


Остановите войну!
for scientists:


default search action
Jean-Sébastien Coron
Person information

- affiliation: University of Luxembourg
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j17]Jean-Sébastien Coron, François Gérard, Simon Montoya, Rina Zeitoun:
High-order Polynomial Comparison and Masking Lattice-based Encryption. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1): 153-192 (2023) - [j16]Jean-Sébastien Coron, François Gérard, Matthias Trannoy, Rina Zeitoun:
High-order masking of NTRU. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 180-211 (2023) - 2022
- [j15]Jean-Sébastien Coron, François Gérard, Simon Montoya
, Rina Zeitoun:
High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(2): 1-40 (2022) - [i60]Jean-Sébastien Coron, François Gérard, Matthias Trannoy, Rina Zeitoun:
High-order masking of NTRU. IACR Cryptol. ePrint Arch. 2022: 1188 (2022) - 2021
- [c84]Jean-Sébastien Coron, Lorenzo Spignoli:
Secure Wire Shuffling in the Probing Model. CRYPTO (3) 2021: 215-244 - [i59]Jean-Sébastien Coron, Lorenzo Spignoli:
Secure Shuffling in the Probing Model. IACR Cryptol. ePrint Arch. 2021: 258 (2021) - [i58]Jean-Sébastien Coron, Agnese Gini:
Provably Solving the Hidden Subset Sum Problem via Statistical Learning. IACR Cryptol. ePrint Arch. 2021: 1007 (2021) - [i57]Jean-Sébastien Coron, François Gérard, Simon Montoya, Rina Zeitoun:
High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption. IACR Cryptol. ePrint Arch. 2021: 1314 (2021) - [i56]Jean-Sébastien Coron, François Gérard, Simon Montoya
, Rina Zeitoun:
High-order Polynomial Comparison and Masking Lattice-based Encryption. IACR Cryptol. ePrint Arch. 2021: 1615 (2021) - 2020
- [j14]Jean-Sébastien Coron, Agnese Gini:
Improved cryptanalysis of the AJPS Mersenne based cryptosystem. J. Math. Cryptol. 14(1): 218-223 (2020) - [c83]Jean-Sébastien Coron, Agnese Gini:
A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem. CRYPTO (2) 2020: 3-31 - [c82]Sonia Belaïd, Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Abdul Rahman Taleb:
Random Probing Security: Verification, Composition, Expansion and New Constructions. CRYPTO (1) 2020: 339-368 - [c81]Jean-Sébastien Coron, Aurélien Greuet, Rina Zeitoun:
Side-Channel Masking with Pseudo-Random Generator. EUROCRYPT (3) 2020: 342-375 - [i55]Jean-Sébastien Coron, Luca Notarnicola, Gabor Wiese:
Simultaneous Diagonalization of Incomplete Matrices and Applications. CoRR abs/2005.13629 (2020) - [i54]Jean-Sébastien Coron, Agnese Gini:
A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem. IACR Cryptol. ePrint Arch. 2020: 461 (2020) - [i53]Jean-Sébastien Coron, Luca Notarnicola, Gabor Wiese:
Simultaneous Diagonalization of Incomplete Matrices and Applications. IACR Cryptol. ePrint Arch. 2020: 631 (2020) - [i52]Sonia Belaïd, Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Abdul Rahman Taleb:
Random Probing Security: Verification, Composition, Expansion and New Constructions. IACR Cryptol. ePrint Arch. 2020: 786 (2020)
2010 – 2019
- 2019
- [c80]Jean-Sébastien Coron, Hilder V. L. Pereira:
On Kilian's Randomization of Multilinear Map Encodings. ASIACRYPT (2) 2019: 325-355 - [c79]Jean-Sébastien Coron, Luca Notarnicola:
Cryptanalysis of CLT13 Multilinear Maps with Independent Slots. ASIACRYPT (2) 2019: 356-385 - [i51]Jean-Sébastien Coron, Luca Notarnicola:
Cryptanalysis of CLT13 Multilinear Maps with Independent Slots. IACR Cryptol. ePrint Arch. 2019: 309 (2019) - [i50]Jean-Sébastien Coron, Agnese Gini:
Improved Cryptanalysis of the AJPS Mersenne Based Cryptosystem. IACR Cryptol. ePrint Arch. 2019: 610 (2019) - [i49]Jean-Sébastien Coron, Aurélien Greuet, Rina Zeitoun:
Side-channel Masking with Pseudo-Random Generator. IACR Cryptol. ePrint Arch. 2019: 1106 (2019) - 2018
- [j13]Jean-Sébastien Coron, Franck Rondepierre, Rina Zeitoun:
High Order Masking of Look-up Tables with Common Shares. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(1): 40-72 (2018) - [j12]Luk Bettale
, Jean-Sébastien Coron, Rina Zeitoun:
Improved High-Order Conversion From Boolean to Arithmetic Masking. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2): 22-45 (2018) - [c78]Jean-Sébastien Coron:
Formal Verification of Side-Channel Countermeasures via Elementary Circuit Transformations. ACNS 2018: 65-82 - [c77]Jean-Sébastien Coron, Rina Zeitoun:
Improved Factorization of N=p^rq^s. CT-RSA 2018: 65-79 - [i48]Luk Bettale, Jean-Sébastien Coron, Rina Zeitoun:
Improved High-Order Conversion From Boolean to Arithmetic Masking. IACR Cryptol. ePrint Arch. 2018: 328 (2018) - [i47]Jean-Sébastien Coron, Hilder V. L. Pereira:
On Kilian's Randomization of Multilinear Map Encodings. IACR Cryptol. ePrint Arch. 2018: 1129 (2018) - 2017
- [c76]Jean-Sébastien Coron:
High-Order Conversion from Boolean to Arithmetic Masking. CHES 2017: 93-114 - [c75]Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint
, Mehdi Tibouchi
:
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13. Public Key Cryptography (1) 2017: 41-58 - [e6]Jean-Sébastien Coron, Jesper Buus Nielsen
:
Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part I. Lecture Notes in Computer Science 10210, 2017, ISBN 978-3-319-56619-1 [contents] - [e5]Jean-Sébastien Coron, Jesper Buus Nielsen
:
Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part II. Lecture Notes in Computer Science 10211, 2017, ISBN 978-3-319-56613-9 [contents] - [e4]Jean-Sébastien Coron, Jesper Buus Nielsen
:
Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III. Lecture Notes in Computer Science 10212, 2017, ISBN 978-3-319-56616-0 [contents] - [i46]Jean-Sébastien Coron:
High-Order Conversion From Boolean to Arithmetic Masking. IACR Cryptol. ePrint Arch. 2017: 252 (2017) - [i45]Jean-Sébastien Coron, Franck Rondepierre, Rina Zeitoun:
High Order Masking of Look-up Tables with Common Shares. IACR Cryptol. ePrint Arch. 2017: 271 (2017) - [i44]Jean-Sébastien Coron:
Formal Verification of Side-channel Countermeasures via Elementary Circuit Transformations. IACR Cryptol. ePrint Arch. 2017: 879 (2017) - 2016
- [j11]Jean-Sébastien Coron, Thomas Holenstein, Robin Künzler, Jacques Patarin, Yannick Seurin, Stefano Tessaro:
How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction. J. Cryptol. 29(1): 61-114 (2016) - [j10]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi
, Ralf-Philipp Weinmann:
Practical Cryptanalysis of ISO 9796-2 and EMV Signatures. J. Cryptol. 29(3): 632-656 (2016) - [c74]Jean-Sébastien Coron:
Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol. The New Codebreakers 2016: 518-542 - [c73]Alberto Battistello
, Jean-Sébastien Coron, Emmanuel Prouff, Rina Zeitoun:
Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme. CHES 2016: 23-39 - [c72]Jean-Sébastien Coron, Aurélien Greuet, Emmanuel Prouff, Rina Zeitoun:
Faster Evaluation of SBoxes via Common Shares. CHES 2016: 498-514 - [c71]Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint
, Mehdi Tibouchi
:
Cryptanalysis of GGH15 Multilinear Maps. CRYPTO (2) 2016: 607-628 - [c70]Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun:
Factoring N=p^rq^s for Large r and s. CT-RSA 2016: 448-464 - [e3]Marc Fischlin, Jean-Sébastien Coron:
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I. Lecture Notes in Computer Science 9665, Springer 2016, ISBN 978-3-662-49889-7 [contents] - [e2]Marc Fischlin, Jean-Sébastien Coron:
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II. Lecture Notes in Computer Science 9666, Springer 2016, ISBN 978-3-662-49895-8 [contents] - [i43]Alberto Battistello, Jean-Sébastien Coron, Emmanuel Prouff, Rina Zeitoun:
Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme. IACR Cryptol. ePrint Arch. 2016: 540 (2016) - [i42]Jean-Sébastien Coron, Rina Zeitoun:
Improved Factorization of N=prqs. IACR Cryptol. ePrint Arch. 2016: 551 (2016) - [i41]Jean-Sébastien Coron, Aurélien Greuet, Emmanuel Prouff, Rina Zeitoun:
Faster Evaluation of SBoxes via Common Shares. IACR Cryptol. ePrint Arch. 2016: 572 (2016) - [i40]Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi:
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13. IACR Cryptol. ePrint Arch. 2016: 1011 (2016) - 2015
- [j9]Jean-Sébastien Coron, Arnab Roy
, Srinivas Vivek
:
Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures. J. Cryptogr. Eng. 5(2): 73-83 (2015) - [c69]Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff:
Improved Side-Channel Analysis of Finite-Field Multiplication. CHES 2015: 395-415 - [c68]Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint
, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi
:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations. CRYPTO (1) 2015: 247-266 - [c67]Jean-Sébastien Coron, Tancrède Lepoint
, Mehdi Tibouchi
:
New Multilinear Maps Over the Integers. CRYPTO (1) 2015: 267-286 - [c66]Jean-Sébastien Coron, Johann Großschädl, Mehdi Tibouchi
, Praveen Kumar Vadnala:
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity. FSE 2015: 130-149 - [c65]Eric Brier, Jean-Sébastien Coron, Rémi Géraud
, Diana Maimut, David Naccache:
A Number-Theoretic Error-Correcting Code. SECITC 2015: 25-35 - [i39]Eric Brier, Jean-Sébastien Coron, Rémi Géraud, Diana Maimut, David Naccache:
A Number-Theoretic Error-Correcting Code. CoRR abs/1509.00378 (2015) - [i38]Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun:
Factoring N=pr qs for Large r and s. IACR Cryptol. ePrint Arch. 2015: 71 (2015) - [i37]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
New Multilinear Maps over the Integers. IACR Cryptol. ePrint Arch. 2015: 162 (2015) - [i36]Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Higher-Order Side Channel Security and Mask Refreshing. IACR Cryptol. ePrint Arch. 2015: 359 (2015) - [i35]Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff:
Improved Side-Channel Analysis of Finite-Field Multiplication. IACR Cryptol. ePrint Arch. 2015: 542 (2015) - [i34]Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations. IACR Cryptol. ePrint Arch. 2015: 596 (2015) - [i33]Jean-Sébastien Coron:
Cryptanalysis of GGH15 Multilinear Maps. IACR Cryptol. ePrint Arch. 2015: 1037 (2015) - 2014
- [j8]Guido Bertoni
, Jean-Sébastien Coron:
Introduction to the CHES 2013 special issue. J. Cryptogr. Eng. 4(1): 1 (2014) - [c64]Jean-Sébastien Coron, Arnab Roy
, Srinivas Vivek
:
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures. CHES 2014: 170-187 - [c63]Jean-Sébastien Coron, Johann Großschädl, Praveen Kumar Vadnala:
Secure Conversion between Boolean and Arithmetic Masking of Any Order. CHES 2014: 188-205 - [c62]Jean-Sébastien Coron:
Higher Order Masking of Look-Up Tables. EUROCRYPT 2014: 441-458 - [c61]Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun:
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences. Public Key Cryptography 2014: 185-202 - [c60]Jean-Sébastien Coron, Tancrède Lepoint
, Mehdi Tibouchi
:
Scale-Invariant Fully Homomorphic Encryption over the Integers. Public Key Cryptography 2014: 311-328 - [i32]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Scale-Invariant Fully Homomorphic Encryption over the Integers. IACR Cryptol. ePrint Arch. 2014: 32 (2014) - [i31]Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun:
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences. IACR Cryptol. ePrint Arch. 2014: 437 (2014) - [i30]Jean-Sébastien Coron, Arnab Roy, Srinivas Vivek:
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel Countermeasures. IACR Cryptol. ePrint Arch. 2014: 890 (2014) - [i29]Jean-Sébastien Coron, Johann Großschädl, Praveen Kumar Vadnala, Mehdi Tibouchi:
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity. IACR Cryptol. ePrint Arch. 2014: 891 (2014) - [i28]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers. IACR Cryptol. ePrint Arch. 2014: 975 (2014) - 2013
- [j7]Jean-Sébastien Coron, Alexey Kirichenko, Mehdi Tibouchi
:
A Note on the Bivariate Coppersmith Theorem. J. Cryptol. 26(2): 246-250 (2013) - [c59]Jean-Sébastien Coron, Tancrède Lepoint
, Mehdi Tibouchi
:
Practical Multilinear Maps over the Integers. CRYPTO (1) 2013: 476-493 - [c58]Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint
, Mehdi Tibouchi
, Aaram Yun:
Batch Fully Homomorphic Encryption over the Integers. EUROCRYPT 2013: 315-335 - [c57]Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Higher-Order Side Channel Security and Mask Refreshing. FSE 2013: 410-424 - [e1]Guido Bertoni, Jean-Sébastien Coron:
Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings. Lecture Notes in Computer Science 8086, Springer 2013, ISBN 978-3-642-40348-4 [contents] - [i27]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Batch Fully Homomorphic Encryption over the Integers. IACR Cryptol. ePrint Arch. 2013: 36 (2013) - [i26]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Practical Multilinear Maps over the Integers. IACR Cryptol. ePrint Arch. 2013: 183 (2013) - [i25]Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun:
A Variant of Coppersmith's Algorithm with Improved Complexity and Efficient Exhaustive Search. IACR Cryptol. ePrint Arch. 2013: 483 (2013) - [i24]Jean-Sébastien Coron:
Higher Order Masking of Look-up Tables. IACR Cryptol. ePrint Arch. 2013: 700 (2013) - 2012
- [c56]Jean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier:
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping. Cryptography and Security 2012: 207-232 - [c55]Jean-Sébastien Coron, Emmanuel Prouff, Thomas Roche:
On the Use of Shamir's Secret Sharing against Side-Channel Analysis. CARDIS 2012: 77-90 - [c54]Jean-Sébastien Coron, Christophe Giraud
, Emmanuel Prouff, Soline Renner, Matthieu Rivain, Praveen Kumar Vadnala:
Conversion of Security Proofs from One Leakage Model to Another: A New Issue. COSADE 2012: 69-81 - [c53]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi
:
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers. EUROCRYPT 2012: 446-464 - [c52]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi
:
Another Look at Affine-Padding RSA Signatures. ICISC 2012: 22-32 - 2011
- [c51]Jean-Sébastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi
:
Fully Homomorphic Encryption over the Integers with Shorter Public Keys. CRYPTO 2011: 487-504 - [c50]Anja Becker, Jean-Sébastien Coron, Antoine Joux
:
Improved Generic Algorithms for Hard Knapsacks. EUROCRYPT 2011: 364-385 - [c49]Jean-Sébastien Coron, Antoine Joux
, Avradip Mandal, David Naccache, Mehdi Tibouchi
:
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005. Public Key Cryptography 2011: 147-155 - [i23]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Another Look at RSA Signatures With Affine Padding. IACR Cryptol. ePrint Arch. 2011: 57 (2011) - [i22]Jean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier:
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping. IACR Cryptol. ePrint Arch. 2011: 58 (2011) - [i21]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Optimization of Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2011: 440 (2011) - [i20]Jean-Sébastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi:
Fully Homomorphic Encryption over the Integers with Shorter Public Keys. IACR Cryptol. ePrint Arch. 2011: 441 (2011) - [i19]Anja Becker, Jean-Sébastien Coron, Antoine Joux:
Improved Generic Algorithms for Hard Knapsacks. IACR Cryptol. ePrint Arch. 2011: 474 (2011) - 2010
- [c48]Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi
, Damien Vergnaud
:
On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption. ACNS 2010: 1-18 - [c47]Benoît Chevallier-Mames, Jean-Sébastien Coron, Noel McCullagh, David Naccache, Michael Scott:
Secure Delegation of Elliptic-Curve Pairing. CARDIS 2010: 24-35 - [c46]Jean-Sébastien Coron, Ilya Kizhvatov:
Analysis and Improvement of the Random Delay Countermeasure of CHES 2009. CHES 2010: 95-109 - [c45]Eric Brier, Jean-Sébastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi
:
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves. CRYPTO 2010: 237-254 - [c44]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi
:
Fault Attacks Against emv Signatures. CT-RSA 2010: 208-220 - [c43]Jean-Sébastien Coron, Aline Gouget, Pascal Paillier, Karine Villegas:
SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications. Financial Cryptography Workshops 2010: 107-122 - [c42]Jean-Sébastien Coron, Christophe Giraud
, Nicolas Morin, Gilles Piret, David Vigilant:
Fault Attacks and Countermeasures on Vigilant's RSA-CRT Algorithm. FDTC 2010: 89-96 - [c41]Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin:
A Domain Extender for the Ideal Cipher. TCC 2010: 273-289 - [i18]Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud:
On The Broadcast and Validity-Checking Security of PKCS \#1 v1.5 Encryption. IACR Cryptol. ePrint Arch. 2010: 135 (2010) - [i17]Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi:
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005. IACR Cryptol. ePrint Arch. 2010: 650 (2010)
2000 – 2009
- 2009
- [j6]Jean-Sébastien Coron:
A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model. Des. Codes Cryptogr. 50(1): 115-133 (2009) - [c40]Jean-Sébastien Coron, Avradip Mandal:
PSS Is Secure against Random Fault Attacks. ASIACRYPT 2009: 653-666 - [c39]Jean-Sébastien Coron, Ilya Kizhvatov:
Analysis of the split mask countermeasure for embedded systems. WESS 2009 - [c38]Jean-Sébastien Coron, Ilya Kizhvatov:
An Efficient Method for Random Delay Generation in Embedded Software. CHES 2009: 156-170 - [c37]Jean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier:
Fault Attacks on RSA Signatures with Partially Unknown Messages. CHES 2009: 444-456 - [c36]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi
, Ralf-Philipp Weinmann:
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures. CRYPTO 2009: 428-444 - [i16]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann:
Practical Cryptanalysis of ISO/IEC 9796-2 and EMV Signatures. IACR Cryptol. ePrint Arch. 2009: 203 (2009) - [i15]Jean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier:
Fault Attacks on RSA Signatures with Partially Unknown Messages. IACR Cryptol. ePrint Arch. 2009: 309 (2009) - [i14]Eric Brier, Jean-Sébastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi:
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves. IACR Cryptol. ePrint Arch. 2009: 340 (2009) - [i13]Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin:
A Domain Extender for the Ideal Cipher. IACR Cryptol. ePrint Arch. 2009: 356 (2009) - [i12]Jean-Sébastien Coron, Ilya Kizhvatov:
An Efficient Method for Random Delay Generation in Embedded Software. IACR Cryptol. ePrint Arch. 2009: 419 (2009) - [i11]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Fault Attacks Against EMV Signatures. IACR Cryptol. ePrint Arch. 2009: 503 (2009) - 2008
- [j5]Don Coppersmith, Jean-Sébastien Coron, François Grieu, Shai Halevi, Charanjit S. Jutla, David Naccache, Julien P. Stern:
Cryptanalysis of ISO/IEC 9796-1. J. Cryptol. 21(1): 27-51 (2008) - [c35]Jean-Sébastien Coron, Christophe Giraud
, Emmanuel Prouff, Matthieu Rivain:
Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform. CHES 2008: 1-14 - [c34]Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin:
The Random Oracle Model and the Ideal Cipher Model Are Equivalent. CRYPTO 2008: 1-20 - [c33]Jean-Sébastien Coron:
A New DPA Countermeasure Based on Permutation Tables. SCN 2008: 278-292 - [i10]Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin:
The Random Oracle Model and the Ideal Cipher Model are Equivalent. IACR Cryptol. ePrint Arch. 2008: 246 (2008) - 2007
- [j4]Jean-Sébastien Coron, Alexander May
:
Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring. J. Cryptol. 20(1): 39-50 (2007) - [c32]Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain:
Side Channel Cryptanalysis of a Higher Order Masking Scheme. CHES 2007: 28-44 - [c31]Christophe Clavier, Jean-Sébastien Coron:
On the Implementation of a Fast Prime Generation Algorithm. CHES 2007: 443-449 - [c30]Jean-Sébastien Coron:
Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach. CRYPTO 2007: 379-394 - 2006
- [j3]Jean-Sébastien Coron