Follow
David Naccache
David Naccache
ENS (Equipe Securité) & visiting RHUL (ISG)
Verified email at ens.fr - Homepage
Title
Cited by
Cited by
Year
The sorcerer's apprentice guide to fault attacks
H Bar-El, H Choukri, D Naccache, M Tunstall, C Whelan
Proceedings of the IEEE 94 (2), 370-382, 2006
11622006
Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures
A Barenghi, L Breveglieri, I Koren, D Naccache
Proceedings of the IEEE 100 (11), 3056-3076, 2012
6672012
Fully homomorphic encryption over the integers with shorter public keys
JS Coron, A Mandal, D Naccache, M Tibouchi
Annual Cryptology Conference, 487-504, 2011
6632011
A new public key cryptosystem based on higher residues
D Naccache, J Stern
Proceedings of the 5th ACM Conference on Computer and Communications …, 1998
5431998
Public key compression and modulus switching for fully homomorphic encryption over the integers
JS Coron, D Naccache, M Tibouchi
Annual International Conference on the Theory and Applications of …, 2012
4072012
On blind signatures and perfect crimes
S Von Solms, D Naccache
Computers & Security 11 (6), 581-583, 1992
3711992
Hotp: An hmac-based one-time password algorithm
D M'Raihi, M Bellare, F Hoornaert, D Naccache, O Ranen
3512005
Can DSA be improved?—Complexity trade-offs with the digital signature standard—
D Naccache, D M'RaÏhi, S Vaudenay, D Raphaeli
Advances in Cryptology—EUROCRYPT'94: Workshop on the Theory and Application …, 1995
2661995
When clocks fail: On critical paths and clock faults
M Agoyan, JM Dutertre, D Naccache, B Robisson, A Tria
International conference on smart card research and advanced applications …, 2010
2502010
Statistics and secret leakage
JS Coron, P Kocher, D Naccache
Financial Cryptography: 4th International Conference, FC 2000 Anguilla …, 2001
2372001
Cryptographic smart cards
D Naccache, D M'Raihi
IEEE micro 16 (3), 14-24, 1996
1881996
Secure delegation of elliptic-curve pairing
B Chevallier-Mames, JS Coron, N McCullagh, D Naccache, M Scott
Smart Card Research and Advanced Application: 9th IFIP WG 8.8/11.2 …, 2010
1592010
Efficient rational secret sharing in standard communication networks
G Fuchsbauer, J Katz, D Naccache
Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010
1532010
Secure and practical identity-based encryption
D Naccache
IET Information Security 1 (2), 59-64, 2007
1532007
Method for the Generation of Electronic Signatures, in particular for Smart Cards
D Naccache
US Patent 5,910,989, 1999
1501999
A new public-key cryptosystem
D Naccache, J Stern
Advances in Cryptology—EUROCRYPT’97: International Conference on the Theory …, 1997
1421997
On the security of RSA padding
JS Coron, D Naccache, JP Stern
Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999
1331999
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
1222006
Efficient implementation of true random number generator based on sram pufs
V Van der Leest, E Van der Sluis, GJ Schrijen, P Tuyls, H Handschuh
Cryptography and Security: From Theory to Applications: Essays Dedicated to …, 2012
1192012
Towards hardware-intrinsic security
AR Sadeghi, D Naccache
Springer Berlin Heidelberg, 2010
1172010
The system can't perform the operation now. Try again later.
Articles 1–20