Cryptographers' World
 

Jean-Sébastien Coron


Author's Web Page Link

38 papers in database with 1989 citations StarStarStar

H-number: 19

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Don Coppersmith,  Jean-Sébastien Coron,  François Grieu,  Shai Halevi,  Charanjit S. Jutla,  David Naccache,  Julien P. Stern,  Cryptanalysis of ISO/IEC 9796-1, Journal of Cryptology, Volume 21(1), pp. 27 - 51, Springer, 2008.

[Cited 3 times ]

2. Jean-Sébastien Coron,  Alexander May,  Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring, Journal of Cryptology, Volume 20(1), pp. 39 - 50, Springer, 2007.

[Cited 20 times ]

3. Jean-Sébastien Coron,  David Naccache,  Yvo Desmedt,  Andrew M. Odlyzko,  Julien P. Stern,  Index Calculation Attacks on RSA Signature and Encryption, Designs, Codes and Cryptography, Volume 38(1), pp. 41 - 53, Springer, 2006.

[Electronic Edition][Cited 2 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Jean-Sébastien Coron,  Avradip Mandal,  PSS Is Secure against Random Fault Attacks, pp. 653 - 666, ASIACRYPT 2009.

[Electronic Edition][Cited 1 times ]

2. Jean-Sébastien Coron,  David Naccache,  Mehdi Tibouchi,  Ralf-Philipp Weinmann,  Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures, pp. 428 - 444, CRYPTO 2009.

[Electronic Edition][Cited 3 times ]

3. Jean-Sébastien Coron,  Christophe Giraud,  Emmanuel Prouff,  Matthieu Rivain,  Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform, pp. 1 - 14, CHES 2008.

[Electronic Edition][Cited 8 times ]

4. Jean-Sébastien Coron,  Jacques Patarin,  Yannick Seurin,  The Random Oracle Model and the Ideal Cipher Model Are Equivalent, pp. 1 - 20, CRYPTO 2008.

[Electronic Edition][Cited 26 times ]

5. Christophe Clavier,  Jean-Sébastien Coron,  On the Implementation of a Fast Prime Generation Algorithm, pp. 443 - 449, CHES 2007.

[Electronic Edition][Cited 1 times ]

6. Jean-Sébastien Coron,  Emmanuel Prouff,  Matthieu Rivain,  Side Channel Cryptanalysis of a Higher Order Masking Scheme, pp. 28 - 44, CHES 2007.

[Electronic Edition][Cited 18 times ]

7. Jean-Sébastien Coron,  Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach, pp. 379 - 394, CRYPTO 2007.

[Electronic Edition][Cited 18 times ]

8. Jean-Sébastien Coron,  Yevgeniy Dodis,  Cécile Malinaud,  Prashant Puniya,  Merkle-DamgÃ¥rd Revisited: How to Construct a Hash Function, pp. 430 - 448, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 180 times Red StarRed Star]

9. Jean-Sébastien Coron,  David Lefranc,  Guillaume Poupard,  A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis, pp. 47 - 60, CHES 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 14 times ]

10. Julien Cathalo,  Jean-Sébastien Coron,  David Naccache,  From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited, pp. 234 - 243, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 1 times ]

11. Jean-Sébastien Coron,  Finding Small Roots of Bivariate Integer Polynomial Equations Revisited, pp. 492 - 505, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 44 times ]

12. Jean-Sébastien Coron,  Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem, pp. 14 - 27, PKC 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 6 times ]

13. Jean-Sébastien Coron,  David Naccache,  Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95, pp. 157 - 162, CT-RSA 2004.

[Electronic Edition][Cited 2 times ]

14. Jean-Sébastien Coron,  David Naccache,  Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption, pp. 392 - 397, ASIACRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 21 times ]

15. Jean-Sébastien Coron,  Alexei Tchulkine,  A New Algorithm for Switching from Arithmetic to Boolean Masking, pp. 89 - 97, CHES 2003.

[Electronic Edition][Cited 23 times ]

16. Jean-Sébastien Coron,  Marc Joye,  David Naccache,  Pascal Paillier,  Universal Padding Schemes for RSA, pp. 226 - 241, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 55 times Red Star]

17. Jean-Sébastien Coron,  Security Proof for Partial-Domain Hash Signature Schemes, pp. 613 - 626, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 14 times ]

18. Jean-Sébastien Coron,  Optimal Security Proofs for PSS and Other Signature Schemes, pp. 272 - 287, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 78 times Red Star]

19. Jean-Sébastien Coron,  Helena Handschuh,  Marc Joye,  Pascal Paillier,  David Pointcheval,  Christophe Tymen,  GEM: A Generic Chosen-Ciphertext Secure Encryption Method, pp. 263 - 276, CT-RSA 2002.

[Electronic Edition][Cited 32 times ]

20. Jean-Sébastien Coron,  Helena Handschuh,  Marc Joye,  Pascal Paillier,  David Pointcheval,  Christophe Tymen,  Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages, pp. 17 - 33, PKC 2002.

[Electronic Edition][Cited 17 times ]

21. Jean-Sébastien Coron,  David M'Raïhi,  Christophe Tymen,  Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves, pp. 151 - 164, SAC 2001.

[Electronic Edition][Cited 14 times ]

22. Eric Brier,  Christophe Clavier,  Jean-Sébastien Coron,  David Naccache,  Cryptanalysis of RSA Signatures with Fixed-Pattern Padding, pp. 433 - 439, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 16 times ]

23. Jean-Sébastien Coron,  François Koeune,  David Naccache,  From Fixed-Length to Arbitrary-Length RSA Padding Schemes, pp. 90 - 96, ASIACRYPT 2000.

[Electronic Edition][Cited 4 times ]

24. Jean-Sébastien Coron,  On the Exact Security of Full Domain Hash, pp. 229 - 235, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 191 times Red StarRed Star]

25. Jean-Sébastien Coron,  Marc Joye,  David Naccache,  Pascal Paillier,  New Attacks on PKCS#1 v1.5 Encryption, pp. 369 - 381, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 19 times ]

26. Jean-Sébastien Coron,  David Naccache,  Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme, pp. 91 - 101, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 33 times ]

27. Jean-Sébastien Coron,  Louis Goubin,  On Boolean and Arithmetic Masking against Differential Power Analysis, pp. 231 - 237, CHES 2000.

[Electronic Edition][Cited 139 times Red StarRed Star]

28. Christophe Clavier,  Jean-Sébastien Coron,  Nora Dabbous,  Differential Power Analysis in the Presence of Hardware Countermeasures, pp. 252 - 263, CHES 2000.

[Electronic Edition][Cited 219 times Red StarRed Star]

29. Jean-Sébastien Coron,  Paul C. Kocher,  David Naccache,  Statistics and Secret Leakage, pp. 157 - 173, FC 2000.

[Electronic Edition][Cited 99 times Red Star]

30. Jean-Sébastien Coron,  Helena Handschuh,  David Naccache,  ECC: Do We Need to Count?, pp. 122 - 134, ASIACRYPT 1999.

[Electronic Edition][Cited 4 times ]

31. Jean-Sébastien Coron,  David Naccache,  Julien P. Stern,  On the Security of RSA Padding, pp. 1 - 18, CRYPTO 1999.

[Electronic Edition][Cited 87 times Red Star]

32. Jean-Sébastien Coron,  Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems, pp. 292 - 302, CHES 1999.

[Electronic Edition][Cited 504 times Red StarRed StarRed StarRed Star]

33. Jean-Sébastien Coron,  David Naccache,  On the Security of RSA Screening, pp. 197 - 203, PKC 1999.

[Electronic Edition][Cited 19 times ]

34. Jean-Sébastien Coron,  On the Security of Random Sources, pp. 29 - 42, PKC 1999.

[Electronic Edition][Cited 21 times ]

35. Jean-Sébastien Coron,  David Naccache,  An Accurate Evaluation of Maurer's Universal Test, pp. 57 - 71, SAC 1998.

[Electronic Edition][Cited 33 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...