David Naccache

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On Catalan constant continued fractions
Codes, Cryptology and Information Security
2023-10-04Paper
Pattern Recognition Experiments on Mathematical Expressions
 
2022-12-21Paper
A Note on the Ramanujan Machine
 
2022-11-02Paper
Non-interactive provably secure attestations for arbitrary RSA prime generation algorithms
 
2022-08-25Paper
Reusing nonces in Schnorr signatures (and keeping it secure...)
 
2022-08-25Paper
Automated Discovery of New $L$-Function Relations
 
2022-06-07Paper
The Multiplicative Persistence Conjecture Is True for Odd Targets
 
2021-10-08Paper
The eleventh power residue symbol
Journal of Mathematical Cryptology
2021-05-25Paper
New number-theoretic cryptographic primitives
Journal of Mathematical Cryptology
2021-05-03Paper
Approaching optimal duplicate detection in a sliding window
 
2021-04-21Paper
Explaining the Entombed Algorithm
 
2021-04-18Paper
Integer Reconstruction Public-Key Encryption
Cryptology and Network Security
2020-07-20Paper
Recovering secrets from prefix-dependent leakage
Journal of Mathematical Cryptology
2020-06-24Paper
A Fractional $3n+1$ Conjecture
 
2020-06-20Paper
The Look-and-Say The Biggest Sequence Eventually Cycles
 
2020-06-12Paper
Stuttering Conway Sequences Are Still Conway Sequences
 
2020-06-11Paper
On the hardness of the Mersenne Low Hamming Ratio assumption
 
2020-03-02Paper
Robust encryption (extended)
 
2020-01-28Paper
Efficient subtree-based encryption for fuzzy-entity data sharing
Soft Computing
2018-11-27Paper
\(\mathsf{xmx}\): a firmware-oriented block cipher based on modular multiplications
Fast Software Encryption
2018-05-09Paper
Backtracking-assisted multiplication
Cryptography and Communications
2018-01-29Paper
Honey encryption for language. Robbing Shannon to pay Turing?
 
2017-10-23Paper
Human public-key encryption
 
2017-10-23Paper
Legally Fair Contract Signing Without Keystones
Applied Cryptography and Network Security
2016-10-04Paper
Practical cryptanalysis of ISO 9796-2 and EMV signatures
Journal of Cryptology
2016-09-21Paper
Slow motion zero knowledge identifying with colliding commitments
Information Security and Cryptology
2016-07-25Paper
Buying AES design resistance with speed and energy
The New Codebreakers
2016-05-02Paper
Improving the Big Mac attack on elliptic curve cryptography
The New Codebreakers
2016-05-02Paper
Photonic power firewalls
The New Codebreakers
2016-05-02Paper
Double-speed Barrett moduli
The New Codebreakers
2016-05-02Paper
Failure is also an option
The New Codebreakers
2016-05-02Paper
How to (carefully) breach a service contract?
The New Codebreakers
2016-05-02Paper
Safe-errors on SPA protected implementations with the atomicity technique
The New Codebreakers
2016-05-02Paper
OMD: a compression function mode of operation for authenticated encryption
Selected Areas in Cryptography -- SAC 2014
2016-04-13Paper
Verifying software integrity in embedded systems: a side channel approach
Constructive Side-Channel Analysis and Secure Design
2016-03-10Paper
How to sign paper contracts? Conjectures and evidence related to equitable and efficient collaborative task scheduling
Open Problems in Mathematics and Computational Science
2015-06-22Paper
Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption
Lecture Notes in Computer Science
2014-10-14Paper
Another look at affine-padding RSA signatures
Lecture Notes in Computer Science
2013-06-04Paper
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Autotomic signatures
Cryptography and Security: From Theory to Applications
2012-06-08Paper
Operand Folding Hardware Multipliers
Cryptography and Security: From Theory to Applications
2012-06-08Paper
How to Read a Signature?
Cryptography and Security: From Theory to Applications
2012-06-08Paper
Physical Simulation of Inarticulate Robots
Cryptography and Security: From Theory to Applications
2012-06-08Paper
Can a program reverse-engineer itself?
Cryptography and Coding
2011-12-16Paper
Fully homomorphic encryption over the integers with shorter public keys
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Cryptanalysis of the RSA subgroup assumption from TCC 2005
Public Key Cryptography – PKC 2011
2011-03-15Paper
Factoring unbalanced moduli with known bits
Information, Security and Cryptology – ICISC 2009
2010-07-16Paper
On the broadcast and validity-checking security of \textsc{pkcs}\#1 v1.5 encryption
Applied Cryptography and Network Security
2010-07-06Paper
Divisibility, smoothness and cryptographic applications
 
2010-05-14Paper
The polynomial composition problem in \((\mathbb Z/n\mathbb Z)[X\)]
Lecture Notes in Computer Science
2010-04-19Paper
Fault attacks against EMV signatures
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Efficient rational secret sharing in standard communication networks
Theory of Cryptography
2010-02-24Paper
Oracle-assisted static Diffie-Hellman is easier than discrete logarithms
Cryptography and Coding
2010-01-07Paper
Comparing with RSA
Cryptography and Coding
2010-01-07Paper
Boneh et al.'s \(k\)-element aggregate extraction assumption is equivalent to the Diffie-Hellman assumption
Lecture Notes in Computer Science
2010-01-05Paper
Fault Attacks on RSA Signatures with Partially Unknown Messages
Lecture Notes in Computer Science
2009-11-10Paper
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Topics in Cryptology – CT-RSA 2004
Lecture Notes in Computer Science
2009-05-07Paper
Linear Bandwidth Naccache-Stern Encryption
Lecture Notes in Computer Science
2008-11-20Paper
When e-th Roots Become Easier Than Factoring
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
Cryptanalysis of ISO/IEC 9796-1
Journal of Cryptology
2008-04-16Paper
Cryptographic Test Correction
Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings
2008-03-05Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry’s Crypt
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Index calculation attacks on RSA signature and encryption
Designs, Codes and Cryptography
2006-05-29Paper
New attacks on PKCS\#1 V1.5 encryption
 
2006-03-01Paper
Security analysis of the Gennaro-Halevi-Rabin signature scheme
 
2006-03-01Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
Cryptographic Hardware and Embedded Systems - CHES 2004
Lecture Notes in Computer Science
2005-08-23Paper
scientific article; zbMATH DE number 2088330 (Why is no real title available?)
 
2004-08-12Paper
scientific article; zbMATH DE number 1980953 (Why is no real title available?)
 
2003-09-15Paper
scientific article; zbMATH DE number 1950600 (Why is no real title available?)
 
2003-07-17Paper
scientific article; zbMATH DE number 1950608 (Why is no real title available?)
 
2003-07-17Paper
scientific article; zbMATH DE number 1942423 (Why is no real title available?)
 
2003-06-30Paper
scientific article; zbMATH DE number 1842505 (Why is no real title available?)
 
2002-12-08Paper
scientific article; zbMATH DE number 1759356 (Why is no real title available?)
 
2002-11-28Paper
scientific article; zbMATH DE number 1759354 (Why is no real title available?)
 
2002-11-28Paper
scientific article; zbMATH DE number 1759351 (Why is no real title available?)
 
2002-11-28Paper
scientific article; zbMATH DE number 1759295 (Why is no real title available?)
 
2002-11-28Paper
scientific article; zbMATH DE number 1676660 (Why is no real title available?)
 
2001-11-25Paper
scientific article; zbMATH DE number 1583772 (Why is no real title available?)
 
2001-07-03Paper
scientific article; zbMATH DE number 1504544 (Why is no real title available?)
 
2000-09-12Paper
scientific article; zbMATH DE number 1418283 (Why is no real title available?)
 
2000-07-26Paper
scientific article; zbMATH DE number 1456815 (Why is no real title available?)
 
2000-06-07Paper
scientific article; zbMATH DE number 1304108 (Why is no real title available?)
 
2000-02-01Paper
scientific article; zbMATH DE number 1341876 (Why is no real title available?)
 
2000-02-01Paper
scientific article; zbMATH DE number 1394294 (Why is no real title available?)
 
2000-01-31Paper
scientific article; zbMATH DE number 1341875 (Why is no real title available?)
 
1999-09-22Paper
scientific article; zbMATH DE number 1303124 (Why is no real title available?)
 
1999-06-17Paper
scientific article; zbMATH DE number 1304109 (Why is no real title available?)
 
1999-06-17Paper
scientific article; zbMATH DE number 1088905 (Why is no real title available?)
 
1998-02-19Paper
Can Montgomery parasites be avoided? A design methodology based on key and cryptosystem modifications
Designs, Codes and Cryptography
1995-06-20Paper
scientific article; zbMATH DE number 503365 (Why is no real title available?)
 
1994-03-10Paper
The Balkans Continued Fraction
 
N/APaper


Research outcomes over time


This page was built for person: David Naccache