dblp.uni-trier.dewww.uni-trier.de

David Naccache Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
68EEJean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier: Fault Attacks on RSA Signatures with Partially Unknown Messages. CHES 2009: 444-456
67EEJean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann: Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures. CRYPTO 2009: 428-444
2008
66 Luca Breveglieri, Shay Gueron, Israel Koren, David Naccache, Jean-Pierre Seifert: Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008, FDTC 2008, Washington, DC, USA, 10 August 2008 IEEE Computer Society 2008
65EEÉric Levieil, David Naccache: Cryptographic Test Correction. Public Key Cryptography 2008: 85-100
64EEBenoît Chevallier-Mames, David Naccache, Jacques Stern: Linear Bandwidth Naccache-Stern Encryption. SCN 2008: 327-339
63EEDavid Naccache, Igor Shparlinski: Divisibility, Smoothness and Cryptographic Applications CoRR abs/0810.2067: (2008)
62EEÉric Levieil, David Naccache: Cryptographic Test Correction. IEEE Security & Privacy 6(2): 69-71 (2008)
61EEDon Coppersmith, Jean-Sébastien Coron, François Grieu, Shai Halevi, Charanjit S. Jutla, David Naccache, Julien P. Stern: Cryptanalysis of ISO/IEC 9796-1. J. Cryptology 21(1): 27-51 (2008)
2007
60 Luca Breveglieri, Shay Gueron, Israel Koren, David Naccache, Jean-Pierre Seifert: Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007, FDTC 2007: Vienna, Austria, 10 September 2007 IEEE Computer Society 2007
59EEAntoine Joux, David Naccache, Emmanuel Thomé: When e-th Roots Become Easier Than Factoring. ASIACRYPT 2007: 13-28
58EEVanessa Gratzer, David Naccache: Alien vs. Quine. IEEE Security & Privacy 5(2): 26-31 (2007)
57EEVanessa Gratzer, David Naccache: Trust on a Nationwide Scale. IEEE Security & Privacy 5(5): 69-71 (2007)
2006
56 Luca Breveglieri, Israel Koren, David Naccache, Jean-Pierre Seifert: Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings Springer 2006
55EEVanessa Gratzer, David Naccache: Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry's Crypt. EUROCRYPT 2006: 48-58
54EEVanessa Gratzer, David Naccache, David Znaty: Law Enforcement, Forensics and Mobile Communications. PerCom Workshops 2006: 256-260
53EEJean-Sébastien Coron, David Naccache, Yvo Desmedt, Andrew M. Odlyzko, Julien P. Stern: Index Calculation Attacks on RSA Signature and Encryption. Des. Codes Cryptography 38(1): 41-53 (2006)
52EEVanessa Gratzer, David Naccache: Cryptography, Law Enforcement, and Mobile Communications. IEEE Security & Privacy 4(6): 67-70 (2006)
2005
51EEDavid Naccache: National Security, Forensics and Mobile Communications. ICISC 2005: 1
50EEDavid Naccache, Phong Q. Nguyen, Michael Tunstall, Claire Whelan: Experimenting with Faults, Lattices and the DSA. Public Key Cryptography 2005: 16-28
49EEJulien Cathalo, Jean-Sébastien Coron, David Naccache: From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited. Public Key Cryptography 2005: 234-243
48EEDavid Naccache: Secure and {\sl Practical} Identity-Based Encryption CoRR abs/cs/0510042: (2005)
47EEPeter Gutmann, David Naccache, Charles C. Palmer: When Hashes Collide. IEEE Security & Privacy 3(3): 68-71 (2005)
46EEDavid Naccache: Finding Faults. IEEE Security & Privacy 3(5): 61-65 (2005)
2004
45EEBenoît Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval: How to Disembed a Program? CHES 2004: 441-454
44EEJean-Sébastien Coron, David Naccache: Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95. CT-RSA 2004: 157-162
43EEDavid Naccache, Nigel P. Smart, Jacques Stern: Projective Coordinates Leak. EUROCRYPT 2004: 257-267
42EEClaude Barral, Jean-Sébastien Coron, David Naccache: Externalized Fingerprint Matching. ICBA 2004: 309-315
41EEJean-Sébastien Coron, David Naccache, Paul C. Kocher: Statistics and secret leakage. ACM Trans. Embedded Comput. Syst. 3(3): 492-508 (2004)
2003
40EEJean-Sébastien Coron, David Naccache: Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption. ASIACRYPT 2003: 392-397
39EEKonstantin Hyppönen, David Naccache, Elena Trichina, Alexei Tchoulkine: Trading-Off Type-Inference Memory Complexity against Communication. ICICS 2003: 60-71
2002
38 David Naccache, Pascal Paillier: Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002, Proceedings Springer 2002
37EEHelena Handschuh, David Naccache, Pascal Paillier, Christophe Tymen: Provably Secure Chipcard Personalization, or, How to Fool Malicious Insiders. CARDIS 2002
36EEJean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier: Universal Padding Schemes for RSA. CRYPTO 2002: 226-241
35EEDavid Naccache, Alexei Tchoulkine, Christophe Tymen, Elena Trichina: Reducing the Memory Complexity of Type-Inference Algorithms. ICICS 2002: 109-121
34EESerge Lefranc, David Naccache: Cut-&-Paste Attacks with JAVA. ICISC 2002: 1-15
33EENils Maltesson, David Naccache, Elena Trichina, Christophe Tymen: Applet Verification Strategiesfor RAM-Constrained Devices. ICISC 2002: 118-137
2001
32 David Naccache: Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings Springer 2001
31 Çetin Kaya Koç, David Naccache, Christof Paar: Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings Springer 2001
30EEDavid Naccache, David Pointcheval, Jacques Stern: Twin signatures: an alternative to the hash-and-sign paradigm. ACM Conference on Computer and Communications Security 2001: 20-27
29EEEric Brier, Christophe Clavier, Jean-Sébastien Coron, David Naccache: Cryptanalysis of RSA Signatures with Fixed-Pattern Padding. CRYPTO 2001: 433-439
28EEDavid Naccache, David Pointcheval, Christophe Tymen: Monotone Signatures. Financial Cryptography 2001: 295-308
2000
27EEJean-Sébastien Coron, François Koeune, David Naccache: From Fixed-Length to Arbitrary-Length RSA Padding Schemes. ASIACRYPT 2000: 90-96
26EEDavid Naccache, Michael Tunstall: How to Explain Side-Channel Leakage to Your Kids. CHES 2000: 229-230
25EEJean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier: New Attacks on PKCS#1 v1.5 Encryption. EUROCRYPT 2000: 369-381
24EEJean-Sébastien Coron, David Naccache: Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme. EUROCRYPT 2000: 91-101
23EEDavid Naccache, Jacques Stern: Signing on a Postcard. Financial Cryptography 2000: 121-135
22EEJean-Sébastien Coron, Paul C. Kocher, David Naccache: Statistics and Secret Leakage. Financial Cryptography 2000: 157-173
21EEDavid M'Raïhi, David Naccache, Michael Tunstall: Asymmetric Currency Rounding. Financial Cryptography 2000: 192-201
1999
20EEJean-Sébastien Coron, Helena Handschuh, David Naccache: ECC: Do We Need to Count? ASIACRYPT 1999: 122-134
19EEJean-Sébastien Coron, David Naccache, Julien P. Stern: On the Security of RSA Padding. CRYPTO 1999: 1-18
18EEDavid Naccache, Adi Shamir, Julien P. Stern: How to Copyright a Function? Public Key Cryptography 1999: 188-196
17EEJean-Sébastien Coron, David Naccache: On the Security of RSA Screening. Public Key Cryptography 1999: 197-203
1998
16EEDavid Naccache, Jacques Stern: A New Public Key Cryptosystem Based on Higher Residues. ACM Conference on Computer and Communications Security 1998: 59-66
15EEGérard D. Cohen, Antoine Lobstein, David Naccache, Gilles Zémor: How to Improve an Exponentiation Black-Box. EUROCRYPT 1998: 211-220
14EEJean-Sébastien Coron, David Naccache: An Accurate Evaluation of Maurer's Universal Test. Selected Areas in Cryptography 1998: 57-71
13EEDavid M'Raïhi, David Naccache, David Pointcheval, Serge Vaudenay: Computational Alternatives to Random Number Generators. Selected Areas in Cryptography 1998: 72-80
1997
12EEDavid Naccache, Jacques Stern: A New Public-Key Cryptosystem. EUROCRYPT 1997: 27-36
11EEDavid M'Raïhi, David Naccache, Jacques Stern, Serge Vaudenay: XMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications. FSE 1997: 166-171
1996
10EEDavid M'Raïhi, David Naccache: Batch Exponentiation: A Fast DLP-Based Signature Generation Strategy. ACM Conference on Computer and Communications Security 1996: 58-61
9 David Naccache, David M'Raïhi: Arithmetic co-processors for public-key cryptography: The state of the art. CARDIS 1996
8EEMarkus Michels, David Naccache, Holger Petersen: GOST 34.10 - A brief overview of Russia's DSA. Computers & Security 15(8): 725-732 (1996)
1995
7EEDavid Naccache, David M'Raïhi, William Wolfowicz, Adina di Porto: Are Crypto-Accelerators Really Inevitable? 20Bit Zero-Knowledge in Less than a Second on Simple 8-bit Microcontrollers EUROCRYPT 1995: 404-409
6 David Naccache, David M'Raïhi, Dan Raphaeli: Can Montgomery Parasites Be Avoided? A Design Methodology Based on Key and Cryptosystem Modifications. Des. Codes Cryptography 5(1): 73-80 (1995)
1994
5EEDavid Naccache, David M'Raïhi, Serge Vaudenay, Dan Raphaeli: Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard. EUROCRYPT 1994: 77-85
1993
4EEDavid Naccache, David M'Raïhi: Montgomery-Suitable Cryptosystems. Algebraic Coding 1993: 75-81
3EEDavid Naccache: Can O.S.S. be Repaired? Proposal for a New Practical Signature Scheme. EUROCRYPT 1993: 233-239
1992
2EEDavid Naccache: A Montgomery-Suitable Fiat-Shamir-like Authenication Scheme. EUROCRYPT 1992: 488-491
1EESebastiaan H. von Solms, David Naccache: On blind signatures and perfect crimes. Computers & Security 11(6): 581-583 (1992)

Coauthor Index

1Claude Barral [42]
2Luca Breveglieri [56] [60] [66]
3Eric Brier [29]
4Julien Cathalo [49]
5Benoît Chevallier-Mames [45] [64]
6Christophe Clavier [29]
7Gérard D. Cohen [15]
8Don Coppersmith [61]
9Jean-Sébastien Coron [14] [17] [19] [20] [22] [24] [25] [27] [29] [36] [40] [41] [42] [44] [49] [53] [61] [67] [68]
10Yvo Desmedt [53]
11Vanessa Gratzer [52] [54] [55] [57] [58]
12François Grieu [61]
13Shay Gueron [60] [66]
14Peter Gutmann [47]
15Shai Halevi [61]
16Helena Handschuh [20] [37]
17Konstantin Hyppönen [39]
18Antoine Joux [59] [68]
19Marc Joye [25] [36]
20Charanjit S. Jutla [61]
21Ilya Kizhvatov [68]
22Çetin Kaya Koç [31]
23Paul C. Kocher [22] [41]
24François Koeune [27]
25Israel Koren [56] [60] [66]
26Serge Lefranc [34]
27Éric Levieil [62] [65]
28Antoine Lobstein [15]
29David M'Raïhi [4] [5] [6] [7] [9] [10] [11] [13] [21]
30Nils Maltesson [33]
31Markus Michels [8]
32Phong Q. Nguyen [50]
33Andrew M. Odlyzko [53]
34Christof Paar [31]
35Pascal Paillier [25] [36] [37] [38] [45] [68]
36Charles C. Palmer [47]
37Holger Petersen [8]
38David Pointcheval [13] [28] [30] [45]
39Adina di Porto [7]
40Dan Raphaeli [5] [6]
41Jean-Pierre Seifert [56] [60] [66]
42Adi Shamir [18]
43Igor Shparlinski [63]
44Nigel P. Smart [43]
45Sebastiaan H. von Solms (Basie von Solms) [1]
46Jacques Stern [11] [12] [16] [23] [30] [43] [64]
47Julien P. Stern [18] [19] [53] [61]
48Alexei Tchoulkine [35] [39]
49Emmanuel Thomé [59]
50Mehdi Tibouchi [67]
51Elena Trichina [33] [35] [39]
52Michael Tunstall [21] [26] [50]
53Christophe Tymen [28] [33] [35] [37]
54Serge Vaudenay [5] [11] [13]
55Ralf-Philipp Weinmann [67]
56Claire Whelan [50]
57William Wolfowicz [7]
58Gilles Zémor [15]
59David Znaty [54]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)