Jacques Stern
According to our database1,
Jacques Stern
authored at least 102 papers
between 1975 and 2011.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2011
Proceedings of the 2nd European Future Technologies Conference and Exhibition, 2011
2010
Proceedings of the 27th International Symposium on Theoretical Aspects of Computer Science, 2010
2008
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008
Proceedings of the Public Key Cryptography, 2008
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007
Proceedings of the Public Key Cryptography, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
2006
J. Cryptol., 2006
Proceedings of the Public Key Cryptography, 2006
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
2004
Proceedings of the Financial Cryptography, 2004
2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Proceedings of the Financial Cryptography, 2003
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
Proceedings of the Applied Algebra, 2003
2002
Proceedings of the Information Security, 5th International Conference, 2002
Proceedings of the Financial Cryptography, 6th International Conference, 2002
Proceedings of the Advances in Cryptology, 2002
Proceedings of the Advances in Cryptology, 2002
Proceedings of the Advances in Cryptology, 2002
2001
IACR Cryptol. ePrint Arch., 2001
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001
Proceedings of the Public Key Cryptography, 2001
Proceedings of the Public Key Cryptography, 2001
Proceedings of the CCS 2001, 2001
Proceedings of the Cryptography and Lattices, International Conference, 2001
Proceedings of the Advances in Cryptology, 2001
2000
Proceedings of the Public Key Cryptography, 2000
Proceedings of the Automata, Languages and Programming, 27th International Colloquium, 2000
Proceedings of the Financial Cryptography, 2000
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000
Proceedings of the Algorithmic Number Theory, 4th International Symposium, 2000
1999
Proceedings of the Public Key Cryptography, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999
1998
Random Struct. Algorithms, 1998
Electron. Colloquium Comput. Complex., 1998
Proceedings of the Selected Areas in Cryptography '98, 1998
Proceedings of the Public Key Cryptography, 1998
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998
Security Analysis of a Practical "on the fly" Authentication and Signature Generation.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
Proceedings of the Advances in Cryptology, 1998
Proceedings of the CCS '98, 1998
Proceedings of the Advances in Cryptology, 1998
Proceedings of the Advances in Cryptology, 1998
1997
The Hardness of Approximate Optima in Lattices, Codes, and Systems of Linear Equations.
J. Comput. Syst. Sci., 1997
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997
Merkle-Hellman Revisited: A Cryptanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizations.
Proceedings of the Advances in Cryptology, 1997
Proceedings of the CCS '97, 1997
1996
The Action of a Few Random Permutations on r-Tuples and an Application to Cryptography.
Proceedings of the STACS 96, 1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Advances in Cryptology, 1996
1995
J. Cryptol., 1995
1994
Polynomial-time construction of codes II. Spherical codes and the kissing number of spheres.
IEEE Trans. Inf. Theory, 1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
1993
The Hardness of Approximate Optimia in Lattices, Codes, and Systems of Linear Equations
Proceedings of the 34th Annual Symposium on Foundations of Computer Science, 1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the Applied Algebra, 1993
1992
Appl. Algebra Eng. Commun. Comput., 1992
1991
Improving the Critical Density of the Lagarias-Odlyzko Attack Against Subset Sum Problems.
Proceedings of the Fundamentals of Computation Theory, 8th International Symposium, 1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Applied Algebra, 1991
1990
Cryptanalysis of a Public-Key Cryptosystem Based on Approximations by Rational Numbers.
Proceedings of the Advances in Cryptology, 1990
1989
Proceedings of the Advances in Cryptology, 1989
1988
Proceedings of the Coding Theory and Applications, 1988
1987
Proceedings of the 28th Annual Symposium on Foundations of Computer Science, 1987
1985
Inf. Control., September, 1985
1983
1978
Communication Systems.
Proceedings of the Information Technology '78: Proceedings of the 3rd Jerusalem Conference on Information Technology (JCIT3), 1978
1975