Follow
Jean-Sebastien Coron
Jean-Sebastien Coron
Professor of Computer Science, University of Luxembourg
Verified email at uni.lu - Homepage
Title
Cited by
Cited by
Year
Resistance against differential power analysis for elliptic curve cryptosystems
JS Coron
International workshop on cryptographic hardware and embedded systems, 292-302, 1999
13751999
Merkle-Damgård revisited: How to construct a hash function
JS Coron, Y Dodis, C Malinaud, P Puniya
Annual International Cryptology Conference, 430-448, 2005
6392005
Fully homomorphic encryption over the integers with shorter public keys
JS Coron, A Mandal, D Naccache, M Tibouchi
Annual Cryptology Conference, 487-504, 2011
6062011
Differential power analysis in the presence of hardware countermeasures
C Clavier, JS Coron, N Dabbous
International Workshop on Cryptographic Hardware and Embedded Systems, 252-263, 2000
5952000
On the exact security of full domain hash
JS Coron
Annual International Cryptology Conference, 229-235, 2000
5142000
Practical multilinear maps over the integers
JS Coron, T Lepoint, M Tibouchi
Annual Cryptology Conference, 476-493, 2013
4722013
Batch fully homomorphic encryption over the integers
JH Cheon, JS Coron, J Kim, MS Lee, T Lepoint, M Tibouchi, A Yun
Annual International Conference on the Theory and Applications of …, 2013
4272013
Public key compression and modulus switching for fully homomorphic encryption over the integers
JS Coron, D Naccache, M Tibouchi
Annual International Conference on the Theory and Applications of …, 2012
3732012
On boolean and arithmetic masking against differential power analysis
JS Coron, L Goubin
International Workshop on Cryptographic Hardware and Embedded Systems, 231-237, 2000
3442000
Optimal security proofs for PSS and other signature schemes
JS Coron
International Conference on the Theory and Applications of Cryptographic …, 2002
2362002
Scale-invariant fully homomorphic encryption over the integers
JS Coron, T Lepoint, M Tibouchi
International Workshop on Public Key Cryptography, 311-328, 2014
2212014
Statistics and secret leakage
JS Coron, P Kocher, D Naccache
International Conference on Financial Cryptography, 157-173, 2000
2202000
New multilinear maps over the integers
JS Coron, T Lepoint, M Tibouchi
Annual Cryptology Conference, 267-286, 2015
1812015
Zeroizing without low-level zeroes: New MMAP attacks and their limitations
JS Coron, C Gentry, S Halevi, T Lepoint, HK Maji, E Miles, M Raykova, ...
Annual Cryptology Conference, 247-266, 2015
1802015
The random oracle model and the ideal cipher model are equivalent
JS Coron, J Patarin, Y Seurin
Annual International Cryptology Conference, 1-20, 2008
1642008
Higher-order side channel security and mask refreshing
JS Coron, E Prouff, M Rivain, T Roche
International Workshop on Fast Software Encryption, 410-424, 2013
1622013
Higher order masking of look-up tables
JS Coron
Annual International Conference on the Theory and Applications of …, 2014
1612014
Efficient indifferentiable hashing into ordinary elliptic curves
E Brier, JS Coron, T Icart, D Madore, H Randriam, M Tibouchi
Annual Cryptology Conference, 237-254, 2010
1502010
Secure delegation of elliptic-curve pairing
B Chevallier-Mames, JS Coron, N McCullagh, D Naccache, M Scott
International Conference on Smart Card Research and Advanced Applications, 24-35, 2010
1482010
An efficient method for random delay generation in embedded software
JS Coron, I Kizhvatov
International Workshop on Cryptographic Hardware and Embedded Systems, 156-170, 2009
1412009
The system can't perform the operation now. Try again later.
Articles 1–20