Julien P. Stern},
  editor       = {Michael J. Wiener},
  title        = {On the Security of {RSA} Padding},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_1},
  doi          = {10.1007/3-540-48405-1\_1},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CoronNS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NaccacheSS99,
  author       = {David Naccache and
                  Adi Shamir and
                  Julien P. Stern},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {How to Copyright a Function?},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {188--196},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_14},
  doi          = {10.1007/3-540-49162-7\_14},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/NaccacheSS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CoronN99,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {On the Security of {RSA} Screening},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {197--203},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_15},
  doi          = {10.1007/3-540-49162-7\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CoronN99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NaccacheS98,
  author       = {David Naccache and
                  Jacques Stern},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {A New Public Key Cryptosystem Based on Higher Residues},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {59--66},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288106},
  doi          = {10.1145/288090.288106},
  timestamp    = {Tue, 10 Nov 2020 20:00:11 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NaccacheS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CohenLNZ98,
  author       = {G{\'{e}}rard D. Cohen and
                  Antoine Lobstein and
                  David Naccache and
                  Gilles Z{\'{e}}mor},
  editor       = {Kaisa Nyberg},
  title        = {How to Improve an Exponentiation Black-Box},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {211--220},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054128},
  doi          = {10.1007/BFB0054128},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CohenLNZ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/CoronN98,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache},
  editor       = {Stafford E. Tavares and
                  Henk Meijer},
  title        = {An Accurate Evaluation of Maurer's Universal Test},
  booktitle    = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada,
                  August 17-18, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1556},
  pages        = {57--71},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48892-8\_5},
  doi          = {10.1007/3-540-48892-8\_5},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/CoronN98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/MRaihiNPV98,
  author       = {David M'Ra{\"{\i}}hi and
                  David Naccache and
                  David Pointcheval and
                  Serge Vaudenay},
  editor       = {Stafford E. Tavares and
                  Henk Meijer},
  title        = {Computational Alternatives to Random Number Generators},
  booktitle    = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada,
                  August 17-18, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1556},
  pages        = {72--80},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48892-8\_6},
  doi          = {10.1007/3-540-48892-8\_6},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/MRaihiNPV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/NaccacheS97,
  author       = {David Naccache and
                  Jacques Stern},
  editor       = {Walter Fumy},
  title        = {A New Public-Key Cryptosystem},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
                  on the Theory and Application of Cryptographic Techniques, Konstanz,
                  Germany, May 11-15, 1997, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1233},
  pages        = {27--36},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-69053-0\_3},
  doi          = {10.1007/3-540-69053-0\_3},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/NaccacheS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MRaihiNSV97,
  author       = {David M'Ra{\"{\i}}hi and
                  David Naccache and
                  Jacques Stern and
                  Serge Vaudenay},
  editor       = {Eli Biham},
  title        = {{XMX:} {A} Firmware-Oriented Block Cipher Based on Modular Multiplications},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {166--171},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052344},
  doi          = {10.1007/BFB0052344},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MRaihiNSV97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MichelsNP96,
  author       = {Markus Michels and
                  David Naccache and
                  Holger Petersen},
  title        = {{GOST} 34.10 - {A} brief overview of Russia's {DSA}},
  journal      = {Comput. Secur.},
  volume       = {15},
  number       = {8},
  pages        = {725--732},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0167-4048(96)00016-8},
  doi          = {10.1016/S0167-4048(96)00016-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MichelsNP96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/micro/NaccacheM96,
  author       = {David Naccache and
                  David M'Ra{\"{\i}}hi},
  title        = {Cryptographic smart cards},
  journal      = {{IEEE} Micro},
  volume       = {16},
  number       = {3},
  pages        = {14--24},
  year         = {1996},
  url          = {https://doi.org/10.1109/40.502402},
  doi          = {10.1109/40.502402},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/micro/NaccacheM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/NaccacheM96,
  author       = {David Naccache and
                  David M'Ra{\"{\i}}hi},
  title        = {Arithmetic co-processors for public-key cryptography: The state of
                  the art},
  booktitle    = {Proceedings of the Second Smart Card Research and Advanced Application
                  Conference, {CARDIS} 1996, September 18-20, 1996, CWI, Amsterdam,
                  The Netherlands},
  year         = {1996},
  timestamp    = {Fri, 15 Oct 2004 16:01:14 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/NaccacheM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MRaihiN96,
  author       = {David M'Ra{\"{\i}}hi and
                  David Naccache},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {Batch Exponentiation: {A} Fast DLP-Based Signature Generation Strategy},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {58--61},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238187},
  doi          = {10.1145/238168.238187},
  timestamp    = {Tue, 10 Nov 2020 20:00:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MRaihiN96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/NaccacheMR95,
  author       = {David Naccache and
                  David M'Ra{\"{\i}}hi and
                  Dan Raphaeli},
  title        = {Can Montgomery Parasites Be Avoided? {A} Design Methodology Based
                  on Key and Cryptosystem Modifications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {5},
  number       = {1},
  pages        = {73--80},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01388505},
  doi          = {10.1007/BF01388505},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/NaccacheMR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/NaccacheMWP95,
  author       = {David Naccache and
                  David M'Ra{\"{\i}}hi and
                  William Wolfowicz and
                  Adina di Porto},
  editor       = {Louis C. Guillou and
                  Jean{-}Jacques Quisquater},
  title        = {Are Crypto-Accelerators Really Inevitable? 20Bit Zero-Knowledge in
                  Less than a Second on Simple 8-bit Microcontrollers},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '95, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saint-Malo,
                  France, May 21-25, 1995, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {921},
  pages        = {404--409},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-49264-X\_33},
  doi          = {10.1007/3-540-49264-X\_33},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/NaccacheMWP95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/BarkeeCEMR94,
  author       = {Boo Barkee and
                  Deh Cac Can and
                  Julia Ecks and
                  Theo Moriarty and
                  R. F. Ree},
  title        = {Why You Cannot Even Hope to use Gr{\"{o}}bner Bases in Public
                  Key Cryptography: An Open Letter to a Scientist Who Failed and a Challenge
                  to Those Who Have Not Yet Failed},
  journal      = {J. Symb. Comput.},
  volume       = {18},
  number       = {6},
  pages        = {497--501},
  year         = {1994},
  url          = {https://doi.org/10.1006/jsco.1994.1061},
  doi          = {10.1006/JSCO.1994.1061},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/BarkeeCEMR94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/NaccacheMVR94,
  author       = {David Naccache and
                  David M'Ra{\"{\i}}hi and
                  Serge Vaudenay and
                  Dan Raphaeli},
  editor       = {Alfredo De Santis},
  title        = {Can {D.S.A.} be Improved? Complexity Trade-Offs with the Digital Signature
                  Standard},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
                  Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
                  1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {950},
  pages        = {77--85},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0053426},
  doi          = {10.1007/BFB0053426},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/NaccacheMVR94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Naccache93,
  author       = {David Naccache},
  editor       = {Tor Helleseth},
  title        = {Can {O.S.S.} be Repaired? Proposal for a New Practical Signature Scheme},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27,
                  1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {765},
  pages        = {233--239},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48285-7\_19},
  doi          = {10.1007/3-540-48285-7\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Naccache93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fiwac/NaccacheM93,
  author       = {David Naccache and
                  David M'Ra{\"{\i}}hi},
  editor       = {G{\'{e}}rard D. Cohen and
                  Simon Litsyn and
                  Antoine Lobstein and
                  Gilles Z{\'{e}}mor},
  title        = {Montgomery-Suitable Cryptosystems},
  booktitle    = {Algebraic Coding, First French-Israeli Workshop, Paris, France, July
                  19-21, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {781},
  pages        = {75--81},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-57843-9\_10},
  doi          = {10.1007/3-540-57843-9\_10},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/fiwac/NaccacheM93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SolmsN92,
  author       = {Sebastiaan H. von Solms and
                  David Naccache},
  title        = {On blind signatures and perfect crimes},
  journal      = {Comput. Secur.},
  volume       = {11},
  number       = {6},
  pages        = {581--583},
  year         = {1992},
  url          = {https://doi.org/10.1016/0167-4048(92)90193-U},
  doi          = {10.1016/0167-4048(92)90193-U},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SolmsN92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Naccache92,
  author       = {David Naccache},
  editor       = {Rainer A. Rueppel},
  title        = {A Montgomery-Suitable Fiat-Shamir-like Authenication Scheme},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Balatonf{\"{u}}red,
                  Hungary, May 24-28, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {658},
  pages        = {488--491},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-47555-9\_45},
  doi          = {10.1007/3-540-47555-9\_45},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Naccache92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics