Skip to Main content Skip to Navigation

inria-00577142v1  Conference papers
Aurélie BauerJean-Sébastien CoronDavid NaccacheMehdi TibouchiDamien Vergnaud. On The Broadcast and Validity-Checking Security of PKCS #1 v1.5 Encryption
Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Jun 2010, Beijing, China. pp.1-18, ⟨10.1007/978-3-642-13708-2_1⟩
hal-01098399v1  Reports
Thomas BourgeatJulien BringerHervé ChabanneRobin ChampenoisJérémie Clément et al.  New Algorithmic Approaches to Point Constellation Recogniti
[Technical Report] CoRR abs/1405.1402 (2014), Ecole normale supérieure. 2014, pp.14
hal-01613794v1  Conference papers
Marc BeunardeauAisling ConnollyHouda FerradiRémi GéraudDavid Naccache et al.  Reusing Nonces in Schnorr Signatures
Computer Security - ESORICS 2017, Sep 2017, Oslo, Norway. pp.224-241, ⟨10.1007/978-3-319-66402-6_14⟩
hal-01668213v1  Conference papers
Rémi GéraudDavid NaccacheRăzvan Roşie. Twisting Lattice and Graph Techniques to Compress Transactional Ledgers
SecureComm 2017 - 13th EAI International Conference on Security and Privacy in Communication Networks, Oct 2017, Niagara Falls, Canada. pp.1-20
hal-01110259v1  Conference papers
Antoine AmarilliSascha MüllerDavid NaccacheDaniel PagePablo Rauzy et al.  Can code polymorphism limit information leakage?
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩
hal-01098401v2  Conference papers
Thomas BourgeatJulien BringerHervé ChabanneRobin ChampenoisJérémie Clément et al.  New Algorithmic Approaches to Point Constellation Recognition
29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.80-90, ⟨10.1007/978-3-642-55415-5_7⟩
hal-01098408v1  Books
David NaccacheDamien Sauveron. Information Security Theory and Practice: Securing the Internet of Things
David Naccache; Damien Sauveron. Springer, LNCS-8501, 2014, Lecture Notes in Computer Science, 978-3-662-43825-1. ⟨10.1007/978-3-662-43826-8⟩
hal-01056101v1  Conference papers
Benoît Chevallier-MamesJean-Sébastien CoronNoel MccullaghDavid NaccacheMichael Scott. Secure Delegation of Elliptic-Curve Pairing
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.24-35, ⟨10.1007/978-3-642-12510-2_3⟩
hal-01110894v1  Journal articles
Eric BrierWenjie FangDavid Naccache. How to Scatter a Secret?
Cryptologia, Taylor & Francis, 2012, 36 (1), pp.46-54. ⟨10.1080/01611194.2012.635100⟩
emse-01130826v1  Conference papers
Michel AgoyanJean-Max DutertreAmir-Pasha MirbahaDavid NaccacheAnne-Lise Ribotta et al.  How to Flip a Bit?
On-Line Testing Symposium (IOLTS), 2010 IEEE 16th International, Jul 2010, Corfu, Greece. ⟨10.1109/IOLTS.2010.5560194⟩
emse-00742567v1  Conference papers
Jean-Max DutertreAmir-Pasha MirbahaDavid NaccacheAnne-Lise RibottaAssia Tria et al.  Fault Round Modification Analysis of the Advanced Encryption Standard
Hardware-Oriented Security and Trust (HOST), 2012, Jun 2012, San Francisco, United States. pp.140--145, ⟨10.1109/HST.2012.6224334⟩
hal-01110216v1  Conference papers
Jean-Sébastien CoronAvradip MandalDavid NaccacheMehdi Tibouchi. Fully Homomorphic Encryption over the Integers with Shorter Public Keys
CRYPTO 2011 - 31st Annual Cryptology Conference, Aug 2011, Santa Barbara, CA, United States. pp.487-504, ⟨10.1007/978-3-642-22792-9_28⟩
hal-00686565v1  Conference papers
Cedric MurdicaJean-Luc DangerSylvain GuilleyPhilippe HoogvorstDavid Naccache. Same Values Power Analysis Using Special Points on Elliptic Curves
COSADE 2012 - Third International Workshop Constructive Side-Channel Analysis and Secure Design, May 2012, Darmstadt, Germany. pp.Cédric Murdica, ⟨10.1007/978-3-642-29912-4_14⟩
hal-00934334v1  Reports
Roman KorkikianDavid NaccacheGuilherme Ozari de Almeida. Instantaneous Frequency Analysis
[Research Report] IACR Cryptology ePrint Archive 2013: 320 (2013), 2013
hal-00934340v1  Conference papers
Roman KorkikianDavid NaccacheGuilherme Ozari de Almeida. Instantaneous Frequency Analysis
DCNET/ICE-B/OPTICS 2013: IS-11 - 4th International Conference on Data Communication Networking, 10th International Conference on e-Business and 4th International Conference on Optical Communication Systems, Jul 2013, Reykjavík, Iceland
hal-00934335v1  Conference papers
Diana MaimutCédric MurdicaDavid NaccacheMehdi Tibouchi. Fault Attacks on Projective-to-Affine Coordinates Conversion
COSADE 2013 - 4th International Workshop Constructive Side-Channel Analysis and Secure Design, 2013, Paris, France. pp.46-61, ⟨10.1007/978-3-642-40026-1_4⟩
hal-01111484v1  Book sections
Guillaume ClaretMichaël MathieuDavid NaccacheGuillaume Segerer. Physical Simulation of Inarticulate Robots
David Naccache. Cryptography and Security: From Theory to Applications:Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday, 6805, Springer, pp.491-499, 2012, LNCS - Lecture Notes in Computer Science, ⟨10.1007/978-3-642-28368-0_33⟩
hal-01110234v1  Conference papers
Jean-Sébastien CoronAntoine JouxAvradip MandalDavid NaccacheMehdi Tibouchi. Cryptanalysis of the RSA Subgroup Assumption from TCC 2005
PKC 2011 - Proceedings of the 2011 International Conference on Practice and Theory in Public Key Cryptography, Mar 2011, Taormina, Italy. pp.147-155, ⟨10.1007/978-3-642-19379-8_9⟩
hal-01110939v1  Directions of work or proceedings
David Naccache. Cryptography and Security: From Theory to Applications
France. 6805, Springer, pp.318, 2012, LNCS - Lecture Notes in Computer Science, ⟨10.1007/978-3-642-28368-0⟩
hal-00721569v2  Conference papers
Sébastien BriaisJean-Michel CioranescoJean-Luc DangerSylvain GuilleyDavid Naccache et al.  Random Active Shield
Fault Diagnosis and Tolerance in Cryptography, Sep 2012, Leuven, Belgium. 11 p., ⟨10.1109/FDTC.2012.11⟩
emse-01130782v1  Conference papers
Jean-Max DutertreAmir-Pasha MirbahaDavid NaccacheAssia Tria. Reproducible Single-Byte Laser Fault Injection
6th Conference on Ph.D. Research in Microelectronics & Electronics, PRIME 2010, Jul 2010, Berlin, Germany
hal-00934347v1  Journal articles
Jean-Michel CioranescoHouda FerradiDavid Naccache. Communicating Covertly through CPU Monitoring
IEEE Security and Privacy Magazine, Institute of Electrical and Electronics Engineers, 2013, 11 (6), pp.71-73. ⟨10.1109/MSP.2013.140⟩
hal-00934345v1  Conference papers
Eric BrierDavid NaccacheLi-Yao Xia. How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling
Open Problems in Mathematical and Computational Sciences Conference, Sep 2013, Istambul, Turkey
hal-01111541v1  Conference papers
Jean-Sébastien CoronDavid NaccacheMehdi Tibouchi. Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Apr 2012, Cambridge, UK, United Kingdom. pp.446-464, ⟨10.1007/978-3-642-29011-4_27⟩