dblp.uni-trier.dewww.uni-trier.de

Jacques Stern Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2008
98EEPierre-Alain Fouque, Gilles Macario-Rat, Jacques Stern: Key Recovery on Hidden Monomial Multivariate Schemes. EUROCRYPT 2008: 19-30
97EEPierre-Alain Fouque, Gilles Macario-Rat, Ludovic Perret, Jacques Stern: Total Break of the l-IC Signature Scheme. Public Key Cryptography 2008: 1-17
96EEBenoît Chevallier-Mames, David Naccache, Jacques Stern: Linear Bandwidth Naccache-Stern Encryption. SCN 2008: 327-339
2007
95EEVivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern: Practical Cryptanalysis of SFLASH. CRYPTO 2007: 1-12
94EEVivien Dubois, Pierre-Alain Fouque, Jacques Stern: Cryptanalysis of SFLASH with Slightly Modified Parameters. EUROCRYPT 2007: 264-275
93EEVivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern: Cryptanalysis of the SFLASH Signature Scheme. Inscrypt 2007: 1-4
92EEVivien Dubois, Louis Granboulan, Jacques Stern: Cryptanalysis of HFE with Internal Perturbation. Public Key Cryptography 2007: 249-265
91EEThomas Baignères, Jacques Stern, Serge Vaudenay: Linear Cryptanalysis of Non Binary Ciphers. Selected Areas in Cryptography 2007: 184-211
2006
90EELouis Granboulan, Antoine Joux, Jacques Stern: Inverting HFE Is Quasipolynomial. CRYPTO 2006: 345-356
89EEVivien Dubois, Louis Granboulan, Jacques Stern: An Efficient Provable Distinguisher for HFE. ICALP (2) 2006: 156-167
88EEPierre-Alain Fouque, David Pointcheval, Jacques Stern, Sébastien Zimmer: Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes. ICALP (2) 2006: 240-251
87EESébastien Kunz-Jacques, Gwenaëlle Martinet, Guillaume Poupard, Jacques Stern: Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm. Public Key Cryptography 2006: 27-43
86EEMarc Girault, Guillaume Poupard, Jacques Stern: On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order. J. Cryptology 19(4): 463-487 (2006)
2005
85EEPhong Q. Nguyen, Jacques Stern: Adapting Density Attacks to Low-Weight Knapsacks. ASIACRYPT 2005: 41-58
84EEPierre-Alain Fouque, Louis Granboulan, Jacques Stern: Differential Cryptanalysis for Multivariate Schemes. EUROCRYPT 2005: 341-353
2004
83EEDavid Naccache, Nigel P. Smart, Jacques Stern: Projective Coordinates Leak. EUROCRYPT 2004: 257-267
82EEJacques Stern: Cryptography and the French Banking Cards: Past, Present, Future. Financial Cryptography 2004: 68-69
81EEEiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern: RSA-OAEP Is Secure under the RSA Assumption. J. Cryptology 17(2): 81-104 (2004)
2003
80EEJacques Stern: Cryptography and the Methodology of Provable Security. AAECC 2003: 1-5
79EETatsuaki Okamoto, Jacques Stern: Almost Uniform Density of Power Residues and the Provable Security of ESIGN. ASIACRYPT 2003: 287-301
78EEJacques Stern: Why Provable Security Matters? EUROCRYPT 2003: 449-461
77EEAntoine Joux, Guillaume Poupard, Jacques Stern: New Attacks against Standardized MACs. FSE 2003: 170-181
76EEJacques Stern, Julien P. Stern: Cryptanalysis of the OTM Signature Scheme from FC'02. Financial Cryptography 2003: 138-148
2002
75EEDario Catalano, Phong Q. Nguyen, Jacques Stern: The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm. ASIACRYPT 2002: 299-310
74EEEmmanuel Bresson, Jacques Stern, Michael Szydlo: Threshold Ring Signatures and Applications to Ad-hoc Groups. CRYPTO 2002: 465-480
73EEJacques Stern, David Pointcheval, John Malone-Lee, Nigel P. Smart: Flaws in Applying Proof Methodologies to Signature Schemes. CRYPTO 2002: 93-110
72EEPierre-Alain Fouque, Jacques Stern, Jan-Geert Wackers: CryptoComputing with Rationals. Financial Cryptography 2002: 136-146
71EEEmmanuel Bresson, Jacques Stern: Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications. ISC 2002: 272-288
2001
70EEDavid Naccache, David Pointcheval, Jacques Stern: Twin signatures: an alternative to the hash-and-sign paradigm. ACM Conference on Computer and Communications Security 2001: 20-27
69EECraig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo: Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. ASIACRYPT 2001: 1-20
68EEPierre-Alain Fouque, Jacques Stern: Fully Distributed Threshold RSA under Standard Assumptions. ASIACRYPT 2001: 310-330
67EEEiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern: RSA-OAEP Is Secure under the RSA Assumption. CRYPTO 2001: 260-274
66EEPhong Q. Nguyen, Jacques Stern: The Two Faces of Lattices in Cryptology. CaLC 2001: 146-180
65EEOlivier Baudron, Jacques Stern: Non-interactive Private Auctions. Financial Cryptography 2001: 354-
64EEOlivier Baudron, Pierre-Alain Fouque, David Pointcheval, Jacques Stern, Guillaume Poupard: Practical multi-candidate election system. PODC 2001: 274-283
63EEEmmanuel Bresson, Jacques Stern: Efficient Revocation in Group Signatures. Public Key Cryptography 2001: 190-206
62EEPierre-Alain Fouque, Jacques Stern: One Round Threshold Discrete-Log Key Generation without Private Channels. Public Key Cryptography 2001: 300-316
2000
61 Phong Q. Nguyen, Jacques Stern: Lattice Reduction in Cryptology: An Update. ANTS 2000: 85-112
60EEThomas Pornin, Jacques Stern: Software-Hardware Trade-Offs: Application to A5/1 Cryptanalysis. CHES 2000: 318-327
59EEGuillaume Poupard, Jacques Stern: Fair Encryption of RSA Keys. EUROCRYPT 2000: 172-189
58EEDavid Naccache, Jacques Stern: Signing on a Postcard. Financial Cryptography 2000: 121-135
57EEPierre-Alain Fouque, Guillaume Poupard, Jacques Stern: Sharing Decryption in the Context of Voting or Lotteries. Financial Cryptography 2000: 90-104
56EEOlivier Baudron, David Pointcheval, Jacques Stern: Extended Notions of Security for Multicast Public Key Cryptosystems. ICALP 2000: 499-511
55 Guillaume Poupard, Jacques Stern: Short Proofs of Knowledge for Factoring. Public Key Cryptography 2000: 147-166
54EEDavid Pointcheval, Jacques Stern: Security Arguments for Digital Signatures and Blind Signatures. J. Cryptology 13(3): 361-396 (2000)
1999
53 Jacques Stern: Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding Springer 1999
52EEGuillaume Poupard, Jacques Stern: On the Fly Signatures Based on Factoring. ACM Conference on Computer and Communications Security 1999: 37-45
51EEHelena Handschuh, Pascal Paillier, Jacques Stern: Probing Attacks on Tamper-Resistant Devices. CHES 1999: 303-315
50EEPhong Q. Nguyen, Jacques Stern: The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications. CRYPTO 1999: 31-46
49EEChristophe Coupé, Phong Q. Nguyen, Jacques Stern: The Effectiveness of Lattice Attacks Against Low-Exponent RSA. Public Key Cryptography 1999: 204-218
1998
48EEDavid Naccache, Jacques Stern: A New Public Key Cryptosystem Based on Higher Residues. ACM Conference on Computer and Communications Security 1998: 59-66
47EEGuillaume Poupard, Jacques Stern: Generation of Shared RSA Keys by Two Parties. ASIACRYPT 1998: 11-24
46EEPhong Q. Nguyen, Jacques Stern: The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure. ASIACRYPT 1998: 372-379
45EEPhong Q. Nguyen, Jacques Stern: Cryptanalysis of the Ajtai-Dwork Cryptosystem. CRYPTO 1998: 223-242
44EEGuillaume Poupard, Jacques Stern: Security Analysis of a Practical "on the fly" Authentication and Signature Generation. EUROCRYPT 1998: 422-436
43EEJacques Stern, Serge Vaudenay: CS-Cipher. FSE 1998: 189-205
42EEJacques Stern: Lattices and Cryptography: An Overview. Public Key Cryptography 1998: 50-54
41EEPhong Q. Nguyen, Jacques Stern: Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC '97. Selected Areas in Cryptography 1998: 213-218
40EEPhong Q. Nguyen, Jacques Stern: A Converse to the Ajtai-Dwork Security Proof and its Cryptographic Implications Electronic Colloquium on Computational Complexity (ECCC) 5(10): (1998)
39EEAntoine Joux, Jacques Stern: Lattice Reduction: A Toolbox for the Cryptanalyst. J. Cryptology 11(3): 161-185 (1998)
38 Joel Friedman, Antoine Joux, Yuval Roichman, Jacques Stern, Jean-Pierre Tillich: The action of a few permutations on r-tuples is quickly transitive. Random Struct. Algorithms 12(4): 335-350 (1998)
1997
37EEDavid Pointcheval, Jacques Stern: New Blind Signatures Equivalent to Factorization (extended abstract). ACM Conference on Computer and Communications Security 1997: 92-99
36EEPhong Q. Nguyen, Jacques Stern: Merkle-Hellman Revisited: A Cryptoanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizations. CRYPTO 1997: 198-212
35EEDavid Naccache, Jacques Stern: A New Public-Key Cryptosystem. EUROCRYPT 1997: 27-36
34EEDavid M'Raïhi, David Naccache, Jacques Stern, Serge Vaudenay: XMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications. FSE 1997: 166-171
33 Jacques Stern, Serge Vaudenay: SVP: A Flexible Micropayment Scheme. Financial Cryptography 1997: 161-172
32 Sanjeev Arora, László Babai, Jacques Stern, Z. Sweedyk: The Hardness of Approximate Optima in Lattices, Codes, and Systems of Linear Equations. J. Comput. Syst. Sci. 54(2): 317-331 (1997)
31 Don Coppersmith, Jacques Stern, Serge Vaudenay: The Security of the Birational Permutation Signature Schemes. J. Cryptology 10(3): 207-221 (1997)
1996
30EEDavid Pointcheval, Jacques Stern: Provably Secure Blind Signature Schemes. ASIACRYPT 1996: 252-265
29EEJacques Stern: The Validation of Cryptographic Algorithms. ASIACRYPT 1996: 301-310
28EEFlorent Chabaud, Jacques Stern: The Cryptographic Security of the Syndrome Decoding Problem for Rank Distance Codes. ASIACRYPT 1996: 368-381
27EEJean-Bernard Fischer, Jacques Stern: An Efficient Pseudo-Random Generator Provably as Secure as Syndrome Decoding. EUROCRYPT 1996: 245-255
26EEDavid Pointcheval, Jacques Stern: Security Proofs for Signature Schemes. EUROCRYPT 1996: 387-398
25EEJoel Friedman, Antoine Joux, Yuval Roichman, Jacques Stern, Jean-Pierre Tillich: The Action of a Few Random Permutations on r-Tuples and an Application to Cryptography. STACS 1996: 375-386
1995
24 Simon R. Blackburn, Sean Murphy, Jacques Stern: The Cryptanalysis of a Public-Key Implementation of Finite Group Mappings. J. Cryptology 8(3): 157-166 (1995)
1994
23EEJacques Stern: Can One Design a Signature Scheme Based on Error-Correctin Codes? ASIACRYPT 1994: 424-426
22EEJacques Stern: Designing Identification Schemes with Keys of Short Size. CRYPTO 1994: 164-173
21EEMarc Girault, Jacques Stern: On the Length of Cryptographic Hash-Values Used in Identification Schemes. CRYPTO 1994: 202-215
20 Gilles Lachaud, Jacques Stern: Polynomial-time construction of codes II. Spherical codes and the kissing number of spheres. IEEE Transactions on Information Theory 40(4): 1140-1146 (1994)
1993
19EEJacques Stern: Approximating the Number of Error Locations within a Constant Ratio is NP-complete. AAECC 1993: 325-331
18EEJacques Stern: A New Identification Scheme Based on Syndrome Decoding. CRYPTO 1993: 13-21
17EEDon Coppersmith, Jacques Stern, Serge Vaudenay: Attacks on the Birational Permutation Signature Schemes. CRYPTO 1993: 435-443
16EESimon R. Blackburn, Sean Murphy, Jacques Stern: Weakness of a Public-Key Cryptosystem Based on Factorizations of Finite Groups. EUROCRYPT 1993: 50-54
15 Sanjeev Arora, László Babai, Jacques Stern, Z. Sweedyk: The Hardness of Approximate Optimia in Lattices, Codes, and Systems of Linear Equations FOCS 1993: 724-733
1992
14 Gilles Lachaud, Jacques Stern: Polynomial-Time Construction of Codes I: Linear Codes with Almost Equal Weights. Appl. Algebra Eng. Commun. Comput. 3: 151-161 (1992)
13 Matthijs J. Coster, Antoine Joux, Brian A. LaMacchia, Andrew M. Odlyzko, Claus-Peter Schnorr, Jacques Stern: Improved Low-Density Subset Sum Algorithms. Computational Complexity 2: 111-128 (1992)
1991
12EEGilles Lachaud, Jacques Stern: Polynomial-Time Construction of Spherical Codes. AAECC 1991: 218-223
11EEAntoine Joux, Jacques Stern: Cryptanalysis of Another Knapsack Cryptosystem. ASIACRYPT 1991: 470-476
10EEYeow Meng Chee, Antoine Joux, Jacques Stern: The Cryptoanalysis of a New Public-Key Cryptosystem Based on Modular Knapsacks. CRYPTO 1991: 204-212
9 Antoine Joux, Jacques Stern: Improving the Critical Density of the Lagarias-Odlyzko Attack Against Subset Sum Problems. FCT 1991: 258-264
1990
8EEJacques Stern, Philippe Toffin: Cryptanalysis of a Public-Key Cryptosystem Based on Approximations by Rational Numbers. EUROCRYPT 1990: 313-317
1989
7EEJacques Stern: An Alternative to the Fiat-Shamir Protocol. EUROCRYPT 1989: 173-180
1988
6 Jacques Stern: A method for finding codewords of small weight. Coding Theory and Applications 1988: 106-113
1987
5 Jacques Stern: Secret Linear Congruential Generators Are Not Cryptographically Secure FOCS 1987: 421-426
1985
4 Jacques Stern: Complexity of Some Problems from the Theory of Automata Information and Control 66(3): 163-176 (1985)
3 Jacques Stern: Characterizations of Some Classes of Regular Events. Theor. Comput. Sci. 35: 17-42 (1985)
1978
2 Jacques Stern: Communication Systems. Jerusalem Conference on Information Technology 1978: 271-277
1975
1 Jacques Stern: A New Look at the Interpolation Problem. J. Symb. Log. 40(1): 1-13 (1975)

Coauthor Index

1Sanjeev Arora [15] [32]
2László Babai [15] [32]
3Thomas Baignères [91]
4Olivier Baudron [56] [64] [65]
5Simon R. Blackburn [16] [24]
6Emmanuel Bresson [63] [71] [74]
7Dario Catalano [75]
8Florent Chabaud [28]
9Yeow Meng Chee [10]
10Benoît Chevallier-Mames [96]
11Don Coppersmith [17] [31]
12Matthijs J. Coster [13]
13Christophe Coupé [49]
14Vivien Dubois [89] [92] [93] [94] [95]
15Jean-Bernard Fischer [27]
16Pierre-Alain Fouque [57] [62] [64] [68] [72] [84] [88] [93] [94] [95] [97] [98]
17Joel Friedman [25] [38]
18Eiichiro Fujisaki [67] [81]
19Craig Gentry [69]
20Marc Girault [21] [86]
21Louis Granboulan [84] [89] [90] [92]
22Helena Handschuh [51]
23Jakob Jonsson [69]
24Antoine Joux [9] [10] [11] [13] [25] [38] [39] [77] [90]
25Sébastien Kunz-Jacques [87]
26Brian A. LaMacchia [13]
27Gilles Lachaud [12] [14] [20]
28David M'Raïhi [34]
29Gilles Macario-Rat [97] [98]
30John Malone-Lee [73]
31Gwenaëlle Martinet [87]
32Sean Murphy [16] [24]
33David Naccache [34] [35] [48] [58] [70] [83] [96]
34Phong Q. Nguyen [36] [40] [41] [45] [46] [49] [50] [61] [66] [75] [85]
35Andrew M. Odlyzko [13]
36Tatsuaki Okamoto [67] [79] [81]
37Pascal Paillier [51]
38Ludovic Perret [97]
39David Pointcheval [26] [30] [37] [54] [56] [64] [67] [70] [73] [81] [88]
40Thomas Pornin [60]
41Guillaume Poupard [44] [47] [52] [55] [57] [59] [64] [77] [86] [87]
42Yuval Roichman [25] [38]
43Claus-Peter Schnorr [13]
44Adi Shamir [93] [95]
45Nigel P. Smart [73] [83]
46Julien P. Stern [76]
47Z. Sweedyk [15] [32]
48Michael Szydlo [69] [74]
49Jean-Pierre Tillich [25] [38]
50Philippe Toffin [8]
51Serge Vaudenay [17] [31] [33] [34] [43] [91]
52Jan-Geert Wackers [72]
53Sébastien Zimmer [88]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)