An Accurate Evaluation of Maurer's Universal Test

Jean -Sébastien Coron , David Naccache
selected areas in cryptography 57 -71

35
1998
On the Security of Random Sources

Jean -Sebastien Coron
public key cryptography 29 -42

38
1999
On the Security of RSA Screening

Jean -Sebastien Coron , David Naccache
public key cryptography 197 -203

16
1999
A new baby-step giant-step algorithm and some applications to cryptanalysis

Jean Sébastien Coron , David Lefranc , Guillaume Poupard
cryptographic hardware and embedded systems 47 -60

20
2005
Securit e des primitives sym etriques et de leurs implementations

Anne CANTEAUT , Louis GOUBIN , David MONNIAUX , Jean-Sébastien CORON

Procedings of SAC’98, Lectures Notes in Computer Science

JS Coron , D Naccache
Springer-Verlag

11
1998
Statistics and information leakage

JS Coron , D Naccache , P Kocher
ACM Trans. Embedded Comput. Systems 3 492 -508

7
2004
ECRYPT: Hardness of the main computational problems used in cryptography

JS Coron , B de Weger
European Network of Excellence in Cryptology

6
2007
Statistics and Secret Leackage, to appear in Proceedings of Financial Cryptography

JS Coron , P Kocher , D Naccache
Springer-Verlag, February

5
2000
Cryptographic Hardware and Embedded Systems-CHES 2009

JS Coron , I Kizhvatov , C Clavier , K Gaj
Springer, Berlin Heidelberg 156 -170

4
2009
A New Signature Forgery Strategy

JS Coron
ISO/IEC JTC1/SC27/WG2 N429

2
1999
Advances in Cryptology–EUROCRYPT 2011

A Becker , JS Coron , A Joux
Springer 6632 364 -385

8
2011
Cryptanalysis of a Provably Secure Cryptographic Hash Function.

Jean-Sébastien Coron , Antoine Joux
IACR Cryptology ePrint Archive 2004 13

32
2004
Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers.

Mehdi Tibouchi , Tancrède Lepoint , Jean-Sébastien Coron
IACR Cryptology ePrint Archive 2014 975

39
2014
A Variant of Coppersmith's Algorithm with Improved Complexity and Efficient Exhaustive Search.

Jean-Charles Faugère , Rina Zeitoun , Jean-Sébastien Coron , Guénaël Renault
IACR Cryptology ePrint Archive 2013 483

2013
The Random Oracle Model and the Ideal Cipher Model Are Equivalent

Yannick Seurin , Jean-Sébastien Coron , Jacques Patarin
Advances in Cryptography

2008