Jean-Sébastien Coron
Person information
- affiliation: University of Luxembourg
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2018
- [j12]Jean-Sébastien Coron, Franck Rondepierre, Rina Zeitoun:
High Order Masking of Look-up Tables with Common Shares. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(1): 40-72 (2018) - [c77]
- 2017
- [c76]
- [c75]Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi:
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13. Public Key Cryptography (1) 2017: 41-58 - [e6]Jean-Sébastien Coron, Jesper Buus Nielsen:
Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part I. Lecture Notes in Computer Science 10210, 2017, ISBN 978-3-319-56619-1 [contents] - [e5]Jean-Sébastien Coron, Jesper Buus Nielsen:
Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part II. Lecture Notes in Computer Science 10211, 2017, ISBN 978-3-319-56613-9 [contents] - [e4]Jean-Sébastien Coron, Jesper Buus Nielsen:
Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III. Lecture Notes in Computer Science 10212, 2017, ISBN 978-3-319-56616-0 [contents] - [i46]Jean-Sébastien Coron:
High-Order Conversion From Boolean to Arithmetic Masking. IACR Cryptology ePrint Archive 2017: 252 (2017) - [i45]Jean-Sébastien Coron, Franck Rondepierre, Rina Zeitoun:
High Order Masking of Look-up Tables with Common Shares. IACR Cryptology ePrint Archive 2017: 271 (2017) - [i44]Jean-Sébastien Coron:
Formal Verification of Side-channel Countermeasures via Elementary Circuit Transformations. IACR Cryptology ePrint Archive 2017: 879 (2017) - 2016
- [j11]Jean-Sébastien Coron, Thomas Holenstein, Robin Künzler, Jacques Patarin, Yannick Seurin, Stefano Tessaro:
How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction. J. Cryptology 29(1): 61-114 (2016) - [j10]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann:
Practical Cryptanalysis of ISO 9796-2 and EMV Signatures. J. Cryptology 29(3): 632-656 (2016) - [c74]Jean-Sébastien Coron:
Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol. The New Codebreakers 2016: 518-542 - [c73]Alberto Battistello, Jean-Sébastien Coron, Emmanuel Prouff, Rina Zeitoun:
Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme. CHES 2016: 23-39 - [c72]Jean-Sébastien Coron, Aurélien Greuet, Emmanuel Prouff, Rina Zeitoun:
Faster Evaluation of SBoxes via Common Shares. CHES 2016: 498-514 - [c71]Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi:
Cryptanalysis of GGH15 Multilinear Maps. CRYPTO (2) 2016: 607-628 - [c70]Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun:
Factoring N=p^rq^s for Large r and s. CT-RSA 2016: 448-464 - [e3]Marc Fischlin, Jean-Sébastien Coron:
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I. Lecture Notes in Computer Science 9665, Springer 2016, ISBN 978-3-662-49889-7 [contents] - [e2]Marc Fischlin, Jean-Sébastien Coron:
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II. Lecture Notes in Computer Science 9666, Springer 2016, ISBN 978-3-662-49895-8 [contents] - [i43]Alberto Battistello, Jean-Sébastien Coron, Emmanuel Prouff, Rina Zeitoun:
Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme. IACR Cryptology ePrint Archive 2016: 540 (2016) - [i42]Jean-Sébastien Coron, Rina Zeitoun:
Improved Factorization of N=prqs. IACR Cryptology ePrint Archive 2016: 551 (2016) - [i41]Jean-Sébastien Coron, Aurélien Greuet, Emmanuel Prouff, Rina Zeitoun:
Faster Evaluation of SBoxes via Common Shares. IACR Cryptology ePrint Archive 2016: 572 (2016) - [i40]Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi:
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13. IACR Cryptology ePrint Archive 2016: 1011 (2016) - 2015
- [j9]Jean-Sébastien Coron, Arnab Roy, Srinivas Vivek:
Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures. J. Cryptographic Engineering 5(2): 73-83 (2015) - [c69]Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff:
Improved Side-Channel Analysis of Finite-Field Multiplication. CHES 2015: 395-415 - [c68]Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations. CRYPTO (1) 2015: 247-266 - [c67]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
New Multilinear Maps Over the Integers. CRYPTO (1) 2015: 267-286 - [c66]Jean-Sébastien Coron, Johann Großschädl, Mehdi Tibouchi, Praveen Kumar Vadnala:
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity. FSE 2015: 130-149 - [c65]Eric Brier, Jean-Sébastien Coron, Rémi Géraud, Diana Maimut, David Naccache:
A Number-Theoretic Error-Correcting Code. SECITC 2015: 25-35 - [i39]Eric Brier, Jean-Sébastien Coron, Rémi Géraud, Diana Maimut, David Naccache:
A Number-Theoretic Error-Correcting Code. CoRR abs/1509.00378 (2015) - [i38]Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun:
Factoring N=pr qs for Large r and s. IACR Cryptology ePrint Archive 2015: 71 (2015) - [i37]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
New Multilinear Maps over the Integers. IACR Cryptology ePrint Archive 2015: 162 (2015) - [i36]Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Higher-Order Side Channel Security and Mask Refreshing. IACR Cryptology ePrint Archive 2015: 359 (2015) - [i35]Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff:
Improved Side-Channel Analysis of Finite-Field Multiplication. IACR Cryptology ePrint Archive 2015: 542 (2015) - [i34]Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations. IACR Cryptology ePrint Archive 2015: 596 (2015) - [i33]Jean-Sébastien Coron:
Cryptanalysis of GGH15 Multilinear Maps. IACR Cryptology ePrint Archive 2015: 1037 (2015) - 2014
- [j8]Guido Bertoni, Jean-Sébastien Coron:
Introduction to the CHES 2013 special issue. J. Cryptographic Engineering 4(1): 1 (2014) - [c64]Jean-Sébastien Coron, Arnab Roy, Srinivas Vivek:
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures. CHES 2014: 170-187 - [c63]Jean-Sébastien Coron, Johann Großschädl, Praveen Kumar Vadnala:
Secure Conversion between Boolean and Arithmetic Masking of Any Order. CHES 2014: 188-205 - [c62]
- [c61]Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun:
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences. Public Key Cryptography 2014: 185-202 - [c60]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Scale-Invariant Fully Homomorphic Encryption over the Integers. Public Key Cryptography 2014: 311-328 - [i32]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Scale-Invariant Fully Homomorphic Encryption over the Integers. IACR Cryptology ePrint Archive 2014: 32 (2014) - [i31]Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun:
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences. IACR Cryptology ePrint Archive 2014: 437 (2014) - [i30]Jean-Sébastien Coron, Arnab Roy, Srinivas Vivek:
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel Countermeasures. IACR Cryptology ePrint Archive 2014: 890 (2014) - [i29]Jean-Sébastien Coron, Johann Großschädl, Praveen Kumar Vadnala, Mehdi Tibouchi:
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity. IACR Cryptology ePrint Archive 2014: 891 (2014) - [i28]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers. IACR Cryptology ePrint Archive 2014: 975 (2014) - 2013
- [j7]Jean-Sébastien Coron, Alexey Kirichenko, Mehdi Tibouchi:
A Note on the Bivariate Coppersmith Theorem. J. Cryptology 26(2): 246-250 (2013) - [c59]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Practical Multilinear Maps over the Integers. CRYPTO (1) 2013: 476-493 - [c58]Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, Aaram Yun:
Batch Fully Homomorphic Encryption over the Integers. EUROCRYPT 2013: 315-335 - [c57]Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Higher-Order Side Channel Security and Mask Refreshing. FSE 2013: 410-424 - [e1]Guido Bertoni, Jean-Sébastien Coron:
Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings. Lecture Notes in Computer Science 8086, Springer 2013, ISBN 978-3-642-40348-4 [contents] - [i27]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Batch Fully Homomorphic Encryption over the Integers. IACR Cryptology ePrint Archive 2013: 36 (2013) - [i26]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Practical Multilinear Maps over the Integers. IACR Cryptology ePrint Archive 2013: 183 (2013) - [i25]Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun:
A Variant of Coppersmith's Algorithm with Improved Complexity and Efficient Exhaustive Search. IACR Cryptology ePrint Archive 2013: 483 (2013) - [i24]Jean-Sébastien Coron:
Higher Order Masking of Look-up Tables. IACR Cryptology ePrint Archive 2013: 700 (2013) - 2012
- [c56]Jean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier:
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping. Cryptography and Security 2012: 207-232 - [c55]Jean-Sébastien Coron, Emmanuel Prouff, Thomas Roche:
On the Use of Shamir's Secret Sharing against Side-Channel Analysis. CARDIS 2012: 77-90 - [c54]Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Soline Renner, Matthieu Rivain, Praveen Kumar Vadnala:
Conversion of Security Proofs from One Leakage Model to Another: A New Issue. COSADE 2012: 69-81 - [c53]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers. EUROCRYPT 2012: 446-464 - [c52]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Another Look at Affine-Padding RSA Signatures. ICISC 2012: 22-32 - 2011
- [c51]Jean-Sébastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi:
Fully Homomorphic Encryption over the Integers with Shorter Public Keys. CRYPTO 2011: 487-504 - [c50]Anja Becker, Jean-Sébastien Coron, Antoine Joux:
Improved Generic Algorithms for Hard Knapsacks. EUROCRYPT 2011: 364-385 - [c49]Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi:
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005. Public Key Cryptography 2011: 147-155 - [i23]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Another Look at RSA Signatures With Affine Padding. IACR Cryptology ePrint Archive 2011: 57 (2011) - [i22]Jean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier:
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping. IACR Cryptology ePrint Archive 2011: 58 (2011) - [i21]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Optimization of Fully Homomorphic Encryption. IACR Cryptology ePrint Archive 2011: 440 (2011) - [i20]Jean-Sébastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi:
Fully Homomorphic Encryption over the Integers with Shorter Public Keys. IACR Cryptology ePrint Archive 2011: 441 (2011) - [i19]Anja Becker, Jean-Sébastien Coron, Antoine Joux:
Improved Generic Algorithms for Hard Knapsacks. IACR Cryptology ePrint Archive 2011: 474 (2011) - 2010
- [c48]Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud:
On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption. ACNS 2010: 1-18 - [c47]Benoît Chevallier-Mames, Jean-Sébastien Coron, Noel McCullagh, David Naccache, Michael Scott:
Secure Delegation of Elliptic-Curve Pairing. CARDIS 2010: 24-35 - [c46]Jean-Sébastien Coron, Ilya Kizhvatov:
Analysis and Improvement of the Random Delay Countermeasure of CHES 2009. CHES 2010: 95-109 - [c45]Eric Brier, Jean-Sébastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi:
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves. CRYPTO 2010: 237-254 - [c44]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Fault Attacks Against emv Signatures. CT-RSA 2010: 208-220 - [c43]Jean-Sébastien Coron, Aline Gouget, Pascal Paillier, Karine Villegas:
SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications. Financial Cryptography Workshops 2010: 107-122 - [c42]Jean-Sébastien Coron, Christophe Giraud, Nicolas Morin, Gilles Piret, David Vigilant:
Fault Attacks and Countermeasures on Vigilant's RSA-CRT Algorithm. FDTC 2010: 89-96 - [c41]Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin:
A Domain Extender for the Ideal Cipher. TCC 2010: 273-289 - [i18]Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud:
On The Broadcast and Validity-Checking Security of PKCS \#1 v1.5 Encryption. IACR Cryptology ePrint Archive 2010: 135 (2010) - [i17]Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi:
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005. IACR Cryptology ePrint Archive 2010: 650 (2010)
2000 – 2009
- 2009
- [j6]Jean-Sébastien Coron:
A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model. Des. Codes Cryptography 50(1): 115-133 (2009) - [c40]Jean-Sébastien Coron, Avradip Mandal:
PSS Is Secure against Random Fault Attacks. ASIACRYPT 2009: 653-666 - [c39]Jean-Sébastien Coron, Ilya Kizhvatov:
Analysis of the split mask countermeasure for embedded systems. WESS 2009 - [c38]Jean-Sébastien Coron, Ilya Kizhvatov:
An Efficient Method for Random Delay Generation in Embedded Software. CHES 2009: 156-170 - [c37]Jean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier:
Fault Attacks on RSA Signatures with Partially Unknown Messages. CHES 2009: 444-456 - [c36]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann:
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures. CRYPTO 2009: 428-444 - [i16]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann:
Practical Cryptanalysis of ISO/IEC 9796-2 and EMV Signatures. IACR Cryptology ePrint Archive 2009: 203 (2009) - [i15]Jean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier:
Fault Attacks on RSA Signatures with Partially Unknown Messages. IACR Cryptology ePrint Archive 2009: 309 (2009) - [i14]Eric Brier, Jean-Sébastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi:
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves. IACR Cryptology ePrint Archive 2009: 340 (2009) - [i13]Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin:
A Domain Extender for the Ideal Cipher. IACR Cryptology ePrint Archive 2009: 356 (2009) - [i12]Jean-Sébastien Coron, Ilya Kizhvatov:
An Efficient Method for Random Delay Generation in Embedded Software. IACR Cryptology ePrint Archive 2009: 419 (2009) - [i11]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Fault Attacks Against EMV Signatures. IACR Cryptology ePrint Archive 2009: 503 (2009) - 2008
- [j5]Don Coppersmith, Jean-Sébastien Coron, François Grieu, Shai Halevi, Charanjit S. Jutla, David Naccache, Julien P. Stern:
Cryptanalysis of ISO/IEC 9796-1. J. Cryptology 21(1): 27-51 (2008) - [c35]Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Matthieu Rivain:
Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform. CHES 2008: 1-14 - [c34]Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin:
The Random Oracle Model and the Ideal Cipher Model Are Equivalent. CRYPTO 2008: 1-20 - [c33]
- [i10]Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin:
The Random Oracle Model and the Ideal Cipher Model are Equivalent. IACR Cryptology ePrint Archive 2008: 246 (2008) - 2007
- [j4]Jean-Sébastien Coron, Alexander May:
Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring. J. Cryptology 20(1): 39-50 (2007) - [c32]Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain:
Side Channel Cryptanalysis of a Higher Order Masking Scheme. CHES 2007: 28-44 - [c31]Christophe Clavier, Jean-Sébastien Coron:
On the Implementation of a Fast Prime Generation Algorithm. CHES 2007: 443-449 - [c30]Jean-Sébastien Coron:
Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach. CRYPTO 2007: 379-394 - 2006
- [j3]Jean-Sébastien Coron, David Naccache, Yvo Desmedt, Andrew M. Odlyzko, Julien P. Stern:
Index Calculation Attacks on RSA Signature and Encryption. Des. Codes Cryptography 38(1): 41-53 (2006) - [j2]
- 2005
- [c29]Jean-Sébastien Coron, David Lefranc, Guillaume Poupard:
A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis. CHES 2005: 47-60 - [c28]Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya:
Merkle-Damgård Revisited: How to Construct a Hash Function. CRYPTO 2005: 430-448 - [c27]Julien Cathalo, Jean-Sébastien Coron, David Naccache:
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited. Public Key Cryptography 2005: 234-243 - [i9]Benoît Chevallier-Mames, Jean-Sébastien Coron, Noel McCullagh, David Naccache, Michael Scott:
Secure Delegation of Elliptic-Curve Pairing. IACR Cryptology ePrint Archive 2005: 150 (2005) - 2004
- [j1]Jean-Sébastien Coron, David Naccache, Paul C. Kocher:
Statistics and secret leakage. ACM Trans. Embedded Comput. Syst. 3(3): 492-508 (2004) - [c26]Jean-Sébastien Coron, David Naccache:
Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95. CT-RSA 2004: 157-162 - [c25]Jean-Sébastien Coron:
Finding Small Roots of Bivariate Integer Polynomial Equations Revisited. EUROCRYPT 2004: 492-505 - [c24]Claude Barral, Jean-Sébastien Coron, David Naccache:
Externalized Fingerprint Matching. ICBA 2004: 309-315 - [c23]Jean-Sébastien Coron:
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem. Public Key Cryptography 2004: 14-27 - [i8]Jean-Sébastien Coron, Antoine Joux:
Cryptanalysis of a Provably Secure Cryptographic Hash Function. IACR Cryptology ePrint Archive 2004: 13 (2004) - [i7]Claude Barral, Jean-Sébastien Coron, David Naccache:
Externalized Fingerprint Matching. IACR Cryptology ePrint Archive 2004: 21 (2004) - [i6]Jean-Sébastien Coron, Alexander May:
Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring. IACR Cryptology ePrint Archive 2004: 208 (2004) - 2003
- [c22]Jean-Sébastien Coron, David Naccache:
Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption. ASIACRYPT 2003: 392-397 - [c21]Jean-Sébastien Coron, Alexei Tchulkine:
A New Algorithm for Switching from Arithmetic to Boolean Masking. CHES 2003: 89-97 - [i5]Jean-Sébastien Coron:
Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem. IACR Cryptology ePrint Archive 2003: 36 (2003) - [i4]Jean-Sébastien Coron:
Cryptanalysis of the Repaired Public-key Encryption Scheme Based on the Polynomial Reconstruction Problem. IACR Cryptology ePrint Archive 2003: 219 (2003) - 2002
- [c20]Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier:
Universal Padding Schemes for RSA. CRYPTO 2002: 226-241 - [c19]Jean-Sébastien Coron:
Security Proof for Partial-Domain Hash Signature Schemes. CRYPTO 2002: 613-626 - [c18]Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen:
GEM: A Generic Chosen-Ciphertext Secure Encryption Method. CT-RSA 2002: 263-276 - [c17]Jean-Sébastien Coron:
Optimal Security Proofs for PSS and Other Signature Schemes. EUROCRYPT 2002: 272-287 - [c16]Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen:
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. Public Key Cryptography 2002: 17-33 - [i3]Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen:
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. IACR Cryptology ePrint Archive 2002: 11 (2002) - [i2]Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier:
Universal Padding Schemes for RSA. IACR Cryptology ePrint Archive 2002: 115 (2002) - 2001
- [c15]Eric Brier, Christophe Clavier, Jean-Sébastien Coron, David Naccache:
Cryptanalysis of RSA Signatures with Fixed-Pattern Padding. CRYPTO 2001: 433-439 - [c14]Jean-Sébastien Coron, David M'Raïhi, Christophe Tymen:
Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves. Selected Areas in Cryptography 2001: 151-164 - [i1]Jean-Sébastien Coron:
Optimal security proofs for PSS and other signature schemes. IACR Cryptology ePrint Archive 2001: 62 (2001) - 2000
- [c13]Jean-Sébastien Coron, François Koeune, David Naccache:
From Fixed-Length to Arbitrary-Length RSA Padding Schemes. ASIACRYPT 2000: 90-96 - [c12]Jean-Sébastien Coron, Louis Goubin:
On Boolean and Arithmetic Masking against Differential Power Analysis. CHES 2000: 231-237 - [c11]Christophe Clavier, Jean-Sébastien Coron, Nora Dabbous:
Differential Power Analysis in the Presence of Hardware Countermeasures. CHES 2000: 252-263 - [c10]
- [c9]Jean-Sébastien Coron, David Naccache:
Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme. EUROCRYPT 2000: 91-101 - [c8]