|
|
|
|---|---|---|
|
hal-01111463v1
Chapitre d'ouvrage
Vanessa Gratzer, David Naccache. How to Read a Signature? David Naccache. Cryptography and Security: From Theory to Applications:Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday, 6805, Springer, pp.480-483, 2012, LNCS - Lecture Notes in Computer Science, 978-3-642-28367-3. <10.1007/978-3-642-28368-0_31> |
||
|
hal-00721569v2
Communication dans un congrès
Sébastien Briais, Jean-Michel Cioranesco, Jean-Luc Danger, Sylvain Guilley, David Naccache et al. Random Active Shield IEEE Computer Society. Fault Diagnosis and Tolerance in Cryptography, Sep 2012, Leuven, Belgium. 11 p., 2012, <10.1109/FDTC.2012.11> |
||
|
inria-00577142v1
Communication dans un congrès
Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud. On The Broadcast and Validity-Checking Security of PKCS #1 v1.5 Encryption Jianying Zhou and Moti Yung. Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Jun 2010, Beijing, China. Springer, 6123, pp.1-18, 2010, Lecture Notes in Computer Science; Applied Cryptography and Network Security, 8th International Conference, ACNS 2010. <10.1007/978-3-642-13708-2_1> |
||
|
emse-01130826v1
Communication dans un congrès
Michel Agoyan, Jean-Max Dutertre, Amir-Pasha Mirbaha, David Naccache, Anne-Lise Ribotta et al. How to Flip a Bit? On-Line Testing Symposium (IOLTS), 2010 IEEE 16th International, Jul 2010, Corfu, Greece. <10.1109/IOLTS.2010.5560194> |
||
|
hal-00934341v1
Communication dans un congrès
Hervé Chabanne, Jean-Michel Cioranesco, Vincent Despiegel, Jean-Christophe Fondeur, David Naccache. Using Hamiltonian Totems as Passwords SantaCrypt 2013, 2013, Prague, Czech Republic. 2013 |
||
|
hal-00934338v1
Rapport
Eric Brier, David Naccache, Li-Yao Xia. How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling [Research Report] IACR Cryptology ePrint Archive 2013: 432 (2013), 2013 |
||
|
hal-00934340v1
Communication dans un congrès
Roman Korkikian, David Naccache, Guilherme Ozari de Almeida. Instantaneous Frequency Analysis DCNET/ICE-B/OPTICS 2013: IS-11 - 4th International Conference on Data Communication Networking, 10th International Conference on e-Business and 4th International Conference on Optical Communication Systems, Jul 2013, Reykjavík, Iceland. SciTePress, 2013 |
||
|
hal-00934334v1
Rapport
Roman Korkikian, David Naccache, Guilherme Ozari de Almeida. Instantaneous Frequency Analysis [Research Report] IACR Cryptology ePrint Archive 2013: 320 (2013), 2013 |
||
|
hal-00934335v1
Communication dans un congrès
Diana Maimut, Cédric Murdica, David Naccache, Mehdi Tibouchi. Fault Attacks on Projective-to-Affine Coordinates Conversion COSADE 2013 - 4th International Workshop Constructive Side-Channel Analysis and Secure Design, 2013, Paris, France. Springer, pp.46-61, 2013, <10.1007/978-3-642-40026-1_4> |
||
|
hal-00934345v1
Communication dans un congrès
Eric Brier, David Naccache, Li-Yao Xia. How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling Open Problems in Mathematical and Computational Sciences Conference, Sep 2013, Istambul, Turkey. 2013 |
||
|
hal-01098408v1
Ouvrage (y compris édition critique et traduction)
David Naccache, Damien Sauveron. Information Security Theory and Practice: Securing the Internet of Things David Naccache; Damien Sauveron. Springer, LNCS-8501, 2014, Lecture Notes in Computer Science, 978-3-662-43825-1. <10.1007/978-3-662-43826-8>. <http://www.wistp.org/> |
||
|
hal-01109981v1
Communication dans un congrès
Eric Brier, David Naccache, Phong Q. Nguyen, Mehdi Tibouchi. Modulus Fault Attacks against RSA-CRT Signatures Bart Preneel; Tsuyoshi Takagi. CHES 2011 - 13th International Workshop Cryptographic Hardware and Embedded Systems, Sep 2011, Nara, Japan. Springer, 6917, pp.192-206, 2011, LNCS - Lecture Notes in Computer Science. <10.1007/978-3-642-23951-9_13> |
||
|
hal-01110262v1
Direction d'ouvrage, Proceedings
Luca Breveglieri, Sylvain Guilley, Israel Koren, David Naccache, Junko Takahashi. 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC, Sep 2011, Nara, Japan. IEEE, 2011 |
||
|
hal-01110245v1
Ouvrage (y compris édition critique et traduction)
David Naccache, Emil Simion, Adela Mihaita, Ruxandra Florentina Olimid, Andrei George Oprina. Criptografie si securitatea informatiei Matrix Rom, pp.107, 2011, 978-973-755-675-2 |
||
|
hal-01110250v1
Ouvrage (y compris édition critique et traduction)
Emil Simion, Mircea Andraşiu, David Naccache, Georghe Simion. Cercetări operaţionale,probabilităţi si criptologie Editura Academiei Tehnice Militare, pp.292, 2011 |
||
|
hal-01110259v1
Communication dans un congrès
Antoine Amarilli, Sascha Müller, David Naccache, Daniel Page, Pablo Rauzy et al. Can code polymorphism limit information leakage? Claudio A. Ardagna; Jianying Zhou. WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication, Jun 2011, Heraklion, Crete, Greece. Springer, 6633, pp.1-21, 2011, LNCS - Lecture Notes in Computer Science |
||
|
hal-01110216v1
Communication dans un congrès
Jean-Sébastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi. Fully Homomorphic Encryption over the Integers with Shorter Public Keys Phillip Rogaway. CRYPTO 2011 - 31st Annual Cryptology Conference, Aug 2011, Santa Barbara, CA, United States. Springer, 6841, pp.487-504, 2011, LNCS - Lecture Notes in Computer Science. <10.1007/978-3-642-22792-9_28> |
||
|
hal-01110463v1
Communication dans un congrès
Jean-Michel Cioranesco, Jean-Luc Danger, Tarik Graba, Sylvain Guilley, Yves Mathieu et al. Cryptographically secure shields HOST 2014 - IEEE International Symposium on Hardware-Oriented Security and Trust, May 2014, Washington, United States. IEEE, pp.25 - 31, 2014, <10.1109/HST.2014.6855563> |
||
|
hal-01110939v1
Direction d'ouvrage, Proceedings
David Naccache. Cryptography and Security: From Theory to Applications France. 6805, Springer, pp.318, 2012, LNCS - Lecture Notes in Computer Science, <10.1007/978-3-642-28368-0> |
||
|
hal-01111541v1
Communication dans un congrès
Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi. Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers David Pointcheval; Thomas Johansson. EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Apr 2012, Cambridge, UK, United Kingdom. Springer, 7237, pp.446-464, 2012, LNCS - Lecture Notes in Computer Science. <10.1007/978-3-642-29011-4_27> |
||
|
hal-01110874v1
Chapitre d'ouvrage
David Naccache, David Pointcheval. Autotomic Signatures David Naccache. Cryptography and Security: From Theory to Applications : Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday, 6805, Springer, pp.143-155, 2012, LNCS - Lecture Notes in Computer Science, 978-3-642-28367-3. <10.1007/978-3-642-28368-0_12> |
||
|
hal-01111484v1
Chapitre d'ouvrage
Guillaume Claret, Michaël Mathieu, David Naccache, Guillaume Segerer. Physical Simulation of Inarticulate Robots David Naccache. Cryptography and Security: From Theory to Applications:Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday, 6805, Springer, pp.491-499, 2012, LNCS - Lecture Notes in Computer Science, <10.1007/978-3-642-28368-0_33> |
||
|
hal-01111533v1
Communication dans un congrès
Sébastien Briais, Stéphane Caron, Jean-Michel Cioranesco, Jean-Luc Danger, Sylvain Guilley et al. 3D Hardware Canaries Emmanuel Prouff; Patrick Schaumont. CHES 2012 - 14th International Workshop Cryptographic Hardware and Embedded Systems, Sep 2012, Leuven, Belgium. Springer, 7428, pp.1-22, 2012, LNCS - Lecture Notes in Computer Science. <10.1007/978-3-642-33027-8_1> |
||
|
emse-00742567v1
Communication dans un congrès
Jean-Max Dutertre, Amir-Pasha Mirbaha, David Naccache, Anne-Lise Ribotta, Assia Tria et al. Fault Round Modification Analysis of the Advanced Encryption Standard Hardware-Oriented Security and Trust (HOST), 2012, Jun 2012, San Francisco, United States. IEEE, pp.140--145, 2002, <10.1109/HST.2012.6224334> |
||
|
hal-00934336v1
Rapport
Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache. Dynamic Countermeasure Against the Zero Power Analysis [Research Report] IACR Cryptology ePrint Archive 2013: 764 (2013), 2013 |
||
|
hal-00934337v1
Rapport
Hervé Chabanne, Jean-Michel Cioranesco, Vincent Despiegel, Jean-Christophe Fondeur, David Naccache. Using Hamiltonian Totems as Passwords [Research Report] IACR Cryptology ePrint Archive 2013: 751 (2013), 2013 |
||
|
hal-00934343v1
Communication dans un congrès
Céline Chevalier, Damien Gaumont, David Naccache. How to (Carefully) Breach a Service Contract? Open Problems in Mathematical and Computational Sciences Conference, Sep 2013, Istambul, Turkey. 2013 |
||
|
hal-00934347v1
Article dans une revue
Jean-Michel Cioranesco, Houda Ferradi, David Naccache. Communicating Covertly through CPU Monitoring IEEE Security & Privacy, IEEE, 2013, 11 (6), pp.71-73. <10.1109/MSP.2013.140> |
||
|
hal-00686565v1
Communication dans un congrès
Cedric Murdica, Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, David Naccache. Same Values Power Analysis Using Special Points on Elliptic Curves Schindler, Werner; Huss, Sorin;. COSADE 2012 - Third International Workshop Constructive Side-Channel Analysis and Secure Design, May 2012, Darmstadt, Germany. 7275, pp.Cédric Murdica, 2012, Lecture Notes in Computer Science. <10.1007/978-3-642-29912-4_14> |
||
|
emse-01130782v1
Communication dans un congrès
Jean-Max Dutertre, Amir-Pasha Mirbaha, David Naccache, Assia Tria. Reproducible Single-Byte Laser Fault Injection 6th Conference on Ph.D. Research in Microelectronics & Electronics, PRIME 2010, Jul 2010, Berlin, Germany |
||
|
|
|