The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jean-Sébastien Coron: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jean-Sébastien Coron, Helena Handschuh, David Naccache
    ECC: Do We Need to Count? [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:122-134 [Conf]
  2. Jean-Sébastien Coron, François Koeune, David Naccache
    From Fixed-Length to Arbitrary-Length RSA Padding Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:90-96 [Conf]
  3. Jean-Sébastien Coron, David Naccache
    Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:392-397 [Conf]
  4. Christophe Clavier, Jean-Sébastien Coron, Nora Dabbous
    Differential Power Analysis in the Presence of Hardware Countermeasures. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:252-263 [Conf]
  5. Jean-Sébastien Coron
    Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CHES, 1999, pp:292-302 [Conf]
  6. Jean-Sébastien Coron, Louis Goubin
    On Boolean and Arithmetic Masking against Differential Power Analysis. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:231-237 [Conf]
  7. Jean-Sébastien Coron, David Lefranc, Guillaume Poupard
    A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    CHES, 2005, pp:47-60 [Conf]
  8. Jean-Sébastien Coron, Alexei Tchulkine
    A New Algorithm for Switching from Arithmetic to Boolean Masking. [Citation Graph (0, 0)][DBLP]
    CHES, 2003, pp:89-97 [Conf]
  9. Eric Brier, Christophe Clavier, Jean-Sébastien Coron, David Naccache
    Cryptanalysis of RSA Signatures with Fixed-Pattern Padding. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2001, pp:433-439 [Conf]
  10. Jean-Sébastien Coron
    On the Exact Security of Full Domain Hash. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:229-235 [Conf]
  11. Jean-Sébastien Coron
    Security Proof for Partial-Domain Hash Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:613-626 [Conf]
  12. Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya
    Merkle-Damgård Revisited: How to Construct a Hash Function. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:430-448 [Conf]
  13. Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier
    Universal Padding Schemes for RSA. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:226-241 [Conf]
  14. Jean-Sébastien Coron, David Naccache, Julien P. Stern
    On the Security of RSA Padding. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:1-18 [Conf]
  15. Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen
    GEM: A Generic Chosen-Ciphertext Secure Encryption Method. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:263-276 [Conf]
  16. Jean-Sébastien Coron, David Naccache
    Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:157-162 [Conf]
  17. Jean-Sébastien Coron
    Finding Small Roots of Bivariate Integer Polynomial Equations Revisited. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:492-505 [Conf]
  18. Jean-Sébastien Coron
    Optimal Security Proofs for PSS and Other Signature Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:272-287 [Conf]
  19. Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier
    New Attacks on PKCS#1 v1.5 Encryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2000, pp:369-381 [Conf]
  20. Jean-Sébastien Coron, David Naccache
    Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2000, pp:91-101 [Conf]
  21. Jean-Sébastien Coron, Paul C. Kocher, David Naccache
    Statistics and Secret Leakage. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:157-173 [Conf]
  22. Claude Barral, Jean-Sébastien Coron, David Naccache
    Externalized Fingerprint Matching. [Citation Graph (0, 0)][DBLP]
    ICBA, 2004, pp:309-315 [Conf]
  23. Jean-Sébastien Coron
    Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:14-27 [Conf]
  24. Jean-Sébastien Coron
    On the Security of Random Sources. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:29-42 [Conf]
  25. Julien Cathalo, Jean-Sébastien Coron, David Naccache
    From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:234-243 [Conf]
  26. Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen
    Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:17-33 [Conf]
  27. Jean-Sébastien Coron, David Naccache
    On the Security of RSA Screening. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:197-203 [Conf]
  28. Jean-Sébastien Coron, David M'Raïhi, Christophe Tymen
    Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:151-164 [Conf]
  29. Jean-Sébastien Coron, David Naccache
    An Accurate Evaluation of Maurer's Universal Test. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:57-71 [Conf]
  30. Jean-Sébastien Coron, David Naccache, Yvo Desmedt, Andrew M. Odlyzko, Julien P. Stern
    Index Calculation Attacks on RSA Signature and Encryption. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:38, n:1, pp:41-53 [Journal]
  31. Jean-Sébastien Coron
    What Is Cryptography? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:70-73 [Journal]
  32. Jean-Sébastien Coron, David Naccache, Paul C. Kocher
    Statistics and secret leakage. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Embedded Comput. Syst., 2004, v:3, n:3, pp:492-508 [Journal]
  33. Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain
    Side Channel Cryptanalysis of a Higher Order Masking Scheme. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:28-44 [Conf]
  34. Christophe Clavier, Jean-Sébastien Coron
    On the Implementation of a Fast Prime Generation Algorithm. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:443-449 [Conf]
  35. Jean-Sébastien Coron
    Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2007, pp:379-394 [Conf]
  36. Jean-Sébastien Coron, Alexander May
    Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2007, v:20, n:1, pp:39-50 [Journal]

  37. On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption. [Citation Graph (, )][DBLP]


  38. PSS Is Secure against Random Fault Attacks. [Citation Graph (, )][DBLP]


  39. Secure Delegation of Elliptic-Curve Pairing. [Citation Graph (, )][DBLP]


  40. Analysis of the split mask countermeasure for embedded systems. [Citation Graph (, )][DBLP]


  41. Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform. [Citation Graph (, )][DBLP]


  42. Fault Attacks on RSA Signatures with Partially Unknown Messages. [Citation Graph (, )][DBLP]


  43. An Efficient Method for Random Delay Generation in Embedded Software. [Citation Graph (, )][DBLP]


  44. Analysis and Improvement of the Random Delay Countermeasure of CHES 2009. [Citation Graph (, )][DBLP]


  45. The Random Oracle Model and the Ideal Cipher Model Are Equivalent. [Citation Graph (, )][DBLP]


  46. Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures. [Citation Graph (, )][DBLP]


  47. Efficient Indifferentiable Hashing into Ordinary Elliptic Curves. [Citation Graph (, )][DBLP]


  48. Fault Attacks Against emv Signatures. [Citation Graph (, )][DBLP]


  49. SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications. [Citation Graph (, )][DBLP]


  50. A New DPA Countermeasure Based on Permutation Tables. [Citation Graph (, )][DBLP]


  51. A Domain Extender for the Ideal Cipher. [Citation Graph (, )][DBLP]


  52. A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model. [Citation Graph (, )][DBLP]


Search in 0.026secs, Finished in 0.029secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002