What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
David Naccache
Google Scholar
75
publications in security and cryptology related venues
Year
Venue
Title
2023
conf/sp
Emoji shellcoding in RISC-V.
Hadrien Barral
Georges-Axel Jaloyan
David Naccache
2023
conf/iwsec
Power Analysis Pushed too Far: Breaking Android-Based Isolation with Fuel Gauges.
Vincent Giraud
David Naccache
2021
journals/compsec
Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis.
Carlton Shepherd
Konstantinos Markantonakis
Nico van Heijningen
Driss Aboulkassimi
Clément Gaine
Thibaut Heckmann
David Naccache
2020
conf/ccs
Return-Oriented Programming on RISC-V.
Georges-Axel Jaloyan
Konstantinos Markantonakis
Raja Naeem Akram
David Robin
Keith Mayes
David Naccache
2019
conf/ctrsa
Robust Encryption, Extended.
Rémi Géraud
David Naccache
Razvan Rosie
2019
conf/cans
Integer Reconstruction Public-Key Encryption.
Houda Ferradi
David Naccache
2017
conf/latincrypt
On the Hardness of the Mersenne Low Hamming Ratio Assumption.
Marc Beunardeau
Aisling Connolly
Rémi Géraud
David Naccache
2017
conf/ccs
The Case for System Command Encryption.
Marc Beunardeau
Aisling Connolly
Rémi Géraud
David Naccache
2017
conf/esorics
Reusing Nonces in Schnorr Signatures - (and Keeping It Secure...).
Marc Beunardeau
Aisling Connolly
Houda Ferradi
Rémi Géraud
David Naccache
Damien Vergnaud
2017
conf/esorics
Non-interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms.
Fabrice Benhamouda
Houda Ferradi
Rémi Géraud
David Naccache
2016
journals/joc
Practical Cryptanalysis of ISO 9796-2 and EMV Signatures.
Jean-Sébastien Coron
David Naccache
Mehdi Tibouchi
Ralf-Philipp Weinmann
2016
conf/acns
Legally Fair Contract Signing Without Keystones.
Houda Ferradi
Rémi Géraud
Diana Maimut
David Naccache
David Pointcheval
2016
conf/host
The Conjoined Microprocessor.
Ehsan Aerabi
A. Elhadi Amirouche
Houda Ferradi
Rémi Géraud
David Naccache
Jean Vuillemin
2014
conf/sec
New Algorithmic Approaches to Point Constellation Recognition.
Thomas Bourgeat
Julien Bringer
Hervé Chabanne
Robin Champenois
Jérémie Clément
Houda Ferradi
Marc Heinrich
Paul Melotti
David Naccache
Antoine Voizard
2014
conf/host
Cryptographically secure shields.
Jean-Michel Cioranesco
Jean-Luc Danger
Tarik Graba
Sylvain Guilley
Yves Mathieu
David Naccache
Xuan Thuy Ngo
2014
conf/fdtc
Blind Fault Attack against SPN Ciphers.
Roman Korkikian
Sylvain Pelissier
David Naccache
2014
conf/sacrypt
OMD: A Compression Function Mode of Operation for Authenticated Encryption.
Simon Cogliani
Diana-Stefania Maimut
David Naccache
Rodrigo Portella do Canto
Reza Reyhanitabar
Serge Vaudenay
Damian Vizár
2012
conf/icisc
Another Look at Affine-Padding RSA Signatures.
Jean-Sébastien Coron
David Naccache
Mehdi Tibouchi
2012
conf/ches
3D Hardware Canaries.
Sébastien Briais
Stéphane Caron
Jean-Michel Cioranesco
Jean-Luc Danger
Sylvain Guilley
Jacques-Henri Jourdan
Arthur Milchior
David Naccache
Thibault Porteboeuf
2012
conf/host
Fault Round Modification Analysis of the advanced encryption standard.
Jean-Max Dutertre
Amir-Pasha Mirbaha
David Naccache
Anne-Lise Ribotta
Assia Tria
Thierry Vaschalde
2012
conf/fdtc
Random Active Shield.
Sébastien Briais
Jean-Michel Cioranesco
Jean-Luc Danger
Sylvain Guilley
David Naccache
Thibault Porteboeuf
2012
conf/eurocrypt
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers.
Jean-Sébastien Coron
David Naccache
Mehdi Tibouchi
2011
conf/crypto
Fully Homomorphic Encryption over the Integers with Shorter Public Keys.
Jean-Sébastien Coron
Avradip Mandal
David Naccache
Mehdi Tibouchi
2011
conf/ches
Modulus Fault Attacks against RSA-CRT Signatures.
Eric Brier
David Naccache
Phong Q. Nguyen
Mehdi Tibouchi
2011
conf/pkc
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005.
Jean-Sébastien Coron
Antoine Joux
Avradip Mandal
David Naccache
Mehdi Tibouchi
2010
conf/acns
On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption.
Aurélie Bauer
Jean-Sébastien Coron
David Naccache
Mehdi Tibouchi
Damien Vergnaud
2010
conf/ctrsa
Fault Attacks Against emv Signatures.
Jean-Sébastien Coron
David Naccache
Mehdi Tibouchi
2010
conf/tcc
Efficient Rational Secret Sharing in Standard Communication Networks.
Georg Fuchsbauer
Jonathan Katz
David Naccache
2009
conf/crypto
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures.
Jean-Sébastien Coron
David Naccache
Mehdi Tibouchi
Ralf-Philipp Weinmann
2009
conf/icisc
Factoring Unbalanced Moduli with Known Bits.
Eric Brier
David Naccache
Mehdi Tibouchi
2009
conf/ches
Fault Attacks on RSA Signatures with Partially Unknown Messages.
Jean-Sébastien Coron
Antoine Joux
Ilya Kizhvatov
David Naccache
Pascal Paillier
2008
journals/joc
Cryptanalysis of ISO/IEC 9796-1.
Don Coppersmith
Jean-Sébastien Coron
François Grieu
Shai Halevi
Charanjit S. Jutla
David Naccache
Julien P. Stern
2008
conf/pkc
Cryptographic Test Correction.
Éric Levieil
David Naccache
2007
conf/asiacrypt
-th Roots Become Easier Than Factoring.
Antoine Joux
David Naccache
Emmanuel Thomé
2006
conf/eurocrypt
Quine, the Vanishing Circuit and Other Tales from the Industry's Crypt.
Vanessa Gratzer
David Naccache
2005
conf/icisc
National Security, Forensics and Mobile Communications.
David Naccache
2005
conf/pkc
Experimenting with Faults, Lattices and the DSA.
David Naccache
Phong Q. Nguyen
Michael Tunstall
Claire Whelan
2005
conf/pkc
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited.
Julien Cathalo
Jean-Sébastien Coron
David Naccache
2004
conf/ches
How to Disembed a Program?
Benoît Chevallier-Mames
David Naccache
Pascal Paillier
David Pointcheval
2004
conf/ctrsa
Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95.
Jean-Sébastien Coron
David Naccache
2004
conf/eurocrypt
Projective Coordinates Leak.
David Naccache
Nigel P. Smart
Jacques Stern
2003
conf/icics
Trading-Off Type-Inference Memory Complexity against Communication.
Konstantin Hyppönen
David Naccache
Elena Trichina
Alexei Tchoulkine
2003
conf/asiacrypt
Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption.
Jean-Sébastien Coron
David Naccache
2002
conf/crypto
Universal Padding Schemes for RSA.
Jean-Sébastien Coron
Marc Joye
David Naccache
Pascal Paillier
2002
conf/icisc
Applet Verification Strategiesfor RAM-Constrained Devices.
Nils Maltesson
David Naccache
Elena Trichina
Christophe Tymen
2002
conf/icisc
Cut-&-Paste Attacks with JAVA.
Serge Lefranc
David Naccache
2002
conf/icics
Reducing the Memory Complexity of Type-Inference Algorithms.
David Naccache
Alexei Tchoulkine
Christophe Tymen
Elena Trichina
2001
conf/ccs
Twin signatures: an alternative to the hash-and-sign paradigm.
David Naccache
David Pointcheval
Jacques Stern
2001
conf/crypto
Cryptanalysis of RSA Signatures with Fixed-Pattern Padding.
Eric Brier
Christophe Clavier
Jean-Sébastien Coron
David Naccache
2001
conf/fc
Monotone Signatures.
David Naccache
David Pointcheval
Christophe Tymen
2000
conf/fc
Statistics and Secret Leakage.
Jean-Sébastien Coron
Paul C. Kocher
David Naccache
2000
conf/fc
Asymmetric Currency Rounding.
David M'Raïhi
David Naccache
Michael Tunstall
2000
conf/fc
Signing on a Postcard.
David Naccache
Jacques Stern
2000
conf/ches
How to Explain Side-Channel Leakage to Your Kids.
David Naccache
Michael Tunstall
2000
conf/eurocrypt
New Attacks on PKCS#1 v1.5 Encryption.
Jean-Sébastien Coron
Marc Joye
David Naccache
Pascal Paillier
2000
conf/eurocrypt
Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme.
Jean-Sébastien Coron
David Naccache
2000
conf/asiacrypt
From Fixed-Length to Arbitrary-Length RSA Padding Schemes.
Jean-Sébastien Coron
François Koeune
David Naccache
1999
journals/istr
Padding attacks on RSA.
David Naccache
1999
conf/crypto
On the Security of RSA Padding.
Jean-Sébastien Coron
David Naccache
Julien P. Stern
1999
conf/pkc
On the Security of RSA Screening.
Jean-Sébastien Coron
David Naccache
1999
conf/pkc
How to Copyright a Function?
David Naccache
Adi Shamir
Julien P. Stern
1999
conf/asiacrypt
ECC: Do We Need to Count?
Jean-Sébastien Coron
Helena Handschuh
David Naccache
1998
conf/ccs
A New Public Key Cryptosystem Based on Higher Residues.
David Naccache
Jacques Stern
1998
conf/eurocrypt
How to Improve an Exponentiation Black-Box.
Gérard D. Cohen
Antoine Lobstein
David Naccache
Gilles Zémor
1998
conf/sacrypt
Computational Alternatives to Random Number Generators.
David M'Raïhi
David Naccache
David Pointcheval
Serge Vaudenay
1998
conf/sacrypt
An Accurate Evaluation of Maurer's Universal Test.
Jean-Sébastien Coron
David Naccache
1997
conf/fse
XMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications.
David M'Raïhi
David Naccache
Jacques Stern
Serge Vaudenay
1997
conf/eurocrypt
A New Public-Key Cryptosystem.
David Naccache
Jacques Stern
1996
journals/compsec
GOST 34.10 - A brief overview of Russia's DSA.
Markus Michels
David Naccache
Holger Petersen
1996
conf/ccs
Batch Exponentiation: A Fast DLP-Based Signature Generation Strategy.
David M'Raïhi
David Naccache
1995
conf/eurocrypt
Are Crypto-Accelerators Really Inevitable? 20Bit Zero-Knowledge in Less than a Second on Simple 8-bit Microcontrollers
David Naccache
David M'Raïhi
William Wolfowicz
Adina di Porto
1994
conf/eurocrypt
Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard.
David Naccache
David M'Raïhi
Serge Vaudenay
Dan Raphaeli
1993
conf/eurocrypt
Can O.S.S. be Repaired? Proposal for a New Practical Signature Scheme.
David Naccache
1992
journals/compsec
On blind signatures and perfect crimes.
Sebastiaan H. von Solms
David Naccache
1992
conf/eurocrypt
A Montgomery-Suitable Fiat-Shamir-like Authenication Scheme.
David Naccache
Coauthors
A. Elhadi Amirouche
(1)
Adi Shamir
(1)
Adina di Porto
(1)
Aisling Connolly
(3)
Alexei Tchoulkine
(2)
Amir-Pasha Mirbaha
(1)
Anne-Lise Ribotta
(1)
Antoine Joux
(3)
Antoine Lobstein
(1)
Antoine Voizard
(1)
Arthur Milchior
(1)
Assia Tria
(1)
Aurélie Bauer
(1)
Avradip Mandal
(2)
Benoît Chevallier-Mames
(1)
Carlton Shepherd
(1)
Charanjit S. Jutla
(1)
Christophe Clavier
(1)
Christophe Tymen
(3)
Claire Whelan
(1)
Clément Gaine
(1)
Damian Vizár
(1)
Damien Vergnaud
(2)
Dan Raphaeli
(1)
David M'Raïhi
(6)
David Naccache
(75)
David Pointcheval
(5)
David Robin
(1)
Diana Maimut
(1)
Diana-Stefania Maimut
(1)
Don Coppersmith
(1)
Driss Aboulkassimi
(1)
Ehsan Aerabi
(1)
Elena Trichina
(3)
Emmanuel Thomé
(1)
Eric Brier
(3)
Éric Levieil
(1)
Fabrice Benhamouda
(1)
François Grieu
(1)
François Koeune
(1)
Georg Fuchsbauer
(1)
Georges-Axel Jaloyan
(2)
Gérard D. Cohen
(1)
Gilles Zémor
(1)
Hadrien Barral
(1)
Helena Handschuh
(1)
Hervé Chabanne
(1)
Holger Petersen
(1)
Houda Ferradi
(6)
Ilya Kizhvatov
(1)
Jacques Stern
(6)
Jacques-Henri Jourdan
(1)
Jean Vuillemin
(1)
Jean-Luc Danger
(3)
Jean-Max Dutertre
(1)
Jean-Michel Cioranesco
(3)
Jean-Sébastien Coron
(23)
Jérémie Clément
(1)
Jonathan Katz
(1)
Julien Bringer
(1)
Julien Cathalo
(1)
Julien P. Stern
(3)
Keith Mayes
(1)
Konstantin Hyppönen
(1)
Konstantinos Markantonakis
(2)
Marc Beunardeau
(3)
Marc Heinrich
(1)
Marc Joye
(2)
Markus Michels
(1)
Mehdi Tibouchi
(10)
Michael Tunstall
(3)
Nico van Heijningen
(1)
Nigel P. Smart
(1)
Nils Maltesson
(1)
Pascal Paillier
(4)
Paul C. Kocher
(1)
Paul Melotti
(1)
Phong Q. Nguyen
(2)
Raja Naeem Akram
(1)
Ralf-Philipp Weinmann
(2)
Razvan Rosie
(1)
Rémi Géraud
(7)
Reza Reyhanitabar
(1)
Robin Champenois
(1)
Rodrigo Portella do Canto
(1)
Roman Korkikian
(1)
Sebastiaan H. von Solms
(1)
Sébastien Briais
(2)
Serge Lefranc
(1)
Serge Vaudenay
(4)
Shai Halevi
(1)
Simon Cogliani
(1)
Stéphane Caron
(1)
Sylvain Guilley
(3)
Sylvain Pelissier
(1)
Tarik Graba
(1)
Thibault Porteboeuf
(2)
Thibaut Heckmann
(1)
Thierry Vaschalde
(1)
Thomas Bourgeat
(1)
Vanessa Gratzer
(1)
Vincent Giraud
(1)
William Wolfowicz
(1)
Xuan Thuy Ngo
(1)
Yves Mathieu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to