Jean-Sébastien Coron
Affiliations:- University of Luxembourg
According to our database1,
Jean-Sébastien Coron
authored at least 114 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on wwwfr.uni.lu
-
on id.loc.gov
On csauthors.net:
Bibliography
2024
Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
2020
J. Math. Cryptol., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
2019
IACR Cryptol. ePrint Arch., 2019
2018
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018
2017
Formal Verification of Side-channel Countermeasures via Elementary Circuit Transformations.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
2016
J. Cryptol., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol.
Proceedings of the New Codebreakers, 2016
2015
Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures.
J. Cryptogr. Eng., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
A Variant of Coppersmith's Algorithm with Improved Complexity and Efficient Exhaustive Search.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Advances in Cryptology, 2013
2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012
Proceedings of the Smart Card Research and Advanced Applications, 2012
2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010
SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications.
Proceedings of the Financial Cryptography and Data Security, 2010
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Des. Codes Cryptogr., 2009
Proceedings of the 4th Workshop on Embedded Systems Security, 2009
Proceedings of the Advances in Cryptology, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
2007
Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring.
J. Cryptol., 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
2006
Des. Codes Cryptogr., 2006
2005
Proceedings of the Public Key Cryptography, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005
2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Topics in Cryptology, 2004
2003
Cryptanalysis of the Repaired Public-key Encryption Scheme Based on the Polynomial Reconstruction Problem.
IACR Cryptol. ePrint Arch., 2003
Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem.
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Topics in Cryptology, 2002
Proceedings of the Advances in Cryptology, 2002
2001
IACR Cryptol. ePrint Arch., 2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
Proceedings of the Advances in Cryptology, 2001
2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999
1998
Proceedings of the Selected Areas in Cryptography '98, 1998