|
Search the dblp DataBase
Julien P. Stern:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Thomas Pornin, Julien P. Stern
Digital Signatures Do Not Guarantee Exclusive Ownership. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:138-150 [Conf]
- Julien P. Stern
A New Efficient All-Or-Nothing Disclosure of Secrets Protocol. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1998, pp:357-371 [Conf]
- Jean-Sébastien Coron, David Naccache, Julien P. Stern
On the Security of RSA Padding. [Citation Graph (0, 0)][DBLP] CRYPTO, 1999, pp:1-18 [Conf]
- Charlie Rothwell, Julien P. Stern
Understanding the Shape Properties of Trihedral Polyhedra. [Citation Graph (0, 0)][DBLP] ECCV (1), 1996, pp:175-185 [Conf]
- Jacques Stern, Julien P. Stern
Cryptanalysis of the OTM Signature Scheme from FC'02. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2003, pp:138-148 [Conf]
- Markus Jakobsson, Julien P. Stern, Moti Yung
Scramble All, Encrypt Small. [Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1999, pp:95-111 [Conf]
- Noga Alon, Haim Kaplan, Michael Krivelevich, Dahlia Malkhi, Julien P. Stern
Scalable Secure Storage when Half the System Is Faulty. [Citation Graph (0, 0)][DBLP] ICALP, 2000, pp:576-587 [Conf]
- Julien Boeuf, Julien P. Stern
An Analysis of One of the SDMI Candidates. [Citation Graph (0, 0)][DBLP] Information Hiding, 2001, pp:395-410 [Conf]
- Julien P. Stern, Gaël Hachez, François Koeune, Jean-Jacques Quisquater
Robust Object Watermarking: Application to Code. [Citation Graph (0, 0)][DBLP] Information Hiding, 1999, pp:368-378 [Conf]
- Julien P. Stern, Jean-Pierre Tillich
Automatic Detection of a Watermarked Document Using a Private Key. [Citation Graph (0, 0)][DBLP] Information Hiding, 2001, pp:258-272 [Conf]
- David Naccache, Adi Shamir, Julien P. Stern
How to Copyright a Function? [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1999, pp:188-196 [Conf]
- Markus Jakobsson, Philip D. MacKenzie, Julien P. Stern
Secure and Lightweight Advertising on the Web. [Citation Graph (0, 0)][DBLP] Computer Networks, 1999, v:31, n:11-16, pp:1101-1109 [Journal]
- Jean-Sébastien Coron, David Naccache, Yvo Desmedt, Andrew M. Odlyzko, Julien P. Stern
Index Calculation Attacks on RSA Signature and Encryption. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2006, v:38, n:1, pp:41-53 [Journal]
- Noga Alon, Haim Kaplan, Michael Krivelevich, Dahlia Malkhi, Julien P. Stern
Scalable Secure Storage When Half the System Is Faulty. [Citation Graph (0, 0)][DBLP] Inf. Comput., 2002, v:174, n:2, pp:203-213 [Journal]
- Noga Alon, Haim Kaplan, Michael Krivelevich, Dahlia Malkhi, Julien P. Stern
Addendum to "Scalable secure storage when half the system is faulty" [Inform. Comput 174 (2)(2002) 203-213]. [Citation Graph (0, 0)][DBLP] Inf. Comput., 2007, v:205, n:7, pp:1114-1116 [Journal]
Search in 0.002secs, Finished in 0.002secs
|