Follow
Jean-Sebastien Coron
Jean-Sebastien Coron
Professor of Computer Science, University of Luxembourg
Verified email at uni.lu - Homepage
Title
Cited by
Cited by
Year
Resistance against differential power analysis for elliptic curve cryptosystems
JS Coron
Cryptographic Hardware and Embedded Systems: First InternationalWorkshop …, 1999
14721999
Merkle-Damgård revisited: How to construct a hash function
JS Coron, Y Dodis, C Malinaud, P Puniya
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
7312005
Fully homomorphic encryption over the integers with shorter public keys
JS Coron, A Mandal, D Naccache, M Tibouchi
Annual Cryptology Conference, 487-504, 2011
6712011
Differential power analysis in the presence of hardware countermeasures
C Clavier, JS Coron, N Dabbous
Cryptographic Hardware and Embedded Systems—CHES 2000: Second International …, 2000
6432000
On the exact security of full domain hash
JS Coron
Annual International Cryptology Conference, 229-235, 2000
5602000
Practical multilinear maps over the integers
JS Coron, T Lepoint, M Tibouchi
Annual Cryptology Conference, 476-493, 2013
5102013
Batch fully homomorphic encryption over the integers
JH Cheon, JS Coron, J Kim, MS Lee, T Lepoint, M Tibouchi, A Yun
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
5032013
Public key compression and modulus switching for fully homomorphic encryption over the integers
JS Coron, D Naccache, M Tibouchi
Annual International Conference on the Theory and Applications of …, 2012
4122012
On boolean and arithmetic masking against differential power analysis
JS Coron, L Goubin
Cryptographic Hardware and Embedded Systems—CHES 2000: Second International …, 2000
3782000
Optimal security proofs for PSS and other signature schemes
JS Coron
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
2752002
Scale-invariant fully homomorphic encryption over the integers
JS Coron, T Lepoint, M Tibouchi
Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014
2562014
Statistics and secret leakage
JS Coron, P Kocher, D Naccache
Financial Cryptography: 4th International Conference, FC 2000 Anguilla …, 2001
2382001
An efficient method for random delay generation in embedded software
JS Coron, I Kizhvatov
International Workshop on Cryptographic Hardware and Embedded Systems, 156-170, 2009
2122009
Higher-order side channel security and mask refreshing
JS Coron, E Prouff, M Rivain, T Roche
International Workshop on Fast Software Encryption, 410-424, 2013
2042013
Zeroizing without low-level zeroes: New MMAP attacks and their limitations
JS Coron, C Gentry, S Halevi, T Lepoint, HK Maji, E Miles, M Raykova, ...
Annual Cryptology Conference, 247-266, 2015
1922015
New multilinear maps over the integers
JS Coron, T Lepoint, M Tibouchi
Annual Cryptology Conference, 267-286, 2015
1902015
Higher order masking of look-up tables
JS Coron
Annual International Conference on the Theory and Applications of …, 2014
1892014
Efficient indifferentiable hashing into ordinary elliptic curves
E Brier, JS Coron, T Icart, D Madore, H Randriam, M Tibouchi
Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010
1832010
The random oracle model and the ideal cipher model are equivalent
JS Coron, J Patarin, Y Seurin
Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008
1772008
Secure delegation of elliptic-curve pairing
B Chevallier-Mames, JS Coron, N McCullagh, D Naccache, M Scott
Smart Card Research and Advanced Application: 9th IFIP WG 8.8/11.2 …, 2010
1612010
The system can't perform the operation now. Try again later.
Articles 1–20