David Naccache
Affiliations:- ENS Paris, France
According to our database1,
David Naccache
authored at least 257 papers
between 1992 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on viaf.org
-
on id.loc.gov
-
on d-nb.info
-
on di.ens.fr
On csauthors.net:
Bibliography
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023
Proceedings of the Advances in Information and Computer Security, 2023
Sampling From Autoencoders' Latent Space via Quantization And Probability Mass Function Concepts.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023
Proceedings of the Codes, Cryptology and Information Security, 2023
2022
A forensic analysis of the Google Home: repairing compressed data without error correction.
Digit. Investig., 2022
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Primary Elements in Cyclotomic Fields with Applications to Power Residue Symbols, and More.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Medical Equipment Used for Forensic Data Extraction: A low-cost solution for forensic laboratories not provided with expensive diagnostic or advanced repair equipment.
Digit. Investig., 2021
Index t-SNE: Tracking Dynamics of High-Dimensional Datasets with Coherent Embeddings.
CoRR, 2021
CoRR, 2021
Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Survey.
CoRR, 2021
Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis.
Comput. Secur., 2021
Proceedings of the 2021 IEEE Conference on Games (CoG), 2021
2020
At Most 43 Moves, At Least 29: Optimal Strategies and Bounds for Ultimate Tic-Tac-Toe.
CoRR, 2020
Proceedings of the Computing and Combinatorics - 26th International Conference, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Decrease of energy deposited during laser decapsulation attacks by dyeing and pigmenting the ECA: Application to the forensic micro-repair of wire bonding.
Digit. Investig., 2019
Removing epoxy underfill between neighbouring components using acid for component chip-off.
Digit. Investig., 2019
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
2018
Forensic smartphone analysis using adhesives: Transplantation of Package on Package components.
Digit. Investig., 2018
Proceedings of the 1st International Conference on Historical Cryptology, 2018
Proceedings of the Cyber-Physical Systems Security., 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms.
IACR Cryptol. ePrint Arch., 2017
Electrically conductive adhesives, thermally conductive adhesives and UV adhesives in data extraction forensics.
Digit. Investig., 2017
Generating Functionally Equivalent Programs Having Non-isomorphic Control-Flow Graphs.
Proceedings of the Secure IT Systems, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
When organized crime applies academic results: a forensic analysis of an in-card listening device.
J. Cryptogr. Eng., 2016
Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Low-temperature low-cost 58 Bismuth - 42 Tin alloy forensic chip re-balling and re-soldering.
Digit. Investig., 2016
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
Proceedings of the Information Security Practice and Experience, 2016
Proceedings of the New Codebreakers, 2016
Proceedings of the New Codebreakers, 2016
2015
Int. J. Inf. Sec., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015
Proceedings of the 2015 IEEE Computer Society Annual Symposium on VLSI, 2015
2014
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014
Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools.
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014
How to Sign Paper Contracts? Conjectures and Evidence Related to Equitable and Efficient Collaborative Task Scheduling.
Proceedings of the Open Problems in Mathematics and Computational Science, 2014
2013
J. Cryptogr. Eng., 2013
IACR Cryptol. ePrint Arch., 2013
How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the DCNET, ICE-B and OPTICS 2013 - Proceedings of the 4th International Conference on Data Communication Networking, 10th International Conference on e-Business and 4th International Conference on Optical Communication Systems, Reykjavík, Iceland, 29, 2013
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013
2012
Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures.
Proc. IEEE, 2012
Proceedings of the Trustworthy Global Computing - 7th International Symposium, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012
Proceedings of the 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2012
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012
Proceedings of the Smart Card Research and Advanced Applications, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IACR Cryptol. ePrint Arch., 2011
2010
Extracting Unknown Keys from Unknown Algorithms Encrypting Unknown Fixed Messages and Returning No Results.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 16th IEEE International On-Line Testing Symposium (IOLTS 2010), 2010
Proceedings of the Smart Card Research and Advanced Application, 2010
Proceedings of the Smart Card Research and Advanced Application, 2010
2009
Proceedings of the Algebraic Aspects of Digital Communications, 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
2007
Proceedings of the Advances in Cryptology, 2007
2006
Des. Codes Cryptogr., 2006
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006
Alien <i>vs.</i> Quine, the Vanishing Circuit and Other Tales from the Industry's Crypt.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Public Key Cryptography, 2005
Proceedings of the Information Security and Cryptology, 2005
2004
Proceedings of the Topics in Cryptology, 2004
Security, Cryptography: Theory and Practice. (Sécurité, Cryptographie : Théorie et Pratique).
, 2004
2003
IACR Cryptol. ePrint Arch., 2003
Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002
2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the CCS 2001, 2001
2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000
Proceedings of the Advances in Cryptology, 2000
1999
1998
Proceedings of the Selected Areas in Cryptography '98, 1998
Proceedings of the Selected Areas in Cryptography '98, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
Proceedings of the CCS '98, 1998
1997
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997
1996
Proceedings of the CCS '96, 1996
Arithmetic co-processors for public-key cryptography: The state of the art.
Proceedings of the Second Smart Card Research and Advanced Application Conference, 1996
1995
Can Montgomery Parasites Be Avoided? A Design Methodology Based on Key and Cryptosystem Modifications.
Des. Codes Cryptogr., 1995
Are Crypto-Accelerators Really Inevitable? 20Bit Zero-Knowledge in Less than a Second on Simple 8-bit Microcontrollers
Proceedings of the Advances in Cryptology, 1995
1994
Why You Cannot Even Hope to use Gröbner Bases in Public Key Cryptography: An Open Letter to a Scientist Who Failed and a Challenge to Those Who Have Not Yet Failed.
J. Symb. Comput., 1994
Proceedings of the Advances in Cryptology, 1994
1993
Proceedings of the Advances in Cryptology, 1993
1992
Proceedings of the Advances in Cryptology, 1992