default search action
Jean-Sébastien Coron
Person information
- affiliation: University of Luxembourg
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Jean-Sébastien Coron, François Gérard, Tancrède Lepoint, Matthias Trannoy, Rina Zeitoun:
Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 335-354 (2024) - [i62]Jean-Sébastien Coron, François Gérard, Tancrède Lepoint, Matthias Trannoy, Rina Zeitoun:
Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium. IACR Cryptol. ePrint Arch. 2024: 1149 (2024) - 2023
- [j18]Jean-Sébastien Coron, François Gérard, Simon Montoya, Rina Zeitoun:
High-order Polynomial Comparison and Masking Lattice-based Encryption. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1): 153-192 (2023) - [j17]Jean-Sébastien Coron, François Gérard, Matthias Trannoy, Rina Zeitoun:
High-order masking of NTRU. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 180-211 (2023) - [j16]Jean-Sébastien Coron, François Gérard, Matthias Trannoy, Rina Zeitoun:
Improved Gadgets for the High-Order Masking of Dilithium. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4): 110-145 (2023) - [i61]Jean-Sébastien Coron, François Gérard, Matthias Trannoy, Rina Zeitoun:
Improved Gadgets for the High-Order Masking of Dilithium. IACR Cryptol. ePrint Arch. 2023: 896 (2023) - 2022
- [j15]Jean-Sébastien Coron, François Gérard, Simon Montoya, Rina Zeitoun:
High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(2): 1-40 (2022) - [i60]Jean-Sébastien Coron, François Gérard, Matthias Trannoy, Rina Zeitoun:
High-order masking of NTRU. IACR Cryptol. ePrint Arch. 2022: 1188 (2022) - 2021
- [c84]Jean-Sébastien Coron, Lorenzo Spignoli:
Secure Wire Shuffling in the Probing Model. CRYPTO (3) 2021: 215-244 - [i59]Jean-Sébastien Coron, Lorenzo Spignoli:
Secure Shuffling in the Probing Model. IACR Cryptol. ePrint Arch. 2021: 258 (2021) - [i58]Jean-Sébastien Coron, Agnese Gini:
Provably Solving the Hidden Subset Sum Problem via Statistical Learning. IACR Cryptol. ePrint Arch. 2021: 1007 (2021) - [i57]Jean-Sébastien Coron, François Gérard, Simon Montoya, Rina Zeitoun:
High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption. IACR Cryptol. ePrint Arch. 2021: 1314 (2021) - [i56]Jean-Sébastien Coron, François Gérard, Simon Montoya, Rina Zeitoun:
High-order Polynomial Comparison and Masking Lattice-based Encryption. IACR Cryptol. ePrint Arch. 2021: 1615 (2021) - 2020
- [j14]Jean-Sébastien Coron, Agnese Gini:
Improved cryptanalysis of the AJPS Mersenne based cryptosystem. J. Math. Cryptol. 14(1): 218-223 (2020) - [c83]Jean-Sébastien Coron, Agnese Gini:
A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem. CRYPTO (2) 2020: 3-31 - [c82]Sonia Belaïd, Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Abdul Rahman Taleb:
Random Probing Security: Verification, Composition, Expansion and New Constructions. CRYPTO (1) 2020: 339-368 - [c81]Jean-Sébastien Coron, Aurélien Greuet, Rina Zeitoun:
Side-Channel Masking with Pseudo-Random Generator. EUROCRYPT (3) 2020: 342-375 - [i55]Jean-Sébastien Coron, Luca Notarnicola, Gabor Wiese:
Simultaneous Diagonalization of Incomplete Matrices and Applications. CoRR abs/2005.13629 (2020) - [i54]Jean-Sébastien Coron, Agnese Gini:
A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem. IACR Cryptol. ePrint Arch. 2020: 461 (2020) - [i53]Jean-Sébastien Coron, Luca Notarnicola, Gabor Wiese:
Simultaneous Diagonalization of Incomplete Matrices and Applications. IACR Cryptol. ePrint Arch. 2020: 631 (2020) - [i52]Sonia Belaïd, Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Abdul Rahman Taleb:
Random Probing Security: Verification, Composition, Expansion and New Constructions. IACR Cryptol. ePrint Arch. 2020: 786 (2020)
2010 – 2019
- 2019
- [c80]Jean-Sébastien Coron, Hilder V. L. Pereira:
On Kilian's Randomization of Multilinear Map Encodings. ASIACRYPT (2) 2019: 325-355 - [c79]Jean-Sébastien Coron, Luca Notarnicola:
Cryptanalysis of CLT13 Multilinear Maps with Independent Slots. ASIACRYPT (2) 2019: 356-385 - [i51]Jean-Sébastien Coron, Luca Notarnicola:
Cryptanalysis of CLT13 Multilinear Maps with Independent Slots. IACR Cryptol. ePrint Arch. 2019: 309 (2019) - [i50]Jean-Sébastien Coron, Agnese Gini:
Improved Cryptanalysis of the AJPS Mersenne Based Cryptosystem. IACR Cryptol. ePrint Arch. 2019: 610 (2019) - [i49]Jean-Sébastien Coron, Aurélien Greuet, Rina Zeitoun:
Side-channel Masking with Pseudo-Random Generator. IACR Cryptol. ePrint Arch. 2019: 1106 (2019) - 2018
- [j13]Jean-Sébastien Coron, Franck Rondepierre, Rina Zeitoun:
High Order Masking of Look-up Tables with Common Shares. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(1): 40-72 (2018) - [j12]Luk Bettale, Jean-Sébastien Coron, Rina Zeitoun:
Improved High-Order Conversion From Boolean to Arithmetic Masking. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2): 22-45 (2018) - [c78]Jean-Sébastien Coron:
Formal Verification of Side-Channel Countermeasures via Elementary Circuit Transformations. ACNS 2018: 65-82 - [c77]Jean-Sébastien Coron, Rina Zeitoun:
Improved Factorization of N=p^rq^s. CT-RSA 2018: 65-79 - [i48]Luk Bettale, Jean-Sébastien Coron, Rina Zeitoun:
Improved High-Order Conversion From Boolean to Arithmetic Masking. IACR Cryptol. ePrint Arch. 2018: 328 (2018) - [i47]Jean-Sébastien Coron, Hilder V. L. Pereira:
On Kilian's Randomization of Multilinear Map Encodings. IACR Cryptol. ePrint Arch. 2018: 1129 (2018) - 2017
- [c76]Jean-Sébastien Coron:
High-Order Conversion from Boolean to Arithmetic Masking. CHES 2017: 93-114 - [c75]Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi:
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13. Public Key Cryptography (1) 2017: 41-58 - [e6]Jean-Sébastien Coron, Jesper Buus Nielsen:
Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part I. Lecture Notes in Computer Science 10210, 2017, ISBN 978-3-319-56619-1 [contents] - [e5]Jean-Sébastien Coron, Jesper Buus Nielsen:
Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part II. Lecture Notes in Computer Science 10211, 2017, ISBN 978-3-319-56613-9 [contents] - [e4]Jean-Sébastien Coron, Jesper Buus Nielsen:
Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III. Lecture Notes in Computer Science 10212, 2017, ISBN 978-3-319-56616-0 [contents] - [i46]Jean-Sébastien Coron:
High-Order Conversion From Boolean to Arithmetic Masking. IACR Cryptol. ePrint Arch. 2017: 252 (2017) - [i45]Jean-Sébastien Coron, Franck Rondepierre, Rina Zeitoun:
High Order Masking of Look-up Tables with Common Shares. IACR Cryptol. ePrint Arch. 2017: 271 (2017) - [i44]Jean-Sébastien Coron:
Formal Verification of Side-channel Countermeasures via Elementary Circuit Transformations. IACR Cryptol. ePrint Arch. 2017: 879 (2017) - 2016
- [j11]Jean-Sébastien Coron, Thomas Holenstein, Robin Künzler, Jacques Patarin, Yannick Seurin, Stefano Tessaro:
How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction. J. Cryptol. 29(1): 61-114 (2016) - [j10]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann:
Practical Cryptanalysis of ISO 9796-2 and EMV Signatures. J. Cryptol. 29(3): 632-656 (2016) - [c74]Jean-Sébastien Coron:
Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol. The New Codebreakers 2016: 518-542 - [c73]Alberto Battistello, Jean-Sébastien Coron, Emmanuel Prouff, Rina Zeitoun:
Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme. CHES 2016: 23-39 - [c72]Jean-Sébastien Coron, Aurélien Greuet, Emmanuel Prouff, Rina Zeitoun:
Faster Evaluation of SBoxes via Common Shares. CHES 2016: 498-514 - [c71]Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi:
Cryptanalysis of GGH15 Multilinear Maps. CRYPTO (2) 2016: 607-628 - [c70]Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun:
Factoring N=p^rq^s for Large r and s. CT-RSA 2016: 448-464 - [e3]Marc Fischlin, Jean-Sébastien Coron:
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I. Lecture Notes in Computer Science 9665, Springer 2016, ISBN 978-3-662-49889-7 [contents] - [e2]Marc Fischlin, Jean-Sébastien Coron:
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II. Lecture Notes in Computer Science 9666, Springer 2016, ISBN 978-3-662-49895-8 [contents] - [i43]Alberto Battistello, Jean-Sébastien Coron, Emmanuel Prouff, Rina Zeitoun:
Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme. IACR Cryptol. ePrint Arch. 2016: 540 (2016) - [i42]Jean-Sébastien Coron, Rina Zeitoun:
Improved Factorization of N=prqs. IACR Cryptol. ePrint Arch. 2016: 551 (2016) - [i41]Jean-Sébastien Coron, Aurélien Greuet, Emmanuel Prouff, Rina Zeitoun:
Faster Evaluation of SBoxes via Common Shares. IACR Cryptol. ePrint Arch. 2016: 572 (2016) - [i40]Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi:
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13. IACR Cryptol. ePrint Arch. 2016: 1011 (2016) - 2015
- [j9]Jean-Sébastien Coron, Arnab Roy, Srinivas Vivek:
Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures. J. Cryptogr. Eng. 5(2): 73-83 (2015) - [c69]Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff:
Improved Side-Channel Analysis of Finite-Field Multiplication. CHES 2015: 395-415 - [c68]Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations. CRYPTO (1) 2015: 247-266 - [c67]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
New Multilinear Maps Over the Integers. CRYPTO (1) 2015: 267-286 - [c66]Jean-Sébastien Coron, Johann Großschädl, Mehdi Tibouchi, Praveen Kumar Vadnala:
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity. FSE 2015: 130-149 - [c65]Eric Brier, Jean-Sébastien Coron, Rémi Géraud, Diana Maimut, David Naccache:
A Number-Theoretic Error-Correcting Code. SECITC 2015: 25-35 - [i39]Eric Brier, Jean-Sébastien Coron, Rémi Géraud, Diana Maimut, David Naccache:
A Number-Theoretic Error-Correcting Code. CoRR abs/1509.00378 (2015) - [i38]Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun:
Factoring N=pr qs for Large r and s. IACR Cryptol. ePrint Arch. 2015: 71 (2015) - [i37]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
New Multilinear Maps over the Integers. IACR Cryptol. ePrint Arch. 2015: 162 (2015) - [i36]Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Higher-Order Side Channel Security and Mask Refreshing. IACR Cryptol. ePrint Arch. 2015: 359 (2015) - [i35]Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff:
Improved Side-Channel Analysis of Finite-Field Multiplication. IACR Cryptol. ePrint Arch. 2015: 542 (2015) - [i34]Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations. IACR Cryptol. ePrint Arch. 2015: 596 (2015) - [i33]Jean-Sébastien Coron:
Cryptanalysis of GGH15 Multilinear Maps. IACR Cryptol. ePrint Arch. 2015: 1037 (2015) - 2014
- [j8]Guido Bertoni, Jean-Sébastien Coron:
Introduction to the CHES 2013 special issue. J. Cryptogr. Eng. 4(1): 1 (2014) - [c64]Jean-Sébastien Coron, Arnab Roy, Srinivas Vivek:
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures. CHES 2014: 170-187 - [c63]Jean-Sébastien Coron, Johann Großschädl, Praveen Kumar Vadnala:
Secure Conversion between Boolean and Arithmetic Masking of Any Order. CHES 2014: 188-205 - [c62]Jean-Sébastien Coron:
Higher Order Masking of Look-Up Tables. EUROCRYPT 2014: 441-458 - [c61]Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun:
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences. Public Key Cryptography 2014: 185-202 - [c60]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Scale-Invariant Fully Homomorphic Encryption over the Integers. Public Key Cryptography 2014: 311-328 - [i32]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Scale-Invariant Fully Homomorphic Encryption over the Integers. IACR Cryptol. ePrint Arch. 2014: 32 (2014) - [i31]Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun:
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences. IACR Cryptol. ePrint Arch. 2014: 437 (2014) - [i30]Jean-Sébastien Coron, Arnab Roy, Srinivas Vivek:
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel Countermeasures. IACR Cryptol. ePrint Arch. 2014: 890 (2014) - [i29]Jean-Sébastien Coron, Johann Großschädl, Praveen Kumar Vadnala, Mehdi Tibouchi:
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity. IACR Cryptol. ePrint Arch. 2014: 891 (2014) - [i28]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers. IACR Cryptol. ePrint Arch. 2014: 975 (2014) - 2013
- [j7]Jean-Sébastien Coron, Alexey Kirichenko, Mehdi Tibouchi:
A Note on the Bivariate Coppersmith Theorem. J. Cryptol. 26(2): 246-250 (2013) - [c59]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Practical Multilinear Maps over the Integers. CRYPTO (1) 2013: 476-493 - [c58]Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, Aaram Yun:
Batch Fully Homomorphic Encryption over the Integers. EUROCRYPT 2013: 315-335 - [c57]Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Higher-Order Side Channel Security and Mask Refreshing. FSE 2013: 410-424 - [e1]Guido Bertoni, Jean-Sébastien Coron:
Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings. Lecture Notes in Computer Science 8086, Springer 2013, ISBN 978-3-642-40348-4 [contents] - [i27]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Batch Fully Homomorphic Encryption over the Integers. IACR Cryptol. ePrint Arch. 2013: 36 (2013) - [i26]Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Practical Multilinear Maps over the Integers. IACR Cryptol. ePrint Arch. 2013: 183 (2013) - [i25]Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun:
A Variant of Coppersmith's Algorithm with Improved Complexity and Efficient Exhaustive Search. IACR Cryptol. ePrint Arch. 2013: 483 (2013) - [i24]Jean-Sébastien Coron:
Higher Order Masking of Look-up Tables. IACR Cryptol. ePrint Arch. 2013: 700 (2013) - 2012
- [c56]Jean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier:
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping. Cryptography and Security 2012: 207-232 - [c55]Jean-Sébastien Coron, Emmanuel Prouff, Thomas Roche:
On the Use of Shamir's Secret Sharing against Side-Channel Analysis. CARDIS 2012: 77-90 - [c54]Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Soline Renner, Matthieu Rivain, Praveen Kumar Vadnala:
Conversion of Security Proofs from One Leakage Model to Another: A New Issue. COSADE 2012: 69-81 - [c53]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers. EUROCRYPT 2012: 446-464 - [c52]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Another Look at Affine-Padding RSA Signatures. ICISC 2012: 22-32 - 2011
- [c51]Jean-Sébastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi:
Fully Homomorphic Encryption over the Integers with Shorter Public Keys. CRYPTO 2011: 487-504 - [c50]Anja Becker, Jean-Sébastien Coron, Antoine Joux:
Improved Generic Algorithms for Hard Knapsacks. EUROCRYPT 2011: 364-385 - [c49]Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi:
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005. Public Key Cryptography 2011: 147-155 - [i23]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Another Look at RSA Signatures With Affine Padding. IACR Cryptol. ePrint Arch. 2011: 57 (2011) - [i22]Jean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier:
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping. IACR Cryptol. ePrint Arch. 2011: 58 (2011) - [i21]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Optimization of Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2011: 440 (2011) - [i20]Jean-Sébastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi:
Fully Homomorphic Encryption over the Integers with Shorter Public Keys. IACR Cryptol. ePrint Arch. 2011: 441 (2011) - [i19]Anja Becker, Jean-Sébastien Coron, Antoine Joux:
Improved Generic Algorithms for Hard Knapsacks. IACR Cryptol. ePrint Arch. 2011: 474 (2011) - 2010
- [c48]Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud:
On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption. ACNS 2010: 1-18 - [c47]Benoît Chevallier-Mames, Jean-Sébastien Coron, Noel McCullagh, David Naccache, Michael Scott:
Secure Delegation of Elliptic-Curve Pairing. CARDIS 2010: 24-35 - [c46]Jean-Sébastien Coron, Ilya Kizhvatov:
Analysis and Improvement of the Random Delay Countermeasure of CHES 2009. CHES 2010: 95-109 - [c45]Eric Brier, Jean-Sébastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi:
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves. CRYPTO 2010: 237-254 - [c44]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Fault Attacks Against emv Signatures. CT-RSA 2010: 208-220 - [c43]Jean-Sébastien Coron, Aline Gouget, Pascal Paillier, Karine Villegas:
SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications. Financial Cryptography Workshops 2010: 107-122 - [c42]Jean-Sébastien Coron, Christophe Giraud, Nicolas Morin, Gilles Piret, David Vigilant:
Fault Attacks and Countermeasures on Vigilant's RSA-CRT Algorithm. FDTC 2010: 89-96 - [c41]Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin:
A Domain Extender for the Ideal Cipher. TCC 2010: 273-289 - [i18]Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud:
On The Broadcast and Validity-Checking Security of PKCS \#1 v1.5 Encryption. IACR Cryptol. ePrint Arch. 2010: 135 (2010) - [i17]Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi:
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005. IACR Cryptol. ePrint Arch. 2010: 650 (2010)
2000 – 2009
- 2009
- [j6]Jean-Sébastien Coron:
A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model. Des. Codes Cryptogr. 50(1): 115-133 (2009) - [c40]Jean-Sébastien Coron, Avradip Mandal:
PSS Is Secure against Random Fault Attacks. ASIACRYPT 2009: 653-666 - [c39]Jean-Sébastien Coron, Ilya Kizhvatov:
Analysis of the split mask countermeasure for embedded systems. WESS 2009 - [c38]Jean-Sébastien Coron, Ilya Kizhvatov:
An Efficient Method for Random Delay Generation in Embedded Software. CHES 2009: 156-170 - [c37]Jean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier:
Fault Attacks on RSA Signatures with Partially Unknown Messages. CHES 2009: 444-456 - [c36]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann:
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures. CRYPTO 2009: 428-444 - [i16]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann:
Practical Cryptanalysis of ISO/IEC 9796-2 and EMV Signatures. IACR Cryptol. ePrint Arch. 2009: 203 (2009) - [i15]Jean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier:
Fault Attacks on RSA Signatures with Partially Unknown Messages. IACR Cryptol. ePrint Arch. 2009: 309 (2009) - [i14]Eric Brier, Jean-Sébastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi:
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves. IACR Cryptol. ePrint Arch. 2009: 340 (2009) - [i13]Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin:
A Domain Extender for the Ideal Cipher. IACR Cryptol. ePrint Arch. 2009: 356 (2009) - [i12]Jean-Sébastien Coron, Ilya Kizhvatov:
An Efficient Method for Random Delay Generation in Embedded Software. IACR Cryptol. ePrint Arch. 2009: 419 (2009) - [i11]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Fault Attacks Against EMV Signatures. IACR Cryptol. ePrint Arch. 2009: 503 (2009) - 2008
- [j5]Don Coppersmith, Jean-Sébastien Coron, François Grieu, Shai Halevi, Charanjit S. Jutla, David Naccache, Julien P. Stern:
Cryptanalysis of ISO/IEC 9796-1. J. Cryptol. 21(1): 27-51 (2008) - [c35]Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Matthieu Rivain:
Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform. CHES 2008: 1-14 - [c34]Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin:
The Random Oracle Model and the Ideal Cipher Model Are Equivalent. CRYPTO 2008: 1-20 - [c33]Jean-Sébastien Coron:
A New DPA Countermeasure Based on Permutation Tables. SCN 2008: 278-292 - [i10]Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin:
The Random Oracle Model and the Ideal Cipher Model are Equivalent. IACR Cryptol. ePrint Arch. 2008: 246 (2008) - 2007
- [j4]Jean-Sébastien Coron, Alexander May:
Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring. J. Cryptol. 20(1): 39-50 (2007) - [c32]Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain:
Side Channel Cryptanalysis of a Higher Order Masking Scheme. CHES 2007: 28-44 - [c31]Christophe Clavier, Jean-Sébastien Coron:
On the Implementation of a Fast Prime Generation Algorithm. CHES 2007: 443-449 - [c30]Jean-Sébastien Coron:
Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach. CRYPTO 2007: 379-394 - 2006
- [j3]Jean-Sébastien Coron, David Naccache, Yvo Desmedt, Andrew M. Odlyzko, Julien P. Stern:
Index Calculation Attacks on RSA Signature and Encryption. Des. Codes Cryptogr. 38(1): 41-53 (2006) - [j2]Jean-Sébastien Coron:
What Is Cryptography? IEEE Secur. Priv. 4(1): 70-73 (2006) - 2005
- [c29]Jean-Sébastien Coron, David Lefranc, Guillaume Poupard:
A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis. CHES 2005: 47-60 - [c28]Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya:
Merkle-Damgård Revisited: How to Construct a Hash Function. CRYPTO 2005: 430-448 - [c27]Julien Cathalo, Jean-Sébastien Coron, David Naccache:
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited. Public Key Cryptography 2005: 234-243 - [i9]Benoît Chevallier-Mames, Jean-Sébastien Coron, Noel McCullagh, David Naccache, Michael Scott:
Secure Delegation of Elliptic-Curve Pairing. IACR Cryptol. ePrint Arch. 2005: 150 (2005) - 2004
- [j1]Jean-Sébastien Coron, David Naccache, Paul C. Kocher:
Statistics and secret leakage. ACM Trans. Embed. Comput. Syst. 3(3): 492-508 (2004) - [c26]Jean-Sébastien Coron, David Naccache:
Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95. CT-RSA 2004: 157-162 - [c25]Jean-Sébastien Coron:
Finding Small Roots of Bivariate Integer Polynomial Equations Revisited. EUROCRYPT 2004: 492-505 - [c24]Claude Barral, Jean-Sébastien Coron, David Naccache:
Externalized Fingerprint Matching. ICBA 2004: 309-315 - [c23]Jean-Sébastien Coron:
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem. Public Key Cryptography 2004: 14-27 - [i8]Jean-Sébastien Coron, Antoine Joux:
Cryptanalysis of a Provably Secure Cryptographic Hash Function. IACR Cryptol. ePrint Arch. 2004: 13 (2004) - [i7]Claude Barral, Jean-Sébastien Coron, David Naccache:
Externalized Fingerprint Matching. IACR Cryptol. ePrint Arch. 2004: 21 (2004) - [i6]Jean-Sébastien Coron, Alexander May:
Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring. IACR Cryptol. ePrint Arch. 2004: 208 (2004) - 2003
- [c22]Jean-Sébastien Coron, David Naccache:
Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption. ASIACRYPT 2003: 392-397 - [c21]Jean-Sébastien Coron, Alexei Tchulkine:
A New Algorithm for Switching from Arithmetic to Boolean Masking. CHES 2003: 89-97 - [i5]Jean-Sébastien Coron:
Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem. IACR Cryptol. ePrint Arch. 2003: 36 (2003) - [i4]Jean-Sébastien Coron:
Cryptanalysis of the Repaired Public-key Encryption Scheme Based on the Polynomial Reconstruction Problem. IACR Cryptol. ePrint Arch. 2003: 219 (2003) - 2002
- [c20]Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier:
Universal Padding Schemes for RSA. CRYPTO 2002: 226-241 - [c19]Jean-Sébastien Coron:
Security Proof for Partial-Domain Hash Signature Schemes. CRYPTO 2002: 613-626 - [c18]Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen:
GEM: A Generic Chosen-Ciphertext Secure Encryption Method. CT-RSA 2002: 263-276 - [c17]Jean-Sébastien Coron:
Optimal Security Proofs for PSS and Other Signature Schemes. EUROCRYPT 2002: 272-287 - [c16]Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen:
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. Public Key Cryptography 2002: 17-33 - [i3]Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen:
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. IACR Cryptol. ePrint Arch. 2002: 11 (2002) - [i2]Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier:
Universal Padding Schemes for RSA. IACR Cryptol. ePrint Arch. 2002: 115 (2002) - 2001
- [c15]Eric Brier, Christophe Clavier, Jean-Sébastien Coron, David Naccache:
Cryptanalysis of RSA Signatures with Fixed-Pattern Padding. CRYPTO 2001: 433-439 - [c14]Jean-Sébastien Coron, David M'Raïhi, Christophe Tymen:
Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves. Selected Areas in Cryptography 2001: 151-164 - [i1]Jean-Sébastien Coron:
Optimal security proofs for PSS and other signature schemes. IACR Cryptol. ePrint Arch. 2001: 62 (2001) - 2000
- [c13]Jean-Sébastien Coron, François Koeune, David Naccache:
From Fixed-Length to Arbitrary-Length RSA Padding Schemes. ASIACRYPT 2000: 90-96 - [c12]Jean-Sébastien Coron, Louis Goubin:
On Boolean and Arithmetic Masking against Differential Power Analysis. CHES 2000: 231-237 - [c11]Christophe Clavier, Jean-Sébastien Coron, Nora Dabbous:
Differential Power Analysis in the Presence of Hardware Countermeasures. CHES 2000: 252-263 - [c10]Jean-Sébastien Coron:
On the Exact Security of Full Domain Hash. CRYPTO 2000: 229-235 - [c9]Jean-Sébastien Coron, David Naccache:
Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme. EUROCRYPT 2000: 91-101 - [c8]Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier:
New Attacks on PKCS#1 v1.5 Encryption. EUROCRYPT 2000: 369-381 - [c7]Jean-Sébastien Coron, Paul C. Kocher, David Naccache:
Statistics and Secret Leakage. Financial Cryptography 2000: 157-173
1990 – 1999
- 1999
- [c6]Jean-Sébastien Coron, Helena Handschuh, David Naccache:
ECC: Do We Need to Count? ASIACRYPT 1999: 122-134 - [c5]Jean-Sébastien Coron:
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. CHES 1999: 292-302 - [c4]Jean-Sébastien Coron, David Naccache, Julien P. Stern:
On the Security of RSA Padding. CRYPTO 1999: 1-18 - [c3]Jean-Sébastien Coron:
On the Security of Random Sources. Public Key Cryptography 1999: 29-42 - [c2]Jean-Sébastien Coron, David Naccache:
On the Security of RSA Screening. Public Key Cryptography 1999: 197-203 - 1998
- [c1]Jean-Sébastien Coron, David Naccache:
An Accurate Evaluation of Maurer's Universal Test. Selected Areas in Cryptography 1998: 57-71
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint