Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: David Naccache
@inproceedings{DBLP:conf/c2si/NaccacheY23, author = {David Naccache and Ofer Yifrach{-}Stav}, editor = {Said El Hajji and Sihem Mesnager and El Mamoun Souidi}, title = {On Catalan Constant Continued Fractions}, booktitle = {Codes, Cryptology and Information Security - 4th International Conference, {C2SI} 2023, Rabat, Morocco, May 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13874}, pages = {43--54}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-33017-9\_3}, doi = {10.1007/978-3-031-33017-9\_3}, timestamp = {Fri, 26 May 2023 22:27:21 +0200}, biburl = {https://dblp.org/rec/conf/c2si/NaccacheY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ficc/OrcheHHNPRRWW23, author = {Fatima{-}Ezzahra El Orche and Marcel Hollenstein and Sarah Houdaigoui and David Naccache and Daria Pchelina and Peter B. R{\o}nne and Peter Y. A. Ryan and Julien Weibel and Robert Weil}, editor = {Kohei Arai}, title = {Taphonomical Security: {DNA} Information with a Foreseeable Lifespan}, booktitle = {Advances in Information and Communication - Proceedings of the 2023 Future of Information and Communication Conference (FICC), Volume 2, San Francisco, CA, USA, 2-3 March 2023}, series = {Lecture Notes in Networks and Systems}, volume = {652}, pages = {674--694}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-28073-3\_46}, doi = {10.1007/978-3-031-28073-3\_46}, timestamp = {Fri, 05 May 2023 14:43:05 +0200}, biburl = {https://dblp.org/rec/conf/ficc/OrcheHHNPRRWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/BouayedIN23, author = {Aymene Mohammed Bouayed and Adrian Iaccovelli and David Naccache}, title = {Sampling From Autoencoders' Latent Space via Quantization And Probability Mass Function Concepts}, booktitle = {{IEEE} International Joint Conference on Biometrics, {IJCB} 2023, Ljubljana, Slovenia, September 25-28, 2023}, pages = {1--10}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IJCB57857.2023.10449279}, doi = {10.1109/IJCB57857.2023.10449279}, timestamp = {Wed, 13 Mar 2024 19:10:51 +0100}, biburl = {https://dblp.org/rec/conf/icb/BouayedIN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/GiraudN23, author = {Vincent Giraud and David Naccache}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Power Analysis Pushed too Far: Breaking Android-Based Isolation with Fuel Gauges}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {3--15}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_1}, doi = {10.1007/978-3-031-41326-1\_1}, timestamp = {Fri, 25 Aug 2023 19:50:15 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/GiraudN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BarralJN23, author = {Hadrien Barral and Georges{-}Axel Jaloyan and David Naccache}, title = {Emoji shellcoding in {RISC-V}}, booktitle = {2023 {IEEE} Security and Privacy Workshops (SPW), San Francisco, CA, USA, May 25, 2023}, pages = {255--263}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SPW59333.2023.00028}, doi = {10.1109/SPW59333.2023.00028}, timestamp = {Thu, 21 Sep 2023 16:11:09 +0200}, biburl = {https://dblp.org/rec/conf/sp/BarralJN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-01624, author = {David Naccache and Ofer Yifrach{-}Stav}, title = {Pattern Recognition Experiments on Mathematical Expressions}, journal = {CoRR}, volume = {abs/2301.01624}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.01624}, doi = {10.48550/ARXIV.2301.01624}, eprinttype = {arXiv}, eprint = {2301.01624}, timestamp = {Tue, 10 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-01624.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-06489, author = {Aymene Mohammed Bouayed and David Naccache}, title = {Simplex Autoencoders}, journal = {CoRR}, volume = {abs/2301.06489}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.06489}, doi = {10.48550/ARXIV.2301.06489}, eprinttype = {arXiv}, eprint = {2301.06489}, timestamp = {Thu, 19 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-06489.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-10704, author = {Aymene Mohammed Bouayed and Adrian Iaccovelli and David Naccache}, title = {Sampling From Autoencoders' Latent Space via Quantization And Probability Mass Function Concepts}, journal = {CoRR}, volume = {abs/2308.10704}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.10704}, doi = {10.48550/ARXIV.2308.10704}, eprinttype = {arXiv}, eprint = {2308.10704}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-10704.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GiraudN23, author = {Vincent Giraud and David Naccache}, title = {Bypassing Android isolation with fuel gauges: new risks with advanced power ICs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1078}, year = {2023}, url = {https://eprint.iacr.org/2023/1078}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GiraudN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerradiHN23, author = {Houda Ferradi and Antoine Houssais and David Naccache}, title = {How to Physically Hold Your Bitcoins ?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1485}, year = {2023}, url = {https://eprint.iacr.org/2023/1485}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FerradiHN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeraudStewartN23, author = {R{\'{e}}mi G{\'{e}}raud{-}Stewart and David Naccache}, title = {New Public-Key Cryptosystem Blueprints Using Matrix Products in {\unicode{54589}}\({}_{\mbox{p}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1745}, year = {2023}, url = {https://eprint.iacr.org/2023/1745}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GeraudStewartN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainskyNOY23, author = {Julien S. Jainsky and David Naccache and Bassem Ouni and Ofer Yifrach{-}Stav}, title = {Authenticating Medications with QR-Codes and Compact Digital Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1817}, year = {2023}, url = {https://eprint.iacr.org/2023/1817}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/JainskyNOY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeraudStewartNY23, author = {R{\'{e}}mi G{\'{e}}raud{-}Stewart and David Naccache and Ofer Yifrach{-}Stav}, title = {Fiat-Shamir Goes Tropical}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1954}, year = {2023}, url = {https://eprint.iacr.org/2023/1954}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GeraudStewartNY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaccacheY23, author = {David Naccache and Ofer Yifrach{-}Stav}, title = {On The Practical Advantage of Committing Challenges in Zero-Knowledge Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1961}, year = {2023}, url = {https://eprint.iacr.org/2023/1961}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NaccacheY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DutertreMNT22, author = {Jean{-}Max Dutertre and Amir{-}Pasha Mirbaha and David Naccache and Assia Tria}, title = {Photonic power firewalls}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {3}, pages = {245--254}, year = {2022}, url = {https://doi.org/10.1007/s13389-022-00291-0}, doi = {10.1007/S13389-022-00291-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DutertreMNT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoteid/OrcheGRBNRBDW22, author = {Fatima{-}Ezzahra El Orche and R{\'{e}}mi G{\'{e}}raud{-}Stewart and Peter B. R{\o}nne and Gergei Bana and David Naccache and Peter Y. A. Ryan and Marco Biroli and Megi Dervishi and Hugo Waltsburger}, editor = {Robert Krimmer and Melanie Volkamer and David Duenas{-}Cid and Peter B. R{\o}nne and Micha Germann}, title = {Time, Privacy, Robustness, Accuracy: Trade-Offs for the Open Vote Network Protocol}, booktitle = {Electronic Voting - 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13553}, pages = {19--35}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15911-4\_2}, doi = {10.1007/978-3-031-15911-4\_2}, timestamp = {Mon, 24 Oct 2022 20:50:57 +0200}, biburl = {https://dblp.org/rec/conf/evoteid/OrcheGRBNRBDW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmla/MansourCDN22, author = {Adnan Ben Mansour and Gaia Carenini and Alexandre Duplessis and David Naccache}, editor = {M. Arif Wani and Mehmed M. Kantardzic and Vasile Palade and Daniel Neagu and Longzhi Yang and Kit Yan Chan}, title = {Federated Learning Aggregation: New Robust Algorithms with Guarantees}, booktitle = {21st {IEEE} International Conference on Machine Learning and Applications, {ICMLA} 2022, Nassau, Bahamas, December 12-14, 2022}, pages = {721--726}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICMLA55696.2022.00120}, doi = {10.1109/ICMLA55696.2022.00120}, timestamp = {Wed, 29 Mar 2023 19:23:50 +0200}, biburl = {https://dblp.org/rec/conf/icmla/MansourCDN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-10864, author = {Adnan Ben Mansour and Gaia Carenini and Alexandre Duplessis and David Naccache}, title = {Federated Learning Aggregation: New Robust Algorithms with Guarantees}, journal = {CoRR}, volume = {abs/2205.10864}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.10864}, doi = {10.48550/ARXIV.2205.10864}, eprinttype = {arXiv}, eprint = {2205.10864}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-10864.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-14236, author = {Adnan Ben Mansour and Gaia Carenini and Alexandre Duplessis and David Naccache}, title = {FedControl: When Control Theory Meets Federated Learning}, journal = {CoRR}, volume = {abs/2205.14236}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.14236}, doi = {10.48550/ARXIV.2205.14236}, eprinttype = {arXiv}, eprint = {2205.14236}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-14236.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-00856, author = {Hadrien Barral and Georges{-}Axel Jaloyan and Fabien Thomas{-}Brans and Matthieu Regnery and R{\'{e}}mi G{\'{e}}raud{-}Stewart and Thibaut Heckmann and Thomas R. Souvignet and David Naccache}, title = {A forensic analysis of the Google Home: repairing compressed data without error correction}, journal = {CoRR}, volume = {abs/2210.00856}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.00856}, doi = {10.48550/ARXIV.2210.00856}, eprinttype = {arXiv}, eprint = {2210.00856}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-00856.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-15669, author = {David Naccache and Ofer Yifrach{-}Stav}, title = {On Catalan Constant Continued Fractions}, journal = {CoRR}, volume = {abs/2210.15669}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.15669}, doi = {10.48550/ARXIV.2210.15669}, eprinttype = {arXiv}, eprint = {2210.15669}, timestamp = {Wed, 02 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-15669.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-01058, author = {Eric Brier and David Naccache and Ofer Yifrach{-}Stav}, title = {A Note on the Ramanujan Machine}, journal = {CoRR}, volume = {abs/2211.01058}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.01058}, doi = {10.48550/ARXIV.2211.01058}, eprinttype = {arXiv}, eprint = {2211.01058}, timestamp = {Fri, 04 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-01058.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MachlerN22, author = {Leon M{\"{a}}chler and David Naccache}, title = {A Conjecture on Hermite Constants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {677}, year = {2022}, url = {https://eprint.iacr.org/2022/677}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MachlerN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaccacheY22, author = {David Naccache and Ofer Yifrach{-}Stav}, title = {Invisible Formula Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1110}, year = {2022}, url = {https://eprint.iacr.org/2022/1110}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaccacheY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaccacheY22a, author = {David Naccache and Ofer Yifrach{-}Stav}, title = {On Squaring Modulo Mersenne Numbers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1197}, year = {2022}, url = {https://eprint.iacr.org/2022/1197}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaccacheY22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaccacheY22b, author = {David Naccache and Ofer Yifrach{-}Stav}, title = {A Conjecture From a Failed Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1273}, year = {2022}, url = {https://eprint.iacr.org/2022/1273}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaccacheY22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShepherdMHAGHN21, author = {Carlton Shepherd and Konstantinos Markantonakis and Nico van Heijningen and Driss Aboulkassimi and Cl{\'{e}}ment Gaine and Thibaut Heckmann and David Naccache}, title = {Physical fault injection and side-channel attacks on mobile devices: {A} comprehensive analysis}, journal = {Comput. Secur.}, volume = {111}, pages = {102471}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102471}, doi = {10.1016/J.COSE.2021.102471}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShepherdMHAGHN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Geraud-StewartN21, author = {R{\'{e}}mi G{\'{e}}raud{-}Stewart and David Naccache}, title = {A French cipher from the late 19th century}, journal = {Cryptologia}, volume = {45}, number = {4}, pages = {342--370}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1753265}, doi = {10.1080/01611194.2020.1753265}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Geraud-StewartN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HeckmannSSN21, author = {Thibaut Heckmann and Thomas R. Souvignet and Damien Sauveron and David Naccache}, title = {Medical Equipment Used for Forensic Data Extraction: {A} low-cost solution for forensic laboratories not provided with expensive diagnostic or advanced repair equipment}, journal = {Digit. Investig.}, volume = {36}, number = {Supplement}, pages = {301092}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2020.301092}, doi = {10.1016/J.FSIDI.2020.301092}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HeckmannSSN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/JoyeLNN20, author = {Marc Joye and Oleksandra Lapiha and Ky Nguyen and David Naccache}, title = {The Eleventh Power Residue Symbol}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {111--122}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0077}, doi = {10.1515/JMC-2020-0077}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/JoyeLNN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cig/MachlerN21, author = {Leon M{\"{a}}chler and David Naccache}, title = {Explaining the Entombed Algorithm}, booktitle = {2021 {IEEE} Conference on Games (CoG), Copenhagen, Denmark, August 17-20, 2021}, pages = {1--4}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CoG52621.2021.9619150}, doi = {10.1109/COG52621.2021.9619150}, timestamp = {Fri, 10 Dec 2021 10:04:09 +0100}, biburl = {https://dblp.org/rec/conf/cig/MachlerN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-01995, author = {Gergei Bana and Wojciech Jamroga and David Naccache and Peter Y. A. Ryan}, title = {Convergence Voting: From Pairwise Comparisons to Consensus}, journal = {CoRR}, volume = {abs/2102.01995}, year = {2021}, url = {https://arxiv.org/abs/2102.01995}, eprinttype = {arXiv}, eprint = {2102.01995}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-01995.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-08229, author = {Georges{-}Axel Jaloyan and Konstantinos Markantonakis and Raja Naeem Akram and David Robin and Keith Mayes and David Naccache}, title = {Return-Oriented Programming on {RISC-V}}, journal = {CoRR}, volume = {abs/2103.08229}, year = {2021}, url = {https://arxiv.org/abs/2103.08229}, eprinttype = {arXiv}, eprint = {2103.08229}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-08229.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-09982, author = {Leon M{\"{a}}chler and David Naccache}, title = {Explaining the Entombed Algorithm}, journal = {CoRR}, volume = {abs/2104.09982}, year = {2021}, url = {https://arxiv.org/abs/2104.09982}, eprinttype = {arXiv}, eprint = {2104.09982}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-09982.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-04454, author = {Carlton Shepherd and Konstantinos Markantonakis and Nico van Heijningen and Driss Aboulkassimi and Cl{\'{e}}ment Gaine and Thibaut Heckmann and David Naccache}, title = {Physical Fault Injection and Side-Channel Attacks on Mobile Devices: {A} Comprehensive Survey}, journal = {CoRR}, volume = {abs/2105.04454}, year = {2021}, url = {https://arxiv.org/abs/2105.04454}, eprinttype = {arXiv}, eprint = {2105.04454}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-04454.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-10971, author = {{\'{E}}ric Brier and Megi Dervishi and R{\'{e}}mi G{\'{e}}raud{-}Stewart and David Naccache and Ofer Yifrach{-}Stav}, title = {Near-Optimal Pool Testing under Urgency Constraints}, journal = {CoRR}, volume = {abs/2106.10971}, year = {2021}, url = {https://arxiv.org/abs/2106.10971}, eprinttype = {arXiv}, eprint = {2106.10971}, timestamp = {Tue, 29 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-10971.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-07135, author = {Ga{\"{e}}lle Candel and David Naccache}, title = {Co-Embedding: Discovering Communities on Bipartite Graphs through Projection}, journal = {CoRR}, volume = {abs/2109.07135}, year = {2021}, url = {https://arxiv.org/abs/2109.07135}, eprinttype = {arXiv}, eprint = {2109.07135}, timestamp = {Wed, 22 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-07135.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-10007, author = {Ga{\"{e}}lle Candel and David Naccache}, title = {Generating Local Maps of Science using Deep Bibliographic Coupling}, journal = {CoRR}, volume = {abs/2109.10007}, year = {2021}, url = {https://arxiv.org/abs/2109.10007}, eprinttype = {arXiv}, eprint = {2109.10007}, timestamp = {Mon, 27 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-10007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-10538, author = {Ga{\"{e}}lle Candel and David Naccache}, title = {Index t-SNE: Tracking Dynamics of High-Dimensional Datasets with Coherent Embeddings}, journal = {CoRR}, volume = {abs/2109.10538}, year = {2021}, url = {https://arxiv.org/abs/2109.10538}, eprinttype = {arXiv}, eprint = {2109.10538}, timestamp = {Mon, 27 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-10538.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-14925, author = {Antoine Scardigli and Paul Fournier and Matteo Vilucchio and David Naccache}, title = {Genealogical Population-Based Training for Hyperparameter Optimization}, journal = {CoRR}, volume = {abs/2109.14925}, year = {2021}, url = {https://arxiv.org/abs/2109.14925}, eprinttype = {arXiv}, eprint = {2109.14925}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-14925.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-09212, author = {Ga{\"{e}}lle Candel and David Naccache}, title = {Noise-Resilient Ensemble Learning using Evidence Accumulation Clustering}, journal = {CoRR}, volume = {abs/2110.09212}, year = {2021}, url = {https://arxiv.org/abs/2110.09212}, eprinttype = {arXiv}, eprint = {2110.09212}, timestamp = {Fri, 22 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-09212.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-11079, author = {Ga{\"{e}}lle Candel and David Naccache}, title = {Tagged Documents Co-Clustering}, journal = {CoRR}, volume = {abs/2110.11079}, year = {2021}, url = {https://arxiv.org/abs/2110.11079}, eprinttype = {arXiv}, eprint = {2110.11079}, timestamp = {Thu, 28 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-11079.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Geraud-StewartN21, author = {R{\'{e}}mi G{\'{e}}raud{-}Stewart and David Naccache}, title = {Elementary Attestation of Cryptographically Useful Composite Moduli}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2021}, url = {https://eprint.iacr.org/2021/052}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Geraud-StewartN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Geraud-StewartN21a, author = {R{\'{e}}mi G{\'{e}}raud{-}Stewart and David Naccache}, title = {Magnetic {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {77}, year = {2021}, url = {https://eprint.iacr.org/2021/077}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Geraud-StewartN21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarralBGLNVV21, author = {Hadrien Barral and {\'{E}}ric Brier and R{\'{e}}mi G{\'{e}}raud{-}Stewart and Arthur L{\'{e}}onard and David Naccache and Quentin Vermande and Samuel Vivien}, title = {Discovering New L-Function Relations Using Algebraic Sieving}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1060}, year = {2021}, url = {https://eprint.iacr.org/2021/1060}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarralBGLNVV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanaBDOGNRRW21, author = {Gergei Bana and Marco Biroli and Megi Dervishi and Fatima{-}Ezzahra El Orche and R{\'{e}}mi G{\'{e}}raud{-}Stewart and David Naccache and Peter B. R{\o}nne and Peter Y. A. Ryan and Hugo Waltsburger}, title = {Time, Privacy, Robustness, Accuracy: Trade Offs for the Open Vote Network Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1065}, year = {2021}, url = {https://eprint.iacr.org/2021/1065}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanaBDOGNRRW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OrcheHHNPRRWW21, author = {Fatima{-}Ezzahra El Orche and Marcel Hollenstein and Sarah Houdaigoui and David Naccache and Daria Pchelina and Peter B. R{\o}nne and Peter Y. A. Ryan and Julien Weibel and Robert Weil}, title = {Taphonomical Security: {(DNA)} Information with Foreseeable Lifespan}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1066}, year = {2021}, url = {https://eprint.iacr.org/2021/1066}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OrcheHHNPRRWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrierGJN21, author = {Eric Brier and R{\'{e}}mi G{\'{e}}raud{-}Stewart and Marc Joye and David Naccache}, title = {Primary Elements in Cyclotomic Fields with Applications to Power Residue Symbols, and More}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1106}, year = {2021}, url = {https://eprint.iacr.org/2021/1106}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrierGJN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HollensteinNRRW21, author = {Marcel Hollenstein and David Naccache and Peter B. R{\o}nne and Peter Y. A. Ryan and Robert Weil and Ofer Yifrach{-}Stav}, title = {Preservation of {DNA} Privacy During the Large Scale Detection of {COVID}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1108}, year = {2021}, url = {https://eprint.iacr.org/2021/1108}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HollensteinNRRW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Conrad-Frenkiel21, author = {Th{\'{e}}odore Conrad{-}Frenkiel and R{\'{e}}mi G{\'{e}}raud{-}Stewart and David Naccache}, title = {On Unpadded {NTRU} Quantum (In)Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1426}, year = {2021}, url = {https://eprint.iacr.org/2021/1426}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Conrad-Frenkiel21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChevignardGHNR21, author = {Cl{\'{e}}mence Chevignard and R{\'{e}}mi G{\'{e}}raud{-}Stewart and Antoine Houssais and David Naccache and Edmond de Roffignac}, title = {How to Claim a Computational Feat}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1554}, year = {2021}, url = {https://eprint.iacr.org/2021/1554}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChevignardGHNR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/FerradiGGNT20, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Sylvain Guilley and David Naccache and Mehdi Tibouchi}, title = {Recovering Secrets From Prefix-Dependent Leakage}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {15--24}, year = {2020}, url = {https://doi.org/10.1515/jmc-2015-0048}, doi = {10.1515/JMC-2015-0048}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/FerradiGGNT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BrierFJN20, author = {{\'{E}}ric Brier and Houda Ferradi and Marc Joye and David Naccache}, title = {New number-theoretic cryptographic primitives}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {224--235}, year = {2020}, url = {https://doi.org/10.1515/jmc-2019-0035}, doi = {10.1515/JMC-2019-0035}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/BrierFJN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JaloyanMARMN20, author = {Georges{-}Axel Jaloyan and Konstantinos Markantonakis and Raja Naeem Akram and David Robin and Keith Mayes and David Naccache}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {Return-Oriented Programming on {RISC-V}}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {471--480}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384738}, doi = {10.1145/3320269.3384738}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JaloyanMARMN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/Geraud-StewartL20, author = {R{\'{e}}mi G{\'{e}}raud{-}Stewart and Marius Lombard{-}Platet and David Naccache}, editor = {Donghyun Kim and R. N. Uma and Zhipeng Cai and Dong Hoon Lee}, title = {Approaching Optimal Duplicate Detection in a Sliding Window}, booktitle = {Computing and Combinatorics - 26th International Conference, {COCOON} 2020, Atlanta, GA, USA, August 29-31, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12273}, pages = {64--84}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58150-3\_6}, doi = {10.1007/978-3-030-58150-3\_6}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cocoon/Geraud-StewartL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Geraud-StewartN20, author = {R{\'{e}}mi G{\'{e}}raud{-}Stewart and David Naccache}, editor = {Diana Maimut and Andrei{-}George Oprina and Damien Sauveron}, title = {Elementary Attestation of Cryptographically Useful Composite Moduli}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12596}, pages = {1--12}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69255-1\_1}, doi = {10.1007/978-3-030-69255-1\_1}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Geraud-StewartN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-02940, author = {Marc Beunardeau and {\'{E}}ric Brier and No{\'{e}}mie Cartier and Aisling Connolly and Nathana{\"{e}}l Courant and R{\'{e}}mi G{\'{e}}raud{-}Stewart and David Naccache and Ofer Yifrach{-}Stav}, title = {Optimal Covid-19 Pool Testing with a priori Information}, journal = {CoRR}, volume = {abs/2005.02940}, year = {2020}, url = {https://arxiv.org/abs/2005.02940}, eprinttype = {arXiv}, eprint = {2005.02940}, timestamp = {Sat, 09 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-02940.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-04740, author = {R{\'{e}}mi G{\'{e}}raud{-}Stewart and Marius Lombard{-}Platet and David Naccache}, title = {Approaching Optimal Duplicate Detection in a Sliding Window}, journal = {CoRR}, volume = {abs/2005.04740}, year = {2020}, url = {https://arxiv.org/abs/2005.04740}, eprinttype = {arXiv}, eprint = {2005.04740}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-04740.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-12227, author = {Yao Cheng and Cheng{-}Kang Chu and Hsiao{-}Ying Lin and Marius Lombard{-}Platet and David Naccache}, title = {Keyed Non-Parametric Hypothesis Tests}, journal = {CoRR}, volume = {abs/2005.12227}, year = {2020}, url = {https://arxiv.org/abs/2005.12227}, eprinttype = {arXiv}, eprint = {2005.12227}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-12227.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-02353, author = {Guillaume Bertholon and R{\'{e}}mi G{\'{e}}raud{-}Stewart and Axel Kugelmann and Th{\'{e}}o Lenoir and David Naccache}, title = {At Most 43 Moves, At Least 29: Optimal Strategies and Bounds for Ultimate Tic-Tac-Toe}, journal = {CoRR}, volume = {abs/2006.02353}, year = {2020}, url = {https://arxiv.org/abs/2006.02353}, eprinttype = {arXiv}, eprint = {2006.02353}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-02353.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-06837, author = {{\'{E}}ric Brier and R{\'{e}}mi G{\'{e}}raud{-}Stewart and David Naccache and Alessandro Pacco and Emanuele Troiani}, title = {Stuttering Conway Sequences Are Still Conway Sequences}, journal = {CoRR}, volume = {abs/2006.06837}, year = {2020}, url = {https://arxiv.org/abs/2006.06837}, eprinttype = {arXiv}, eprint = {2006.06837}, timestamp = {Wed, 17 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-06837.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-07246, author = {{\'{E}}ric Brier and R{\'{e}}mi G{\'{e}}raud{-}Stewart and David Naccache and Alessandro Pacco and Emanuele Troiani}, title = {The Look-and-Say The Biggest Sequence Eventually Cycles}, journal = {CoRR}, volume = {abs/2006.07246}, year = {2020}, url = {https://arxiv.org/abs/2006.07246}, eprinttype = {arXiv}, eprint = {2006.07246}, timestamp = {Wed, 17 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-07246.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-11634, author = {{\'{E}}ric Brier and R{\'{e}}mi G{\'{e}}raud{-}Stewart and David Naccache}, title = {A Fractional 3n+1 Conjecture}, journal = {CoRR}, volume = {abs/2006.11634}, year = {2020}, url = {https://arxiv.org/abs/2006.11634}, eprinttype = {arXiv}, eprint = {2006.11634}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-11634.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-09085, author = {Marcel Hollenstein and David Naccache and Peter B. R{\o}nne and Peter Y. A. Ryan and Robert Weil and Ofer Yifrach{-}Stav}, title = {Preservation of {DNA} Privacy During the Large Scale Detection of {COVID-19}}, journal = {CoRR}, volume = {abs/2007.09085}, year = {2020}, url = {https://arxiv.org/abs/2007.09085}, eprinttype = {arXiv}, eprint = {2007.09085}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-09085.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Geraud-StewartN20, author = {R{\'{e}}mi G{\'{e}}raud{-}Stewart and David Naccache}, title = {A French cipher from the late 19th century}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {390}, year = {2020}, url = {https://eprint.iacr.org/2020/390}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Geraud-StewartN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaracoGN20, author = {Jean{-}Claude Caraco and R{\'{e}}mi G{\'{e}}raud{-}Stewart and David Naccache}, title = {Kerckhoffs' Legacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {556}, year = {2020}, url = {https://eprint.iacr.org/2020/556}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaracoGN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HeckmannMMAN19, author = {Thibaut Heckmann and James P. McEvoy and Konstantinos Markantonakis and Raja Naeem Akram and David Naccache}, title = {Removing epoxy underfill between neighbouring components using acid for component chip-off}, journal = {Digit. Investig.}, volume = {29}, pages = {198--209}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.003}, doi = {10.1016/J.DIIN.2019.04.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HeckmannMMAN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HeckmannSN19, author = {Thibaut Heckmann and Thomas R. Souvignet and David Naccache}, title = {Decrease of energy deposited during laser decapsulation attacks by dyeing and pigmenting the {ECA:} Application to the forensic micro-repair of wire bonding}, journal = {Digit. Investig.}, volume = {29}, pages = {210--218}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.004}, doi = {10.1016/J.DIIN.2019.04.004}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HeckmannSN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GeraudN19, author = {R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {Mixed-radix Naccache-Stern encryption}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {3}, pages = {277--282}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0188-7}, doi = {10.1007/S13389-018-0188-7}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GeraudN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/FerradiN19, author = {Houda Ferradi and David Naccache}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Integer Reconstruction Public-Key Encryption}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {412--433}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_23}, doi = {10.1007/978-3-030-31578-8\_23}, timestamp = {Thu, 17 Mar 2022 14:41:28 +0100}, biburl = {https://dblp.org/rec/conf/cans/FerradiN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GeraudNR19, author = {R{\'{e}}mi G{\'{e}}raud and David Naccache and Razvan Rosie}, editor = {Mitsuru Matsui}, title = {Robust Encryption, Extended}, booktitle = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11405}, pages = {149--168}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12612-4\_8}, doi = {10.1007/978-3-030-12612-4\_8}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/GeraudNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ChengCLLN19, author = {Yao Cheng and Cheng{-}Kang Chu and Hsiao{-}Ying Lin and Marius Lombard{-}Platet and David Naccache}, editor = {Joseph K. Liu and Xinyi Huang}, title = {Keyed Non-parametric Hypothesis Tests}, booktitle = {Network and System Security - 13th International Conference, {NSS} 2019, Sapporo, Japan, December 15-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11928}, pages = {632--645}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36938-5\_39}, doi = {10.1007/978-3-030-36938-5\_39}, timestamp = {Wed, 17 Aug 2022 14:30:35 +0200}, biburl = {https://dblp.org/rec/conf/nss/ChengCLLN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/GeraudLN19, author = {R{\'{e}}mi G{\'{e}}raud and Marius Lombard{-}Platet and David Naccache}, editor = {Chih{-}Cheng Hung and George A. Papadopoulos}, title = {Quotient hash tables: efficiently detecting duplicates in streaming data}, booktitle = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing, {SAC} 2019, Limassol, Cyprus, April 8-12, 2019}, pages = {582--589}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3297280.3297335}, doi = {10.1145/3297280.3297335}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/GeraudLN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BeunardeauOMNRR19, author = {Marc Beunardeau and Fatima{-}Ezzahra El Orche and Diana Maimut and David Naccache and Peter B. R{\o}nne and Peter Y. A. Ryan}, editor = {Emil Simion and R{\'{e}}mi G{\'{e}}raud{-}Stewart}, title = {Authenticated Key Distribution: When the Coupon Collector is Your Enemy}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12001}, pages = {1--20}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41025-4\_1}, doi = {10.1007/978-3-030-41025-4\_1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/BeunardeauOMNRR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/CandelGN19, author = {Ga{\"{e}}lle Candel and R{\'{e}}mi G{\'{e}}raud{-}Stewart and David Naccache}, editor = {Maryline Laurent and Thanassis Giannetsos}, title = {How to Compartment Secrets}, booktitle = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12024}, pages = {3--11}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41702-4\_1}, doi = {10.1007/978-3-030-41702-4\_1}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/CandelGN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/BarralGJN19, author = {Hadrien Barral and R{\'{e}}mi G{\'{e}}raud{-}Stewart and Georges{-}Axel Jaloyan and David Naccache}, editor = {Alex Gantman and Cl{\'{e}}mentine Maurice}, title = {{RISC-V:} {\#}AlphanumericShellcoding}, booktitle = {13th {USENIX} Workshop on Offensive Technologies, {WOOT} 2019, Santa Clara, CA, USA, August 12-13, 2019}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/woot19/presentation/barral}, timestamp = {Mon, 01 Feb 2021 08:41:53 +0100}, biburl = {https://dblp.org/rec/conf/woot/BarralGJN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-04358, author = {R{\'{e}}mi G{\'{e}}raud and Marius Lombard{-}Platet and David Naccache}, title = {Quotient Hash Tables - Efficiently Detecting Duplicates in Streaming Data}, journal = {CoRR}, volume = {abs/1901.04358}, year = {2019}, url = {http://arxiv.org/abs/1901.04358}, eprinttype = {arXiv}, eprint = {1901.04358}, timestamp = {Fri, 01 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-04358.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-03819, author = {Hadrien Barral and R{\'{e}}mi G{\'{e}}raud{-}Stewart and Georges{-}Axel Jaloyan and David Naccache}, title = {{RISC-V:} {\#}AlphanumericShellcoding}, journal = {CoRR}, volume = {abs/1908.03819}, year = {2019}, url = {http://arxiv.org/abs/1908.03819}, eprinttype = {arXiv}, eprint = {1908.03819}, timestamp = {Mon, 19 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-03819.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeraudNR19, author = {R{\'{e}}mi G{\'{e}}raud and David Naccache and Razvan Rosie}, title = {Robust Encryption, Extended}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {238}, year = {2019}, url = {https://eprint.iacr.org/2019/238}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeraudNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrierFJN19, author = {Eric Brier and Houda Ferradi and Marc Joye and David Naccache}, title = {New Number-Theoretic Cryptographic Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {484}, year = {2019}, url = {https://eprint.iacr.org/2019/484}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrierFJN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JoyeLNN19, author = {Marc Joye and Oleksandra Lapiha and Ky Nguyen and David Naccache}, title = {The Eleventh Power Residue Symbol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {870}, year = {2019}, url = {https://eprint.iacr.org/2019/870}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JoyeLNN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrierN19, author = {Eric Brier and David Naccache}, title = {The Thirteenth Power Residue Symbol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1176}, year = {2019}, url = {https://eprint.iacr.org/2019/1176}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrierN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CandelGN19, author = {Ga{\"{e}}lle Candel and R{\'{e}}mi G{\'{e}}raud{-}Stewart and David Naccache}, title = {How to compartment secrets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1397}, year = {2019}, url = {https://eprint.iacr.org/2019/1397}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CandelGN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeunardeauOMNRR19, author = {Marc Beunardeau and Fatima{-}Ezzahra El Orche and Diana Maimut and David Naccache and Peter B. R{\o}nne and Peter Y. A. Ryan}, title = {Authenticated Key Distribution: When the Coupon Collector is Your Enemy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1499}, year = {2019}, url = {https://eprint.iacr.org/2019/1499}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeunardeauOMNRR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/FerradiGMNZ18, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Diana Maimut and David Naccache and Hang Zhou}, title = {Backtracking-assisted multiplication}, journal = {Cryptogr. Commun.}, volume = {10}, number = {1}, pages = {17--26}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0254-5}, doi = {10.1007/S12095-017-0254-5}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/FerradiGMNZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HeckmannMNS18, author = {Thibaut Heckmann and Konstantinos Markantonakis and David Naccache and Thomas R. Souvignet}, title = {Forensic smartphone analysis using adhesives: Transplantation of Package on Package components}, journal = {Digit. Investig.}, volume = {26}, pages = {29--39}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.05.005}, doi = {10.1016/J.DIIN.2018.05.005}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HeckmannMNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/FerradiGMNW18, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Diana Maimut and David Naccache and Amaury de Wargny}, title = {Regulating the pace of von Neumann correctors}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {1}, pages = {85--91}, year = {2018}, url = {https://doi.org/10.1007/s13389-017-0153-x}, doi = {10.1007/S13389-017-0153-X}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/FerradiGMNW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/LiuLWQNF18, author = {Weiran Liu and Jianwei Liu and Qianhong Wu and Bo Qin and David Naccache and Houda Ferradi}, title = {Efficient subtree-based encryption for fuzzy-entity data sharing}, journal = {Soft Comput.}, volume = {22}, number = {23}, pages = {7961--7976}, year = {2018}, url = {https://doi.org/10.1007/s00500-017-2743-z}, doi = {10.1007/S00500-017-2743-Z}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/LiuLWQNF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/histocrypt/NaccacheG18, author = {David Naccache and R{\'{e}}mi G{\'{e}}raud}, editor = {Be{\'{a}}ta Megyesi}, title = {Invited Talk: {A} French Code from the Late 19th Century}, booktitle = {Proceedings of the 1st International Conference on Historical Cryptology, HistoCrypt 2018, Uppsala University, English Park Campus, Humanistiska teatern, Uppsala, Sweden, 18-20 June 2018}, series = {Link{\"{o}}ping Electronic Conference Proceedings}, volume = {149}, pages = {149:003}, publisher = {Link{\"{o}}ping University Electronic Press}, year = {2018}, url = {https://ep.liu.se/en/conference-article.aspx?series=ecp\&\#38;issue=149\&\#38;Article\_No=3}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/histocrypt/NaccacheG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/Cogliani0FGMNCW18, author = {Simon Cogliani and Feng Bao and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Diana Maimut and David Naccache and Rodrigo Portella do Canto and Guilin Wang}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Public Key-Based Lightweight Swarm Authentication}, booktitle = {Cyber-Physical Systems Security}, pages = {255--267}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_12}, doi = {10.1007/978-3-319-98935-8\_12}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/18/Cogliani0FGMNCW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icics/2018, editor = {David Naccache and Shouhuai Xu and Sihan Qing and Pierangela Samarati and Gregory Blanc and Rongxing Lu and Zonghua Zhang and Ahmed Meddahi}, title = {Information and Communications Security - 20th International Conference, {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11149}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01950-1}, doi = {10.1007/978-3-030-01950-1}, isbn = {978-3-030-01949-5}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeunardeauCFGNV18, author = {Marc Beunardeau and Aisling Connolly and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache and Damien Vergnaud}, title = {Reusing Nonces in Schnorr Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2018}, url = {http://eprint.iacr.org/2018/069}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeunardeauCFGNV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeraudN18, author = {R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {Mixed-radix Naccache-Stern encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {278}, year = {2018}, url = {https://eprint.iacr.org/2018/278}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeraudN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerradiGGNT18, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Sylvain Guilley and David Naccache and Mehdi Tibouchi}, title = {Recovering Secrets From Prefix-Dependent Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {798}, year = {2018}, url = {https://eprint.iacr.org/2018/798}, timestamp = {Wed, 03 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FerradiGGNT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HeckmannSN17, author = {Thibaut Heckmann and Thomas R. Souvignet and David Naccache}, title = {Electrically conductive adhesives, thermally conductive adhesives and {UV} adhesives in data extraction forensics}, journal = {Digit. Investig.}, volume = {21}, pages = {53--64}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.02.009}, doi = {10.1016/J.DIIN.2017.02.009}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HeckmannSN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BeunardeauCGN17, author = {Marc Beunardeau and Aisling Connolly and R{\'{e}}mi G{\'{e}}raud and David Naccache}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {The Case for System Command Encryption}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3056129}, doi = {10.1145/3052973.3056129}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BeunardeauCGN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BenhamoudaFGN17, author = {Fabrice Benhamouda and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {Non-interactive Provably Secure Attestations for Arbitrary {RSA} Prime Generation Algorithms}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10492}, pages = {206--223}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66402-6\_13}, doi = {10.1007/978-3-319-66402-6\_13}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/BenhamoudaFGN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BeunardeauCFGNV17, author = {Marc Beunardeau and Aisling Connolly and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache and Damien Vergnaud}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {Reusing Nonces in Schnorr Signatures - (and Keeping It Secure...)}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10492}, pages = {224--241}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66402-6\_14}, doi = {10.1007/978-3-319-66402-6\_14}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/BeunardeauCFGNV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/BeunardeauCGN17, author = {Marc Beunardeau and Aisling Connolly and R{\'{e}}mi G{\'{e}}raud and David Naccache}, editor = {Tanja Lange and Orr Dunkelman}, title = {On the Hardness of the Mersenne Low Hamming Ratio Assumption}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2017 - 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11368}, pages = {166--174}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-030-25283-0\_9}, doi = {10.1007/978-3-030-25283-0\_9}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/latincrypt/BeunardeauCGN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/GeraudKLNS17, author = {R{\'{e}}mi G{\'{e}}raud and Mirko Koscina and Paul Lenczner and David Naccache and David Saulpic}, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {Generating Functionally Equivalent Programs Having Non-isomorphic Control-Flow Graphs}, booktitle = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, pages = {265--279}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2\_16}, doi = {10.1007/978-3-319-70290-2\_16}, timestamp = {Mon, 26 Jun 2023 20:48:37 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/GeraudKLNS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BrierGN17, author = {{\'{E}}ric Brier and R{\'{e}}mi G{\'{e}}raud and David Naccache}, editor = {Pooya Farshim and Emil Simion}, title = {Exploring Naccache-Stern Knapsack Encryption}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10543}, pages = {67--82}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69284-5\_6}, doi = {10.1007/978-3-319-69284-5\_6}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/BrierGN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/GeraudNR17, author = {R{\'{e}}mi G{\'{e}}raud and David Naccache and Razvan Rosie}, editor = {Xiaodong Lin and Ali A. Ghorbani and Kui Ren and Sencun Zhu and Aiqing Zhang}, title = {Twisting Lattice and Graph Techniques to Compress Transactional Ledgers}, booktitle = {Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {238}, pages = {108--127}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-78813-5\_6}, doi = {10.1007/978-3-319-78813-5\_6}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/GeraudNR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-08357, author = {R{\'{e}}mi G{\'{e}}raud and Mirko Koscina and Paul Lenczner and David Naccache and David Saulpic}, title = {Generating Functionally Equivalent Programs Having Non-Isomorphic Control-Flow Graphs}, journal = {CoRR}, volume = {abs/1709.08357}, year = {2017}, url = {http://arxiv.org/abs/1709.08357}, eprinttype = {arXiv}, eprint = {1709.08357}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-08357.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeunardeauFGN17, author = {Marc Beunardeau and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {Honey Encryption for Language}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {31}, year = {2017}, url = {http://eprint.iacr.org/2017/031}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeunardeauFGN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrierGN17, author = {Eric Brier and R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {Exploring Naccache-Stern Knapsack Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {421}, year = {2017}, url = {http://eprint.iacr.org/2017/421}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrierGN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeunardeauCGN17, author = {Marc Beunardeau and Aisling Connolly and R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {On the Hardness of the Mersenne Low Hamming Ratio Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {522}, year = {2017}, url = {http://eprint.iacr.org/2017/522}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeunardeauCGN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaFGN17, author = {Fabrice Benhamouda and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {Non-Interactive Provably Secure Attestations for Arbitrary {RSA} Prime Generation Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {640}, year = {2017}, url = {http://eprint.iacr.org/2017/640}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaFGN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeraudNR17, author = {R{\'{e}}mi G{\'{e}}raud and David Naccache and Razvan Rosie}, title = {Twisting Lattice and Graph Techniques to Compress Transactional Ledgers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {751}, year = {2017}, url = {http://eprint.iacr.org/2017/751}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeraudNR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerradiN17, author = {Houda Ferradi and David Naccache}, title = {Integer Reconstruction Public-Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1231}, year = {2017}, url = {http://eprint.iacr.org/2017/1231}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FerradiN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HeckmannSLN16, author = {Thibaut Heckmann and Thomas R. Souvignet and S. Lepeer and David Naccache}, title = {Low-temperature low-cost 58 Bismuth - 42 Tin alloy forensic chip re-balling and re-soldering}, journal = {Digit. Investig.}, volume = {19}, pages = {60--68}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.10.003}, doi = {10.1016/J.DIIN.2016.10.003}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HeckmannSLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BeunardeauCGN16, author = {Marc Beunardeau and Aisling Connolly and R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {Fully Homomorphic Encryption: Computations with a Blindfold}, journal = {{IEEE} Secur. Priv.}, volume = {14}, number = {1}, pages = {63--67}, year = {2016}, url = {https://doi.org/10.1109/MSP.2016.8}, doi = {10.1109/MSP.2016.8}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BeunardeauCGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BeunardeauCGN16a, author = {Marc Beunardeau and Aisling Connolly and R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {Cdoe Obofsucaitn: Securing Software from Within}, journal = {{IEEE} Secur. Priv.}, volume = {14}, number = {3}, pages = {78--81}, year = {2016}, url = {https://doi.org/10.1109/MSP.2016.60}, doi = {10.1109/MSP.2016.60}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BeunardeauCGN16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BeunardeauCGN16b, author = {Marc Beunardeau and Aisling Connolly and R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {White-Box Cryptography: Security in an Insecure Environment}, journal = {{IEEE} Secur. Priv.}, volume = {14}, number = {5}, pages = {88--92}, year = {2016}, url = {https://doi.org/10.1109/MSP.2016.100}, doi = {10.1109/MSP.2016.100}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BeunardeauCGN16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/FerradiGNT16, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache and Assia Tria}, title = {When organized crime applies academic results: a forensic analysis of an in-card listening device}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {1}, pages = {49--59}, year = {2016}, url = {https://doi.org/10.1007/s13389-015-0112-3}, doi = {10.1007/S13389-015-0112-3}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/FerradiGNT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CoronNTW16, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache and Mehdi Tibouchi and Ralf{-}Philipp Weinmann}, title = {Practical Cryptanalysis of {ISO} 9796-2 and {EMV} Signatures}, journal = {J. Cryptol.}, volume = {29}, number = {3}, pages = {632--656}, year = {2016}, url = {https://doi.org/10.1007/s00145-015-9205-5}, doi = {10.1007/S00145-015-9205-5}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CoronNTW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/FerradiGMNP16, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Diana Maimut and David Naccache and David Pointcheval}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Legally Fair Contract Signing Without Keystones}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {175--190}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_10}, doi = {10.1007/978-3-319-39555-5\_10}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/FerradiGMNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/CantoKN16, author = {Rodrigo Portella do Canto and Roman Korkikian and David Naccache}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {Buying {AES} Design Resistance with Speed and Energy}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {134--147}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_9}, doi = {10.1007/978-3-662-49301-4\_9}, timestamp = {Sat, 19 Oct 2019 20:29:10 +0200}, biburl = {https://dblp.org/rec/conf/birthday/CantoKN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/GeraudMN16, author = {R{\'{e}}mi G{\'{e}}raud and Diana Maimut and David Naccache}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {Double-Speed Barrett Moduli}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {148--158}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_10}, doi = {10.1007/978-3-662-49301-4\_10}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/GeraudMN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/AmarilliBGN16, author = {Antoine Amarilli and Marc Beunardeau and R{\'{e}}mi G{\'{e}}raud and David Naccache}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {Failure is Also an Option}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {161--165}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_11}, doi = {10.1007/978-3-662-49301-4\_11}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/birthday/AmarilliBGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/ChevalierGNC16, author = {C{\'{e}}line Chevalier and Damien Gaumont and David Naccache and Rodrigo Portella do Canto}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {How to (Carefully) Breach a Service Contract?}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {166--173}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_12}, doi = {10.1007/978-3-662-49301-4\_12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/ChevalierGNC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/DutertreMNT16, author = {Jean{-}Max Dutertre and Amir{-}Pasha Mirbaha and David Naccache and Assia Tria}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {Photonic Power Firewalls}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {342--354}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_21}, doi = {10.1007/978-3-662-49301-4\_21}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/DutertreMNT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/DangerGHMN16, author = {Jean{-}Luc Danger and Sylvain Guilley and Philippe Hoogvorst and C{\'{e}}dric Murdica and David Naccache}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {Improving the Big Mac Attack on Elliptic Curve Cryptography}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {374--386}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_23}, doi = {10.1007/978-3-662-49301-4\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/DangerGHMN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/FouqueGMN16, author = {Pierre{-}Alain Fouque and Sylvain Guilley and C{\'{e}}dric Murdica and David Naccache}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {Safe-Errors on {SPA} Protected Implementations with the Atomicity Technique}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {479--493}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_30}, doi = {10.1007/978-3-662-49301-4\_30}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/birthday/FouqueGMN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/AerabiAFGNV16, author = {Ehsan Aerabi and A. Elhadi Amirouche and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache and Jean Vuillemin}, editor = {William H. Robinson and Swarup Bhunia and Ryan Kastner}, title = {The Conjoined Microprocessor}, booktitle = {2016 {IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2016, McLean, VA, USA, May 3-5, 2016}, pages = {67--70}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HST.2016.7495558}, doi = {10.1109/HST.2016.7495558}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/AerabiAFGNV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/CoglianiFGN16, author = {Simon Cogliani and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {344--353}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_24}, doi = {10.1007/978-3-319-49151-6\_24}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/CoglianiFGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/BarralFGJN16, author = {Hadrien Barral and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Georges{-}Axel Jaloyan and David Naccache}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {ARMv8 Shellcodes from 'A' to 'Z'}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {354--377}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_25}, doi = {10.1007/978-3-319-49151-6\_25}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/BarralFGJN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/BeunardeauFGN16, author = {Marc Beunardeau and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Honey Encryption for Language - Robbing Shannon to Pay Turing?}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {127--144}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_7}, doi = {10.1007/978-3-319-61273-7\_7}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mycrypt/BeunardeauFGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/FerradiGN16, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Human Public-Key Encryption}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {494--505}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_26}, doi = {10.1007/978-3-319-61273-7\_26}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mycrypt/FerradiGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/birthday/2016kahn, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4}, doi = {10.1007/978-3-662-49301-4}, isbn = {978-3-662-49300-7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/2016kahn.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BarralFGJN16, author = {Hadrien Barral and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Georges{-}Axel Jaloyan and David Naccache}, title = {ARMv8 Shellcodes from 'A' to 'Z'}, journal = {CoRR}, volume = {abs/1608.03415}, year = {2016}, url = {http://arxiv.org/abs/1608.03415}, eprinttype = {arXiv}, eprint = {1608.03415}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BarralFGJN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CioranescoFGN16, author = {Jean{-}Michel Cioranesco and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {Process Table Covert Channels: Exploitation and Countermeasures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {227}, year = {2016}, url = {http://eprint.iacr.org/2016/227}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CioranescoFGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerradiGMNP16, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Diana Maimut and David Naccache and David Pointcheval}, title = {Legally Fair Contract Signing Without Keystones}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {363}, year = {2016}, url = {http://eprint.iacr.org/2016/363}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FerradiGMNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerradiGN16, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {Slow Motion Zero Knowledge Identifying With Colliding Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {399}, year = {2016}, url = {http://eprint.iacr.org/2016/399}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FerradiGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoglianiFGN16, author = {Simon Cogliani and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {443}, year = {2016}, url = {http://eprint.iacr.org/2016/443}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoglianiFGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuLWQNF16, author = {Weiran Liu and Jianwei Liu and Qianhong Wu and Bo Qin and David Naccache and Houda Ferradi}, title = {Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {634}, year = {2016}, url = {http://eprint.iacr.org/2016/634}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuLWQNF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoglianiBFGMNCW16, author = {Simon Cogliani and Feng Bao and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Diana Maimut and David Naccache and Rodrigo Portella do Canto and Guilin Wang}, title = {Public-Key Based Lightweight Swarm Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {750}, year = {2016}, url = {http://eprint.iacr.org/2016/750}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoglianiBFGMNCW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerradiGN16a, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {Human Public-Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {763}, year = {2016}, url = {http://eprint.iacr.org/2016/763}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FerradiGN16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoglianiGN16, author = {Simon Cogliani and R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {A Fiat-Shamir Implementation Note}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1039}, year = {2016}, url = {http://eprint.iacr.org/2016/1039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoglianiGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/QinDWDNZ15, author = {Bo Qin and Hua Deng and Qianhong Wu and Josep Domingo{-}Ferrer and David Naccache and Yunya Zhou}, title = {Flexible attribute-based encryption applicable to secure e-healthcare records}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {6}, pages = {499--511}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0272-7}, doi = {10.1007/S10207-014-0272-7}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/QinDWDNZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/FerradiGN15, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache}, editor = {Dongdai Lin and XiaoFeng Wang and Moti Yung}, title = {Slow Motion Zero Knowledge Identifying with Colliding Commitments}, booktitle = {Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9589}, pages = {381--396}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-38898-4\_22}, doi = {10.1007/978-3-319-38898-4\_22}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/FerradiGN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isvlsi/ClementMNT15, author = {J{\'{e}}r{\'{e}}mie Cl{\'{e}}ment and Bruno Mussard and David Naccache and Lionel Torres}, title = {Implementation of {AES} Using {NVM} Memories Based on Comparison Function}, booktitle = {2015 {IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2015, Montpellier, France, July 8-10, 2015}, pages = {356--361}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ISVLSI.2015.37}, doi = {10.1109/ISVLSI.2015.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isvlsi/ClementMNT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BrierCGMN15, author = {Eric Brier and Jean{-}S{\'{e}}bastien Coron and R{\'{e}}mi G{\'{e}}raud and Diana Maimut and David Naccache}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {A Number-Theoretic Error-Correcting Code}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {25--35}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_2}, doi = {10.1007/978-3-319-27179-8\_2}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/BrierCGMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/GeraudMNCS15, author = {R{\'{e}}mi G{\'{e}}raud and Diana{-}Stefania Maimut and David Naccache and Rodrigo Portella do Canto and Emil Simion}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {Applying Cryptographic Acceleration Techniques to Error Correction}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {150--168}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_11}, doi = {10.1007/978-3-319-27179-8\_11}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/GeraudMNCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cans/2015, editor = {Michael K. Reiter and David Naccache}, title = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1}, doi = {10.1007/978-3-319-26823-1}, isbn = {978-3-319-26822-4}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secitc/2015, editor = {Ion Bica and David Naccache and Emil Simion}, title = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8}, doi = {10.1007/978-3-319-27179-8}, isbn = {978-3-319-27178-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BrierCGMN15, author = {Eric Brier and Jean{-}S{\'{e}}bastien Coron and R{\'{e}}mi G{\'{e}}raud and Diana Maimut and David Naccache}, title = {A Number-Theoretic Error-Correcting Code}, journal = {CoRR}, volume = {abs/1509.00378}, year = {2015}, url = {http://arxiv.org/abs/1509.00378}, eprinttype = {arXiv}, eprint = {1509.00378}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BrierCGMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/QinDWDNZ15, author = {Bo Qin and Hua Deng and Qianhong Wu and Josep Domingo{-}Ferrer and David Naccache and Yunya Zhou}, title = {Flexible Attribute-Based Encryption Applicable to Secure E-Healthcare Records}, journal = {CoRR}, volume = {abs/1512.06578}, year = {2015}, url = {http://arxiv.org/abs/1512.06578}, eprinttype = {arXiv}, eprint = {1512.06578}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/QinDWDNZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeraudMN15, author = {R{\'{e}}mi G{\'{e}}raud and Diana Maimut and David Naccache}, title = {Double-Speed Barrett Moduli}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {785}, year = {2015}, url = {http://eprint.iacr.org/2015/785}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeraudMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CioranescoKNC15, author = {Jean{-}Michel Cioranesco and Roman Korkikian and David Naccache and Rodrigo Portella do Canto}, title = {Buying {AES} Design Resistance with Speed and Energy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {786}, year = {2015}, url = {http://eprint.iacr.org/2015/786}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CioranescoKNC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerradiGMNZ15, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Diana Maimut and David Naccache and Hang Zhou}, title = {Backtracking-Assisted Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {787}, year = {2015}, url = {http://eprint.iacr.org/2015/787}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FerradiGMNZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FouqueGMN15, author = {Pierre{-}Alain Fouque and Sylvain Guilley and C{\'{e}}dric Murdica and David Naccache}, title = {Safe-Errors on {SPA} Protected implementations with the Atomicity Technique}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {794}, year = {2015}, url = {http://eprint.iacr.org/2015/794}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FouqueGMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DangerGHMN15, author = {Jean{-}Luc Danger and Sylvain Guilley and Philippe Hoogvorst and C{\'{e}}dric Murdica and David Naccache}, title = {Improving the Big Mac Attack on Elliptic Curve Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {819}, year = {2015}, url = {http://eprint.iacr.org/2015/819}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DangerGHMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerradiGMNW15, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Diana Maimut and David Naccache and Amaury de Wargny}, title = {Regulating the Pace of von Neumann Correctors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {849}, year = {2015}, url = {http://eprint.iacr.org/2015/849}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FerradiGMNW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeraudMNCS15, author = {R{\'{e}}mi G{\'{e}}raud and Diana{-}Stefania Maimut and David Naccache and Rodrigo Portella do Canto and Emil Simion}, title = {Applying Cryptographic Acceleration Techniques to Error Correction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {886}, year = {2015}, url = {http://eprint.iacr.org/2015/886}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeraudMNCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerradiGNT15, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache and Assia Tria}, title = {When Organized Crime Applies Academic Results - {A} Forensic Analysis of an In-Card Listening Device}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {963}, year = {2015}, url = {http://eprint.iacr.org/2015/963}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FerradiGNT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AerabiAFGNV15, author = {Ehsan Aerabi and A. Elhadi Amirouche and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache and Jean Vuillemin}, title = {The Conjoined Microprocessor}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {974}, year = {2015}, url = {http://eprint.iacr.org/2015/974}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AerabiAFGNV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/MsgnaMNM14, author = {Mehari Msgna and Konstantinos Markantonakis and David Naccache and Keith Mayes}, editor = {Emmanuel Prouff}, title = {Verifying Software Integrity in Embedded Systems: {A} Side Channel Approach}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8622}, pages = {261--280}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10175-0\_18}, doi = {10.1007/978-3-319-10175-0\_18}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/MsgnaMNM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/KorkikianPN14, author = {Roman Korkikian and Sylvain Pelissier and David Naccache}, editor = {Assia Tria and Dooho Choi}, title = {Blind Fault Attack against {SPN} Ciphers}, booktitle = {2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2014, Busan, South Korea, September 23, 2014}, pages = {94--103}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/FDTC.2014.19}, doi = {10.1109/FDTC.2014.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/KorkikianPN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/CioranescoDGGMNN14, author = {Jean{-}Michel Cioranesco and Jean{-}Luc Danger and Tarik Graba and Sylvain Guilley and Yves Mathieu and David Naccache and Xuan Thuy Ngo}, title = {Cryptographically secure shields}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {25--31}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855563}, doi = {10.1109/HST.2014.6855563}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/CioranescoDGGMNN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/AbdallaCFJN14, author = {Michel Abdalla and Herv{\'{e}} Chabanne and Houda Ferradi and Julien Jainski and David Naccache}, editor = {Xinyi Huang and Jianying Zhou}, title = {Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {8--14}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_2}, doi = {10.1007/978-3-319-06320-1\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/AbdallaCFJN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/CoglianiMNCRVV14, author = {Simon Cogliani and Diana{-}Stefania Maimut and David Naccache and Rodrigo Portella do Canto and Reza Reyhanitabar and Serge Vaudenay and Damian Viz{\'{a}}r}, editor = {Antoine Joux and Amr M. Youssef}, title = {{OMD:} {A} Compression Function Mode of Operation for Authenticated Encryption}, booktitle = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8781}, pages = {112--128}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13051-4\_7}, doi = {10.1007/978-3-319-13051-4\_7}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/CoglianiMNCRVV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/NaccacheSCY14, author = {David Naccache and Rainer Steinwandt and Adriana Su{\'{a}}rez Corona and Moti Yung}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {598--607}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_34}, doi = {10.1007/978-3-319-10879-7\_34}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/NaccacheSCY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BourgeatBCCCFHMNV14, author = {Thomas Bourgeat and Julien Bringer and Herv{\'{e}} Chabanne and Robin Champenois and J{\'{e}}r{\'{e}}mie Cl{\'{e}}ment and Houda Ferradi and Marc Heinrich and Paul Melotti and David Naccache and Antoine Voizard}, editor = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Anas Abou El Kalam and Thierry Sans}, title = {New Algorithmic Approaches to Point Constellation Recognition}, booktitle = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11 International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {428}, pages = {80--90}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55415-5\_7}, doi = {10.1007/978-3-642-55415-5\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BourgeatBCCCFHMNV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/14/BrierNX14, author = {Eric Brier and David Naccache and Li{-}yao Xia}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {How to Sign Paper Contracts? Conjectures and Evidence Related to Equitable and Efficient Collaborative Task Scheduling}, booktitle = {Open Problems in Mathematics and Computational Science}, pages = {317--340}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10683-0\_13}, doi = {10.1007/978-3-319-10683-0\_13}, timestamp = {Tue, 16 May 2017 14:01:44 +0200}, biburl = {https://dblp.org/rec/books/sp/14/BrierNX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wistp/2014, editor = {David Naccache and Damien Sauveron}, title = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8}, doi = {10.1007/978-3-662-43826-8}, isbn = {978-3-662-43825-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BourgeatBCCCFHMNV14, author = {Thomas Bourgeat and Julien Bringer and Herv{\'{e}} Chabanne and Robin Champenois and J{\'{e}}r{\'{e}}mie Cl{\'{e}}ment and Houda Ferradi and Marc Heinrich and Paul Melotti and David Naccache and Antoine Voizard}, title = {New Algorithmic Approaches to Point Constellation Recognition}, journal = {CoRR}, volume = {abs/1405.1402}, year = {2014}, url = {http://arxiv.org/abs/1405.1402}, eprinttype = {arXiv}, eprint = {1405.1402}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BourgeatBCCCFHMNV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CioranescoFN13, author = {Jean{-}Michel Cioranesco and Houda Ferradi and David Naccache}, title = {Communicating Covertly through {CPU} Monitoring}, journal = {{IEEE} Secur. Priv.}, volume = {11}, number = {6}, pages = {71--73}, year = {2013}, url = {https://doi.org/10.1109/MSP.2013.140}, doi = {10.1109/MSP.2013.140}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/CioranescoFN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DangerGHMN13, author = {Jean{-}Luc Danger and Sylvain Guilley and Philippe Hoogvorst and C{\'{e}}dric Murdica and David Naccache}, title = {A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {4}, pages = {241--265}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0062-6}, doi = {10.1007/S13389-013-0062-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DangerGHMN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/MaimutMNT13, author = {Diana Maimut and C{\'{e}}dric Murdica and David Naccache and Mehdi Tibouchi}, editor = {Emmanuel Prouff}, title = {Fault Attacks on Projective-to-Affine Coordinates Conversion}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 4th International Workshop, {COSADE} 2013, Paris, France, March 6-8, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7864}, pages = {46--61}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40026-1\_4}, doi = {10.1007/978-3-642-40026-1\_4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/MaimutMNT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/KorkikianNAC13, author = {Roman Korkikian and David Naccache and Guilherme Ozari de Almeida and Rodrigo Portella do Canto}, editor = {Mohammad S. Obaidat and Joaquim Filipe}, title = {Practical Instantaneous Frequency Analysis Experiments}, booktitle = {E-Business and Telecommunications - International Joint Conference, {ICETE} 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {456}, pages = {17--34}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-44788-8\_2}, doi = {10.1007/978-3-662-44788-8\_2}, timestamp = {Tue, 16 Aug 2022 23:04:29 +0200}, biburl = {https://dblp.org/rec/conf/icete/KorkikianNAC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/Naccache13, author = {David Naccache}, editor = {Mohammad S. Obaidat and Jos{\'{e}} Luis Sevillano and Zhaoyang Zhang and David A. Marca and Marten van Sinderen and Panagiotis G. Sarigiannidis and Piero Castoldi and Victor Torres{-}Padrosa}, title = {Instantaneous Frequency Analysis}, booktitle = {DCNET, {ICE-B} and {OPTICS} 2013 - Proceedings of the 4th International Conference on Data Communication Networking, 10th International Conference on e-Business and 4th International Conference on Optical Communication Systems, Reykjav{\'{\i}}k, Iceland, 29 - 31 July, 2013}, pages = {IS--11}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7220043/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/Naccache13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isspit/DangerGHMN13, author = {Jean{-}Luc Danger and Sylvain Guilley and Philippe Hoogvorst and C{\'{e}}dric Murdica and David Naccache}, title = {Dynamic countermeasure against the Zero Power Analysis}, booktitle = {{IEEE} International Symposium on Signal Processing and Information Technology, Athens, Greece, December 12-15, 2013}, pages = {140--147}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ISSPIT.2013.6781869}, doi = {10.1109/ISSPIT.2013.6781869}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isspit/DangerGHMN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KorkikianNA13, author = {Roman Korkikian and David Naccache and Guilherme Ozari de Almeida}, title = {Instantaneous Frequency Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {320}, year = {2013}, url = {http://eprint.iacr.org/2013/320}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KorkikianNA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrierNX13, author = {Eric Brier and David Naccache and Li{-}yao Xia}, title = {How to Sign Paper Contracts? Conjectures {\&} Evidence Related to Equitable {\&} Efficient Collaborative Task Scheduling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {432}, year = {2013}, url = {http://eprint.iacr.org/2013/432}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrierNX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChabanneCDFN13, author = {Herv{\'{e}} Chabanne and Jean{-}Michel Cioranesco and Vincent Despiegel and Jean{-}Christophe Fondeur and David Naccache}, title = {Using Hamiltonian Totems as Passwords}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {751}, year = {2013}, url = {http://eprint.iacr.org/2013/751}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChabanneCDFN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DangerGHMN13, author = {Jean{-}Luc Danger and Sylvain Guilley and Philippe Hoogvorst and C{\'{e}}dric Murdica and David Naccache}, title = {Dynamic Countermeasure Against the Zero Power Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {764}, year = {2013}, url = {http://eprint.iacr.org/2013/764}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DangerGHMN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BrierFN12, author = {Eric Brier and Wenjie Fang and David Naccache}, title = {How to Scatter a Secret?}, journal = {Cryptologia}, volume = {36}, number = {1}, pages = {46--54}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.635100}, doi = {10.1080/01611194.2012.635100}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/BrierFN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/BarenghiBKN12, author = {Alessandro Barenghi and Luca Breveglieri and Israel Koren and David Naccache}, title = {Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures}, journal = {Proc. {IEEE}}, volume = {100}, number = {11}, pages = {3056--3076}, year = {2012}, url = {https://doi.org/10.1109/JPROC.2012.2188769}, doi = {10.1109/JPROC.2012.2188769}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/BarenghiBKN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/NaccacheP12, author = {David Naccache and David Pointcheval}, editor = {David Naccache}, title = {Autotomic Signatures}, booktitle = {Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {6805}, pages = {143--155}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28368-0\_12}, doi = {10.1007/978-3-642-28368-0\_12}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/NaccacheP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/ChungMMNS12, author = {Byungchun Chung and Sandra Marcello and Amir{-}Pasha Mirbaha and David Naccache and Karim Sabeg}, editor = {David Naccache}, title = {Operand Folding Hardware Multipliers}, booktitle = {Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {6805}, pages = {319--328}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28368-0\_21}, doi = {10.1007/978-3-642-28368-0\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/ChungMMNS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/GratzerN12, author = {Vanessa Gratzer and David Naccache}, editor = {David Naccache}, title = {How to Read a Signature?}, booktitle = {Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {6805}, pages = {480--483}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28368-0\_31}, doi = {10.1007/978-3-642-28368-0\_31}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/GratzerN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/ClaretMNS12, author = {Guillaume Claret and Micha{\"{e}}l Mathieu and David Naccache and Guillaume Seguin}, editor = {David Naccache}, title = {Physical Simulation of Inarticulate Robots}, booktitle = {Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {6805}, pages = {491--499}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28368-0\_33}, doi = {10.1007/978-3-642-28368-0\_33}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/ClaretMNS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/DangerGHMN12, author = {Jean{-}Luc Danger and Sylvain Guilley and Philippe Hoogvorst and C{\'{e}}dric Murdica and David Naccache}, editor = {Stefan Mangard}, title = {Low-Cost Countermeasure against {RPA}}, booktitle = {Smart Card Research and Advanced Applications - 11th International Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7771}, pages = {106--122}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37288-9\_8}, doi = {10.1007/978-3-642-37288-9\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/DangerGHMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/BrierFKMNAPRV12, author = {Eric Brier and Quentin Fortier and Roman Korkikian and Khalid W. Magld and David Naccache and Guilherme Ozari de Almeida and Adrien Pommellet and A. H. Ragab and Jean Vuillemin}, editor = {Stefan Mangard}, title = {Defensive Leakage Camouflage}, booktitle = {Smart Card Research and Advanced Applications - 11th International Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7771}, pages = {277--295}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37288-9\_19}, doi = {10.1007/978-3-642-37288-9\_19}, timestamp = {Wed, 19 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cardis/BrierFKMNAPRV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BriaisCCDGJMNP12, author = {S{\'{e}}bastien Briais and St{\'{e}}phane Caron and Jean{-}Michel Cioranesco and Jean{-}Luc Danger and Sylvain Guilley and Jacques{-}Henri Jourdan and Arthur Milchior and David Naccache and Thibault Porteboeuf}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {3D Hardware Canaries}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {1--22}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_1}, doi = {10.1007/978-3-642-33027-8\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BriaisCCDGJMNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/MurdicaGDHN12, author = {C{\'{e}}dric Murdica and Sylvain Guilley and Jean{-}Luc Danger and Philippe Hoogvorst and David Naccache}, editor = {Werner Schindler and Sorin A. Huss}, title = {Same Values Power Analysis Using Special Points on Elliptic Curves}, booktitle = {Constructive Side-Channel Analysis and Secure Design - Third International Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7275}, pages = {183--198}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29912-4\_14}, doi = {10.1007/978-3-642-29912-4\_14}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/MurdicaGDHN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CoronNT12, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache and Mehdi Tibouchi}, editor = {David Pointcheval and Thomas Johansson}, title = {Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {446--464}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_27}, doi = {10.1007/978-3-642-29011-4\_27}, timestamp = {Sun, 12 Nov 2023 02:15:08 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CoronNT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/BriaisCDGNP12, author = {S{\'{e}}bastien Briais and Jean{-}Michel Cioranesco and Jean{-}Luc Danger and Sylvain Guilley and David Naccache and Thibault Porteboeuf}, editor = {Guido Bertoni and Benedikt Gierlichs}, title = {Random Active Shield}, booktitle = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, September 9, 2012}, pages = {103--113}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/FDTC.2012.11}, doi = {10.1109/FDTC.2012.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/BriaisCDGNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/DutertreMNRTV12, author = {Jean{-}Max Dutertre and Amir{-}Pasha Mirbaha and David Naccache and Anne{-}Lise Ribotta and Assia Tria and Thierry Vaschalde}, title = {Fault Round Modification Analysis of the advanced encryption standard}, booktitle = {2012 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2012, San Francisco, CA, USA, June 3-4, 2012}, pages = {140--145}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/HST.2012.6224334}, doi = {10.1109/HST.2012.6224334}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/DutertreMNRTV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/CoronNT12, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache and Mehdi Tibouchi}, editor = {Taekyoung Kwon and Mun{-}Kyu Lee and Daesung Kwon}, title = {Another Look at Affine-Padding {RSA} Signatures}, booktitle = {Information Security and Cryptology - {ICISC} 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7839}, pages = {22--32}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37682-5\_2}, doi = {10.1007/978-3-642-37682-5\_2}, timestamp = {Thu, 12 Nov 2020 16:27:41 +0100}, biburl = {https://dblp.org/rec/conf/icisc/CoronNT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tgc/AmarilliHBMNR12, author = {Antoine Amarilli and Fabrice Ben Hamouda and Florian Bourse and Robin Morisset and David Naccache and Pablo Rauzy}, editor = {Catuscia Palamidessi and Mark Dermot Ryan}, title = {From Rational Number Reconstruction to Set Reconciliation and File Synchronization}, booktitle = {Trustworthy Global Computing - 7th International Symposium, {TGC} 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8191}, pages = {1--18}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-41157-1\_1}, doi = {10.1007/978-3-642-41157-1\_1}, timestamp = {Wed, 07 Dec 2022 23:14:04 +0100}, biburl = {https://dblp.org/rec/conf/tgc/AmarilliHBMNR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/birthday/2012quisquater, editor = {David Naccache}, title = {Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {6805}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28368-0}, doi = {10.1007/978-3-642-28368-0}, isbn = {978-3-642-28367-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/2012quisquater.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BriaisCCDGJMNP12, author = {S{\'{e}}bastien Briais and St{\'{e}}phane Caron and Jean{-}Michel Cioranesco and Jean{-}Luc Danger and Sylvain Guilley and Jacques{-}Henri Jourdan and Arthur Milchior and David Naccache and Thibault Porteboeuf}, title = {3D Hardware Canaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {324}, year = {2012}, url = {http://eprint.iacr.org/2012/324}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BriaisCCDGJMNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrierFKMNAPRV12, author = {Eric Brier and Quentin Fortier and Roman Korkikian and Khalid W. Magld and David Naccache and Guilherme Ozari de Almeida and Adrien Pommellet and A. H. Ragab and Jean Vuillemin}, title = {Defensive Leakage Camouflage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {728}, year = {2012}, url = {http://eprint.iacr.org/2012/728}, timestamp = {Wed, 19 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BrierFKMNAPRV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BrierNNT11, author = {Eric Brier and David Naccache and Phong Q. Nguyen and Mehdi Tibouchi}, title = {Modulus fault attacks against {RSA-CRT} signatures}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {3}, pages = {243--253}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0015-x}, doi = {10.1007/S13389-011-0015-X}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BrierNNT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BrierNNT11, author = {Eric Brier and David Naccache and Phong Q. Nguyen and Mehdi Tibouchi}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Modulus Fault Attacks against {RSA-CRT} Signatures}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {192--206}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_13}, doi = {10.1007/978-3-642-23951-9\_13}, timestamp = {Sat, 19 Oct 2019 20:26:25 +0200}, biburl = {https://dblp.org/rec/conf/ches/BrierNNT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoronMNT11, author = {Jean{-}S{\'{e}}bastien Coron and Avradip Mandal and David Naccache and Mehdi Tibouchi}, editor = {Phillip Rogaway}, title = {Fully Homomorphic Encryption over the Integers with Shorter Public Keys}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {487--504}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_28}, doi = {10.1007/978-3-642-22792-9\_28}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CoronMNT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/AmarilliNRS11, author = {Antoine Amarilli and David Naccache and Pablo Rauzy and Emil Simion}, editor = {Liqun Chen}, title = {Can a Program Reverse-Engineer Itself?}, booktitle = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC} 2011, Oxford, UK, December 12-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7089}, pages = {1--9}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25516-8\_1}, doi = {10.1007/978-3-642-25516-8\_1}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ima/AmarilliNRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CoronJMNT11, author = {Jean{-}S{\'{e}}bastien Coron and Antoine Joux and Avradip Mandal and David Naccache and Mehdi Tibouchi}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Cryptanalysis of the {RSA} Subgroup Assumption from {TCC} 2005}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {147--155}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_9}, doi = {10.1007/978-3-642-19379-8\_9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/CoronJMNT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/AmarilliMNPRT11, author = {Antoine Amarilli and Sascha M{\"{u}}ller and David Naccache and Dan Page and Pablo Rauzy and Michael Tunstall}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Can Code Polymorphism Limit Information Leakage?}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {1--21}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_1}, doi = {10.1007/978-3-642-21040-2\_1}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/wistp/AmarilliMNPRT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fdtc/2011, editor = {Luca Breveglieri and Sylvain Guilley and Israel Koren and David Naccache and Junko Takahashi}, title = {2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2011, Tokyo, Japan, September 29, 2011}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/conhome/6075045/proceeding}, isbn = {978-1-4577-1463-4}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fdtc/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Naccache11, author = {David Naccache}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Autotomic Signatures}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {68}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_888}, doi = {10.1007/978-1-4419-5906-5\_888}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Naccache11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Naccache11a, author = {David Naccache}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Barrett's Algorithm}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {71}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_501}, doi = {10.1007/978-1-4419-5906-5\_501}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Naccache11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Naccache11b, author = {David Naccache}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Blackmailing Attacks}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {148}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_889}, doi = {10.1007/978-1-4419-5906-5\_889}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Naccache11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Naccache11c, author = {David Naccache}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Chemical Combinatorial Attack}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {200--201}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_890}, doi = {10.1007/978-1-4419-5906-5\_890}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Naccache11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Naccache11d, author = {David Naccache}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Cryptophthora}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {284}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_891}, doi = {10.1007/978-1-4419-5906-5\_891}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Naccache11d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Naccache11e, author = {David Naccache}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Generic Model}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {512--513}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_507}, doi = {10.1007/978-1-4419-5906-5\_507}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Naccache11e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Naccache11f, author = {David Naccache}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Gr{\"{o}}bner Basis}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {519}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_508}, doi = {10.1007/978-1-4419-5906-5\_508}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Naccache11f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Naccache11g, author = {David Naccache}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Monotone Signatures}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {799}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_892}, doi = {10.1007/978-1-4419-5906-5\_892}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Naccache11g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Naccache11h, author = {David Naccache}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Multiplicative Knapsack Cryptosystem}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {818}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_513}, doi = {10.1007/978-1-4419-5906-5\_513}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Naccache11h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Naccache11i, author = {David Naccache}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Naccache-Stern Higher Residues Cryptosystem}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {829}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_893}, doi = {10.1007/978-1-4419-5906-5\_893}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Naccache11i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Naccache11j, author = {David Naccache}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Phenotyping}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {927}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_894}, doi = {10.1007/978-1-4419-5906-5\_894}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Naccache11j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Naccache11k, author = {David Naccache}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Reverse Public Key Encryption}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1044}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_895}, doi = {10.1007/978-1-4419-5906-5\_895}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Naccache11k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Naccache11l, author = {David Naccache}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Standard Model}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1253}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_518}, doi = {10.1007/978-1-4419-5906-5\_518}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Naccache11l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Naccache11m, author = {David Naccache}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Temperature Attack}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1283}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_519}, doi = {10.1007/978-1-4419-5906-5\_519}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Naccache11m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Naccache11n, author = {David Naccache}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Twin Signatures}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1338}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_896}, doi = {10.1007/978-1-4419-5906-5\_896}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Naccache11n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Naccache11o, author = {David Naccache}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {von Neumann Correction}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1364}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_520}, doi = {10.1007/978-1-4419-5906-5\_520}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Naccache11o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1104-1533, author = {Byungchun Chung and Sandra Marcello and Amir{-}Pasha Mirbaha and David Naccache and Karim Sabeg}, title = {Operand Folding Hardware Multipliers}, journal = {CoRR}, volume = {abs/1104.1533}, year = {2011}, url = {http://arxiv.org/abs/1104.1533}, eprinttype = {arXiv}, eprint = {1104.1533}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1104-1533.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1104-1546, author = {Guillaume Claret and Micha{\"{e}}l Mathieu and David Naccache and Guillaume Seguin}, title = {Physical Simulation of Inarticulate Robots}, journal = {CoRR}, volume = {abs/1104.1546}, year = {2011}, url = {http://arxiv.org/abs/1104.1546}, eprinttype = {arXiv}, eprint = {1104.1546}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1104-1546.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronNT11, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache and Mehdi Tibouchi}, title = {Another Look at {RSA} Signatures With Affine Padding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {57}, year = {2011}, url = {http://eprint.iacr.org/2011/057}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronNT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmarilliMNPRT11, author = {Antoine Amarilli and Sascha M{\"{u}}ller and David Naccache and Daniel Page and Pablo Rauzy and Michael Tunstall}, title = {Can Code Polymorphism Limit Information Leakage?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {99}, year = {2011}, url = {http://eprint.iacr.org/2011/099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmarilliMNPRT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrierNNT11, author = {Eric Brier and David Naccache and Phong Q. Nguyen and Mehdi Tibouchi}, title = {Modulus Fault Attacks Against {RSA-CRT} Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {388}, year = {2011}, url = {http://eprint.iacr.org/2011/388}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrierNNT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronNT11a, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache and Mehdi Tibouchi}, title = {Optimization of Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {440}, year = {2011}, url = {http://eprint.iacr.org/2011/440}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronNT11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronMNT11, author = {Jean{-}S{\'{e}}bastien Coron and Avradip Mandal and David Naccache and Mehdi Tibouchi}, title = {Fully Homomorphic Encryption over the Integers with Shorter Public Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {441}, year = {2011}, url = {http://eprint.iacr.org/2011/441}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronMNT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmarilliNRS11, author = {Antoine Amarilli and David Naccache and Pablo Rauzy and Emil Simion}, title = {Can a Program Reverse-Engineer Itself?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {497}, year = {2011}, url = {http://eprint.iacr.org/2011/497}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmarilliNRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc6287, author = {David M'Ra{\"{\i}}hi and Johan Rydell and Siddharth Bajaj and Salah Machani and David Naccache}, title = {{OCRA:} {OATH} Challenge-Response Algorithm}, journal = {{RFC}}, volume = {6287}, pages = {1--38}, year = {2011}, url = {https://doi.org/10.17487/RFC6287}, doi = {10.17487/RFC6287}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc6287.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BauerCNTV10, author = {Aur{\'{e}}lie Bauer and Jean{-}S{\'{e}}bastien Coron and David Naccache and Mehdi Tibouchi and Damien Vergnaud}, editor = {Jianying Zhou and Moti Yung}, title = {On the Broadcast and Validity-Checking Security of pkcs{\#}1 v1.5 Encryption}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {1--18}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_1}, doi = {10.1007/978-3-642-13708-2\_1}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BauerCNTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/JoyeNP10, author = {Marc Joye and David Naccache and St{\'{e}}phanie Porte}, editor = {Dieter Gollmann and Jean{-}Louis Lanet and Julien Iguchi{-}Cartigny}, title = {The Polynomial Composition Problem in (Z/\emph{n}Z)[\emph{X}]}, booktitle = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2010, Passau, Germany, April 14-16, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6035}, pages = {1--12}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12510-2\_1}, doi = {10.1007/978-3-642-12510-2\_1}, timestamp = {Sat, 30 May 2020 20:05:42 +0200}, biburl = {https://dblp.org/rec/conf/cardis/JoyeNP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/Chevallier-MamesCMNS10, author = {Beno{\^{\i}}t Chevallier{-}Mames and Jean{-}S{\'{e}}bastien Coron and Noel McCullagh and David Naccache and Michael Scott}, editor = {Dieter Gollmann and Jean{-}Louis Lanet and Julien Iguchi{-}Cartigny}, title = {Secure Delegation of Elliptic-Curve Pairing}, booktitle = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2010, Passau, Germany, April 14-16, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6035}, pages = {24--35}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12510-2\_3}, doi = {10.1007/978-3-642-12510-2\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/Chevallier-MamesCMNS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/AgoyanDNRT10, author = {Michel Agoyan and Jean{-}Max Dutertre and David Naccache and Bruno Robisson and Assia Tria}, editor = {Dieter Gollmann and Jean{-}Louis Lanet and Julien Iguchi{-}Cartigny}, title = {When Clocks Fail: On Critical Paths and Clock Faults}, booktitle = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2010, Passau, Germany, April 14-16, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6035}, pages = {182--193}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12510-2\_13}, doi = {10.1007/978-3-642-12510-2\_13}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/AgoyanDNRT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/CoronNT10, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache and Mehdi Tibouchi}, editor = {Josef Pieprzyk}, title = {Fault Attacks Against emv Signatures}, booktitle = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5985}, pages = {208--220}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11925-5\_15}, doi = {10.1007/978-3-642-11925-5\_15}, timestamp = {Sun, 02 Jun 2019 21:22:43 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/CoronNT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iolts/AgoyanDMNRT10, author = {Michel Agoyan and Jean{-}Max Dutertre and Amir{-}Pasha Mirbaha and David Naccache and Anne{-}Lise Ribotta and Assia Tria}, title = {How to flip a bit?}, booktitle = {16th {IEEE} International On-Line Testing Symposium {(IOLTS} 2010), 5-7 July, 2010, Corfu, Greece}, pages = {235--239}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IOLTS.2010.5560194}, doi = {10.1109/IOLTS.2010.5560194}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iolts/AgoyanDMNRT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FuchsbauerKN10, author = {Georg Fuchsbauer and Jonathan Katz and David Naccache}, editor = {Daniele Micciancio}, title = {Efficient Rational Secret Sharing in Standard Communication Networks}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {419--436}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_25}, doi = {10.1007/978-3-642-11799-2\_25}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/FuchsbauerKN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/BaekGKN10, author = {Yoo{-}Jin Baek and Vanessa Gratzer and Sung{-}Hyun Kim and David Naccache}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Extracting Unknown Keys from Unknown Algorithms Encrypting Unknown Fixed Messages and Returning No Results}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {189--197}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_8}, doi = {10.1007/978-3-642-14452-3\_8}, timestamp = {Tue, 16 May 2017 14:24:21 +0200}, biburl = {https://dblp.org/rec/series/isc/BaekGKN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fdtc/2010, editor = {Luca Breveglieri and Marc Joye and Israel Koren and David Naccache and Ingrid Verbauwhede}, title = {2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2010, Santa Barbara, California, USA, 21 August 2010}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://ieeexplore.ieee.org/xpl/conhome/5575321/proceeding}, isbn = {978-0-7695-4169-3}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fdtc/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/364214451, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3}, doi = {10.1007/978-3-642-14452-3}, isbn = {978-3-642-14451-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/364214451.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BauerCNTV10, author = {Aur{\'{e}}lie Bauer and Jean{-}S{\'{e}}bastien Coron and David Naccache and Mehdi Tibouchi and Damien Vergnaud}, title = {On The Broadcast and Validity-Checking Security of {PKCS} {\textbackslash}{\#}1 v1.5 Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {135}, year = {2010}, url = {http://eprint.iacr.org/2010/135}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BauerCNTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GratzerN10, author = {Vanessa Gratzer and David Naccache}, title = {How to Read a Signature?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {530}, year = {2010}, url = {http://eprint.iacr.org/2010/530}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GratzerN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronJMNT10, author = {Jean{-}S{\'{e}}bastien Coron and Antoine Joux and Avradip Mandal and David Naccache and Mehdi Tibouchi}, title = {Cryptanalysis of the {RSA} Subgroup Assumption from {TCC} 2005}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {650}, year = {2010}, url = {http://eprint.iacr.org/2010/650}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronJMNT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BrouchierKMN09, author = {Julien Brouchier and Tom Kean and Carol Marsh and David Naccache}, title = {Temperature Attacks}, journal = {{IEEE} Secur. Priv.}, volume = {7}, number = {2}, pages = {79--82}, year = {2009}, url = {https://doi.org/10.1109/MSP.2009.54}, doi = {10.1109/MSP.2009.54}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BrouchierKMN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KafiGMN09, author = {Mohaned Kafi and Sylvain Guilley and Sandra Marcello and David Naccache}, title = {Deconvolving Protected Signals}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {687--694}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.197}, doi = {10.1109/ARES.2009.197}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/KafiGMN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biosig/NaccacheSY09, author = {David Naccache and Rainer Steinwandt and Moti Yung}, editor = {Arslan Br{\"{o}}mme and Christoph Busch and Detlef H{\"{u}}hnlein}, title = {Reverse Public Key Encryption}, booktitle = {{BIOSIG} 2009 - Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 17.-18. September 2009 in Darmstadt, Germany}, series = {{LNI}}, volume = {{P-155}}, pages = {155--169}, publisher = {{GI}}, year = {2009}, url = {https://dl.gi.de/handle/20.500.12116/23181}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/biosig/NaccacheSY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CoronJKNP09, author = {Jean{-}S{\'{e}}bastien Coron and Antoine Joux and Ilya Kizhvatov and David Naccache and Pascal Paillier}, editor = {Christophe Clavier and Kris Gaj}, title = {Fault Attacks on {RSA} Signatures with Partially Unknown Messages}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {444--456}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_31}, doi = {10.1007/978-3-642-04138-9\_31}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/CoronJKNP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoronNTW09, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache and Mehdi Tibouchi and Ralf{-}Philipp Weinmann}, editor = {Shai Halevi}, title = {Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {428--444}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_25}, doi = {10.1007/978-3-642-03356-8\_25}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CoronNTW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/BrierNT09, author = {Eric Brier and David Naccache and Mehdi Tibouchi}, editor = {Dong Hoon Lee and Seokhie Hong}, title = {Factoring Unbalanced Moduli with Known Bits}, booktitle = {Information, Security and Cryptology - {ICISC} 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5984}, pages = {65--72}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14423-3\_5}, doi = {10.1007/978-3-642-14423-3\_5}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/BrierNT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/CathaloNQ09, author = {Julien Cathalo and David Naccache and Jean{-}Jacques Quisquater}, editor = {Matthew Geoffrey Parker}, title = {Comparing with {RSA}}, booktitle = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5921}, pages = {326--335}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10868-6\_19}, doi = {10.1007/978-3-642-10868-6\_19}, timestamp = {Wed, 01 Sep 2021 10:36:08 +0200}, biburl = {https://dblp.org/rec/conf/ima/CathaloNQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/JouxLNT09, author = {Antoine Joux and Reynald Lercier and David Naccache and Emmanuel Thom{\'{e}}}, editor = {Matthew Geoffrey Parker}, title = {Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms}, booktitle = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5921}, pages = {351--367}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10868-6\_21}, doi = {10.1007/978-3-642-10868-6\_21}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/JouxLNT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/natosec/NaccacheS09, author = {David Naccache and Igor E. Shparlinski}, editor = {Tanush Shaska and Engjell Hasimaj}, title = {Divisibility, Smoothness and Cryptographic Applications}, booktitle = {Algebraic Aspects of Digital Communications}, series = {{NATO} Science for Peace and Security Series - {D:} Information and Communication Security}, volume = {24}, pages = {115--173}, publisher = {{IOS} Press}, year = {2009}, url = {https://doi.org/10.3233/978-1-60750-019-3-115}, doi = {10.3233/978-1-60750-019-3-115}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/natosec/NaccacheS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fdtc/2009, editor = {Luca Breveglieri and Israel Koren and David Naccache and Elisabeth Oswald and Jean{-}Pierre Seifert}, title = {Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2009, Lausanne, Switzerland, 6 September 2009}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://ieeexplore.ieee.org/xpl/conhome/5412677/proceeding}, isbn = {978-0-7695-3824-2}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fdtc/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrouchierDKMN09, author = {Julien Brouchier and Nora Dabbous and Tom Kean and Carol Marsh and David Naccache}, title = {Thermocommunication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {2009}, url = {http://eprint.iacr.org/2009/002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrouchierDKMN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CathaloNQ09, author = {Julien Cathalo and David Naccache and Jean{-}Jacques Quisquater}, title = {Comparing With {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {2009}, url = {http://eprint.iacr.org/2009/021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CathaloNQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronNTW09, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache and Mehdi Tibouchi and Ralf{-}Philipp Weinmann}, title = {Practical Cryptanalysis of {ISO/IEC} 9796-2 and {EMV} Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {203}, year = {2009}, url = {http://eprint.iacr.org/2009/203}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronNTW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronJKNP09, author = {Jean{-}S{\'{e}}bastien Coron and Antoine Joux and Ilya Kizhvatov and David Naccache and Pascal Paillier}, title = {Fault Attacks on {RSA} Signatures with Partially Unknown Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2009}, url = {http://eprint.iacr.org/2009/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronJKNP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrierNT09, author = {Eric Brier and David Naccache and Mehdi Tibouchi}, title = {Factoring Unbalanced Moduli with Known Bits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {323}, year = {2009}, url = {http://eprint.iacr.org/2009/323}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrierNT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronNT09, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache and Mehdi Tibouchi}, title = {Fault Attacks Against {EMV} Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {503}, year = {2009}, url = {http://eprint.iacr.org/2009/503}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronNT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LevieilN08, author = {{\'{E}}ric Levieil and David Naccache}, title = {Cryptographic Test Correction}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {2}, pages = {69--71}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.30}, doi = {10.1109/MSP.2008.30}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/LevieilN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CoppersmithCGHJNS08, author = {Don Coppersmith and Jean{-}S{\'{e}}bastien Coron and Fran{\c{c}}ois Grieu and Shai Halevi and Charanjit S. Jutla and David Naccache and Julien P. Stern}, title = {Cryptanalysis of {ISO/IEC} 9796-1}, journal = {J. Cryptol.}, volume = {21}, number = {1}, pages = {27--51}, year = {2008}, url = {https://doi.org/10.1007/s00145-007-9007-5}, doi = {10.1007/S00145-007-9007-5}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CoppersmithCGHJNS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LevieilN08, author = {{\'{E}}ric Levieil and David Naccache}, editor = {Ronald Cramer}, title = {Cryptographic Test Correction}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {85--100}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_6}, doi = {10.1007/978-3-540-78440-1\_6}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LevieilN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Chevallier-MamesNS08, author = {Beno{\^{\i}}t Chevallier{-}Mames and David Naccache and Jacques Stern}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Linear Bandwidth Naccache-Stern Encryption}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {327--339}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_22}, doi = {10.1007/978-3-540-85855-3\_22}, timestamp = {Tue, 25 Feb 2020 11:33:46 +0100}, biburl = {https://dblp.org/rec/conf/scn/Chevallier-MamesNS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fdtc/2008, editor = {Luca Breveglieri and Shay Gueron and Israel Koren and David Naccache and Jean{-}Pierre Seifert}, title = {Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008, {FDTC} 2008, Washington, DC, USA, 10 August 2008}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4599542/proceeding}, isbn = {978-0-7695-3314-8}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fdtc/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0810-2067, author = {David Naccache and Igor E. Shparlinski}, title = {Divisibility, Smoothness and Cryptographic Applications}, journal = {CoRR}, volume = {abs/0810.2067}, year = {2008}, url = {http://arxiv.org/abs/0810.2067}, eprinttype = {arXiv}, eprint = {0810.2067}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0810-2067.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chevallier-MamesNS08, author = {Beno{\^{\i}}t Chevallier{-}Mames and David Naccache and Jacques Stern}, title = {Linear Bandwidth Naccache-Stern Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {119}, year = {2008}, url = {http://eprint.iacr.org/2008/119}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chevallier-MamesNS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxLNT08, author = {Antoine Joux and Reynald Lercier and David Naccache and Emmanuel Thom{\'{e}}}, title = {Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {217}, year = {2008}, url = {http://eprint.iacr.org/2008/217}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxLNT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaccacheS08, author = {David Naccache and Igor E. Shparlinski}, title = {Divisibility, Smoothness and Cryptographic Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {437}, year = {2008}, url = {http://eprint.iacr.org/2008/437}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaccacheS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuchsbauerKN08, author = {Georg Fuchsbauer and Jonathan Katz and David Naccache}, title = {Efficient Rational Secret Sharing in Standard Communication Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {488}, year = {2008}, url = {http://eprint.iacr.org/2008/488}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuchsbauerKN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GratzerN07, author = {Vanessa Gratzer and David Naccache}, title = {Alien vs. Quine}, journal = {{IEEE} Secur. Priv.}, volume = {5}, number = {2}, pages = {26--31}, year = {2007}, url = {https://doi.org/10.1109/MSP.2007.28}, doi = {10.1109/MSP.2007.28}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/GratzerN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GratzerN07a, author = {Vanessa Gratzer and David Naccache}, title = {Trust on a Nationwide Scale}, journal = {{IEEE} Secur. Priv.}, volume = {5}, number = {5}, pages = {69--71}, year = {2007}, url = {https://doi.org/10.1109/MSP.2007.127}, doi = {10.1109/MSP.2007.127}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GratzerN07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Naccache07, author = {David Naccache}, title = {Secure and practical identity-based encryption}, journal = {{IET} Inf. Secur.}, volume = {1}, number = {2}, pages = {59--64}, year = {2007}, url = {https://doi.org/10.1049/iet-ifs:20055097}, doi = {10.1049/IET-IFS:20055097}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Naccache07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/JouxNT07, author = {Antoine Joux and David Naccache and Emmanuel Thom{\'{e}}}, editor = {Kaoru Kurosawa}, title = {When \emph{e}-th Roots Become Easier Than Factoring}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {13--28}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_2}, doi = {10.1007/978-3-540-76900-2\_2}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/JouxNT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fdtc/2007, editor = {Luca Breveglieri and Shay Gueron and Israel Koren and David Naccache and Jean{-}Pierre Seifert}, title = {Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007, {FDTC} 2007: Vienna, Austria, 10 September 2007}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://ieeexplore.ieee.org/xpl/conhome/4318971/proceeding}, isbn = {0-7695-2982-8}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fdtc/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxNT07, author = {Antoine Joux and David Naccache and Emmanuel Thom{\'{e}}}, title = {When e-th Roots Become Easier Than Factoring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {424}, year = {2007}, url = {http://eprint.iacr.org/2007/424}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxNT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CoronNDOS06, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache and Yvo Desmedt and Andrew M. Odlyzko and Julien P. Stern}, title = {Index Calculation Attacks on {RSA} Signature and Encryption}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {1}, pages = {41--53}, year = {2006}, url = {https://doi.org/10.1007/s10623-004-5660-y}, doi = {10.1007/S10623-004-5660-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CoronNDOS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GratzerN06, author = {Vanessa Gratzer and David Naccache}, title = {Cryptography, Law Enforcement, and Mobile Communications}, journal = {{IEEE} Secur. Priv.}, volume = {4}, number = {6}, pages = {67--70}, year = {2006}, url = {https://doi.org/10.1109/MSP.2006.148}, doi = {10.1109/MSP.2006.148}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GratzerN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/Bar-ElCNTW06, author = {Hagai Bar{-}El and Hamid Choukri and David Naccache and Michael Tunstall and Claire Whelan}, title = {The Sorcerer's Apprentice Guide to Fault Attacks}, journal = {Proc. {IEEE}}, volume = {94}, number = {2}, pages = {370--382}, year = {2006}, url = {https://doi.org/10.1109/JPROC.2005.862424}, doi = {10.1109/JPROC.2005.862424}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/Bar-ElCNTW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GratzerN06, author = {Vanessa Gratzer and David Naccache}, editor = {Serge Vaudenay}, title = {Alien \emph{vs.} Quine, the Vanishing Circuit and Other Tales from the Industry's Crypt}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {48--58}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_4}, doi = {10.1007/11761679\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GratzerN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/GratzerNZ06, author = {Vanessa Gratzer and David Naccache and David Znaty}, title = {Law Enforcement, Forensics and Mobile Communications}, booktitle = {4th {IEEE} Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 13-17 March 2006, Pisa, Italy}, pages = {256--260}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/PERCOMW.2006.73}, doi = {10.1109/PERCOMW.2006.73}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/GratzerNZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fdtc/2006, editor = {Luca Breveglieri and Israel Koren and David Naccache and Jean{-}Pierre Seifert}, title = {Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, {FDTC} 2006, Yokohama, Japan, October 10, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4236}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11889700}, doi = {10.1007/11889700}, isbn = {3-540-46250-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fdtc/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GutmannNP05, author = {Peter Gutmann and David Naccache and Charles C. Palmer}, title = {When Hashes Collide}, journal = {{IEEE} Secur. Priv.}, volume = {3}, number = {3}, pages = {68--71}, year = {2005}, url = {https://doi.org/10.1109/MSP.2005.84}, doi = {10.1109/MSP.2005.84}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GutmannNP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Naccache05, author = {David Naccache}, title = {Finding Faults}, journal = {{IEEE} Secur. Priv.}, volume = {3}, number = {5}, pages = {61--65}, year = {2005}, url = {https://doi.org/10.1109/MSP.2005.122}, doi = {10.1109/MSP.2005.122}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Naccache05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Naccache05, author = {David Naccache}, editor = {Dongho Won and Seungjoo Kim}, title = {National Security, Forensics and Mobile Communications}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {1}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_1}, doi = {10.1007/11734727\_1}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Naccache05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NaccacheNTW05, author = {David Naccache and Phong Q. Nguyen and Michael Tunstall and Claire Whelan}, editor = {Serge Vaudenay}, title = {Experimenting with Faults, Lattices and the {DSA}}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {16--28}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_3}, doi = {10.1007/978-3-540-30580-4\_3}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/NaccacheNTW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CathaloCN05, author = {Julien Cathalo and Jean{-}S{\'{e}}bastien Coron and David Naccache}, editor = {Serge Vaudenay}, title = {From Fixed-Length to Arbitrary-Length {RSA} Encoding Schemes Revisited}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {234--243}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_16}, doi = {10.1007/978-3-540-30580-4\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CathaloCN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0510042, author = {David Naccache}, title = {Secure and \{{\textbackslash}sl Practical\} Identity-Based Encryption}, journal = {CoRR}, volume = {abs/cs/0510042}, year = {2005}, url = {http://arxiv.org/abs/cs/0510042}, eprinttype = {arXiv}, eprint = {cs/0510042}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0510042.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chevallier-MamesCMNS05, author = {Beno{\^{\i}}t Chevallier{-}Mames and Jean{-}S{\'{e}}bastien Coron and Noel McCullagh and David Naccache and Michael Scott}, title = {Secure Delegation of Elliptic-Curve Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {150}, year = {2005}, url = {http://eprint.iacr.org/2005/150}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chevallier-MamesCMNS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Naccache05, author = {David Naccache}, title = {Secure and \emph{Practical} Identity-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {369}, year = {2005}, url = {http://eprint.iacr.org/2005/369}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Naccache05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GratzerN05, author = {Vanessa Gratzer and David Naccache}, title = {Blind Attacks on Engineering Samples}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {468}, year = {2005}, url = {http://eprint.iacr.org/2005/468}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GratzerN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc4226, author = {David M'Ra{\"{\i}}hi and Mihir Bellare and Frank Hoornaert and David Naccache and Ohad Ranen}, title = {{HOTP:} An HMAC-Based One-Time Password Algorithm}, journal = {{RFC}}, volume = {4226}, pages = {1--37}, year = {2005}, url = {https://doi.org/10.17487/RFC4226}, doi = {10.17487/RFC4226}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc4226.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/hal/Naccache04, author = {David Naccache}, title = {Security, Cryptography: Theory and Practice. (S{\'{e}}curit{\'{e}}, Cryptographie : Th{\'{e}}orie et Pratique)}, year = {2004}, url = {https://tel.archives-ouvertes.fr/tel-01357506}, timestamp = {Thu, 28 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/hal/Naccache04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/CoronNK04, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache and Paul C. Kocher}, title = {Statistics and secret leakage}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {3}, number = {3}, pages = {492--508}, year = {2004}, url = {https://doi.org/10.1145/1015047.1015050}, doi = {10.1145/1015047.1015050}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/CoronNK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Chevallier-MamesNPP04, author = {Beno{\^{\i}}t Chevallier{-}Mames and David Naccache and Pascal Paillier and David Pointcheval}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {How to Disembed a Program?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {441--454}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_32}, doi = {10.1007/978-3-540-28632-5\_32}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/Chevallier-MamesNPP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/CoronN04, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache}, editor = {Tatsuaki Okamoto}, title = {Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95}, booktitle = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2964}, pages = {157--162}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24660-2\_13}, doi = {10.1007/978-3-540-24660-2\_13}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/CoronN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NaccacheSS04, author = {David Naccache and Nigel P. Smart and Jacques Stern}, editor = {Christian Cachin and Jan Camenisch}, title = {Projective Coordinates Leak}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {257--267}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_16}, doi = {10.1007/978-3-540-24676-3\_16}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NaccacheSS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icba/BarralCN04, author = {Claude Barral and Jean{-}S{\'{e}}bastien Coron and David Naccache}, editor = {David Zhang and Anil K. Jain}, title = {Externalized Fingerprint Matching}, booktitle = {Biometric Authentication, First International Conference, {ICBA} 2004, Hong Kong, China, July 15-17, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3072}, pages = {309--315}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25948-0\_43}, doi = {10.1007/978-3-540-25948-0\_43}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icba/BarralCN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarralCN04, author = {Claude Barral and Jean{-}S{\'{e}}bastien Coron and David Naccache}, title = {Externalized Fingerprint Matching}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {2004}, url = {http://eprint.iacr.org/2004/021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarralCN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bar-ElCNTW04, author = {Hagai Bar{-}El and Hamid Choukri and David Naccache and Michael Tunstall and Claire Whelan}, title = {The Sorcerer's Apprentice Guide to Fault Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {100}, year = {2004}, url = {http://eprint.iacr.org/2004/100}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bar-ElCNTW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chevallier-MamesNPP04, author = {Beno{\^{\i}}t Chevallier{-}Mames and David Naccache and Pascal Paillier and David Pointcheval}, title = {How to Disembed a Program?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {138}, year = {2004}, url = {http://eprint.iacr.org/2004/138}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chevallier-MamesNPP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenoitDGGHNSW04, author = {Olivier Beno{\^{\i}}t and Nora Dabbous and Laurent Gauteron and Pierre Girard and Helena Handschuh and David Naccache and St{\'{e}}phane Soci{\'{e}} and Claire Whelan}, title = {Mobile Terminal Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {158}, year = {2004}, url = {http://eprint.iacr.org/2004/158}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenoitDGGHNSW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JoyeNP04, author = {Marc Joye and David Naccache and St{\'{e}}phanie Porte}, title = {The Polynomial Composition Problem in (Z/nZ)[X]}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {224}, year = {2004}, url = {http://eprint.iacr.org/2004/224}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JoyeNP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaccacheNTW04, author = {David Naccache and Phong Q. Nguyen and Michael Tunstall and Claire Whelan}, title = {Experimenting with Faults, Lattices and the {DSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {277}, year = {2004}, url = {http://eprint.iacr.org/2004/277}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaccacheNTW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CoronN03, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache}, editor = {Chi{-}Sung Laih}, title = {Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2894}, pages = {392--397}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40061-5\_25}, doi = {10.1007/978-3-540-40061-5\_25}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/CoronN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/HypponenNTT03, author = {Konstantin Hypp{\"{o}}nen and David Naccache and Elena Trichina and Alexei Tchoulkine}, editor = {Sihan Qing and Dieter Gollmann and Jianying Zhou}, title = {Trading-Off Type-Inference Memory Complexity against Communication}, booktitle = {Information and Communications Security, 5th International Conference, {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2836}, pages = {60--71}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39927-8\_6}, doi = {10.1007/978-3-540-39927-8\_6}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/HypponenNTT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HypponenNTT03, author = {Konstantin Hypp{\"{o}}nen and David Naccache and Elena Trichina and Alexei Tchoulkine}, title = {Trading-Off Type-Inference Memory Complexity Against Communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {140}, year = {2003}, url = {http://eprint.iacr.org/2003/140}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HypponenNTT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Naccache03, author = {David Naccache}, title = {Double-Speed Safe Prime Generation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2003}, url = {http://eprint.iacr.org/2003/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Naccache03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaccacheSS03, author = {David Naccache and Nigel P. Smart and Jacques Stern}, title = {Projective Coordinates Leak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {191}, year = {2003}, url = {http://eprint.iacr.org/2003/191}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaccacheSS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrierNP03, author = {Eric Brier and David Naccache and Pascal Paillier}, title = {Chemical Combinatorial Attacks on Keyboards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {217}, year = {2003}, url = {http://eprint.iacr.org/2003/217}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrierNP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/HandschuhNPT02, author = {Helena Handschuh and David Naccache and Pascal Paillier and Christophe Tymen}, editor = {Peter Honeyman}, title = {Provably Secure Chipcard Personalization, or, How to Fool Malicious Insiders}, booktitle = {Proceedings of the Fifth Smart Card Research and Advanced Application Conference, {CARDIS} '02, November 21-22, 2002, San Jose, CA, {USA}}, publisher = {{USENIX}}, year = {2002}, url = {http://www.usenix.org/publications/library/proceedings/cardis02/handschuh.html}, timestamp = {Wed, 04 Jul 2018 13:06:35 +0200}, biburl = {https://dblp.org/rec/conf/cardis/HandschuhNPT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoronJNP02, author = {Jean{-}S{\'{e}}bastien Coron and Marc Joye and David Naccache and Pascal Paillier}, editor = {Moti Yung}, title = {Universal Padding Schemes for {RSA}}, booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2442}, pages = {226--241}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45708-9\_15}, doi = {10.1007/3-540-45708-9\_15}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CoronJNP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/NaccacheTTT02, author = {David Naccache and Alexei Tchoulkine and Christophe Tymen and Elena Trichina}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Reducing the Memory Complexity of Type-Inference Algorithms}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {109--121}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_10}, doi = {10.1007/3-540-36159-6\_10}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/NaccacheTTT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LefrancN02, author = {Serge Lefranc and David Naccache}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Cut-{\&}-Paste Attacks with {JAVA}}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {1--15}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_1}, doi = {10.1007/3-540-36552-4\_1}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LefrancN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MaltessonNTT02, author = {Nils Maltesson and David Naccache and Elena Trichina and Christophe Tymen}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Applet Verification Strategiesfor RAM-Constrained Devices}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {118--137}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_9}, doi = {10.1007/3-540-36552-4\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MaltessonNTT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2002, editor = {David Naccache and Pascal Paillier}, title = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3}, doi = {10.1007/3-540-45664-3}, isbn = {3-540-43168-3}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LefrancN02, author = {Serge Lefranc and David Naccache}, title = {Cut and Paste Attacks with Java}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {10}, year = {2002}, url = {http://eprint.iacr.org/2002/010}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LefrancN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronJNP02, author = {Jean{-}S{\'{e}}bastien Coron and Marc Joye and David Naccache and Pascal Paillier}, title = {Universal Padding Schemes for {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {115}, year = {2002}, url = {http://eprint.iacr.org/2002/115}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronJNP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NaccachePS01, author = {David Naccache and David Pointcheval and Jacques Stern}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Twin signatures: an alternative to the hash-and-sign paradigm}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {20--27}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.501987}, doi = {10.1145/501983.501987}, timestamp = {Tue, 10 Nov 2020 20:00:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NaccachePS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrierCCN01, author = {Eric Brier and Christophe Clavier and Jean{-}S{\'{e}}bastien Coron and David Naccache}, editor = {Joe Kilian}, title = {Cryptanalysis of {RSA} Signatures with Fixed-Pattern Padding}, booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {433--439}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44647-8\_25}, doi = {10.1007/3-540-44647-8\_25}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrierCCN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/NaccachePT01, author = {David Naccache and David Pointcheval and Christophe Tymen}, editor = {Paul F. Syverson}, title = {Monotone Signatures}, booktitle = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2339}, pages = {295--308}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-46088-8\_24}, doi = {10.1007/3-540-46088-8\_24}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/NaccachePT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2001, editor = {{\c{C}}etin Kaya Ko{\c{c}} and David Naccache and Christof Paar}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2162}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44709-1}, doi = {10.1007/3-540-44709-1}, isbn = {3-540-42521-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ctrsa/2001, editor = {David Naccache}, title = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2020}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45353-9}, doi = {10.1007/3-540-45353-9}, isbn = {3-540-41898-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CoronKN00, author = {Jean{-}S{\'{e}}bastien Coron and Fran{\c{c}}ois Koeune and David Naccache}, editor = {Tatsuaki Okamoto}, title = {From Fixed-Length to Arbitrary-Length {RSA} Padding Schemes}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {90--96}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_8}, doi = {10.1007/3-540-44448-3\_8}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/CoronKN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/NaccacheT00, author = {David Naccache and Michael Tunstall}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {How to Explain Side-Channel Leakage to Your Kids}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {229--230}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_17}, doi = {10.1007/3-540-44499-8\_17}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/NaccacheT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CoronN00, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache}, editor = {Bart Preneel}, title = {Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1807}, pages = {91--101}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45539-6\_7}, doi = {10.1007/3-540-45539-6\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CoronN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CoronJNP00, author = {Jean{-}S{\'{e}}bastien Coron and Marc Joye and David Naccache and Pascal Paillier}, editor = {Bart Preneel}, title = {New Attacks on PKCS{\#}1 v1.5 Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1807}, pages = {369--381}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45539-6\_25}, doi = {10.1007/3-540-45539-6\_25}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CoronJNP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/NaccacheS00, author = {David Naccache and Jacques Stern}, editor = {Yair Frankel}, title = {Signing on a Postcard}, booktitle = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1962}, pages = {121--135}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45472-1\_9}, doi = {10.1007/3-540-45472-1\_9}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/NaccacheS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/CoronKN00, author = {Jean{-}S{\'{e}}bastien Coron and Paul C. Kocher and David Naccache}, editor = {Yair Frankel}, title = {Statistics and Secret Leakage}, booktitle = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1962}, pages = {157--173}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45472-1\_12}, doi = {10.1007/3-540-45472-1\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/CoronKN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MRaihiNT00, author = {David M'Ra{\"{\i}}hi and David Naccache and Michael Tunstall}, editor = {Yair Frankel}, title = {Asymmetric Currency Rounding}, booktitle = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1962}, pages = {192--201}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45472-1\_14}, doi = {10.1007/3-540-45472-1\_14}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/MRaihiNT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Naccache99, author = {David Naccache}, title = {Padding attacks on {RSA}}, journal = {Inf. Secur. Tech. Rep.}, volume = {4}, number = {4}, pages = {28--33}, year = {1999}, url = {https://doi.org/10.1016/S1363-4127(99)80085-5}, doi = {10.1016/S1363-4127(99)80085-5}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Naccache99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CoronHN99, author = {Jean{-}S{\'{e}}bastien Coron and Helena Handschuh and David Naccache}, editor = {Kwok{-}Yan Lam and Eiji Okamoto and Chaoping Xing}, title = {{ECC:} Do We Need to Count?}, booktitle = {Advances in Cryptology - {ASIACRYPT} '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1716}, pages = {122--134}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-48000-6\_11}, doi = {10.1007/978-3-540-48000-6\_11}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/CoronHN99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoronNS99, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache and Julien P. Stern}, editor = {Michael J. Wiener}, title = {On the Security of {RSA} Padding}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {1--18}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_1}, doi = {10.1007/3-540-48405-1\_1}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CoronNS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NaccacheSS99, author = {David Naccache and Adi Shamir and Julien P. Stern}, editor = {Hideki Imai and Yuliang Zheng}, title = {How to Copyright a Function?}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {188--196}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_14}, doi = {10.1007/3-540-49162-7\_14}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/NaccacheSS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CoronN99, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache}, editor = {Hideki Imai and Yuliang Zheng}, title = {On the Security of {RSA} Screening}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {197--203}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_15}, doi = {10.1007/3-540-49162-7\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CoronN99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NaccacheS98, author = {David Naccache and Jacques Stern}, editor = {Li Gong and Michael K. Reiter}, title = {A New Public Key Cryptosystem Based on Higher Residues}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {59--66}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288106}, doi = {10.1145/288090.288106}, timestamp = {Tue, 10 Nov 2020 20:00:11 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NaccacheS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CohenLNZ98, author = {G{\'{e}}rard D. Cohen and Antoine Lobstein and David Naccache and Gilles Z{\'{e}}mor}, editor = {Kaisa Nyberg}, title = {How to Improve an Exponentiation Black-Box}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {211--220}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054128}, doi = {10.1007/BFB0054128}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CohenLNZ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/CoronN98, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache}, editor = {Stafford E. Tavares and Henk Meijer}, title = {An Accurate Evaluation of Maurer's Universal Test}, booktitle = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1556}, pages = {57--71}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-48892-8\_5}, doi = {10.1007/3-540-48892-8\_5}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/CoronN98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/MRaihiNPV98, author = {David M'Ra{\"{\i}}hi and David Naccache and David Pointcheval and Serge Vaudenay}, editor = {Stafford E. Tavares and Henk Meijer}, title = {Computational Alternatives to Random Number Generators}, booktitle = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1556}, pages = {72--80}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-48892-8\_6}, doi = {10.1007/3-540-48892-8\_6}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/MRaihiNPV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NaccacheS97, author = {David Naccache and Jacques Stern}, editor = {Walter Fumy}, title = {A New Public-Key Cryptosystem}, booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1233}, pages = {27--36}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-69053-0\_3}, doi = {10.1007/3-540-69053-0\_3}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NaccacheS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MRaihiNSV97, author = {David M'Ra{\"{\i}}hi and David Naccache and Jacques Stern and Serge Vaudenay}, editor = {Eli Biham}, title = {{XMX:} {A} Firmware-Oriented Block Cipher Based on Modular Multiplications}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {166--171}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052344}, doi = {10.1007/BFB0052344}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/MRaihiNSV97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MichelsNP96, author = {Markus Michels and David Naccache and Holger Petersen}, title = {{GOST} 34.10 - {A} brief overview of Russia's {DSA}}, journal = {Comput. Secur.}, volume = {15}, number = {8}, pages = {725--732}, year = {1996}, url = {https://doi.org/10.1016/S0167-4048(96)00016-8}, doi = {10.1016/S0167-4048(96)00016-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MichelsNP96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/micro/NaccacheM96, author = {David Naccache and David M'Ra{\"{\i}}hi}, title = {Cryptographic smart cards}, journal = {{IEEE} Micro}, volume = {16}, number = {3}, pages = {14--24}, year = {1996}, url = {https://doi.org/10.1109/40.502402}, doi = {10.1109/40.502402}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/micro/NaccacheM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/NaccacheM96, author = {David Naccache and David M'Ra{\"{\i}}hi}, title = {Arithmetic co-processors for public-key cryptography: The state of the art}, booktitle = {Proceedings of the Second Smart Card Research and Advanced Application Conference, {CARDIS} 1996, September 18-20, 1996, CWI, Amsterdam, The Netherlands}, year = {1996}, timestamp = {Fri, 15 Oct 2004 16:01:14 +0200}, biburl = {https://dblp.org/rec/conf/cardis/NaccacheM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MRaihiN96, author = {David M'Ra{\"{\i}}hi and David Naccache}, editor = {Li Gong and Jacques Stearn}, title = {Batch Exponentiation: {A} Fast DLP-Based Signature Generation Strategy}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {58--61}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238187}, doi = {10.1145/238168.238187}, timestamp = {Tue, 10 Nov 2020 20:00:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MRaihiN96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/NaccacheMR95, author = {David Naccache and David M'Ra{\"{\i}}hi and Dan Raphaeli}, title = {Can Montgomery Parasites Be Avoided? {A} Design Methodology Based on Key and Cryptosystem Modifications}, journal = {Des. Codes Cryptogr.}, volume = {5}, number = {1}, pages = {73--80}, year = {1995}, url = {https://doi.org/10.1007/BF01388505}, doi = {10.1007/BF01388505}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/NaccacheMR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NaccacheMWP95, author = {David Naccache and David M'Ra{\"{\i}}hi and William Wolfowicz and Adina di Porto}, editor = {Louis C. Guillou and Jean{-}Jacques Quisquater}, title = {Are Crypto-Accelerators Really Inevitable? 20Bit Zero-Knowledge in Less than a Second on Simple 8-bit Microcontrollers}, booktitle = {Advances in Cryptology - {EUROCRYPT} '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {921}, pages = {404--409}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-49264-X\_33}, doi = {10.1007/3-540-49264-X\_33}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NaccacheMWP95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/BarkeeCEMR94, author = {Boo Barkee and Deh Cac Can and Julia Ecks and Theo Moriarty and R. F. Ree}, title = {Why You Cannot Even Hope to use Gr{\"{o}}bner Bases in Public Key Cryptography: An Open Letter to a Scientist Who Failed and a Challenge to Those Who Have Not Yet Failed}, journal = {J. Symb. Comput.}, volume = {18}, number = {6}, pages = {497--501}, year = {1994}, url = {https://doi.org/10.1006/jsco.1994.1061}, doi = {10.1006/JSCO.1994.1061}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/BarkeeCEMR94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NaccacheMVR94, author = {David Naccache and David M'Ra{\"{\i}}hi and Serge Vaudenay and Dan Raphaeli}, editor = {Alfredo De Santis}, title = {Can {D.S.A.} be Improved? Complexity Trade-Offs with the Digital Signature Standard}, booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {950}, pages = {77--85}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0053426}, doi = {10.1007/BFB0053426}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NaccacheMVR94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Naccache93, author = {David Naccache}, editor = {Tor Helleseth}, title = {Can {O.S.S.} be Repaired? Proposal for a New Practical Signature Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {233--239}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_19}, doi = {10.1007/3-540-48285-7\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Naccache93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fiwac/NaccacheM93, author = {David Naccache and David M'Ra{\"{\i}}hi}, editor = {G{\'{e}}rard D. Cohen and Simon Litsyn and Antoine Lobstein and Gilles Z{\'{e}}mor}, title = {Montgomery-Suitable Cryptosystems}, booktitle = {Algebraic Coding, First French-Israeli Workshop, Paris, France, July 19-21, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {781}, pages = {75--81}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-57843-9\_10}, doi = {10.1007/3-540-57843-9\_10}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/fiwac/NaccacheM93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SolmsN92, author = {Sebastiaan H. von Solms and David Naccache}, title = {On blind signatures and perfect crimes}, journal = {Comput. Secur.}, volume = {11}, number = {6}, pages = {581--583}, year = {1992}, url = {https://doi.org/10.1016/0167-4048(92)90193-U}, doi = {10.1016/0167-4048(92)90193-U}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SolmsN92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Naccache92, author = {David Naccache}, editor = {Rainer A. Rueppel}, title = {A Montgomery-Suitable Fiat-Shamir-like Authenication Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonf{\"{u}}red, Hungary, May 24-28, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {658}, pages = {488--491}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-47555-9\_45}, doi = {10.1007/3-540-47555-9\_45}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Naccache92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.