The sorcerer's apprentice guide to fault attacks H Bar-El, H Choukri, D Naccache, M Tunstall, C Whelan Proceedings of the IEEE 94 (2), 370-382, 2006 | 1116 | 2006 |
Fully homomorphic encryption over the integers with shorter public keys JS Coron, A Mandal, D Naccache, M Tibouchi Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011 | 634 | 2011 |
Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures A Barenghi, L Breveglieri, I Koren, D Naccache Proceedings of the IEEE 100 (11), 3056-3076, 2012 | 610 | 2012 |
A new public key cryptosystem based on higher residues D Naccache, J Stern Proceedings of the 5th ACM Conference on Computer and Communications …, 1998 | 522 | 1998 |
Public key compression and modulus switching for fully homomorphic encryption over the integers JS Coron, D Naccache, M Tibouchi Advances in Cryptology–EUROCRYPT 2012: 31st Annual International Conference …, 2012 | 388 | 2012 |
On blind signatures and perfect crimes S Von Solms, D Naccache Computers & Security 11 (6), 581-583, 1992 | 365 | 1992 |
Hotp: An hmac-based one-time password algorithm D M'Raihi, M Bellare, F Hoornaert, D Naccache, O Ranen | 312 | 2005 |
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ... Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006 | 292 | 2006 |
Can DSA be improved?—Complexity trade-offs with the digital signature standard— D Naccache, D M'RaÏhi, S Vaudenay, D Raphaeli Advances in Cryptology—EUROCRYPT'94: Workshop on the Theory and Application …, 1995 | 259 | 1995 |
When clocks fail: On critical paths and clock faults M Agoyan, JM Dutertre, D Naccache, B Robisson, A Tria Smart Card Research and Advanced Application: 9th IFIP WG 8.8/11.2 …, 2010 | 230 | 2010 |
Statistics and secret leakage JS Coron, P Kocher, D Naccache Financial Cryptography: 4th International Conference, FC 2000 Anguilla …, 2001 | 224 | 2001 |
Cryptographic smart cards D Naccache, D M'Raihi IEEE micro 16 (3), 14-24, 1996 | 187 | 1996 |
Secure delegation of elliptic-curve pairing B Chevallier-Mames, JS Coron, N McCullagh, D Naccache, M Scott Smart Card Research and Advanced Application: 9th IFIP WG 8.8/11.2 …, 2010 | 152 | 2010 |
Secure and practical identity-based encryption D Naccache IET Information Security 1 (2), 59-64, 2007 | 150 | 2007 |
Efficient rational secret sharing in standard communication networks G Fuchsbauer, J Katz, D Naccache Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010 | 147 | 2010 |
A new public-key cryptosystem D Naccache, J Stern Advances in Cryptology—EUROCRYPT’97: International Conference on the Theory …, 1997 | 147 | 1997 |
Method for the Generation of Electronic Signatures, in particular for Smart Cards D Naccache US Patent 5,910,989, 1999 | 134 | 1999 |
On the security of RSA padding JS Coron, D Naccache, JP Stern Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999 | 131 | 1999 |
Towards hardware-intrinsic security AR Sadeghi, D Naccache Springer Berlin Heidelberg, 2010 | 114 | 2010 |
Experimenting with Faults, Lattices and the DSA D Naccache, PQ Nguyen, M Tunstall, C Whelan Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and …, 2005 | 105 | 2005 |