Notice: Unexpected clearActionName after getActionName already called in /var/www/html/w/includes/context/RequestContext.php on line 333
Jean-Sébastien Coron - MaRDI portal

Jean-Sébastien Coron

From MaRDI portal
(Redirected from Person:882778)
Person:271579

Available identifiers

zbMath Open coron.jean-sebastienDBLP61/1318WikidataQ27980757 ScholiaQ27980757MaRDI QIDQ271579

List of research outcomes





PublicationDate of PublicationType
Random probing security: verification, composition, expansion and new constructions2022-11-09Paper
A polynomial-time algorithm for solving the hidden subset sum problem2022-11-09Paper
Secure wire shuffling in the probing model2022-04-22Paper
Side-channel masking with pseudo-random generator2021-12-01Paper
Improved cryptanalysis of the AJPS Mersenne based cryptosystem2021-05-03Paper
Simultaneous diagonalization of incomplete matrices and applications2021-03-11Paper
High-Order Conversion from Boolean to Arithmetic Masking2020-06-24Paper
On Kilian's randomization of multilinear map encodings2020-05-05Paper
Cryptanalysis of CLT13 multilinear maps with independent slots2020-05-05Paper
Improved factorization of \(N=p^rq^s\)2020-01-21Paper
Formal verification of side-channel countermeasures via elementary circuit transformations2018-08-10Paper
Improved side-channel analysis of finite-field multiplication2018-02-14Paper
Horizontal side-channel attacks and countermeasures on the ISW masking scheme2018-02-14Paper
Faster evaluation of sboxes via common shares2018-02-14Paper
Zeroizing Attacks on Indistinguishability Obfuscation over CLT132017-06-13Paper
Cryptanalysis of GGH15 Multilinear Maps2016-10-27Paper
Practical cryptanalysis of ISO 9796-2 and EMV signatures2016-09-21Paper
Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol2016-05-02Paper
Factoring $$N=p^rq^s$$ for Large r and s2016-04-08Paper
How to build an ideal cipher: the indifferentiability of the Feistel construction2016-04-07Paper
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations2015-12-10Paper
New Multilinear Maps Over the Integers2015-12-10Paper
Higher-Order Side Channel Security and Mask Refreshing2015-09-18Paper
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity2015-09-18Paper
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures2015-07-21Paper
Secure Conversion between Boolean and Arithmetic Masking of Any Order2015-07-21Paper
Higher Order Masking of Look-Up Tables2014-05-27Paper
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences2014-03-25Paper
Scale-Invariant Fully Homomorphic Encryption over the Integers2014-03-25Paper
Practical Multilinear Maps over the Integers2013-09-02Paper
A note on the bivariate Coppersmith theorem2013-06-27Paper
Another Look at Affine-Padding RSA Signatures2013-06-04Paper
Batch Fully Homomorphic Encryption over the Integers2013-05-31Paper
Conversion of Security Proofs from One Leakage Model to Another: A New Issue2013-02-14Paper
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers2012-06-29Paper
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping2012-06-08Paper
Fully Homomorphic Encryption over the Integers with Shorter Public Keys2011-08-12Paper
Improved Generic Algorithms for Hard Knapsacks2011-05-27Paper
Cryptanalysis of the RSA Subgroup Assumption from TCC 20052011-03-15Paper
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves2010-08-24Paper
Analysis and Improvement of the Random Delay Countermeasure of CHES 20092010-08-17Paper
On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption2010-07-06Paper
Fault Attacks Against emv Signatures2010-03-16Paper
A New Algorithm for Switching from Arithmetic to Boolean Masking2010-03-09Paper
A Domain Extender for the Ideal Cipher2010-02-24Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
PSS Is Secure against Random Fault Attacks2009-12-15Paper
An Efficient Method for Random Delay Generation in Embedded Software2009-11-10Paper
Fault Attacks on RSA Signatures with Partially Unknown Messages2009-11-10Paper
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures2009-10-20Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model2009-03-31Paper
Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach2009-03-10Paper
The Random Oracle Model and the Ideal Cipher Model Are Equivalent2009-02-10Paper
A New DPA Countermeasure Based on Permutation Tables2008-11-20Paper
Side Channel Cryptanalysis of a Higher Order Masking Scheme2008-09-16Paper
Cryptanalysis of ISO/IEC 9796-12008-04-16Paper
Merkle-Damgård Revisited: How to Construct a Hash Function2008-03-17Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Deterministic polynomial-time equivalence of computing the RSA secret key and factoring2007-05-24Paper
Index calculation attacks on RSA signature and encryption2006-05-29Paper
https://portal.mardi4nfdi.de/entity/Q33749022006-03-01Paper
https://portal.mardi4nfdi.de/entity/Q33749212006-03-01Paper
Public Key Cryptography - PKC 20052005-12-07Paper
https://portal.mardi4nfdi.de/entity/Q47372502004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q30439242004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q47364292004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q44720792004-08-03Paper
https://portal.mardi4nfdi.de/entity/Q44091212003-06-30Paper
https://portal.mardi4nfdi.de/entity/Q44091462003-06-30Paper
https://portal.mardi4nfdi.de/entity/Q47837392002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q45362282002-11-28Paper
https://portal.mardi4nfdi.de/entity/Q45362312002-11-28Paper
https://portal.mardi4nfdi.de/entity/Q45362952002-11-28Paper
https://portal.mardi4nfdi.de/entity/Q45368042002-07-28Paper
https://portal.mardi4nfdi.de/entity/Q42634192001-07-23Paper
https://portal.mardi4nfdi.de/entity/Q27074062001-07-03Paper
https://portal.mardi4nfdi.de/entity/Q45027962001-03-04Paper
https://portal.mardi4nfdi.de/entity/Q45024922000-09-12Paper
https://portal.mardi4nfdi.de/entity/Q49418432000-07-26Paper
https://portal.mardi4nfdi.de/entity/Q42508062000-02-01Paper
https://portal.mardi4nfdi.de/entity/Q42634342000-02-01Paper

Research outcomes over time

This page was built for person: Jean-Sébastien Coron