Suivre
Jean-Sebastien Coron
Jean-Sebastien Coron
Professor of Computer Science, University of Luxembourg
Adresse e-mail validée de uni.lu - Page d'accueil
Titre
Citée par
Citée par
Année
Resistance against differential power analysis for elliptic curve cryptosystems
JS Coron
Cryptographic Hardware and Embedded Systems: First InternationalWorkshop …, 1999
14161999
Merkle-Damgård revisited: How to construct a hash function
JS Coron, Y Dodis, C Malinaud, P Puniya
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
6742005
Fully homomorphic encryption over the integers with shorter public keys
JS Coron, A Mandal, D Naccache, M Tibouchi
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
6342011
Differential power analysis in the presence of hardware countermeasures
C Clavier, JS Coron, N Dabbous
Cryptographic Hardware and Embedded Systems—CHES 2000: Second International …, 2000
6112000
On the exact security of full domain hash
JS Coron
Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology …, 2000
5272000
Practical multilinear maps over the integers
JS Coron, T Lepoint, M Tibouchi
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
4872013
Batch fully homomorphic encryption over the integers
JH Cheon, JS Coron, J Kim, MS Lee, T Lepoint, M Tibouchi, A Yun
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
4592013
Public key compression and modulus switching for fully homomorphic encryption over the integers
JS Coron, D Naccache, M Tibouchi
Advances in Cryptology–EUROCRYPT 2012: 31st Annual International Conference …, 2012
3882012
On boolean and arithmetic masking against differential power analysis
JS Coron, L Goubin
Cryptographic Hardware and Embedded Systems—CHES 2000: Second International …, 2000
3572000
Optimal security proofs for PSS and other signature schemes
JS Coron
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
2472002
Statistics and secret leakage
JS Coron, P Kocher, D Naccache
Financial Cryptography: 4th International Conference, FC 2000 Anguilla …, 2001
2242001
Scale-invariant fully homomorphic encryption over the integers
JS Coron, T Lepoint, M Tibouchi
Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014
2212014
Zeroizing without low-level zeroes: New MMAP attacks and their limitations
JS Coron, C Gentry, S Halevi, T Lepoint, HK Maji, E Miles, M Raykova, ...
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
1832015
New multilinear maps over the integers
JS Coron, T Lepoint, M Tibouchi
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
1832015
Higher-order side channel security and mask refreshing
JS Coron, E Prouff, M Rivain, T Roche
Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014
1802014
An efficient method for random delay generation in embedded software
JS Coron, I Kizhvatov
Cryptographic Hardware and Embedded Systems-CHES 2009: 11th International …, 2009
1772009
The Random Oracle Model and the Ideal Cipher Model Are Equivalent.
JS Coron, J Patarin, Y Seurin
CRYPTO 5157, 1-20, 2008
1742008
Higher order masking of look-up tables
JS Coron
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
1692014
Efficient indifferentiable hashing into ordinary elliptic curves
E Brier, JS Coron, T Icart, D Madore, H Randriam, M Tibouchi
Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010
1632010
Analysis and improvement of the random delay countermeasure of CHES 2009
JS Coron, I Kizhvatov
Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International …, 2010
1522010
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20