Follow
Jean-Sebastien Coron
Jean-Sebastien Coron
Professor of Computer Science, University of Luxembourg
Verified email at uni.lu - Homepage
Title
Cited by
Cited by
Year
Resistance against differential power analysis for elliptic curve cryptosystems
JS Coron
International workshop on cryptographic hardware and embedded systems, 292-302, 1999
13831999
Merkle-Damgård revisited: How to construct a hash function
JS Coron, Y Dodis, C Malinaud, P Puniya
Annual International Cryptology Conference, 430-448, 2005
6432005
Fully homomorphic encryption over the integers with shorter public keys
JS Coron, A Mandal, D Naccache, M Tibouchi
Annual Cryptology Conference, 487-504, 2011
5992011
Differential power analysis in the presence of hardware countermeasures
C Clavier, JS Coron, N Dabbous
International Workshop on Cryptographic Hardware and Embedded Systems, 252-263, 2000
5942000
On the exact security of full domain hash
JS Coron
Annual International Cryptology Conference, 229-235, 2000
5152000
Practical multilinear maps over the integers
JS Coron, T Lepoint, M Tibouchi
Annual Cryptology Conference, 476-493, 2013
4772013
Batch fully homomorphic encryption over the integers
JH Cheon, JS Coron, J Kim, MS Lee, T Lepoint, M Tibouchi, A Yun
Annual International Conference on the Theory and Applications of …, 2013
4232013
Public key compression and modulus switching for fully homomorphic encryption over the integers
JS Coron, D Naccache, M Tibouchi
Annual International Conference on the Theory and Applications of …, 2012
3722012
On boolean and arithmetic masking against differential power analysis
JS Coron, L Goubin
International Workshop on Cryptographic Hardware and Embedded Systems, 231-237, 2000
3462000
Optimal security proofs for PSS and other signature schemes
JS Coron
International Conference on the Theory and Applications of Cryptographic …, 2002
2412002
Statistics and secret leakage
JS Coron, P Kocher, D Naccache
International Conference on Financial Cryptography, 157-173, 2000
2222000
Scale-invariant fully homomorphic encryption over the integers
JS Coron, T Lepoint, M Tibouchi
International Workshop on Public Key Cryptography, 311-328, 2014
2172014
Zeroizing without low-level zeroes: New MMAP attacks and their limitations
JS Coron, C Gentry, S Halevi, T Lepoint, HK Maji, E Miles, M Raykova, ...
Annual Cryptology Conference, 247-266, 2015
1832015
New multilinear maps over the integers
JS Coron, T Lepoint, M Tibouchi
Annual Cryptology Conference, 267-286, 2015
1822015
Higher-order side channel security and mask refreshing
JS Coron, E Prouff, M Rivain, T Roche
International Workshop on Fast Software Encryption, 410-424, 2013
1692013
The random oracle model and the ideal cipher model are equivalent
JS Coron, J Patarin, Y Seurin
Annual International Cryptology Conference, 1-20, 2008
1662008
Higher order masking of look-up tables
JS Coron
Annual International Conference on the Theory and Applications of …, 2014
1632014
Efficient indifferentiable hashing into ordinary elliptic curves
E Brier, JS Coron, T Icart, D Madore, H Randriam, M Tibouchi
Annual Cryptology Conference, 237-254, 2010
1532010
Secure delegation of elliptic-curve pairing
B Chevallier-Mames, JS Coron, N McCullagh, D Naccache, M Scott
International Conference on Smart Card Research and Advanced Applications, 24-35, 2010
1482010
An efficient method for random delay generation in embedded software
JS Coron, I Kizhvatov
International Workshop on Cryptographic Hardware and Embedded Systems, 156-170, 2009
1462009
The system can't perform the operation now. Try again later.
Articles 1–20