Resistance against differential power analysis for elliptic curve cryptosystems JS Coron Cryptographic Hardware and Embedded Systems: First InternationalWorkshop …, 1999 | 1452 | 1999 |
Merkle-Damgård revisited: How to construct a hash function JS Coron, Y Dodis, C Malinaud, P Puniya Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005 | 720 | 2005 |
Fully homomorphic encryption over the integers with shorter public keys JS Coron, A Mandal, D Naccache, M Tibouchi Annual Cryptology Conference, 487-504, 2011 | 663 | 2011 |
Differential power analysis in the presence of hardware countermeasures C Clavier, JS Coron, N Dabbous Cryptographic Hardware and Embedded Systems—CHES 2000: Second International …, 2000 | 636 | 2000 |
On the exact security of full domain hash JS Coron Annual International Cryptology Conference, 229-235, 2000 | 558 | 2000 |
Practical multilinear maps over the integers JS Coron, T Lepoint, M Tibouchi Annual Cryptology Conference, 476-493, 2013 | 506 | 2013 |
Batch fully homomorphic encryption over the integers JH Cheon, JS Coron, J Kim, MS Lee, T Lepoint, M Tibouchi, A Yun Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013 | 496 | 2013 |
Public key compression and modulus switching for fully homomorphic encryption over the integers JS Coron, D Naccache, M Tibouchi Annual International Conference on the Theory and Applications of …, 2012 | 406 | 2012 |
On boolean and arithmetic masking against differential power analysis JS Coron, L Goubin Cryptographic Hardware and Embedded Systems—CHES 2000: Second International …, 2000 | 375 | 2000 |
Optimal security proofs for PSS and other signature schemes JS Coron Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002 | 273 | 2002 |
Scale-invariant fully homomorphic encryption over the integers JS Coron, T Lepoint, M Tibouchi Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014 | 253 | 2014 |
Statistics and secret leakage JS Coron, P Kocher, D Naccache Financial Cryptography: 4th International Conference, FC 2000 Anguilla …, 2001 | 236 | 2001 |
An efficient method for random delay generation in embedded software JS Coron, I Kizhvatov International Workshop on Cryptographic Hardware and Embedded Systems, 156-170, 2009 | 206 | 2009 |
Higher-order side channel security and mask refreshing JS Coron, E Prouff, M Rivain, T Roche International Workshop on Fast Software Encryption, 410-424, 2013 | 201 | 2013 |
Zeroizing without low-level zeroes: New MMAP attacks and their limitations JS Coron, C Gentry, S Halevi, T Lepoint, HK Maji, E Miles, M Raykova, ... Annual Cryptology Conference, 247-266, 2015 | 191 | 2015 |
New multilinear maps over the integers JS Coron, T Lepoint, M Tibouchi Annual Cryptology Conference, 267-286, 2015 | 189 | 2015 |
Higher order masking of look-up tables JS Coron Annual International Conference on the Theory and Applications of …, 2014 | 186 | 2014 |
Efficient indifferentiable hashing into ordinary elliptic curves E Brier, JS Coron, T Icart, D Madore, H Randriam, M Tibouchi Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010 | 181 | 2010 |
The random oracle model and the ideal cipher model are equivalent JS Coron, J Patarin, Y Seurin Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008 | 172 | 2008 |
Secure delegation of elliptic-curve pairing B Chevallier-Mames, JS Coron, N McCullagh, D Naccache, M Scott Smart Card Research and Advanced Application: 9th IFIP WG 8.8/11.2 …, 2010 | 161 | 2010 |