Géraud-Stewart, Rémi; Lombard-Platet, Marius; Naccache, David Approaching optimal duplicate detection in a sliding window. (English) Zbl 07336095 Kim, Donghyun (ed.) et al., Computing and combinatorics. 26th international conference, COCOON 2020, Atlanta, GA, USA, August 29–31, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12273, 64-84 (2020). MSC: 68Rxx PDFBibTeX XMLCite \textit{R. Géraud-Stewart} et al., Lect. Notes Comput. Sci. 12273, 64--84 (2020; Zbl 07336095) Full Text: DOI arXiv
Liu, Weiran; Liu, Jianwei; Wu, Qianhong; Qin, Bo; Naccache, David; Ferradi, Houda Efficient subtree-based encryption for fuzzy-entity data sharing. (English) Zbl 1402.68056 Soft Comput. 22, No. 23, 7961-7976 (2018). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{W. Liu} et al., Soft Comput. 22, No. 23, 7961--7976 (2018; Zbl 1402.68056) Full Text: DOI
Naccache, David (ed.); Xu, Shouhuai (ed.); Qing, Sihan (ed.); Samarati, Pierangela (ed.); Blanc, Gregory (ed.); Lu, Rongxing (ed.); Zhang, Zonghua (ed.); Meddahi, Ahmed (ed.) Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. (English) Zbl 1398.68037 Lecture Notes in Computer Science 11149. Cham: Springer (ISBN 978-3-030-01949-5/pbk; 978-3-030-01950-1/ebook). xv, 818 p. (2018). MSC: 68-06 68P25 94A60 00B25 PDFBibTeX XMLCite \textit{D. Naccache} (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29--31, 2018. Proceedings. Cham: Springer (2018; Zbl 1398.68037) Full Text: DOI
Ferradi, Houda; Géraud, Rémi; Maimuţ, Diana; Naccache, David; Zhou, Hang Backtracking-assisted multiplication. (English) Zbl 1384.68008 Cryptogr. Commun. 10, No. 1, 17-26 (2018). MSC: 68M07 68W40 94A60 PDFBibTeX XMLCite \textit{H. Ferradi} et al., Cryptogr. Commun. 10, No. 1, 17--26 (2018; Zbl 1384.68008) Full Text: DOI
Benhamouda, Fabrice; Ferradi, Houda; Géraud, Rémi; Naccache, David Non-interactive provably secure attestations for arbitrary RSA prime generation algorithms. (English) Zbl 1500.94018 Foley, Simon N. (ed.) et al., Computer security – ESORICS 2017. 22nd European symposium on research in computer security, Oslo, Norway, September 11–15, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10492, 206-223 (2017). MSC: 94A60 68Q10 PDFBibTeX XMLCite \textit{F. Benhamouda} et al., Lect. Notes Comput. Sci. 10492, 206--223 (2017; Zbl 1500.94018) Full Text: DOI
Dutertre, Jean-Max; Mirbaha, Amir-Pasha; Naccache, David; Tria, Assia Photonic power firewalls. (English) Zbl 1405.94061 Ryan, Peter Y. A. (ed.) et al., The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday. Berlin: Springer (ISBN 978-3-662-49300-7/pbk; 978-3-662-49301-4/ebook). Lecture Notes in Computer Science 9100, 342-354 (2016). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J.-M. Dutertre} et al., Lect. Notes Comput. Sci. 9100, 342--354 (2016; Zbl 1405.94061) Full Text: DOI
Reiter, Michael (ed.); Naccache, David (ed.) Cryptology and network security. 14th international conference, CANS 2015, Marrakesh, Morocco, December 10–12, 2015. Proceedings. (English) Zbl 1325.68022 Lecture Notes in Computer Science 9476. Cham: Springer (ISBN 978-3-319-26822-4/pbk; 978-3-319-26823-1/ebook). x, 257 p. (2015). MSC: 68-06 94-06 68P25 94A60 94A62 00B25 PDFBibTeX XMLCite \textit{M. Reiter} (ed.) and \textit{D. Naccache} (ed.), Cryptology and network security. 14th international conference, CANS 2015, Marrakesh, Morocco, December 10--12, 2015. Proceedings. Cham: Springer (2015; Zbl 1325.68022) Full Text: DOI
Brier, Eric; Naccache, David; Xia, Li-Yao How to sign paper contracts? Conjectures and evidence related to equitable and efficient collaborative task scheduling. (English) Zbl 1314.68083 Koç, Çetin Kaya (ed.), Open problems in mathematics and computational science. Based on the presentations at the conference, Istanbul, Turkey, September 18–20, 2013. Cham: Springer (ISBN 978-3-319-10682-3/hbk; 978-3-319-10683-0/ebook). 317-340 (2014). MSC: 68M20 PDFBibTeX XMLCite \textit{E. Brier} et al., in: Open problems in mathematics and computational science. Based on the presentations at the conference, Istanbul, Turkey, September 18--20, 2013. Cham: Springer. 317--340 (2014; Zbl 1314.68083) Full Text: DOI
Chung, Byungchun; Marcello, Sandra; Mirbaha, Amir-Pasha; Naccache, David; Sabeg, Karim Operand folding hardware multipliers. (English) Zbl 1301.68023 Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 319-328 (2012). MSC: 68M07 PDFBibTeX XMLCite \textit{B. Chung} et al., Lect. Notes Comput. Sci. 6805, 319--328 (2012; Zbl 1301.68023) Full Text: DOI
Amarilli, Antoine; Naccache, David; Rauzy, Pablo; Simion, Emil Can a program reverse-engineer itself? (English) Zbl 1282.68098 Chen, Liqun (ed.), Cryptography and coding. 13th IMA international conference, IMACC 2011, Oxford, UK, December 12–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25515-1/pbk). Lecture Notes in Computer Science 7089, 1-9 (2011). MSC: 68P25 PDFBibTeX XMLCite \textit{A. Amarilli} et al., Lect. Notes Comput. Sci. 7089, 1--9 (2011; Zbl 1282.68098) Full Text: DOI
Sadeghi, Ahmad-Reza (ed.); Naccache, David (ed.) Towards hardware-intrinsic security. Foundations and practice. Foreword by Pim Tuyls. (English) Zbl 1213.68157 Information Security and Cryptography. Texts and Monographs. Berlin: Springer (ISBN 978-3-642-14451-6/hbk; 978-3-642-14452-3/ebook). xvi, 407 p. (2010). MSC: 68M99 68-06 68P25 68N99 00B15 PDFBibTeX XMLCite \textit{A.-R. Sadeghi} (ed.) and \textit{D. Naccache} (ed.), Towards hardware-intrinsic security. Foundations and practice. Foreword by Pim Tuyls. Berlin: Springer (2010; Zbl 1213.68157) Full Text: DOI
Joye, Marc; Naccache, David; Porte, Stéphanie The polynomial composition problem in \((\mathbb Z/n\mathbb Z)[X]\). (English) Zbl 1300.94066 Gollmann, Dieter (ed.) et al., Smart card research and advanced application. 9th IFIP WG 8.8/11.2 international conference, CARDIS 2010, Passau, Germany, April 14–16, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12509-6/pbk). Lecture Notes in Computer Science 6035, 1-12 (2010). MSC: 94A60 68P25 PDFBibTeX XML Full Text: DOI
Fuchsbauer, Georg; Katz, Jonathan; Naccache, David Efficient rational secret sharing in standard communication networks. (English) Zbl 1274.94137 Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 419-436 (2010). MSC: 94A62 68M12 PDFBibTeX XMLCite \textit{G. Fuchsbauer} et al., Lect. Notes Comput. Sci. 5978, 419--436 (2010; Zbl 1274.94137) Full Text: DOI
Coppersmith, D.; Coron, J. S.; Grieu, F.; Halevi, S.; Jutla, C.; Naccache, D.; Stern, J. P. Cryptanalysis of ISO/IEC 9796-1. (English) Zbl 1146.68366 J. Cryptology 21, No. 1, 27-51 (2008). MSC: 68P25 PDFBibTeX XMLCite \textit{D. Coppersmith} et al., J. Cryptology 21, No. 1, 27--51 (2008; Zbl 1146.68366) Full Text: DOI
Chevallier-Mames, Benoît; Naccache, David; Paillier, Pascal; Pointcheval, David How to disembed a program? (Extended abstract). (English) Zbl 1104.68469 Joye, Marc (ed.) et al., Cryptographic hardware and embedded systems – CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11–13, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22666-4/pbk). Lecture Notes in Computer Science 3156, 441-454 (2004). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{B. Chevallier-Mames} et al., Lect. Notes Comput. Sci. 3156, 441--454 (2004; Zbl 1104.68469) Full Text: DOI
Maltesson, Nils; Naccache, David; Trichina, Elena; Tymen, Christophe Applet verification strategies for RAM-constrained devices. (English) Zbl 1028.68524 Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 118-137 (2003). MSC: 68P25 PDFBibTeX XMLCite \textit{N. Maltesson} et al., Lect. Notes Comput. Sci. 2587, 118--137 (2003; Zbl 1028.68524) Full Text: Link
Lefranc, Serge; Naccache, David Cut-&-paste attacks with Java. (English) Zbl 1031.94520 Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 1-15 (2003). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. Lefranc} and \textit{D. Naccache}, Lect. Notes Comput. Sci. 2587, 1--15 (2003; Zbl 1031.94520) Full Text: Link
Naccache, David; Tchoulkine, Alexei; Tymen, Christophe; Trichina, Elena Reducing the memory complexity of type-inference algorithms. (English) Zbl 1023.68563 Deng, Robert (ed.) et al., Information and communications security. 4th international conference, ICICS 2002, Singapore, December 9-12, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2513, 109-121 (2002). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{D. Naccache} et al., Lect. Notes Comput. Sci. 2513, 109--121 (2002; Zbl 1023.68563) Full Text: Link
Coron, Jean-Sébastien; Joye, Marc; Naccache, David; Paillier, Pascal Universal padding schemes for RSA. (English) Zbl 1026.94526 Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 226-241 (2002). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{J.-S. Coron} et al., Lect. Notes Comput. Sci. 2442, 226--241 (2002; Zbl 1026.94526) Full Text: Link
Naccache, David; Stern, Jacques Signing on a postcard. (English) Zbl 0999.94549 Frankel, Yair (ed.), Financial cryptography. 4th international conference, FC 2000, Anguilla, British West Indies, February 20-24, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1962, 121-135 (2001). MSC: 94A62 68W40 PDFBibTeX XMLCite \textit{D. Naccache} and \textit{J. Stern}, Lect. Notes Comput. Sci. 1962, 121--135 (2001; Zbl 0999.94549)
Koç, Çetin K. (ed.); Naccache, David (ed.); Paar, Christof (ed.) Cryptographic hardware and embedded systems - CHES 2001. 3rd international workshop, Paris, France, May 14–16, 2001. Proceedings. (English) Zbl 0971.00042 Lecture Notes in Computer Science. 2162. Berlin: Springer. xiv, 411 p. (2001). MSC: 00B25 68-06 94-06 68P25 PDFBibTeX XMLCite \textit{Ç. K. Koç} (ed.) et al., Cryptographic hardware and embedded systems - CHES 2001. 3rd international workshop, Paris, France, May 14--16, 2001. Proceedings. Berlin: Springer (2001; Zbl 0971.00042) Full Text: DOI
Naccache, David; Tunstall, Michael How to explain side-channel leakage to your kids. (English) Zbl 0998.68679 Koç, Çetin K. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2000. 2nd international workshop, Worcester, MA, USA, August 17-18, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1965, 229-230 (2000). MSC: 68U99 94A60 PDFBibTeX XMLCite \textit{D. Naccache} and \textit{M. Tunstall}, Lect. Notes Comput. Sci. 1965, 229--230 (2000; Zbl 0998.68679)
Naccache, David; Shamir, Adi; Stern, Julien P. How to copyright a function? (English) Zbl 0935.68017 Imai, Hideki (ed.) et al., Public key cryptography. 2nd international workshop on Practice and theory in public key cryptography, PKC ’99. Kamakura, Japan, March 1-3, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1560, 188-196 (1999). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{D. Naccache} et al., Lect. Notes Comput. Sci. 1560, 188--196 (1999; Zbl 0935.68017)
Cohen, Gérard; Lobstein, Antoine; Naccache, David; Zémor, Gilles How to improve an exponentiation black-box. (English) Zbl 0929.68050 Nyberg, Kaisa (ed.), Advances in Cryptology. International conference on the Theory and application of cryptographic techniques. Espoo, Finland, May 31 - June 4, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1403, 211-220 (1998). MSC: 68P25 11Y16 PDFBibTeX XMLCite \textit{G. Cohen} et al., Lect. Notes Comput. Sci. 1403, 211--220 (1998; Zbl 0929.68050)
Naccache, David; M’Raïhi, David; Raphaeli, Dan Can Montgomery parasites be avoided? A design methodology based on key and cryptosystem modifications. (English) Zbl 0814.94016 Des. Codes Cryptography 5, No. 1, 73-80 (1995). MSC: 94A60 68W10 11T71 68P25 PDFBibTeX XMLCite \textit{D. Naccache} et al., Des. Codes Cryptography 5, No. 1, 73--80 (1995; Zbl 0814.94016) Full Text: DOI