#### Filter Results:

- Full text PDF available (84)

#### Publication Year

1996

2018

- This year (1)
- Last 5 years (32)
- Last 10 years (62)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

- Jean-Sébastien Coron
- CHES
- 1999

Differential Power Analysis, first introduced by Kocher et al. in [14], is a powerful technique allowing to recover secret smart card information by monitoring power signals. In [14] a specific DPA… (More)

- Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya
- CRYPTO
- 2005

The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compression function on the input message. The compression function is usually designed from scratch or made out of a… (More)

- Jean-Sébastien Coron
- CRYPTO
- 2000

The Full Domain Hash (FDH) scheme is a RSA-based signature scheme in which the message is hashed onto the full domain of the RSA function. The FDH scheme is provably secure in the random oracle… (More)

- Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi
- IACR Cryptology ePrint Archive
- 2013

Extending bilinear elliptic curve pairings to multilinear maps is a long-standing open problem. The first plausible construction of such multilinear maps has recently been described by Garg, Gentry… (More)

- Jean-Sébastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi
- IACR Cryptology ePrint Archive
- 2011

At Eurocrypt 2010 van Dijk et al. described a fully homomorphic encryption scheme over the integers. The main appeal of this scheme (compared to Gentry’s) is its conceptual simplicity. This… (More)

- Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi
- EUROCRYPT
- 2012

We describe a compression technique that reduces the public key size of van Dijk, Gentry, Halevi and Vaikuntanathan’s (DGHV) fully homomorphic scheme over the integers from Õ(λ) to Õ(λ). Our variant… (More)

- Jean-Sébastien Coron
- IACR Cryptology ePrint Archive
- 2001

The Probabilistic Signature Scheme (PSS) designed by Bellare and Rogaway is a signature scheme provably secure against chosen message attacks in the random oracle model, whose security can be tightly… (More)

- Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi
- IACR Cryptology ePrint Archive
- 2013

We extend the fully homomorphic encryption scheme over the integers of van Dijk et al. (DGHV) to batch fully homomorphic encryption, i.e. to a scheme that supports encrypting and homomorphically… (More)

The silicon industry has lately been focusing on side channel attacks, that is attacks that exploit information that leaks from the physical devices. Although different countermeasures to thwart… (More)

- Jean-Sébastien Coron, David Naccache, Paul C. Kocher
- ACM Trans. Embedded Comput. Syst.
- 2004

In addition to its usual complexity assumptions, cryptography silently assumes that information can be physically protected in a single location. As one can easily imagine, real-life devices are not… (More)