Applied Crypto Group Publications

  1. Zeroizing Attacks on Indistinguishability Obfuscation over CLT13. Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi. Proceedings of PKC 2017.
  2. How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction. Jean-Sébastien Coron, Thomas Holenstein, Robin Künzler, Jacques Patarin, Yannick Seurin, Stefano Tessaro. J. Cryptology 2016.
  3. Practical Cryptanalysis of ISO 9796-2 and EMV Signatures. Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann. J. Cryptology 2016.
  4. Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol. Jean-Sébastien Coron. Proceedings of The New Codebreakers 2016.
  5. Factoring N=p^rq^s for Large r and s. Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun. Proceedings of CT-RSA 2016.
  6. Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme. Alberto Battistello, Jean-Sébastien Coron, Emmanuel Prouff, Rina Zeitoun. Proceedings of CHES 2016.
  7. Faster Evaluation of SBoxes via Common Shares. Jean-Sébastien Coron, Aurélien Greuet, Emmanuel Prouff, Rina Zeitoun. Proceedings of CHES 2016.
  8. Cryptanalysis of GGH15 Multilinear Maps. Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi. Proceedings of CRYPTO 2016.
  9. Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures. Jean-Sébastien Coron, Arnab Roy, Srinivas Vivek. J. Cryptographic Engineering 2015.
  10. A Number-Theoretic Error-Correcting Code. Eric Brier, Jean-Sébastien Coron, Rémi Géraud, Diana Maimut, David Naccache. CoRR 2015.
  11. Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity. Jean-Sébastien Coron, Johann Großschädl, Mehdi Tibouchi, Praveen Kumar Vadnala. Proceedings of FSE 2015.
  12. Improved Side-Channel Analysis of Finite-Field Multiplication. Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff. Proceedings of CHES 2015.
  13. A Number-Theoretic Error-Correcting Code. Eric Brier, Jean-Sébastien Coron, Rémi Géraud, Diana Maimut, David Naccache. Proceedings of SECITC 2015.
  14. Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations. Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi. Proceedings of CRYPTO 2015.
  15. New Multilinear Maps Over the Integers. Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi. Proceedings of CRYPTO 2015.
  16. Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives. Olivier Pereira, François-Xavier Standaert, Srinivas Vivek. Proceedings of ACM Conference on Computer and Communications Security 2015.
  17. Faster Mask Conversion with Lookup Tables. Praveen Kumar Vadnala, Johann Großschädl. Proceedings of COSADE 2015.
  18. Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON. Junwei Wang, Praveen Kumar Vadnala, Johann Großschädl, Qiuliang Xu. Proceedings of CT-RSA 2015.
  19. Elliptic curve with Optimal mixed Montgomery-Edwards model for low-end devices. Zhe Liu, Zhi Hu, Wei Wu. SCIENCE CHINA Information Sciences 2015.
  20. The impact of social cloud reputation and structure on rational computation. Yilei Wang, Tao Li, Qianqian Liu, Jing Sun, Zhe Liu. J. High Speed Networks 2015.
  21. Optimized Karatsuba squaring on 8-bit AVR processors. Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim. Security and Communication Networks 2015.
  22. Karatsuba-Block-Comb technique for elliptic curve cryptography over binary fields. Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim. Security and Communication Networks 2015.
  23. Performance evaluation of twisted Edwards-form elliptic curve cryptography for wireless sensor nodes. Zhe Liu, Hwajeong Seo, Qiuliang Xu. Security and Communication Networks 2015.
  24. Montgomery multiplication and squaring for Optimal Prime Fields. Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim. Computers & Security 2015.
  25. Faster ECC over \mathbb F_2^521-1 F 2 521 - 1 (feat. NEON). Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Lu Zhou, Howon Kim. Proceedings of ICISC 2015.
  26. Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks. Zhe Liu, Hwajeong Seo, Zhi Hu, Xinyi Huang, Johann Großschädl. Proceedings of ASIACCS 2015.
  27. Efficient Ring-LWE Encryption on 8-Bit AVR Processors. Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede. Proceedings of CHES 2015.
  28. Compact Implementations of LSH. Taehwan Park, Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim. Proceedings of WISA 2015.
  29. Open Sesame! Hacking the Password. Hwajeong Seo, Zhe Liu, Gyuwon Seo, Taehwan Park, Jongseok Choi, Howon Kim. Proceedings of WISA 2015.
  30. Secure Binary Field Multiplication. Hwajeong Seo, Chien-Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim. Proceedings of WISA 2015.
  31. Compact Implementations of LEA Block Cipher for Low-End Microprocessors. Hwajeong Seo, Zhe Liu, Jongseok Choi, Taehwan Park, Howon Kim. Proceedings of WISA 2015.
  32. Introduction to the CHES 2013 special issue. Guido Bertoni, Jean-Sébastien Coron. J. Cryptographic Engineering 2014.
  33. Scale-Invariant Fully Homomorphic Encryption over the Integers. Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi. Proceedings of Public Key Cryptography 2014.
  34. Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences. Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun. Proceedings of Public Key Cryptography 2014.
  35. Higher Order Masking of Look-Up Tables. Jean-Sébastien Coron. Proceedings of EUROCRYPT 2014.
  36. Secure Conversion between Boolean and Arithmetic Masking of Any Order. Jean-Sébastien Coron, Johann Großschädl, Praveen Kumar Vadnala. Proceedings of CHES 2014.
  37. Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures. Jean-Sébastien Coron, Arnab Roy, Srinivas Vivek. Proceedings of CHES 2014.
  38. Cubic Sieve Congruence of the Discrete Logarithm Problem, and fractional part sequences. Srinivas Vivek, C. E. Veni Madhavan. J. Symb. Comput. 2014.
  39. Limits of a conjecture on a leakage-resilient cryptosystem. David Galindo, Srinivas Vivek. Inf. Process. Lett. 2014.
  40. New rational parties relying on reputation. Yilei Wang, Zhe Liu, Qiuliang Xu. Security and Communication Networks 2014.
  41. Social rational secure multi-party computation. Yilei Wang, Zhe Liu, Hao Wang, Qiuliang Xu. Concurrency and Computation: Practice and Experience 2014.
  42. Small Private Key MQPKS on an Embedded Microprocessor. Hwajeong Seo, Jihyun Kim, Jongseok Choi, Taehwan Park, Zhe Liu, Howon Kim. Sensors 2014.
  43. MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks. Zhe Liu, Erich Wenger, Johann Großschädl. Proceedings of ACNS 2014.
  44. Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks. Yang Yang, Zhi Guan, Zhe Liu, Zhong Chen. Proceedings of ICICS 2014.
  45. Reverse Product-Scanning Multiplication and Squaring on 8-Bit AVR Processors. Zhe Liu, Hwajeong Seo, Johann Großschädl, Howon Kim. Proceedings of ICICS 2014.
  46. Montgomery Modular Multiplication on ARM-NEON Revisited. Hwajeong Seo, Zhe Liu, Johann Großschädl, Jongseok Choi, Howon Kim. Proceedings of ICISC 2014.
  47. High-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit. Shujie Cui, Johann Großschädl, Zhe Liu, Qiuliang Xu. Proceedings of ISPEC 2014.
  48. Rational Secure Two-party Computation in Social Cloud. Yilei Wang, Zhe Liu, Tao Li, Qiuliang Xu. Proceedings of NSS 2014.
  49. Improved Modular Multiplication for Optimal Prime Fields. Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim. Proceedings of WISA 2014.
  50. New Speed Records for Montgomery Modular Multiplication on 8-Bit AVR Microcontrollers. Zhe Liu, Johann Großschädl. Proceedings of AFRICACRYPT 2014.
  51. A Note on the Bivariate Coppersmith Theorem. Jean-Sébastien Coron, Alexey Kirichenko, Mehdi Tibouchi. J. Cryptology 2013.
  52. Higher-Order Side Channel Security and Mask Refreshing. Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche. Proceedings of FSE 2013.
  53. Batch Fully Homomorphic Encryption over the Integers. Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, Aaram Yun. Proceedings of EUROCRYPT 2013.
  54. Practical Multilinear Maps over the Integers. Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi. Proceedings of CRYPTO 2013.
  55. Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012. Arnab Roy, Srinivas Vivek. Proceedings of CHES 2013.
  56. A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme. David Galindo, Srinivas Vivek. Proceedings of IMA Int. Conf. 2013.
  57. Algorithms for Switching between Boolean and Arithmetic Masking of Second Order. Praveen Kumar Vadnala, Johann Großschädl. Proceedings of SPACE 2013.
  58. A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES. Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Zhe Liu, Jean-François Gallais. Computers & Security 2013.
  59. Fixed-Base Comb with Window-Non-Adjacent Form (NAF) Method for Scalar Multiplication. Hwajeong Seo, Hyunjin Kim, Taehwan Park, Yeoncheol Lee, Zhe Liu, Howon Kim. Sensors 2013.
  60. Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes. Zhe Liu, Hwajeong Seo, Johann Großschädl, Howon Kim. Proceedings of ICICS 2013.
  61. Parallel Implementations of LEA. Hwajeong Seo, Zhe Liu, Taehwan Park, Hyunjin Kim, Yeoncheol Lee, Jongseok Choi, Howon Kim. Proceedings of ICISC 2013.
  62. Twisted edwards-form elliptic curve cryptography for 8-bit AVR-based sensor nodes. Dalin Chu, Johann Großschädl, Zhe Liu, Volker Müller, Yang Zhang. Proceedings of AsiaPKC@AsiaCCS 2013.
  63. Fair Computation with Tit-for-Tat Strategy. Yilei Wang, Qiuliang Xu, Zhe Liu. Proceedings of INCoS 2013.
  64. Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors. Zhe Liu, Johann Großschädl, Duncan S. Wong. Proceedings of Inscrypt 2013.
  65. Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors. Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim. Proceedings of INDOCRYPT 2013.
  66. Conversion of Security Proofs from One Leakage Model to Another: A New Issue. Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Soline Renner, Matthieu Rivain, Praveen Kumar Vadnala. Proceedings of COSADE 2012.
  67. Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping. Jean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier. Proceedings of Cryptography and Security 2012.
  68. On the Use of Shamir's Secret Sharing against Side-Channel Analysis. Jean-Sébastien Coron, Emmanuel Prouff, Thomas Roche. Proceedings of CARDIS 2012.
  69. Another Look at Affine-Padding RSA Signatures. Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi. Proceedings of ICISC 2012.
  70. Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers. Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi. Proceedings of EUROCRYPT 2012.
  71. On the energy cost of authenticated key agreement in wireless sensor networks. David Galindo, Rodrigo Roman, Javier Lopez. Wireless Communications and Mobile Computing 2012.
  72. A Practical Leakage-Resilient Signature Scheme in the Generic Group Model. David Galindo, Srinivas Vivek. Proceedings of Selected Areas in Cryptography 2012.
  73. Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience. David Galindo, Javier Herranz, Jorge L. Villar. Proceedings of ESORICS 2012.
  74. Extended Security Arguments for Signature Schemes. Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo, Pierre-Louis Cayrel. Proceedings of AFRICACRYPT 2012.
  75. On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction. Avradip Mandal, Jacques Patarin, Yannick Seurin. Proceedings of TCC 2012.
  76. Multi-party Computation with Social Rational Parties. Yilei Wang, Qiuliang Xu, Zhe Liu. Proceedings of INCoS 2012.
  77. Cryptanalysis of the RSA Subgroup Assumption from TCC 2005. Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi. Proceedings of Public Key Cryptography 2011.
  78. Improved Generic Algorithms for Hard Knapsacks. Anja Becker, Jean-Sébastien Coron, Antoine Joux. Proceedings of EUROCRYPT 2011.
  79. Fully Homomorphic Encryption over the Integers with Shorter Public Keys. Jean-Sébastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi. Proceedings of CRYPTO 2011.
  80. Non-interactive distributed encryption: a new primitive for revocable privacy. Jaap-Henk Hoepman, David Galindo. Proceedings of WPES 2011.
  81. Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF. Alex Biryukov, Ilya Kizhvatov, Bin Zhang. Proceedings of ACNS 2011.
  82. On the Impossibility of Instantiating PSS in the Standard Model. Rishiraj Bhattacharyya, Avradip Mandal. Proceedings of Public Key Cryptography 2011.
  83. On the Indifferentiability of Fugue and Luffa. Rishiraj Bhattacharyya, Avradip Mandal. Proceedings of ACNS 2011.
  84. SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications. Jean-Sébastien Coron, Aline Gouget, Pascal Paillier, Karine Villegas. Proceedings of Financial Cryptography Workshops 2010.
  85. On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption. Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud. Proceedings of ACNS 2010.
  86. A Domain Extender for the Ideal Cipher. Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin. Proceedings of TCC 2010.
  87. Secure Delegation of Elliptic-Curve Pairing. Benoît Chevallier-Mames, Jean-Sébastien Coron, Noel McCullagh, David Naccache, Michael Scott. Proceedings of CARDIS 2010.
  88. Fault Attacks Against emv Signatures. Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi. Proceedings of CT-RSA 2010.
  89. Analysis and Improvement of the Random Delay Countermeasure of CHES 2009. Jean-Sébastien Coron, Ilya Kizhvatov. Proceedings of CHES 2010.
  90. Efficient Indifferentiable Hashing into Ordinary Elliptic Curves. Eric Brier, Jean-Sébastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi. Proceedings of CRYPTO 2010.
  91. Fault Attacks and Countermeasures on Vigilant's RSA-CRT Algorithm. Jean-Sébastien Coron, Christophe Giraud, Nicolas Morin, Gilles Piret, David Vigilant. Proceedings of FDTC 2010.
  92. Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters. Julien Bringer, Hervé Chabanne, Thomas Icart. Proceedings of ACNS 2010.
  93. On the generic construction of identity-based signatures with additional properties. David Galindo, Javier Herranz, Eike Kiltz. Adv. in Math. of Comm. 2010.
  94. Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman. David Galindo. Proceedings of Pairing 2010.
  95. Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions. David Galindo, Benoît Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis, Dominique Schröder. Proceedings of AFRICACRYPT 2010.
  96. Combined Implementation Attack Resistant Exponentiation. Jörn-Marc Schmidt, Michael Tunstall, Roberto Maria Avanzi, Ilya Kizhvatov, Timo Kasper, David Oswald. Proceedings of LATINCRYPT 2010.
  97. Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices. Johann Großschädl, Ilya Kizhvatov. Proceedings of CANS 2010.
  98. Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations. Jean-François Gallais, Ilya Kizhvatov, Michael Tunstall. Proceedings of WISA 2010.
  99. Security Analysis of the Mode of JH Hash Function. Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi. Proceedings of FSE 2010.
  100. Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations. Avradip Mandal, Jacques Patarin, Valérie Nachef. Proceedings of INDOCRYPT 2010.
  101. A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model. Jean-Sébastien Coron. Des. Codes Cryptography 2009.
  102. Analysis of the split mask countermeasure for embedded systems. Jean-Sébastien Coron, Ilya Kizhvatov. Proceedings of WESS 2009.
  103. PSS Is Secure against Random Fault Attacks. Jean-Sébastien Coron, Avradip Mandal. Proceedings of ASIACRYPT 2009.
  104. Fault Attacks on RSA Signatures with Partially Unknown Messages. Jean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier. Proceedings of CHES 2009.
  105. An Efficient Method for Random Delay Generation in Embedded Software. Jean-Sébastien Coron, Ilya Kizhvatov. Proceedings of CHES 2009.
  106. Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures. Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann. Proceedings of CRYPTO 2009.
  107. Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis. Emmanuel Prouff, Matthieu Rivain. Proceedings of ACNS 2009.
  108. On Second-Order Fault Analysis Resistance for CRT-RSA Implementations. Emmanuelle Dottax, Christophe Giraud, Matthieu Rivain, Yannick Sierra. Proceedings of WISTP 2009.
  109. Securing RSA against Fault Analysis by Double Addition Chain Exponentiation. Matthieu Rivain. Proceedings of CT-RSA 2009.
  110. Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers. Matthieu Rivain, Emmanuel Prouff, Julien Doget. Proceedings of CHES 2009.
  111. Differential Fault Analysis on DES Middle Rounds. Matthieu Rivain. Proceedings of CHES 2009.
  112. Efficient zero-knowledge identification schemes which respect privacy. Julien Bringer, Hervé Chabanne, Thomas Icart. Proceedings of ASIACCS 2009.
  113. How to Hash into Elliptic Curves. Thomas Icart. Proceedings of CRYPTO 2009.
  114. On Physical Obfuscation of Cryptographic Algorithms. Julien Bringer, Hervé Chabanne, Thomas Icart. Proceedings of INDOCRYPT 2009.
  115. Direct chosen-ciphertext secure identity-based key encapsulation without random oracles. Eike Kiltz, David Galindo. Theor. Comput. Sci. 2009.
  116. Improved identity-based identification using correcting codes Pierre-Louis Cayrel, Philippe Gaborit, David Galindo, Marc Girault. CoRR 2009.
  117. Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening. David Galindo. Proceedings of CT-RSA 2009.
  118. A Schnorr-Like Lightweight Identity-Based Signature Scheme. David Galindo, Flavio D. Garcia. Proceedings of AFRICACRYPT 2009.
  119. Side channel analysis of AVR XMEGA crypto engine. Ilya Kizhvatov. Proceedings of WESS 2009.
  120. Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions. Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi. Proceedings of INDOCRYPT 2009.
  121. Cryptanalysis of ISO/IEC 9796-1. Don Coppersmith, Jean-Sébastien Coron, François Grieu, Shai Halevi, Charanjit S. Jutla, David Naccache, Julien P. Stern. J. Cryptology 2008.
  122. A New DPA Countermeasure Based on Permutation Tables. Jean-Sébastien Coron. Proceedings of SCN 2008.
  123. Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform. Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Matthieu Rivain. Proceedings of CHES 2008.
  124. The Random Oracle Model and the Ideal Cipher Model Are Equivalent. Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin. Proceedings of CRYPTO 2008.
  125. Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff. Proceedings of FSE 2008.
  126. On the Exact Success Rate of Side Channel Analysis in the Gaussian Model. Matthieu Rivain. Proceedings of Selected Areas in Cryptography 2008.
  127. Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function. Julien Bringer, Hervé Chabanne, Thomas Icart. Proceedings of SCN 2008.
  128. Cryptanalysis of EC-RAC, a RFID Identification Protocol. Julien Bringer, Hervé Chabanne, Thomas Icart. Proceedings of CANS 2008.
  129. HIP Tags Privacy Architecture. Pascal Urien, Dorice Nyami, Simon Elrharbi, Hervé Chabanne, Thomas Icart, Cyrille Pepin, Mathieu Bouet, Daniel de Oliveira Cunha, Vincent Guyot, Guy Pujolle, Eric Gressier-Soudan, Jean-Ferdy Susini. Proceedings of ICSNC 2008.
  130. Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection. Andrey Bogdanov, Ilya Kizhvatov, Andrei Pyshkin. Proceedings of INDOCRYPT 2008.
  131. Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring. Jean-Sébastien Coron, Alexander May. J. Cryptology 2007.
  132. Side Channel Cryptanalysis of a Higher Order Masking Scheme. Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain. Proceedings of CHES 2007.
  133. On the Implementation of a Fast Prime Generation Algorithm. Christophe Clavier, Jean-Sébastien Coron. Proceedings of CHES 2007.
  134. Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach. Jean-Sébastien Coron. Proceedings of CRYPTO 2007.
  135. A Generic Method for Secure SBox Implementation. Emmanuel Prouff, Matthieu Rivain. Proceedings of WISA 2007.
  136. Index Calculation Attacks on RSA Signature and Encryption. Jean-Sébastien Coron, David Naccache, Yvo Desmedt, Andrew M. Odlyzko, Julien P. Stern. Des. Codes Cryptography 2006.
  137. What Is Cryptography? Jean-Sébastien Coron. IEEE Security & Privacy 2006.
  138. From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited. Julien Cathalo, Jean-Sébastien Coron, David Naccache. Proceedings of Public Key Cryptography 2005.
  139. A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis. Jean-Sébastien Coron, David Lefranc, Guillaume Poupard. Proceedings of CHES 2005.
  140. Merkle-Damgård Revisited: How to Construct a Hash Function. Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya. Proceedings of CRYPTO 2005.
  141. Statistics and secret leakage. Jean-Sébastien Coron, David Naccache, Paul C. Kocher. ACM Trans. Embedded Comput. Syst. 2004.
  142. Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem. Jean-Sébastien Coron. Proceedings of Public Key Cryptography 2004.
  143. Externalized Fingerprint Matching. Claude Barral, Jean-Sébastien Coron, David Naccache. Proceedings of ICBA 2004.
  144. Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95. Jean-Sébastien Coron, David Naccache. Proceedings of CT-RSA 2004.
  145. Finding Small Roots of Bivariate Integer Polynomial Equations Revisited. Jean-Sébastien Coron. Proceedings of EUROCRYPT 2004.
  146. Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption. Jean-Sébastien Coron, David Naccache. Proceedings of ASIACRYPT 2003.
  147. A New Algorithm for Switching from Arithmetic to Boolean Masking. Jean-Sébastien Coron, Alexei Tchulkine. Proceedings of CHES 2003.
  148. Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen. Proceedings of Public Key Cryptography 2002.
  149. GEM: A Generic Chosen-Ciphertext Secure Encryption Method. Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen. Proceedings of CT-RSA 2002.
  150. Optimal Security Proofs for PSS and Other Signature Schemes. Jean-Sébastien Coron. Proceedings of EUROCRYPT 2002.
  151. Security Proof for Partial-Domain Hash Signature Schemes. Jean-Sébastien Coron. Proceedings of CRYPTO 2002.
  152. Universal Padding Schemes for RSA. Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier. Proceedings of CRYPTO 2002.
  153. Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves. Jean-Sébastien Coron, David M'Raïhi, Christophe Tymen. Proceedings of Selected Areas in Cryptography 2001.
  154. Cryptanalysis of RSA Signatures with Fixed-Pattern Padding. Eric Brier, Christophe Clavier, Jean-Sébastien Coron, David Naccache. Proceedings of CRYPTO 2001.
  155. Statistics and Secret Leakage. Jean-Sébastien Coron, Paul C. Kocher, David Naccache. Proceedings of Financial Cryptography 2000.
  156. From Fixed-Length to Arbitrary-Length RSA Padding Schemes. Jean-Sébastien Coron, François Koeune, David Naccache. Proceedings of ASIACRYPT 2000.
  157. Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme. Jean-Sébastien Coron, David Naccache. Proceedings of EUROCRYPT 2000.
  158. New Attacks on PKCS#1 v1.5 Encryption. Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier. Proceedings of EUROCRYPT 2000.
  159. On Boolean and Arithmetic Masking against Differential Power Analysis. Jean-Sébastien Coron, Louis Goubin. Proceedings of CHES 2000.
  160. Differential Power Analysis in the Presence of Hardware Countermeasures. Christophe Clavier, Jean-Sébastien Coron, Nora Dabbous. Proceedings of CHES 2000.
  161. On the Exact Security of Full Domain Hash. Jean-Sébastien Coron. Proceedings of CRYPTO 2000.
  162. On the Security of Random Sources. Jean-Sébastien Coron. Proceedings of Public Key Cryptography 1999.
  163. On the Security of RSA Screening. Jean-Sébastien Coron, David Naccache. Proceedings of Public Key Cryptography 1999.
  164. ECC: Do We Need to Count? Jean-Sébastien Coron, Helena Handschuh, David Naccache. Proceedings of ASIACRYPT 1999.
  165. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. Jean-Sébastien Coron. Proceedings of CHES 1999.
  166. On the Security of RSA Padding. Jean-Sébastien Coron, David Naccache, Julien P. Stern. Proceedings of CRYPTO 1999.
  167. An Accurate Evaluation of Maurer's Universal Test. Jean-Sébastien Coron, David Naccache. Proceedings of Selected Areas in Cryptography 1998.