Applied Crypto Group Publications
- Zeroizing Attacks on Indistinguishability Obfuscation over CLT13. Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi. Proceedings of PKC 2017.
- How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction. Jean-Sébastien Coron, Thomas Holenstein, Robin Künzler, Jacques Patarin, Yannick Seurin, Stefano Tessaro. J. Cryptology 2016.
- Practical Cryptanalysis of ISO 9796-2 and EMV Signatures. Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann. J. Cryptology 2016.
- Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol. Jean-Sébastien Coron. Proceedings of The New Codebreakers 2016.
- Factoring N=p^rq^s for Large r and s. Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun. Proceedings of CT-RSA 2016.
- Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme. Alberto Battistello, Jean-Sébastien Coron, Emmanuel Prouff, Rina Zeitoun. Proceedings of CHES 2016.
- Faster Evaluation of SBoxes via Common Shares. Jean-Sébastien Coron, Aurélien Greuet, Emmanuel Prouff, Rina Zeitoun. Proceedings of CHES 2016.
- Cryptanalysis of GGH15 Multilinear Maps. Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi. Proceedings of CRYPTO 2016.
- Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures. Jean-Sébastien Coron, Arnab Roy, Srinivas Vivek. J. Cryptographic Engineering 2015.
- A Number-Theoretic Error-Correcting Code. Eric Brier, Jean-Sébastien Coron, Rémi Géraud, Diana Maimut, David Naccache. CoRR 2015.
- Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity. Jean-Sébastien Coron, Johann Großschädl, Mehdi Tibouchi, Praveen Kumar Vadnala. Proceedings of FSE 2015.
- Improved Side-Channel Analysis of Finite-Field Multiplication. Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff. Proceedings of CHES 2015.
- A Number-Theoretic Error-Correcting Code. Eric Brier, Jean-Sébastien Coron, Rémi Géraud, Diana Maimut, David Naccache. Proceedings of SECITC 2015.
- Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations. Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi. Proceedings of CRYPTO 2015.
- New Multilinear Maps Over the Integers. Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi. Proceedings of CRYPTO 2015.
- Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives. Olivier Pereira, François-Xavier Standaert, Srinivas Vivek. Proceedings of ACM Conference on Computer and Communications Security 2015.
- Faster Mask Conversion with Lookup Tables. Praveen Kumar Vadnala, Johann Großschädl. Proceedings of COSADE 2015.
- Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON. Junwei Wang, Praveen Kumar Vadnala, Johann Großschädl, Qiuliang Xu. Proceedings of CT-RSA 2015.
- Elliptic curve with Optimal mixed Montgomery-Edwards model for low-end devices. Zhe Liu, Zhi Hu, Wei Wu. SCIENCE CHINA Information Sciences 2015.
- The impact of social cloud reputation and structure on rational computation. Yilei Wang, Tao Li, Qianqian Liu, Jing Sun, Zhe Liu. J. High Speed Networks 2015.
- Optimized Karatsuba squaring on 8-bit AVR processors. Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim. Security and Communication Networks 2015.
- Karatsuba-Block-Comb technique for elliptic curve cryptography over binary fields. Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim. Security and Communication Networks 2015.
- Performance evaluation of twisted Edwards-form elliptic curve cryptography for wireless sensor nodes. Zhe Liu, Hwajeong Seo, Qiuliang Xu. Security and Communication Networks 2015.
- Montgomery multiplication and squaring for Optimal Prime Fields. Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim. Computers & Security 2015.
- Faster ECC over \mathbb F_2^521-1 F 2 521 - 1 (feat. NEON). Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Lu Zhou, Howon Kim. Proceedings of ICISC 2015.
- Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks. Zhe Liu, Hwajeong Seo, Zhi Hu, Xinyi Huang, Johann Großschädl. Proceedings of ASIACCS 2015.
- Efficient Ring-LWE Encryption on 8-Bit AVR Processors. Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede. Proceedings of CHES 2015.
- Compact Implementations of LSH. Taehwan Park, Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim. Proceedings of WISA 2015.
- Open Sesame! Hacking the Password. Hwajeong Seo, Zhe Liu, Gyuwon Seo, Taehwan Park, Jongseok Choi, Howon Kim. Proceedings of WISA 2015.
- Secure Binary Field Multiplication. Hwajeong Seo, Chien-Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim. Proceedings of WISA 2015.
- Compact Implementations of LEA Block Cipher for Low-End Microprocessors. Hwajeong Seo, Zhe Liu, Jongseok Choi, Taehwan Park, Howon Kim. Proceedings of WISA 2015.
- Introduction to the CHES 2013 special issue. Guido Bertoni, Jean-Sébastien Coron. J. Cryptographic Engineering 2014.
- Scale-Invariant Fully Homomorphic Encryption over the Integers. Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi. Proceedings of Public Key Cryptography 2014.
- Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences. Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun. Proceedings of Public Key Cryptography 2014.
- Higher Order Masking of Look-Up Tables. Jean-Sébastien Coron. Proceedings of EUROCRYPT 2014.
- Secure Conversion between Boolean and Arithmetic Masking of Any Order. Jean-Sébastien Coron, Johann Großschädl, Praveen Kumar Vadnala. Proceedings of CHES 2014.
- Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures. Jean-Sébastien Coron, Arnab Roy, Srinivas Vivek. Proceedings of CHES 2014.
- Cubic Sieve Congruence of the Discrete Logarithm Problem, and fractional part sequences. Srinivas Vivek, C. E. Veni Madhavan. J. Symb. Comput. 2014.
- Limits of a conjecture on a leakage-resilient cryptosystem. David Galindo, Srinivas Vivek. Inf. Process. Lett. 2014.
- New rational parties relying on reputation. Yilei Wang, Zhe Liu, Qiuliang Xu. Security and Communication Networks 2014.
- Social rational secure multi-party computation. Yilei Wang, Zhe Liu, Hao Wang, Qiuliang Xu. Concurrency and Computation: Practice and Experience 2014.
- Small Private Key MQPKS on an Embedded Microprocessor. Hwajeong Seo, Jihyun Kim, Jongseok Choi, Taehwan Park, Zhe Liu, Howon Kim. Sensors 2014.
- MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks. Zhe Liu, Erich Wenger, Johann Großschädl. Proceedings of ACNS 2014.
- Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks. Yang Yang, Zhi Guan, Zhe Liu, Zhong Chen. Proceedings of ICICS 2014.
- Reverse Product-Scanning Multiplication and Squaring on 8-Bit AVR Processors. Zhe Liu, Hwajeong Seo, Johann Großschädl, Howon Kim. Proceedings of ICICS 2014.
- Montgomery Modular Multiplication on ARM-NEON Revisited. Hwajeong Seo, Zhe Liu, Johann Großschädl, Jongseok Choi, Howon Kim. Proceedings of ICISC 2014.
- High-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit. Shujie Cui, Johann Großschädl, Zhe Liu, Qiuliang Xu. Proceedings of ISPEC 2014.
- Rational Secure Two-party Computation in Social Cloud. Yilei Wang, Zhe Liu, Tao Li, Qiuliang Xu. Proceedings of NSS 2014.
- Improved Modular Multiplication for Optimal Prime Fields. Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim. Proceedings of WISA 2014.
- New Speed Records for Montgomery Modular Multiplication on 8-Bit AVR Microcontrollers. Zhe Liu, Johann Großschädl. Proceedings of AFRICACRYPT 2014.
- A Note on the Bivariate Coppersmith Theorem. Jean-Sébastien Coron, Alexey Kirichenko, Mehdi Tibouchi. J. Cryptology 2013.
- Higher-Order Side Channel Security and Mask Refreshing. Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche. Proceedings of FSE 2013.
- Batch Fully Homomorphic Encryption over the Integers. Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, Aaram Yun. Proceedings of EUROCRYPT 2013.
- Practical Multilinear Maps over the Integers. Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi. Proceedings of CRYPTO 2013.
- Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012. Arnab Roy, Srinivas Vivek. Proceedings of CHES 2013.
- A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme. David Galindo, Srinivas Vivek. Proceedings of IMA Int. Conf. 2013.
- Algorithms for Switching between Boolean and Arithmetic Masking of Second Order. Praveen Kumar Vadnala, Johann Großschädl. Proceedings of SPACE 2013.
- A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES. Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Zhe Liu, Jean-François Gallais. Computers & Security 2013.
- Fixed-Base Comb with Window-Non-Adjacent Form (NAF) Method for Scalar Multiplication. Hwajeong Seo, Hyunjin Kim, Taehwan Park, Yeoncheol Lee, Zhe Liu, Howon Kim. Sensors 2013.
- Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes. Zhe Liu, Hwajeong Seo, Johann Großschädl, Howon Kim. Proceedings of ICICS 2013.
- Parallel Implementations of LEA. Hwajeong Seo, Zhe Liu, Taehwan Park, Hyunjin Kim, Yeoncheol Lee, Jongseok Choi, Howon Kim. Proceedings of ICISC 2013.
- Twisted edwards-form elliptic curve cryptography for 8-bit AVR-based sensor nodes. Dalin Chu, Johann Großschädl, Zhe Liu, Volker Müller, Yang Zhang. Proceedings of AsiaPKC@AsiaCCS 2013.
- Fair Computation with Tit-for-Tat Strategy. Yilei Wang, Qiuliang Xu, Zhe Liu. Proceedings of INCoS 2013.
- Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors. Zhe Liu, Johann Großschädl, Duncan S. Wong. Proceedings of Inscrypt 2013.
- Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors. Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim. Proceedings of INDOCRYPT 2013.
- Conversion of Security Proofs from One Leakage Model to Another: A New Issue. Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Soline Renner, Matthieu Rivain, Praveen Kumar Vadnala. Proceedings of COSADE 2012.
- Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping. Jean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier. Proceedings of Cryptography and Security 2012.
- On the Use of Shamir's Secret Sharing against Side-Channel Analysis. Jean-Sébastien Coron, Emmanuel Prouff, Thomas Roche. Proceedings of CARDIS 2012.
- Another Look at Affine-Padding RSA Signatures. Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi. Proceedings of ICISC 2012.
- Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers. Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi. Proceedings of EUROCRYPT 2012.
- On the energy cost of authenticated key agreement in wireless sensor networks. David Galindo, Rodrigo Roman, Javier Lopez. Wireless Communications and Mobile Computing 2012.
- A Practical Leakage-Resilient Signature Scheme in the Generic Group Model. David Galindo, Srinivas Vivek. Proceedings of Selected Areas in Cryptography 2012.
- Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience. David Galindo, Javier Herranz, Jorge L. Villar. Proceedings of ESORICS 2012.
- Extended Security Arguments for Signature Schemes. Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo, Pierre-Louis Cayrel. Proceedings of AFRICACRYPT 2012.
- On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction. Avradip Mandal, Jacques Patarin, Yannick Seurin. Proceedings of TCC 2012.
- Multi-party Computation with Social Rational Parties. Yilei Wang, Qiuliang Xu, Zhe Liu. Proceedings of INCoS 2012.
- Cryptanalysis of the RSA Subgroup Assumption from TCC 2005. Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi. Proceedings of Public Key Cryptography 2011.
- Improved Generic Algorithms for Hard Knapsacks. Anja Becker, Jean-Sébastien Coron, Antoine Joux. Proceedings of EUROCRYPT 2011.
- Fully Homomorphic Encryption over the Integers with Shorter Public Keys. Jean-Sébastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi. Proceedings of CRYPTO 2011.
- Non-interactive distributed encryption: a new primitive for revocable privacy. Jaap-Henk Hoepman, David Galindo. Proceedings of WPES 2011.
- Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF. Alex Biryukov, Ilya Kizhvatov, Bin Zhang. Proceedings of ACNS 2011.
- On the Impossibility of Instantiating PSS in the Standard Model. Rishiraj Bhattacharyya, Avradip Mandal. Proceedings of Public Key Cryptography 2011.
- On the Indifferentiability of Fugue and Luffa. Rishiraj Bhattacharyya, Avradip Mandal. Proceedings of ACNS 2011.
- SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications. Jean-Sébastien Coron, Aline Gouget, Pascal Paillier, Karine Villegas. Proceedings of Financial Cryptography Workshops 2010.
- On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption. Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud. Proceedings of ACNS 2010.
- A Domain Extender for the Ideal Cipher. Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin. Proceedings of TCC 2010.
- Secure Delegation of Elliptic-Curve Pairing. Benoît Chevallier-Mames, Jean-Sébastien Coron, Noel McCullagh, David Naccache, Michael Scott. Proceedings of CARDIS 2010.
- Fault Attacks Against emv Signatures. Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi. Proceedings of CT-RSA 2010.
- Analysis and Improvement of the Random Delay Countermeasure of CHES 2009. Jean-Sébastien Coron, Ilya Kizhvatov. Proceedings of CHES 2010.
- Efficient Indifferentiable Hashing into Ordinary Elliptic Curves. Eric Brier, Jean-Sébastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi. Proceedings of CRYPTO 2010.
- Fault Attacks and Countermeasures on Vigilant's RSA-CRT Algorithm. Jean-Sébastien Coron, Christophe Giraud, Nicolas Morin, Gilles Piret, David Vigilant. Proceedings of FDTC 2010.
- Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters. Julien Bringer, Hervé Chabanne, Thomas Icart. Proceedings of ACNS 2010.
- On the generic construction of identity-based signatures with additional properties. David Galindo, Javier Herranz, Eike Kiltz. Adv. in Math. of Comm. 2010.
- Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman. David Galindo. Proceedings of Pairing 2010.
- Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions. David Galindo, Benoît Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis, Dominique Schröder. Proceedings of AFRICACRYPT 2010.
- Combined Implementation Attack Resistant Exponentiation. Jörn-Marc Schmidt, Michael Tunstall, Roberto Maria Avanzi, Ilya Kizhvatov, Timo Kasper, David Oswald. Proceedings of LATINCRYPT 2010.
- Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices. Johann Großschädl, Ilya Kizhvatov. Proceedings of CANS 2010.
- Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations. Jean-François Gallais, Ilya Kizhvatov, Michael Tunstall. Proceedings of WISA 2010.
- Security Analysis of the Mode of JH Hash Function. Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi. Proceedings of FSE 2010.
- Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations. Avradip Mandal, Jacques Patarin, Valérie Nachef. Proceedings of INDOCRYPT 2010.
- A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model. Jean-Sébastien Coron. Des. Codes Cryptography 2009.
- Analysis of the split mask countermeasure for embedded systems. Jean-Sébastien Coron, Ilya Kizhvatov. Proceedings of WESS 2009.
- PSS Is Secure against Random Fault Attacks. Jean-Sébastien Coron, Avradip Mandal. Proceedings of ASIACRYPT 2009.
- Fault Attacks on RSA Signatures with Partially Unknown Messages. Jean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier. Proceedings of CHES 2009.
- An Efficient Method for Random Delay Generation in Embedded Software. Jean-Sébastien Coron, Ilya Kizhvatov. Proceedings of CHES 2009.
- Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures. Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann. Proceedings of CRYPTO 2009.
- Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis. Emmanuel Prouff, Matthieu Rivain. Proceedings of ACNS 2009.
- On Second-Order Fault Analysis Resistance for CRT-RSA Implementations. Emmanuelle Dottax, Christophe Giraud, Matthieu Rivain, Yannick Sierra. Proceedings of WISTP 2009.
- Securing RSA against Fault Analysis by Double Addition Chain Exponentiation. Matthieu Rivain. Proceedings of CT-RSA 2009.
- Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers. Matthieu Rivain, Emmanuel Prouff, Julien Doget. Proceedings of CHES 2009.
- Differential Fault Analysis on DES Middle Rounds. Matthieu Rivain. Proceedings of CHES 2009.
- Efficient zero-knowledge identification schemes which respect privacy. Julien Bringer, Hervé Chabanne, Thomas Icart. Proceedings of ASIACCS 2009.
- How to Hash into Elliptic Curves. Thomas Icart. Proceedings of CRYPTO 2009.
- On Physical Obfuscation of Cryptographic Algorithms. Julien Bringer, Hervé Chabanne, Thomas Icart. Proceedings of INDOCRYPT 2009.
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles. Eike Kiltz, David Galindo. Theor. Comput. Sci. 2009.
- Improved identity-based identification using correcting codes Pierre-Louis Cayrel, Philippe Gaborit, David Galindo, Marc Girault. CoRR 2009.
- Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening. David Galindo. Proceedings of CT-RSA 2009.
- A Schnorr-Like Lightweight Identity-Based Signature Scheme. David Galindo, Flavio D. Garcia. Proceedings of AFRICACRYPT 2009.
- Side channel analysis of AVR XMEGA crypto engine. Ilya Kizhvatov. Proceedings of WESS 2009.
- Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions. Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi. Proceedings of INDOCRYPT 2009.
- Cryptanalysis of ISO/IEC 9796-1. Don Coppersmith, Jean-Sébastien Coron, François Grieu, Shai Halevi, Charanjit S. Jutla, David Naccache, Julien P. Stern. J. Cryptology 2008.
- A New DPA Countermeasure Based on Permutation Tables. Jean-Sébastien Coron. Proceedings of SCN 2008.
- Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform. Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Matthieu Rivain. Proceedings of CHES 2008.
- The Random Oracle Model and the Ideal Cipher Model Are Equivalent. Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin. Proceedings of CRYPTO 2008.
- Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff. Proceedings of FSE 2008.
- On the Exact Success Rate of Side Channel Analysis in the Gaussian Model. Matthieu Rivain. Proceedings of Selected Areas in Cryptography 2008.
- Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function. Julien Bringer, Hervé Chabanne, Thomas Icart. Proceedings of SCN 2008.
- Cryptanalysis of EC-RAC, a RFID Identification Protocol. Julien Bringer, Hervé Chabanne, Thomas Icart. Proceedings of CANS 2008.
- HIP Tags Privacy Architecture. Pascal Urien, Dorice Nyami, Simon Elrharbi, Hervé Chabanne, Thomas Icart, Cyrille Pepin, Mathieu Bouet, Daniel de Oliveira Cunha, Vincent Guyot, Guy Pujolle, Eric Gressier-Soudan, Jean-Ferdy Susini. Proceedings of ICSNC 2008.
- Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection. Andrey Bogdanov, Ilya Kizhvatov, Andrei Pyshkin. Proceedings of INDOCRYPT 2008.
- Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring. Jean-Sébastien Coron, Alexander May. J. Cryptology 2007.
- Side Channel Cryptanalysis of a Higher Order Masking Scheme. Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain. Proceedings of CHES 2007.
- On the Implementation of a Fast Prime Generation Algorithm. Christophe Clavier, Jean-Sébastien Coron. Proceedings of CHES 2007.
- Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach. Jean-Sébastien Coron. Proceedings of CRYPTO 2007.
- A Generic Method for Secure SBox Implementation. Emmanuel Prouff, Matthieu Rivain. Proceedings of WISA 2007.
- Index Calculation Attacks on RSA Signature and Encryption. Jean-Sébastien Coron, David Naccache, Yvo Desmedt, Andrew M. Odlyzko, Julien P. Stern. Des. Codes Cryptography 2006.
- What Is Cryptography? Jean-Sébastien Coron. IEEE Security & Privacy 2006.
- From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited. Julien Cathalo, Jean-Sébastien Coron, David Naccache. Proceedings of Public Key Cryptography 2005.
- A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis. Jean-Sébastien Coron, David Lefranc, Guillaume Poupard. Proceedings of CHES 2005.
- Merkle-Damgård Revisited: How to Construct a Hash Function. Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya. Proceedings of CRYPTO 2005.
- Statistics and secret leakage. Jean-Sébastien Coron, David Naccache, Paul C. Kocher. ACM Trans. Embedded Comput. Syst. 2004.
- Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem. Jean-Sébastien Coron. Proceedings of Public Key Cryptography 2004.
- Externalized Fingerprint Matching. Claude Barral, Jean-Sébastien Coron, David Naccache. Proceedings of ICBA 2004.
- Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95. Jean-Sébastien Coron, David Naccache. Proceedings of CT-RSA 2004.
- Finding Small Roots of Bivariate Integer Polynomial Equations Revisited. Jean-Sébastien Coron. Proceedings of EUROCRYPT 2004.
- Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption. Jean-Sébastien Coron, David Naccache. Proceedings of ASIACRYPT 2003.
- A New Algorithm for Switching from Arithmetic to Boolean Masking. Jean-Sébastien Coron, Alexei Tchulkine. Proceedings of CHES 2003.
- Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen. Proceedings of Public Key Cryptography 2002.
- GEM: A Generic Chosen-Ciphertext Secure Encryption Method. Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen. Proceedings of CT-RSA 2002.
- Optimal Security Proofs for PSS and Other Signature Schemes. Jean-Sébastien Coron. Proceedings of EUROCRYPT 2002.
- Security Proof for Partial-Domain Hash Signature Schemes. Jean-Sébastien Coron. Proceedings of CRYPTO 2002.
- Universal Padding Schemes for RSA. Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier. Proceedings of CRYPTO 2002.
- Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves. Jean-Sébastien Coron, David M'Raïhi, Christophe Tymen. Proceedings of Selected Areas in Cryptography 2001.
- Cryptanalysis of RSA Signatures with Fixed-Pattern Padding. Eric Brier, Christophe Clavier, Jean-Sébastien Coron, David Naccache. Proceedings of CRYPTO 2001.
- Statistics and Secret Leakage. Jean-Sébastien Coron, Paul C. Kocher, David Naccache. Proceedings of Financial Cryptography 2000.
- From Fixed-Length to Arbitrary-Length RSA Padding Schemes. Jean-Sébastien Coron, François Koeune, David Naccache. Proceedings of ASIACRYPT 2000.
- Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme. Jean-Sébastien Coron, David Naccache. Proceedings of EUROCRYPT 2000.
- New Attacks on PKCS#1 v1.5 Encryption. Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier. Proceedings of EUROCRYPT 2000.
- On Boolean and Arithmetic Masking against Differential Power Analysis. Jean-Sébastien Coron, Louis Goubin. Proceedings of CHES 2000.
- Differential Power Analysis in the Presence of Hardware Countermeasures. Christophe Clavier, Jean-Sébastien Coron, Nora Dabbous. Proceedings of CHES 2000.
- On the Exact Security of Full Domain Hash. Jean-Sébastien Coron. Proceedings of CRYPTO 2000.
- On the Security of Random Sources. Jean-Sébastien Coron. Proceedings of Public Key Cryptography 1999.
- On the Security of RSA Screening. Jean-Sébastien Coron, David Naccache. Proceedings of Public Key Cryptography 1999.
- ECC: Do We Need to Count? Jean-Sébastien Coron, Helena Handschuh, David Naccache. Proceedings of ASIACRYPT 1999.
- Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. Jean-Sébastien Coron. Proceedings of CHES 1999.
- On the Security of RSA Padding. Jean-Sébastien Coron, David Naccache, Julien P. Stern. Proceedings of CRYPTO 1999.
- An Accurate Evaluation of Maurer's Universal Test. Jean-Sébastien Coron, David Naccache. Proceedings of Selected Areas in Cryptography 1998.