Naccache, David; Yifrach-Stav, Ofer On Catalan constant continued fractions. (English) Zbl 07745627 El Hajji, Said (ed.) et al., Codes, cryptology and information security. 4th international conference, C2SI 2023, Rabat, Morocco, May 29–31, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13874, 43-54 (2023). MSC: 11Y65 11Y60 PDFBibTeX XMLCite \textit{D. Naccache} and \textit{O. Yifrach-Stav}, Lect. Notes Comput. Sci. 13874, 43--54 (2023; Zbl 07745627) Full Text: DOI arXiv
Naccache, David; Yifrach-Stav, Ofer The Balkans Continued Fraction. arXiv:2308.06291 Preprint, arXiv:2308.06291 [math.NT] (2023). BibTeX Cite \textit{D. Naccache} and \textit{O. Yifrach-Stav}, ``The Balkans Continued Fraction'', Preprint, arXiv:2308.06291 [math.NT] (2023) Full Text: arXiv OA License
Naccache, David; Yifrach-Stav, Ofer Pattern Recognition Experiments on Mathematical Expressions. arXiv:2301.01624 Preprint, arXiv:2301.01624 [math.NT] (2022). BibTeX Cite \textit{D. Naccache} and \textit{O. Yifrach-Stav}, ``Pattern Recognition Experiments on Mathematical Expressions'', Preprint, arXiv:2301.01624 [math.NT] (2022) Full Text: arXiv OA License
Brier, Eric; Naccache, David; Yifrach-Stav, Ofer A Note on the Ramanujan Machine. arXiv:2211.01058 Preprint, arXiv:2211.01058 [math.NT] (2022). BibTeX Cite \textit{E. Brier} et al., ``A Note on the Ramanujan Machine'', Preprint, arXiv:2211.01058 [math.NT] (2022) Full Text: arXiv OA License
Barral, Hadrien; Géraud-Stewart, Rémi; Léonard, Arthur; Naccache, David; Vermande, Quentin; Vivien, Samuel Automated Discovery of New \(L\)-Function Relations. arXiv:2206.03604 Preprint, arXiv:2206.03604 [math.NT] (2022). BibTeX Cite \textit{H. Barral} et al., ``Automated Discovery of New $L$-Function Relations'', Preprint, arXiv:2206.03604 [math.NT] (2022) Full Text: arXiv OA License
Joye, Marc; Lapiha, Oleksandra; Nguyen, Ky; Naccache, David The eleventh power residue symbol. (English) Zbl 1472.11030 J. Math. Cryptol. 15, 111-122 (2021). MSC: 11A15 11R18 11Y40 11T71 PDFBibTeX XMLCite \textit{M. Joye} et al., J. Math. Cryptol. 15, 111--122 (2021; Zbl 1472.11030) Full Text: DOI
Brier, Eric; Clavier, Christophe; Gutsche, Linda; Naccache, David The Multiplicative Persistence Conjecture Is True for Odd Targets. arXiv:2110.04263 Preprint, arXiv:2110.04263 [math.NT] (2021). BibTeX Cite \textit{E. Brier} et al., ``The Multiplicative Persistence Conjecture Is True for Odd Targets'', Preprint, arXiv:2110.04263 [math.NT] (2021) Full Text: arXiv OA License
Mächler, Leon; Naccache, David Explaining the Entombed Algorithm. arXiv:2104.09982 Preprint, arXiv:2104.09982 [cs.CG] (2021). BibTeX Cite \textit{L. Mächler} and \textit{D. Naccache}, ``Explaining the Entombed Algorithm'', Preprint, arXiv:2104.09982 [cs.CG] (2021) Full Text: arXiv OA License
Brier, Éric; Ferradi, Houda; Joye, Marc; Naccache, David New number-theoretic cryptographic primitives. (English) Zbl 1465.94059 J. Math. Cryptol. 14, 224-235 (2020). Reviewer: Jaak Henno (Tallinn) MSC: 94A60 11T71 11A15 11R18 PDFBibTeX XMLCite \textit{É. Brier} et al., J. Math. Cryptol. 14, 224--235 (2020; Zbl 1465.94059) Full Text: DOI
Géraud-Stewart, Rémi; Lombard-Platet, Marius; Naccache, David Approaching optimal duplicate detection in a sliding window. (English) Zbl 07336095 Kim, Donghyun (ed.) et al., Computing and combinatorics. 26th international conference, COCOON 2020, Atlanta, GA, USA, August 29–31, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12273, 64-84 (2020). MSC: 68Rxx PDFBibTeX XMLCite \textit{R. Géraud-Stewart} et al., Lect. Notes Comput. Sci. 12273, 64--84 (2020; Zbl 07336095) Full Text: DOI arXiv
Ferradi, Houda; Géraud, Rémi; Guilley, Sylvain; Naccache, David; Tibouchi, Mehdi Recovering secrets from prefix-dependent leakage. (English) Zbl 1448.94243 J. Math. Cryptol. 14, 15-24 (2020). MSC: 94A62 11T71 PDFBibTeX XMLCite \textit{H. Ferradi} et al., J. Math. Cryptol. 14, 15--24 (2020; Zbl 1448.94243) Full Text: DOI
Brier, Éric; Géraud-Stewart, Rémi; Naccache, David A Fractional \(3n+1\) Conjecture. arXiv:2006.11634 Preprint, arXiv:2006.11634 [math.DS] (2020). BibTeX Cite \textit{É. Brier} et al., ``A Fractional $3n+1$ Conjecture'', Preprint, arXiv:2006.11634 [math.DS] (2020) Full Text: arXiv OA License
Brier, Éric; Géraud-Stewart, Rémi; Naccache, David; Pacco, Alessandro; Troiani, Emanuele The Look-and-Say The Biggest Sequence Eventually Cycles. arXiv:2006.07246 Preprint, arXiv:2006.07246 [math.DS] (2020). BibTeX Cite \textit{É. Brier} et al., ``The Look-and-Say The Biggest Sequence Eventually Cycles'', Preprint, arXiv:2006.07246 [math.DS] (2020) Full Text: arXiv OA License
Brier, Éric; Géraud-Stewart, Rémi; Naccache, David; Pacco, Alessandro; Troiani, Emanuele Stuttering Conway Sequences Are Still Conway Sequences. arXiv:2006.06837 Preprint, arXiv:2006.06837 [math.DS] (2020). BibTeX Cite \textit{É. Brier} et al., ``Stuttering Conway Sequences Are Still Conway Sequences'', Preprint, arXiv:2006.06837 [math.DS] (2020) Full Text: arXiv OA License
Ferradi, Houda; Naccache, David Integer reconstruction public-key encryption. (English) Zbl 1457.94128 Mu, Yi (ed.) et al., Cryptology and network security. 18th international conference, CANS 2019, Fuzhou, China, October 25–27, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11829, 412-433 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Ferradi} and \textit{D. Naccache}, Lect. Notes Comput. Sci. 11829, 412--433 (2019; Zbl 1457.94128) Full Text: DOI
Beunardeau, Marc; Connolly, Aisling; Géraud, Rémi; Naccache, David On the hardness of the Mersenne Low Hamming Ratio assumption. (English) Zbl 1454.94050 Lange, Tanja (ed.) et al., Progress in cryptology – LATINCRYPT 2017. 5th international conference on cryptology and information security in Latin America, Havana, Cuba, September 20–22, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11368, 166-174 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Beunardeau} et al., Lect. Notes Comput. Sci. 11368, 166--174 (2019; Zbl 1454.94050) Full Text: DOI
Géraud, Rémi; Naccache, David; Roşie, Răzvan Robust encryption (extended). (English) Zbl 1509.94090 Matsui, Mitsuru (ed.), Topics in cryptology – CT-RSA 2019. The cryptographers’ track at the RSA conference 2019, San Francisco, CA, USA, March 4–8, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11405, 149-168 (2019). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{R. Géraud} et al., Lect. Notes Comput. Sci. 11405, 149--168 (2019; Zbl 1509.94090) Full Text: DOI
Liu, Weiran; Liu, Jianwei; Wu, Qianhong; Qin, Bo; Naccache, David; Ferradi, Houda Efficient subtree-based encryption for fuzzy-entity data sharing. (English) Zbl 1402.68056 Soft Comput. 22, No. 23, 7961-7976 (2018). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{W. Liu} et al., Soft Comput. 22, No. 23, 7961--7976 (2018; Zbl 1402.68056) Full Text: DOI
Naccache, David (ed.); Xu, Shouhuai (ed.); Qing, Sihan (ed.); Samarati, Pierangela (ed.); Blanc, Gregory (ed.); Lu, Rongxing (ed.); Zhang, Zonghua (ed.); Meddahi, Ahmed (ed.) Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. (English) Zbl 1398.68037 Lecture Notes in Computer Science 11149. Cham: Springer (ISBN 978-3-030-01949-5/pbk; 978-3-030-01950-1/ebook). xv, 818 p. (2018). MSC: 68-06 68P25 94A60 00B25 PDFBibTeX XMLCite \textit{D. Naccache} (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29--31, 2018. Proceedings. Cham: Springer (2018; Zbl 1398.68037) Full Text: DOI
Ferradi, Houda; Géraud, Rémi; Maimuţ, Diana; Naccache, David; Zhou, Hang Backtracking-assisted multiplication. (English) Zbl 1384.68008 Cryptogr. Commun. 10, No. 1, 17-26 (2018). MSC: 68M07 68W40 94A60 PDFBibTeX XMLCite \textit{H. Ferradi} et al., Cryptogr. Commun. 10, No. 1, 17--26 (2018; Zbl 1384.68008) Full Text: DOI
Beunardeau, Marc; Connolly, Aisling; Ferradi, Houda; Géraud, Rémi; Naccache, David; Vergnaud, Damien Reusing nonces in Schnorr signatures (and keeping it secure...). (English) Zbl 1500.94065 Foley, Simon N. (ed.) et al., Computer security – ESORICS 2017. 22nd European symposium on research in computer security, Oslo, Norway, September 11–15, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10492, 224-241 (2017). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{M. Beunardeau} et al., Lect. Notes Comput. Sci. 10492, 224--241 (2017; Zbl 1500.94065) Full Text: DOI
Benhamouda, Fabrice; Ferradi, Houda; Géraud, Rémi; Naccache, David Non-interactive provably secure attestations for arbitrary RSA prime generation algorithms. (English) Zbl 1500.94018 Foley, Simon N. (ed.) et al., Computer security – ESORICS 2017. 22nd European symposium on research in computer security, Oslo, Norway, September 11–15, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10492, 206-223 (2017). MSC: 94A60 68Q10 PDFBibTeX XMLCite \textit{F. Benhamouda} et al., Lect. Notes Comput. Sci. 10492, 206--223 (2017; Zbl 1500.94018) Full Text: DOI
Ferradi, Houda; Géraud, Rémi; Naccache, David Human public-key encryption. (English) Zbl 1410.94066 Phan, Raphael C.-W. (ed.) et al., Paradigms in cryptology – Mycrypt 2016. Malicious and exploratory cryptology. Second international conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1–2, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10311, 494-505 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Ferradi} et al., Lect. Notes Comput. Sci. 10311, 494--505 (2017; Zbl 1410.94066) Full Text: DOI
Beunardeau, Marc; Ferradi, Houda; Géraud, Rémi; Naccache, David Honey encryption for language. Robbing Shannon to pay Turing? (English) Zbl 1410.94046 Phan, Raphael C.-W. (ed.) et al., Paradigms in cryptology – Mycrypt 2016. Malicious and exploratory cryptology. Second international conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1–2, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10311, 127-144 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Beunardeau} et al., Lect. Notes Comput. Sci. 10311, 127--144 (2017; Zbl 1410.94046) Full Text: DOI
Ferradi, Houda; Géraud, Rémi; Maimut, Diana; Naccache, David; Pointcheval, David Legally fair contract signing without keystones. (English) Zbl 1346.94142 Manulis, Mark (ed.) et al., Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19–22, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). Lecture Notes in Computer Science 9696, 175-190 (2016). MSC: 94A62 PDFBibTeX XMLCite \textit{H. Ferradi} et al., Lect. Notes Comput. Sci. 9696, 175--190 (2016; Zbl 1346.94142) Full Text: DOI Link
Coron, Jean-Sébastien; Naccache, David; Tibouchi, Mehdi; Weinmann, Ralf-Philipp Practical cryptanalysis of ISO 9796-2 and EMV signatures. (English) Zbl 1348.94040 J. Cryptology 29, No. 3, 632-656 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{J.-S. Coron} et al., J. Cryptology 29, No. 3, 632--656 (2016; Zbl 1348.94040) Full Text: DOI
Ferradi, Houda; Géraud, Rémi; Naccache, David Slow motion zero knowledge identifying with colliding commitments. (English) Zbl 1409.94872 Lin, Dongdai (ed.) et al., Information security and cryptology. 11th international conference, Inscrypt 2015, Beijing, China, November 1–3, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9589, 381-396 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Ferradi} et al., Lect. Notes Comput. Sci. 9589, 381--396 (2016; Zbl 1409.94872) Full Text: DOI
Fouque, Pierre-Alain; Guilley, Sylvain; Murdica, Cédric; Naccache, David Safe-errors on SPA protected implementations with the atomicity technique. (English) Zbl 1405.94062 Ryan, Peter Y. A. (ed.) et al., The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday. Berlin: Springer (ISBN 978-3-662-49300-7/pbk; 978-3-662-49301-4/ebook). Lecture Notes in Computer Science 9100, 479-493 (2016). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{P.-A. Fouque} et al., Lect. Notes Comput. Sci. 9100, 479--493 (2016; Zbl 1405.94062) Full Text: DOI
Danger, Jean-Luc; Guilley, Sylvain; Hoogvorst, Philippe; Murdica, Cédric; Naccache, David Improving the Big Mac attack on elliptic curve cryptography. (English) Zbl 1405.94056 Ryan, Peter Y. A. (ed.) et al., The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday. Berlin: Springer (ISBN 978-3-662-49300-7/pbk; 978-3-662-49301-4/ebook). Lecture Notes in Computer Science 9100, 374-386 (2016). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{J.-L. Danger} et al., Lect. Notes Comput. Sci. 9100, 374--386 (2016; Zbl 1405.94056) Full Text: DOI
Dutertre, Jean-Max; Mirbaha, Amir-Pasha; Naccache, David; Tria, Assia Photonic power firewalls. (English) Zbl 1405.94061 Ryan, Peter Y. A. (ed.) et al., The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday. Berlin: Springer (ISBN 978-3-662-49300-7/pbk; 978-3-662-49301-4/ebook). Lecture Notes in Computer Science 9100, 342-354 (2016). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J.-M. Dutertre} et al., Lect. Notes Comput. Sci. 9100, 342--354 (2016; Zbl 1405.94061) Full Text: DOI
Chevalier, Céline; Gaumont, Damien; Naccache, David; Do Canto, Rodrigo Portella How to (carefully) breach a service contract? (English) Zbl 1405.94052 Ryan, Peter Y. A. (ed.) et al., The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday. Berlin: Springer (ISBN 978-3-662-49300-7/pbk; 978-3-662-49301-4/ebook). Lecture Notes in Computer Science 9100, 166-173 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Chevalier} et al., Lect. Notes Comput. Sci. 9100, 166--173 (2016; Zbl 1405.94052) Full Text: DOI
Amarilli, Antoine; Beunardeau, Marc; Géraud, Rémi; Naccache, David Failure is also an option. (English) Zbl 1405.94040 Ryan, Peter Y. A. (ed.) et al., The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday. Berlin: Springer (ISBN 978-3-662-49300-7/pbk; 978-3-662-49301-4/ebook). Lecture Notes in Computer Science 9100, 161-165 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Amarilli} et al., Lect. Notes Comput. Sci. 9100, 161--165 (2016; Zbl 1405.94040) Full Text: DOI Link
Géraud, Rémi; Maimuţ, Diana; Naccache, David Double-speed Barrett moduli. (English) Zbl 1405.94065 Ryan, Peter Y. A. (ed.) et al., The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday. Berlin: Springer (ISBN 978-3-662-49300-7/pbk; 978-3-662-49301-4/ebook). Lecture Notes in Computer Science 9100, 148-158 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Géraud} et al., Lect. Notes Comput. Sci. 9100, 148--158 (2016; Zbl 1405.94065) Full Text: DOI
do Canto, Rodrigo Portella; Korkikian, Roman; Naccache, David Buying AES design resistance with speed and energy. (English) Zbl 1405.94098 Ryan, Peter Y. A. (ed.) et al., The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday. Berlin: Springer (ISBN 978-3-662-49300-7/pbk; 978-3-662-49301-4/ebook). Lecture Notes in Computer Science 9100, 134-147 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{R. P. do Canto} et al., Lect. Notes Comput. Sci. 9100, 134--147 (2016; Zbl 1405.94098) Full Text: DOI Link
Ryan, Peter Y. A. (ed.); Naccache, David (ed.); Quisquater, Jean-Jacques (ed.) The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday. (English) Zbl 1334.94030 Lecture Notes in Computer Science 9100. Berlin: Springer (ISBN 978-3-662-49300-7/pbk; 978-3-662-49301-4/ebook). xiv, 551 p. (2016). MSC: 94-06 94A60 00B30 PDFBibTeX XMLCite \textit{P. Y. A. Ryan} (ed.) et al., The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday. Berlin: Springer (2016; Zbl 1334.94030) Full Text: DOI
Reiter, Michael (ed.); Naccache, David (ed.) Cryptology and network security. 14th international conference, CANS 2015, Marrakesh, Morocco, December 10–12, 2015. Proceedings. (English) Zbl 1325.68022 Lecture Notes in Computer Science 9476. Cham: Springer (ISBN 978-3-319-26822-4/pbk; 978-3-319-26823-1/ebook). x, 257 p. (2015). MSC: 68-06 94-06 68P25 94A60 94A62 00B25 PDFBibTeX XMLCite \textit{M. Reiter} (ed.) and \textit{D. Naccache} (ed.), Cryptology and network security. 14th international conference, CANS 2015, Marrakesh, Morocco, December 10--12, 2015. Proceedings. Cham: Springer (2015; Zbl 1325.68022) Full Text: DOI
Cogliani, Simon; Maimuţ, Diana-Ştefania; Naccache, David; do Canto, Rodrigo Portella; Reyhanitabar, Reza; Vaudenay, Serge; Vizár, Damian OMD: a compression function mode of operation for authenticated encryption. (English) Zbl 1382.94083 Joux, Antoine (ed.) et al., Selected areas in cryptography – SAC 2014. 21st international conference, Montreal, QC, Canada, August 14–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-13050-7/pbk; 978-3-319-13051-4/ebook). Lecture Notes in Computer Science 8781, 112-128 (2014). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Cogliani} et al., Lect. Notes Comput. Sci. 8781, 112--128 (2014; Zbl 1382.94083) Full Text: DOI
Msgna, Mehari; Markantonakis, Konstantinos; Naccache, David; Mayes, Keith Verifying software integrity in embedded systems: a side channel approach. (English) Zbl 1440.94069 Prouff, Emmanuel (ed.), Constructive side-channel analysis and secure design. 5th international workshop, COSADE 2014, Paris, France, April 13–15, 2014. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 8622, 261-280 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Msgna} et al., Lect. Notes Comput. Sci. 8622, 261--280 (2014; Zbl 1440.94069) Full Text: DOI
Brier, Eric; Naccache, David; Xia, Li-Yao How to sign paper contracts? Conjectures and evidence related to equitable and efficient collaborative task scheduling. (English) Zbl 1314.68083 Koç, Çetin Kaya (ed.), Open problems in mathematics and computational science. Based on the presentations at the conference, Istanbul, Turkey, September 18–20, 2013. Cham: Springer (ISBN 978-3-319-10682-3/hbk; 978-3-319-10683-0/ebook). 317-340 (2014). MSC: 68M20 PDFBibTeX XMLCite \textit{E. Brier} et al., in: Open problems in mathematics and computational science. Based on the presentations at the conference, Istanbul, Turkey, September 18--20, 2013. Cham: Springer. 317--340 (2014; Zbl 1314.68083) Full Text: DOI
Naccache, David; Steinwandt, Rainer; Suárez Corona, Adriana; Yung, Moti Narrow bandwidth is not inherent in reverse public-key encryption. (English) Zbl 1378.94057 Abdalla, Michel (ed.) et al., Security and cryptography for networks. 9th international conference, SCN 2014, Amalfi, Italy, September 3–5, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-10878-0/pbk). Lecture Notes in Computer Science 8642, 598-607 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Naccache} et al., Lect. Notes Comput. Sci. 8642, 598--607 (2014; Zbl 1378.94057) Full Text: DOI
Coron, Jean-Sébastien; Naccache, David; Tibouchi, Mehdi Another look at affine-padding RSA signatures. (English) Zbl 1293.94061 Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 22-32 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{J.-S. Coron} et al., Lect. Notes Comput. Sci. 7839, 22--32 (2013; Zbl 1293.94061) Full Text: DOI
Coron, Jean-Sébastien; Naccache, David; Tibouchi, Mehdi Public key compression and modulus switching for fully homomorphic encryption over the integers. (English) Zbl 1297.94062 Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 446-464 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{J.-S. Coron} et al., Lect. Notes Comput. Sci. 7237, 446--464 (2012; Zbl 1297.94062) Full Text: DOI
Claret, Guillaume; Mathieu, Michaël; Naccache, David; Seguin, Guillaume Physical simulation of inarticulate robots. (English) Zbl 1301.70003 Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 491-499 (2012). MSC: 70B15 PDFBibTeX XMLCite \textit{G. Claret} et al., Lect. Notes Comput. Sci. 6805, 491--499 (2012; Zbl 1301.70003) Full Text: DOI
Gratzer, Vanessa; Naccache, David How to read a signature? (English) Zbl 1300.94108 Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 480-483 (2012). MSC: 94A62 PDFBibTeX XMLCite \textit{V. Gratzer} and \textit{D. Naccache}, Lect. Notes Comput. Sci. 6805, 480--483 (2012; Zbl 1300.94108) Full Text: DOI
Chung, Byungchun; Marcello, Sandra; Mirbaha, Amir-Pasha; Naccache, David; Sabeg, Karim Operand folding hardware multipliers. (English) Zbl 1301.68023 Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 319-328 (2012). MSC: 68M07 PDFBibTeX XMLCite \textit{B. Chung} et al., Lect. Notes Comput. Sci. 6805, 319--328 (2012; Zbl 1301.68023) Full Text: DOI
Naccache, David; Pointcheval, David Autotomic signatures. (English) Zbl 1300.94113 Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 143-155 (2012). MSC: 94A62 PDFBibTeX XMLCite \textit{D. Naccache} and \textit{D. Pointcheval}, Lect. Notes Comput. Sci. 6805, 143--155 (2012; Zbl 1300.94113) Full Text: DOI
Naccache, David (ed.) Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. (English) Zbl 1233.94004 Lecture Notes in Computer Science 6805. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). xiii, 502 p. (2012). MSC: 94-06 94A60 00B30 PDFBibTeX XMLCite \textit{D. Naccache} (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (2012; Zbl 1233.94004) Full Text: DOI
Amarilli, Antoine; Naccache, David; Rauzy, Pablo; Simion, Emil Can a program reverse-engineer itself? (English) Zbl 1282.68098 Chen, Liqun (ed.), Cryptography and coding. 13th IMA international conference, IMACC 2011, Oxford, UK, December 12–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25515-1/pbk). Lecture Notes in Computer Science 7089, 1-9 (2011). MSC: 68P25 PDFBibTeX XMLCite \textit{A. Amarilli} et al., Lect. Notes Comput. Sci. 7089, 1--9 (2011; Zbl 1282.68098) Full Text: DOI
Coron, Jean-Sébastien; Mandal, Avradip; Naccache, David; Tibouchi, Mehdi Fully homomorphic encryption over the integers with shorter public keys. (English) Zbl 1290.94059 Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 487-504 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{J.-S. Coron} et al., Lect. Notes Comput. Sci. 6841, 487--504 (2011; Zbl 1290.94059) Full Text: DOI
Coron, Jean-Sébastien; Joux, Antoine; Mandal, Avradip; Naccache, David; Tibouchi, Mehdi Cryptanalysis of the RSA subgroup assumption from TCC 2005. (English) Zbl 1291.94070 Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 147-155 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{J.-S. Coron} et al., Lect. Notes Comput. Sci. 6571, 147--155 (2011; Zbl 1291.94070) Full Text: DOI
Sadeghi, Ahmad-Reza (ed.); Naccache, David (ed.) Towards hardware-intrinsic security. Foundations and practice. Foreword by Pim Tuyls. (English) Zbl 1213.68157 Information Security and Cryptography. Texts and Monographs. Berlin: Springer (ISBN 978-3-642-14451-6/hbk; 978-3-642-14452-3/ebook). xvi, 407 p. (2010). MSC: 68M99 68-06 68P25 68N99 00B15 PDFBibTeX XMLCite \textit{A.-R. Sadeghi} (ed.) and \textit{D. Naccache} (ed.), Towards hardware-intrinsic security. Foundations and practice. Foreword by Pim Tuyls. Berlin: Springer (2010; Zbl 1213.68157) Full Text: DOI
Brier, Eric; Naccache, David; Tibouchi, Mehdi Factoring unbalanced moduli with known bits. (English) Zbl 1305.94035 Lee, Donghoon (ed.) et al., Information, security and cryptology – ICISC 2009. 12th international conference, Seoul, Korea, December 2–4, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14422-6/pbk). Lecture Notes in Computer Science 5984, 65-72 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Brier} et al., Lect. Notes Comput. Sci. 5984, 65--72 (2010; Zbl 1305.94035) Full Text: DOI
Bauer, Aurélie; Coron, Jean-Sébastien; Naccache, David; Tibouchi, Mehdi; Vergnaud, Damien On the broadcast and validity-checking security of pkcs#1 v1.5 encryption. (English) Zbl 1315.94054 Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13707-5/pbk). Lecture Notes in Computer Science 6123, 1-18 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Bauer} et al., Lect. Notes Comput. Sci. 6123, 1--18 (2010; Zbl 1315.94054) Full Text: DOI
Chevallier-Mames, Benoît; Coron, Jean-Sébastien; McCullagh, Noel; Naccache, David; Scott, Michael Secure delegation of elliptic-curve pairing. (English) Zbl 1391.94738 Gollmann, Dieter (ed.) et al., Smart card research and advanced application. 9th IFIP WG 8.8/11.2 international conference, CARDIS 2010, Passau, Germany, April 14–16, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12509-6/pbk). Lecture Notes in Computer Science 6035, 24-35 (2010). MSC: 94A60 14G50 PDFBibTeX XML Full Text: DOI
Joye, Marc; Naccache, David; Porte, Stéphanie The polynomial composition problem in \((\mathbb Z/n\mathbb Z)[X]\). (English) Zbl 1300.94066 Gollmann, Dieter (ed.) et al., Smart card research and advanced application. 9th IFIP WG 8.8/11.2 international conference, CARDIS 2010, Passau, Germany, April 14–16, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12509-6/pbk). Lecture Notes in Computer Science 6035, 1-12 (2010). MSC: 94A60 68P25 PDFBibTeX XML Full Text: DOI
Coron, Jean-Sébastien; Naccache, David; Tibouchi, Mehdi Fault attacks against EMV signatures. (English) Zbl 1274.94133 Pieprzyk, Josef (ed.), Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11924-8/pbk). Lecture Notes in Computer Science 5985, 208-220 (2010). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{J.-S. Coron} et al., Lect. Notes Comput. Sci. 5985, 208--220 (2010; Zbl 1274.94133) Full Text: DOI
Fuchsbauer, Georg; Katz, Jonathan; Naccache, David Efficient rational secret sharing in standard communication networks. (English) Zbl 1274.94137 Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 419-436 (2010). MSC: 94A62 68M12 PDFBibTeX XMLCite \textit{G. Fuchsbauer} et al., Lect. Notes Comput. Sci. 5978, 419--436 (2010; Zbl 1274.94137) Full Text: DOI
Naccache, David; Shparlinski, Igor E. Divisibility, smoothness and cryptographic applications. (English) Zbl 1198.94117 Shaska, Tanush (ed.) et al., Algebraic aspects of digital communications. Selected papers based on the presentations at the conference “New challenges in digital communications”, Vlora, Albania, April 27 – May 9, 2008. Amsterdam: IOS Press (ISBN 978-1-60750-019-3/hbk; 978-1-60750-439-9/ebook). NATO Science for Peace and Security Series D: Information and Communication Security 24, 115-173 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Naccache} and \textit{I. E. Shparlinski}, NATO Sci. Peace Secur. Ser. D, Inf. Commun. Secur. 24, 115--173 (2009; Zbl 1198.94117) Full Text: arXiv
Joux, Antoine; Lercier, Reynald; Naccache, David; Thomé, Emmanuel Oracle-assisted static Diffie-Hellman is easier than discrete logarithms. (English) Zbl 1234.94050 Parker, Matthew G. (ed.), Cryptography and coding. 12th IMA international conference, cryptography and coding 2009, Cirencester, UK, December 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10867-9/pbk). Lecture Notes in Computer Science 5921, 351-367 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Joux} et al., Lect. Notes Comput. Sci. 5921, 351--367 (2009; Zbl 1234.94050) Full Text: DOI Link
Cathalo, Julien; Naccache, David; Quisquater, Jean-Jacques Comparing with RSA. (English) Zbl 1234.94033 Parker, Matthew G. (ed.), Cryptography and coding. 12th IMA international conference, cryptography and coding 2009, Cirencester, UK, December 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10867-9/pbk). Lecture Notes in Computer Science 5921, 326-335 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Cathalo} et al., Lect. Notes Comput. Sci. 5921, 326--335 (2009; Zbl 1234.94033) Full Text: DOI
Coron, Jean-Sébastien; Joux, Antoine; Kizhvatov, Ilya; Naccache, David; Paillier, Pascal Fault attacks on RSA signatures with partially unknown messages. (English) Zbl 1290.94057 Clavier, Christophe (ed.) et al., Cryptographic hardware and embedded systems – CHES 2009. 11th international workshop Lausanne, Switzerland, September 6–9, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04137-2/pbk). Lecture Notes in Computer Science 5747, 444-456 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{J.-S. Coron} et al., Lect. Notes Comput. Sci. 5747, 444--456 (2009; Zbl 1290.94057) Full Text: DOI
Coron, Jean-Sébastien; Naccache, David; Tibouchi, Mehdi; Weinmann, Ralf-Philipp Practical cryptanalysis of ISO/IEC 9796-2 and EMV signatures. (English) Zbl 1252.94055 Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 428-444 (2009). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J.-S. Coron} et al., Lect. Notes Comput. Sci. 5677, 428--444 (2009; Zbl 1252.94055) Full Text: DOI
Chevallier-Mames, Benoît; Naccache, David; Stern, Jacques Linear bandwidth Naccache-Stern encryption. (English) Zbl 1180.94049 Ostrovsky, Rafail (ed.) et al., Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85854-6/pbk). Lecture Notes in Computer Science 5229, 327-339 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{B. Chevallier-Mames} et al., Lect. Notes Comput. Sci. 5229, 327--339 (2008; Zbl 1180.94049) Full Text: DOI
Coppersmith, D.; Coron, J. S.; Grieu, F.; Halevi, S.; Jutla, C.; Naccache, D.; Stern, J. P. Cryptanalysis of ISO/IEC 9796-1. (English) Zbl 1146.68366 J. Cryptology 21, No. 1, 27-51 (2008). MSC: 68P25 PDFBibTeX XMLCite \textit{D. Coppersmith} et al., J. Cryptology 21, No. 1, 27--51 (2008; Zbl 1146.68366) Full Text: DOI
Levieil, Eric; Naccache, David Cryptographic test correction. (English) Zbl 1162.94381 Cramer, Ronald (ed.), Public key cryptography – PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78440-1/pbk). Lecture Notes in Computer Science 4939, 85-100 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{E. Levieil} and \textit{D. Naccache}, Lect. Notes Comput. Sci. 4939, 85--100 (2008; Zbl 1162.94381) Full Text: DOI
Joux, Antoine; Naccache, David; Thomé, Emmanuel When \(e\)-th roots become easier than factoring. (English) Zbl 1153.11345 Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 13-28 (2007). MSC: 11Y16 11T71 11Y05 94A60 PDFBibTeX XMLCite \textit{A. Joux} et al., Lect. Notes Comput. Sci. 4833, 13--28 (2007; Zbl 1153.11345) Full Text: DOI
Gratzer, Vanessa; Naccache, David Alien vs. Quine, the vanishing circuit and other tales from the industry’s crypt. (Invited talk). (English) Zbl 1140.94342 Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 48-58 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{V. Gratzer} and \textit{D. Naccache}, Lect. Notes Comput. Sci. 4004, 48--58 (2006; Zbl 1140.94342) Full Text: DOI
Coron, Jean-Sébastien; Naccache, David; Desmedt, Yvo; Odlyzko, Andrew; Stern, Julien P. Index calculation attacks on RSA signature and encryption. (English) Zbl 1142.94338 Des. Codes Cryptography 38, No. 1, 41-53 (2006). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{J.-S. Coron} et al., Des. Codes Cryptography 38, No. 1, 41--53 (2006; Zbl 1142.94338) Full Text: DOI
Naccache, David; Nguyên, Phong Q.; Tunstall, Michael; Whelan, Claire Experimenting with faults, lattices and the DSA. (English) Zbl 1081.94533 Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 16-28 (2005). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D. Naccache} et al., Lect. Notes Comput. Sci. 3386, 16--28 (2005; Zbl 1081.94533) Full Text: DOI
Cathalo, Julien; Coron, Jean-Sébastien; Naccache, David From fixed-length to arbitrary-length RSA encoding schemes revisited. (English) Zbl 1081.94018 Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 234-243 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Cathalo} et al., Lect. Notes Comput. Sci. 3386, 234--243 (2005; Zbl 1081.94018) Full Text: DOI
Coron, Jean-Sébastien; Naccache, David Cryptanalysis of a zero-knowledge identification protocol of Eurocrypt ‘95. (English) Zbl 1196.94047 Okamoto, Tatsuaki (ed.), Topics in cryptology – CT-RSA 2004. The cryptographers’ track at the RSA conference 2004, San Francisco, CA, USA, February 23–27, 2004. Proceedings. Berlin: Springer (ISBN 3-540-20996-4/pbk). Lecture Notes in Computer Science 2964, 157-162 (2004). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J.-S. Coron} and \textit{D. Naccache}, Lect. Notes Comput. Sci. 2964, 157--162 (2004; Zbl 1196.94047) Full Text: DOI
Naccache, David; Smart, Nigel P.; Stern, Jacques Projective coordinates leak. (English) Zbl 1122.14300 Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 257-267 (2004). MSC: 14G50 11T71 94A60 PDFBibTeX XMLCite \textit{D. Naccache} et al., Lect. Notes Comput. Sci. 3027, 257--267 (2004; Zbl 1122.14300) Full Text: DOI
Chevallier-Mames, Benoît; Naccache, David; Paillier, Pascal; Pointcheval, David How to disembed a program? (Extended abstract). (English) Zbl 1104.68469 Joye, Marc (ed.) et al., Cryptographic hardware and embedded systems – CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11–13, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22666-4/pbk). Lecture Notes in Computer Science 3156, 441-454 (2004). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{B. Chevallier-Mames} et al., Lect. Notes Comput. Sci. 3156, 441--454 (2004; Zbl 1104.68469) Full Text: DOI
Coron, Jean-Sebastien; Naccache, David Boneh et al.’s \(k\)-element aggregate extraction assumption is equivalent to the Diffie-Hellman assumption. (English) Zbl 1205.94080 Laih, Chi Sung (ed.), Advances in cryptology – ASIACRYPT 2003. 9th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20592-6/pbk). Lect. Notes Comput. Sci. 2894, 392-397 (2003). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J.-S. Coron} and \textit{D. Naccache}, Lect. Notes Comput. Sci. 2894, 392--397 (2003; Zbl 1205.94080) Full Text: DOI
Maltesson, Nils; Naccache, David; Trichina, Elena; Tymen, Christophe Applet verification strategies for RAM-constrained devices. (English) Zbl 1028.68524 Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 118-137 (2003). MSC: 68P25 PDFBibTeX XMLCite \textit{N. Maltesson} et al., Lect. Notes Comput. Sci. 2587, 118--137 (2003; Zbl 1028.68524) Full Text: Link
Lefranc, Serge; Naccache, David Cut-&-paste attacks with Java. (English) Zbl 1031.94520 Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 1-15 (2003). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. Lefranc} and \textit{D. Naccache}, Lect. Notes Comput. Sci. 2587, 1--15 (2003; Zbl 1031.94520) Full Text: Link
Naccache, David; Pointcheval, David; Tymen, Christophe Monotone signatures. (English) Zbl 1051.94517 Syverson, Paul F. (ed.), Financial cryptography. 5th international conference, FC 2001, Grand Cayman, British West Indies, February 19–22, 2001. Proceedings. Berlin: Springer (ISBN 3-540-44079-8). Lect. Notes Comput. Sci. 2339, 305-318 (2002). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{D. Naccache} et al., Lect. Notes Comput. Sci. 2339, 305--318 (2002; Zbl 1051.94517) Full Text: Link
Naccache, David; Tchoulkine, Alexei; Tymen, Christophe; Trichina, Elena Reducing the memory complexity of type-inference algorithms. (English) Zbl 1023.68563 Deng, Robert (ed.) et al., Information and communications security. 4th international conference, ICICS 2002, Singapore, December 9-12, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2513, 109-121 (2002). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{D. Naccache} et al., Lect. Notes Comput. Sci. 2513, 109--121 (2002; Zbl 1023.68563) Full Text: Link
Coron, Jean-Sébastien; Joye, Marc; Naccache, David; Paillier, Pascal Universal padding schemes for RSA. (English) Zbl 1026.94526 Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 226-241 (2002). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{J.-S. Coron} et al., Lect. Notes Comput. Sci. 2442, 226--241 (2002; Zbl 1026.94526) Full Text: Link
Naccache, David (ed.); Paillier, Pascal (ed.) Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12–14, 2002. Proceedings. (English) Zbl 0984.00082 Lecture Notes in Computer Science. 2274. Berlin: Springer. xi, 385 p. (2002). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{D. Naccache} (ed.) and \textit{P. Paillier} (ed.), Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12--14, 2002. Proceedings. Berlin: Springer (2002; Zbl 0984.00082) Full Text: DOI
Brier, Eric; Clavier, Christophe; Coron, Jean-Sébastien; Naccache, David Cryptanalysis of RSA signatures with fixed-pattern padding. (English) Zbl 1003.94523 Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 433-439 (2001). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Brier} et al., Lect. Notes Comput. Sci. 2139, 433--439 (2001; Zbl 1003.94523) Full Text: Link
M’Raïhi, David; Naccache, David; Tunstall, Michael Asymmetric currency rounding. (English) Zbl 0999.94530 Frankel, Yair (ed.), Financial cryptography. 4th international conference, FC 2000, Anguilla, British West Indies, February 20-24, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1962, 192-201 (2001). MSC: 94A60 91G99 PDFBibTeX XMLCite \textit{D. M'Raïhi} et al., Lect. Notes Comput. Sci. 1962, 192--201 (2001; Zbl 0999.94530)
Coron, Jean-Sébastien; Kocher, Paul; Naccache, David Statistics and secret leakage. (English) Zbl 0999.94579 Frankel, Yair (ed.), Financial cryptography. 4th international conference, FC 2000, Anguilla, British West Indies, February 20-24, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1962, 157-173 (2001). MSC: 94C12 94A60 62P99 PDFBibTeX XMLCite \textit{J.-S. Coron} et al., Lect. Notes Comput. Sci. 1962, 157--173 (2001; Zbl 0999.94579)
Naccache, David; Stern, Jacques Signing on a postcard. (English) Zbl 0999.94549 Frankel, Yair (ed.), Financial cryptography. 4th international conference, FC 2000, Anguilla, British West Indies, February 20-24, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1962, 121-135 (2001). MSC: 94A62 68W40 PDFBibTeX XMLCite \textit{D. Naccache} and \textit{J. Stern}, Lect. Notes Comput. Sci. 1962, 121--135 (2001; Zbl 0999.94549)
Koç, Çetin K. (ed.); Naccache, David (ed.); Paar, Christof (ed.) Cryptographic hardware and embedded systems - CHES 2001. 3rd international workshop, Paris, France, May 14–16, 2001. Proceedings. (English) Zbl 0971.00042 Lecture Notes in Computer Science. 2162. Berlin: Springer. xiv, 411 p. (2001). MSC: 00B25 68-06 94-06 68P25 PDFBibTeX XMLCite \textit{Ç. K. Koç} (ed.) et al., Cryptographic hardware and embedded systems - CHES 2001. 3rd international workshop, Paris, France, May 14--16, 2001. Proceedings. Berlin: Springer (2001; Zbl 0971.00042) Full Text: DOI
Naccache, David (ed.) Topics in cryptology - CT-RSA 2001. The cryptographer’s track at RSA conference 2001, San Francisco, CA, USA, April 8–12, 2001. Proceedings. (English) Zbl 0960.00081 Lecture Notes in Computer Science. 2020. Berlin: Springer. xii, 471 p. (2001). MSC: 00B25 94-06 PDFBibTeX XMLCite \textit{D. Naccache} (ed.), Topics in cryptology - CT-RSA 2001. The cryptographer's track at RSA conference 2001, San Francisco, CA, USA, April 8--12, 2001. Proceedings. Berlin: Springer (2001; Zbl 0960.00081)
Coron, Jean-Sébastien; Joye, Marc; Naccache, David; Paillier, Pascal New attacks on PKCS#1 V1.5 encryption. (English) Zbl 1082.94512 Preneel, Bart (ed.), Advances in cryptology - EUROCRYPT 2000. 19th international conference on the theory and application of cryptographic techniques, Bruges, Belgium, May 14–18, 2000. Proceedings. Berlin: Springer (ISBN 3-540-67517-5). Lect. Notes Comput. Sci. 1807, 369-381 (2000). MSC: 94A60 PDFBibTeX XMLCite \textit{J.-S. Coron} et al., Lect. Notes Comput. Sci. 1807, 369--381 (2000; Zbl 1082.94512)
Coron, Jean-Sébastien; Naccache, David Security analysis of the Gennaro-Halevi-Rabin signature scheme. (English) Zbl 1082.94513 Preneel, Bart (ed.), Advances in cryptology - EUROCRYPT 2000. 19th international conference on the theory and application of cryptographic techniques, Bruges, Belgium, May 14–18, 2000. Proceedings. Berlin: Springer (ISBN 3-540-67517-5). Lect. Notes Comput. Sci. 1807, 91-101 (2000). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J.-S. Coron} and \textit{D. Naccache}, Lect. Notes Comput. Sci. 1807, 91--101 (2000; Zbl 1082.94513)
Naccache, David; Tunstall, Michael How to explain side-channel leakage to your kids. (English) Zbl 0998.68679 Koç, Çetin K. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2000. 2nd international workshop, Worcester, MA, USA, August 17-18, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1965, 229-230 (2000). MSC: 68U99 94A60 PDFBibTeX XMLCite \textit{D. Naccache} and \textit{M. Tunstall}, Lect. Notes Comput. Sci. 1965, 229--230 (2000; Zbl 0998.68679)
Coron, Jean-Sébastien; Koeune, Francois; Naccache, David From fixed-length to arbitrary-length RSA padding schemes. (English) Zbl 0966.94020 Okamoto, Tatsuaki (ed.), Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1976, 90-96 (2000). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{J.-S. Coron} et al., Lect. Notes Comput. Sci. 1976, 90--96 (2000; Zbl 0966.94020)
Coron, Jean-Sébastien; Handschuh, Helena; Naccache, David ECC: Do we need to count? (English) Zbl 0977.94026 Lam, Kwok Yan (ed.) et al., Advances in cryptology - ASIACRYPT ’99. International conference on the theory and application of cryptology and information security, Singapore, November 14-18, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1716, 122-134 (1999). MSC: 94A60 14H52 PDFBibTeX XMLCite \textit{J.-S. Coron} et al., Lect. Notes Comput. Sci. 1716, 122--134 (1999; Zbl 0977.94026)
Coron, Jean-Sébastien; Naccache, David; Stern, Julien P. On the security of RSA padding. (English) Zbl 0940.94010 Wiener, Michael (ed.), Advances in cryptology - CRYPTO ’99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15-19, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1666, 1-18 (1999). MSC: 94A60 PDFBibTeX XMLCite \textit{J.-S. Coron} et al., Lect. Notes Comput. Sci. 1666, 1--18 (1999; Zbl 0940.94010)
Coron, Jean-Sébastien; Naccache, David On the security of RSA screening. (English) Zbl 0929.94026 Imai, Hideki (ed.) et al., Public key cryptography. 2nd international workshop on Practice and theory in public key cryptography, PKC ’99. Kamakura, Japan, March 1–3, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1560, 197-203 (1999). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{J.-S. Coron} and \textit{D. Naccache}, Lect. Notes Comput. Sci. 1560, 197--203 (1999; Zbl 0929.94026)
Naccache, David; Shamir, Adi; Stern, Julien P. How to copyright a function? (English) Zbl 0935.68017 Imai, Hideki (ed.) et al., Public key cryptography. 2nd international workshop on Practice and theory in public key cryptography, PKC ’99. Kamakura, Japan, March 1-3, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1560, 188-196 (1999). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{D. Naccache} et al., Lect. Notes Comput. Sci. 1560, 188--196 (1999; Zbl 0935.68017)
M’Raïhi, David; Naccache, David; Pointcheval, David; Vaudenay, Serge Computational alternatives to random number generators. (English) Zbl 0931.94049 Tavares, Stafford (ed.) et al., Selected areas in cryptography. 5th annual international workshop, SAC ’98. Kingston, Ontario, Canada, August 17–18, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1556, 72-80 (1999). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D. M'Raïhi} et al., Lect. Notes Comput. Sci. 1556, 72--80 (1999; Zbl 0931.94049)
Coron, Jean-Sébastien; Naccache, David An accurate evaluation of Maurer’s universal test. (English) Zbl 0929.94006 Tavares, Stafford (ed.) et al., Selected areas in cryptography. 5th annual international workshop, SAC ’98. Kingston, Ontario, Canada, August 17–18, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1556, 57-71 (1999). MSC: 94A60 62P99 65C10 PDFBibTeX XMLCite \textit{J.-S. Coron} and \textit{D. Naccache}, Lect. Notes Comput. Sci. 1556, 57--71 (1999; Zbl 0929.94006)
Cohen, Gérard; Lobstein, Antoine; Naccache, David; Zémor, Gilles How to improve an exponentiation black-box. (English) Zbl 0929.68050 Nyberg, Kaisa (ed.), Advances in Cryptology. International conference on the Theory and application of cryptographic techniques. Espoo, Finland, May 31 - June 4, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1403, 211-220 (1998). MSC: 68P25 11Y16 PDFBibTeX XMLCite \textit{G. Cohen} et al., Lect. Notes Comput. Sci. 1403, 211--220 (1998; Zbl 0929.68050)
M’Raïhi, David; Naccache, David; Stern, Jacques; Vaudenay, Serge \(\mathsf{xmx}\): a firmware-oriented block cipher based on modular multiplications. (English) Zbl 1385.94059 Biham, Eli (ed.), Fast software encryption. 4th international workshop, FSE ’97, Haifa, Israel, January 20–22, 1997. Proceedings. Berlin: Springer (ISBN 3-540-63247-6). Lect. Notes Comput. Sci. 1267, 166-171 (1997). MSC: 94A60 PDFBibTeX XMLCite \textit{D. M'Raïhi} et al., Lect. Notes Comput. Sci. 1267, 166--171 (1997; Zbl 1385.94059) Full Text: DOI
Naccache, David; M’Raïhi, David; Raphaeli, Dan Can Montgomery parasites be avoided? A design methodology based on key and cryptosystem modifications. (English) Zbl 0814.94016 Des. Codes Cryptography 5, No. 1, 73-80 (1995). MSC: 94A60 68W10 11T71 68P25 PDFBibTeX XMLCite \textit{D. Naccache} et al., Des. Codes Cryptography 5, No. 1, 73--80 (1995; Zbl 0814.94016) Full Text: DOI
Naccache, David; M’Raïhi, David; Wolfowicz, William; Di Porto, Adina Are crypto-accelerators really inevitable? 20 bit zero-knowledge in less than a second on simple 8-bit microcontrollers. (English) Zbl 0973.94523 Guillou, Louis C. (ed.) et al., Advances in cryptology - EUROCRYPT ’95. International conference on the theory and application of cryptographic techniques, Saint-Malo, France, May 21-25, 1995. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 921, 404-412 (1995). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D. Naccache} et al., Lect. Notes Comput. Sci. 921, 404--412 (1995; Zbl 0973.94523)