Follow
Jean-Sebastien Coron
Jean-Sebastien Coron
Professor of Computer Science, University of Luxembourg
Verified email at uni.lu - Homepage
Title
Cited by
Cited by
Year
Resistance against differential power analysis for elliptic curve cryptosystems
JS Coron
Cryptographic Hardware and Embedded Systems: First InternationalWorkshop …, 1999
14061999
Merkle-Damgård revisited: How to construct a hash function
JS Coron, Y Dodis, C Malinaud, P Puniya
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
6572005
Fully homomorphic encryption over the integers with shorter public keys
JS Coron, A Mandal, D Naccache, M Tibouchi
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
6192011
Differential power analysis in the presence of hardware countermeasures
C Clavier, JS Coron, N Dabbous
Cryptographic Hardware and Embedded Systems—CHES 2000: Second International …, 2000
6082000
On the exact security of full domain hash
JS Coron
Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology …, 2000
5202000
Practical multilinear maps over the integers
JS Coron, T Lepoint, M Tibouchi
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
4812013
Batch fully homomorphic encryption over the integers
JH Cheon, JS Coron, J Kim, MS Lee, T Lepoint, M Tibouchi, A Yun
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
4432013
Public key compression and modulus switching for fully homomorphic encryption over the integers
JS Coron, D Naccache, M Tibouchi
Advances in Cryptology–EUROCRYPT 2012: 31st Annual International Conference …, 2012
3802012
On boolean and arithmetic masking against differential power analysis
JS Coron, L Goubin
Cryptographic Hardware and Embedded Systems—CHES 2000: Second International …, 2000
3512000
Optimal security proofs for PSS and other signature schemes
JS Coron
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
2442002
Statistics and secret leakage
JS Coron, P Kocher, D Naccache
Financial Cryptography: 4th International Conference, FC 2000 Anguilla …, 2001
2232001
Scale-invariant fully homomorphic encryption over the integers
JS Coron, T Lepoint, M Tibouchi
Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014
2162014
Zeroizing without low-level zeroes: New MMAP attacks and their limitations
JS Coron, C Gentry, S Halevi, T Lepoint, HK Maji, E Miles, M Raykova, ...
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
1822015
New multilinear maps over the integers
JS Coron, T Lepoint, M Tibouchi
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
1822015
Higher-order side channel security and mask refreshing
JS Coron, E Prouff, M Rivain, T Roche
Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014
1712014
The Random Oracle Model and the Ideal Cipher Model Are Equivalent.
JS Coron, J Patarin, Y Seurin
CRYPTO 5157, 1-20, 2008
1692008
Higher order masking of look-up tables
JS Coron
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
1642014
Efficient indifferentiable hashing into ordinary elliptic curves
E Brier, JS Coron, T Icart, D Madore, H Randriam, M Tibouchi
Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010
1612010
An efficient method for random delay generation in embedded software
JS Coron, I Kizhvatov
Cryptographic Hardware and Embedded Systems-CHES 2009: 11th International …, 2009
1612009
Secure delegation of elliptic-curve pairing
B Chevallier-Mames, JS Coron, N McCullagh, D Naccache, M Scott
Smart Card Research and Advanced Application: 9th IFIP WG 8.8/11.2 …, 2010
1492010
The system can't perform the operation now. Try again later.
Articles 1–20