Search the dblp DataBase
Jean-Sébastien Coron :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jean-Sébastien Coron , Helena Handschuh , David Naccache ECC: Do We Need to Count? [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1999, pp:122-134 [Conf ] Jean-Sébastien Coron , François Koeune , David Naccache From Fixed-Length to Arbitrary-Length RSA Padding Schemes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:90-96 [Conf ] Jean-Sébastien Coron , David Naccache Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:392-397 [Conf ] Christophe Clavier , Jean-Sébastien Coron , Nora Dabbous Differential Power Analysis in the Presence of Hardware Countermeasures. [Citation Graph (0, 0)][DBLP ] CHES, 2000, pp:252-263 [Conf ] Jean-Sébastien Coron Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP ] CHES, 1999, pp:292-302 [Conf ] Jean-Sébastien Coron , Louis Goubin On Boolean and Arithmetic Masking against Differential Power Analysis. [Citation Graph (0, 0)][DBLP ] CHES, 2000, pp:231-237 [Conf ] Jean-Sébastien Coron , David Lefranc , Guillaume Poupard A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis. [Citation Graph (0, 0)][DBLP ] CHES, 2005, pp:47-60 [Conf ] Jean-Sébastien Coron , Alexei Tchulkine A New Algorithm for Switching from Arithmetic to Boolean Masking. [Citation Graph (0, 0)][DBLP ] CHES, 2003, pp:89-97 [Conf ] Eric Brier , Christophe Clavier , Jean-Sébastien Coron , David Naccache Cryptanalysis of RSA Signatures with Fixed-Pattern Padding. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:433-439 [Conf ] Jean-Sébastien Coron On the Exact Security of Full Domain Hash. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2000, pp:229-235 [Conf ] Jean-Sébastien Coron Security Proof for Partial-Domain Hash Signature Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:613-626 [Conf ] Jean-Sébastien Coron , Yevgeniy Dodis , Cécile Malinaud , Prashant Puniya Merkle-Damgård Revisited: How to Construct a Hash Function. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:430-448 [Conf ] Jean-Sébastien Coron , Marc Joye , David Naccache , Pascal Paillier Universal Padding Schemes for RSA. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:226-241 [Conf ] Jean-Sébastien Coron , David Naccache , Julien P. Stern On the Security of RSA Padding. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:1-18 [Conf ] Jean-Sébastien Coron , Helena Handschuh , Marc Joye , Pascal Paillier , David Pointcheval , Christophe Tymen GEM: A Generic Chosen-Ciphertext Secure Encryption Method. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:263-276 [Conf ] Jean-Sébastien Coron , David Naccache Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:157-162 [Conf ] Jean-Sébastien Coron Finding Small Roots of Bivariate Integer Polynomial Equations Revisited. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2004, pp:492-505 [Conf ] Jean-Sébastien Coron Optimal Security Proofs for PSS and Other Signature Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:272-287 [Conf ] Jean-Sébastien Coron , Marc Joye , David Naccache , Pascal Paillier New Attacks on PKCS#1 v1.5 Encryption. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2000, pp:369-381 [Conf ] Jean-Sébastien Coron , David Naccache Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2000, pp:91-101 [Conf ] Jean-Sébastien Coron , Paul C. Kocher , David Naccache Statistics and Secret Leakage. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:157-173 [Conf ] Claude Barral , Jean-Sébastien Coron , David Naccache Externalized Fingerprint Matching. [Citation Graph (0, 0)][DBLP ] ICBA, 2004, pp:309-315 [Conf ] Jean-Sébastien Coron Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:14-27 [Conf ] Jean-Sébastien Coron On the Security of Random Sources. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:29-42 [Conf ] Julien Cathalo , Jean-Sébastien Coron , David Naccache From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2005, pp:234-243 [Conf ] Jean-Sébastien Coron , Helena Handschuh , Marc Joye , Pascal Paillier , David Pointcheval , Christophe Tymen Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:17-33 [Conf ] Jean-Sébastien Coron , David Naccache On the Security of RSA Screening. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:197-203 [Conf ] Jean-Sébastien Coron , David M'Raïhi , Christophe Tymen Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:151-164 [Conf ] Jean-Sébastien Coron , David Naccache An Accurate Evaluation of Maurer's Universal Test. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:57-71 [Conf ] Jean-Sébastien Coron , David Naccache , Yvo Desmedt , Andrew M. Odlyzko , Julien P. Stern Index Calculation Attacks on RSA Signature and Encryption. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2006, v:38, n:1, pp:41-53 [Journal ] Jean-Sébastien Coron What Is Cryptography? [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2006, v:4, n:1, pp:70-73 [Journal ] Jean-Sébastien Coron , David Naccache , Paul C. Kocher Statistics and secret leakage. [Citation Graph (0, 0)][DBLP ] ACM Trans. Embedded Comput. Syst., 2004, v:3, n:3, pp:492-508 [Journal ] Jean-Sébastien Coron , Emmanuel Prouff , Matthieu Rivain Side Channel Cryptanalysis of a Higher Order Masking Scheme. [Citation Graph (0, 0)][DBLP ] CHES, 2007, pp:28-44 [Conf ] Christophe Clavier , Jean-Sébastien Coron On the Implementation of a Fast Prime Generation Algorithm. [Citation Graph (0, 0)][DBLP ] CHES, 2007, pp:443-449 [Conf ] Jean-Sébastien Coron Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2007, pp:379-394 [Conf ] Jean-Sébastien Coron , Alexander May Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2007, v:20, n:1, pp:39-50 [Journal ] On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption. [Citation Graph (, )][DBLP ] PSS Is Secure against Random Fault Attacks. [Citation Graph (, )][DBLP ] Secure Delegation of Elliptic-Curve Pairing. [Citation Graph (, )][DBLP ] Analysis of the split mask countermeasure for embedded systems. [Citation Graph (, )][DBLP ] Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform. [Citation Graph (, )][DBLP ] Fault Attacks on RSA Signatures with Partially Unknown Messages. [Citation Graph (, )][DBLP ] An Efficient Method for Random Delay Generation in Embedded Software. [Citation Graph (, )][DBLP ] Analysis and Improvement of the Random Delay Countermeasure of CHES 2009. [Citation Graph (, )][DBLP ] The Random Oracle Model and the Ideal Cipher Model Are Equivalent. [Citation Graph (, )][DBLP ] Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures. [Citation Graph (, )][DBLP ] Efficient Indifferentiable Hashing into Ordinary Elliptic Curves. [Citation Graph (, )][DBLP ] Fault Attacks Against emv Signatures. [Citation Graph (, )][DBLP ] SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications. [Citation Graph (, )][DBLP ] A New DPA Countermeasure Based on Permutation Tables. [Citation Graph (, )][DBLP ] A Domain Extender for the Ideal Cipher. [Citation Graph (, )][DBLP ] A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model. [Citation Graph (, )][DBLP ] Search in 0.007secs, Finished in 0.010secs