David Naccache
#17,250
Most Influential Person Now
Cryptographer
David Naccache's AcademicInfluence.com Rankings
David Naccachemathematics Degrees
Mathematics
#4830
World Rank
#6832
Historical Rank
Measure Theory
#2297
World Rank
#2751
Historical Rank
Download Badge
Computer Science Mathematics
Why Is David Naccache Influential?
(Suggest an Edit or Addition)According to Wikipedia, David Naccache is a cryptographer, currently a professor at the École normale supérieure and a member of its Computer Laboratory. He was previously a professor at Panthéon-Assas University. Biography He received his Ph.D. in 1995 from the École nationale supérieure des télécommunications. Naccache's most notable work is in public-key cryptography, including the cryptanalysis of digital signature schemes. Together with Jacques Stern he designed the similarly named but very distinct Naccache-Stern cryptosystem and Naccache-Stern knapsack cryptosystem.
David Naccache's Published Works
Published Works
- The Sorcerer's Apprentice Guide to Fault Attacks (2006) (887)
- Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures (2012) (471)
- Fully Homomorphic Encryption over the Integers with Shorter Public Keys (2011) (467)
- A new public key cryptosystem based on higher residues (1998) (366)
- Cryptographic Hardware and Embedded Systems — CHES 2001 (2001) (322)
- Topics in Cryptology — CT-RSA 2001 (2001) (291)
- Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers (2012) (286)
- HOTP: An HMAC-Based One-Time Password Algorithm (2005) (274)
- On blind signatures and perfect crimes (1992) (262)
- Statistics and secret leakage (2000) (222)
- Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard (1994) (187)
- When Clocks Fail: On Critical Paths and Clock Faults (2010) (169)
- Standard Model (2011) (146)
- A New Public-Key Cryptosystem (1997) (142)
- Efficient Rational Secret Sharing in Standard Communication Networks (2010) (126)
- Secure and practical identity-based encryption (2005) (125)
- Cryptographic smart cards (1996) (116)
- Secure Delegation of Elliptic-Curve Pairing (2010) (109)
- Towards Hardware-Intrinsic Security - Foundations and Practice (2010) (101)
- On the Security of RSA Padding (1999) (91)
- How to flip a bit? (2010) (85)
- Experimenting with Faults, Lattices and the DSA (2005) (84)
- Universal Padding Schemes for RSA (2002) (65)
- Projective Coordinates Leak (2004) (64)
- Temperature Attacks (2009) (57)
- An Accurate Evaluation of Maurer's Universal Test (1998) (55)
- Batch exponentiation: a fast DLP-based signature generation strategy (1996) (55)
- Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme (2000) (54)
- Signing on a Postcard (2000) (53)
- Fault Attacks on RSA Signatures with Partially Unknown Messages (2009) (46)
- How to Copyright a Function? (1999) (44)
- What Is Cryptography (2006) (42)
- Twin signatures: an alternative to the hash-and-sign paradigm (2001) (41)
- Why You Cannot Even Hope to use Gröbner Bases in Public Key Cryptography: An Open Letter to a Scientist Who Failed and a Challenge to Those Who Have Not Yet Failed (1994) (41)
- Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings (2006) (41)
- Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption (2003) (40)
- A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards (2013) (38)
- Cryptographically secure shields (2014) (37)
- Flexible attribute-based encryption applicable to secure e-healthcare records (2015) (36)
- Random Active Shield (2012) (35)
- When e-th Roots Become Easier Than Factoring (2007) (34)
- Fault Attacks Against emv Signatures (2010) (34)
- Computational Alternatives to Random Number Generators (1998) (34)
- Externalized Fingerprint Matching (2004) (32)
- 3D Hardware Canaries (2012) (32)
- Single-bit DFA using multiple-byte laser fault injection (2010) (31)
- OCRA: OATH Challenge-Response Algorithm (2011) (31)
- Randomness in Cryptography (2006) (30)
- New Attacks on PKCS#1 v1.5 Encryption (2000) (30)
- Cryptography and Security: From Theory to Applications (2012) (29)
- Cryptanalysis of the RSA Subgroup Assumption from TCC 2005 (2011) (29)
- Fault Round Modification Analysis of the advanced encryption standard (2012) (29)
- Alien vs. Quine (2007) (28)
- Verifying Software Integrity in Embedded Systems: A Side Channel Approach (2014) (28)
- OMD: A Compression Function Mode of Operation for Authenticated Encryption (2014) (24)
- Improving the Big Mac Attack on Elliptic Curve Cryptography (2015) (23)
- Arithmetic co-processors for public-key cryptography: The state of the art (1996) (23)
- Advances in Cryptology - EUROCRYPT 2004 (2004) (21)
- Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms (2009) (20)
- Review of fault injection mechanisms and consequences on countermeasures design (2011) (20)
- When organized crime applies academic results: a forensic analysis of an in-card listening device (2016) (20)
- On the Security of RSA Screening (1999) (20)
- Linear Bandwidth Naccache-Stern Encryption (2008) (20)
- Can Code Polymorphism Limit Information Leakage? (2011) (19)
- On the Hardness of the Mersenne Low Hamming Ratio Assumption (2017) (19)
- Mobile Terminal Security (2004) (19)
- Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry's Crypt (2006) (18)
- White-Box Cryptography: Security in an Insecure Environment (2016) (17)
- Blind Fault Attack against SPN Ciphers (2014) (17)
- When Hashes Collide (2005) (17)
- Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures (2009) (17)
- Finding Faults (2005) (17)
- Modulus fault attacks against RSA–CRT signatures (2011) (17)
- GOST 34.10 - A brief overview of Russia's DSA (1996) (16)
- Cryptanalysis of RSA Signatures with Fixed-Pattern Padding (2001) (16)
- Same Values Power Analysis Using Special Points on Elliptic Curves (2012) (15)
- Generic Model (2011) (14)
- Cut-&-Paste Attacks with JAVA (2002) (14)
- On The Broadcast and Validity-Checking Security of PKCS \#1 v1.5 Encryption (2010) (13)
- Law enforcement, forensics and mobile communications (2006) (13)
- Modulus Fault Attacks against RSA-CRT Signatures (2011) (12)
- Low-temperature low-cost 58 Bismuth - 42 Tin alloy forensic chip re-balling and re-soldering (2016) (12)
- ECC: Do We Need to Count? (1999) (12)
- Cryptography, Law Enforcement, and Mobile Communications (2006) (12)
- Forensic smartphone analysis using adhesives: Transplantation of Package on Package components (2018) (11)
- Information Security Theory and Practice. Securing the Internet of Things (2014) (11)
- Efficient subtree-based encryption for fuzzy-entity data sharing (2018) (11)
- Monotone Signatures (2002) (11)
- Cryptanalysis of ISO/IEC 9796-1 (2008) (11)
- Legally Fair Contract Signing Without Keystones (2016) (10)
- Offset Merkle-Damgård (OMD) version 2.0 A CAESAR Proposal (2015) (10)
- Deconvolving Protected Signals (2009) (10)
- Optimization of Fully Homomorphic Encryption (2011) (10)
- Reproducible single-byte laser fault injection (2010) (10)
- Topics in Cryptology - CT-RSA 2001: The Cryptographer's Track at RSA Conference 2001 San Francisco, CA, USA, April 8-12, 2001 Proceedings (2001) (10)
- Cryptographic Hardware and Embedded Systems - CHES 2001: Third International Workshop, Paris, France, May 14-16, 2001 Proceedings (2001) (10)
- Fully Homomorphic Encryption: Computations with a Blindfold (2016) (9)
- Double-Speed Safe Prime Generation (2003) (9)
- Are Crypto-Accelerators Really Inevitable? 20Bit Zero-Knowledge in Less than a Second on Simple 8-bit Microcontrollers (1995) (9)
- Cut and Paste Attacks with Java (2002) (9)
- Non-interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms (2017) (8)
- Trust on a Nationwide Scale (2007) (8)
- Reducing the Memory Complexity of Type-Inference Algorithms (2002) (8)
- How to Disembed a Program? (2004) (8)
- Fault Attacks on Projective-to-Affine Coordinates Conversion (2013) (8)
- The Eleventh Power Residue Symbol (2020) (8)
- XMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications (1997) (8)
- Index Calculation Attacks on RSA Signature and Encryption (2006) (7)
- Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA (2001) (7)
- New number-theoretic cryptographic primitives (2020) (7)
- Electrically conductive adhesives, thermally conductive adhesives and UV adhesives in data extraction forensics (2017) (7)
- Twisting Lattice and Graph Techniques to Compress Transactional Ledgers (2017) (7)
- Chemical Combinatorial Attacks on Keyboards (2003) (7)
- Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis (2021) (7)
- Can O.S.S. be Repaired? Proposal for a New Practical Signature Scheme (1994) (6)
- Couponing Scheme Reduces Computational Power Requirements for DSS Signatures (1994) (6)
- Honey Encryption for Language (2017) (6)
- Can Montgomery parasites be avoided? A design methodology based on key and cryptosystem modifications (1995) (6)
- Binary-to-decimal conversion based on the divisibility of 2/sup 8/-1 by 5 (1992) (6)
- The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday (2016) (6)
- How to Improve an Exponentiation Black-Box (1998) (6)
- Optimal Covid-19 Pool Testing with a priori Information (2020) (6)
- Safe-Errors on SPA Protected Implementations with the Atomicity Technique (2015) (5)
- Cdoe Obofsucaitn: Securing Software from Within (2016) (5)
- Return-Oriented Programming on RISC-V (2020) (5)
- From Fixed-Length to Arbitrary-Length RSA Padding Schemes (2000) (5)
- Asymmetric Currency Rounding (2000) (5)
- Accelerating Okamoto-Uchiyama public-key cryptosystem (1999) (5)
- Double-Speed Barrett Moduli (2015) (5)
- The Thirteenth Power Residue Symbol (2019) (5)
- Removing epoxy underfill between neighbouring components using acid for component chip-off (2019) (5)
- Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing (2016) (4)
- The New Codebreakers (2016) (4)
- How to compartment secrets (2019) (4)
- Can a Program Reverse-Engineer Itself? (2011) (4)
- Practical Instantaneous Frequency Analysis Experiments (2013) (4)
- New Algorithmic Approaches to Point Constellation Recognition (2014) (4)
- Instantaneous Frequency Analysis (2013) (4)
- Honey Encryption for Language - Robbing Shannon to Pay Turing? (2016) (4)
- Regulating the pace of von Neumann correctors (2018) (4)
- Low-Cost Countermeasure against RPA (2012) (4)
- Robust Encryption, Extended (2019) (4)
- Medical Equipment Used for Forensic Data Extraction: A low-cost solution for forensic laboratories not provided with expensive diagnostic or advanced repair equipment (2021) (4)
- Applet Verification Strategiesfor RAM-Constrained Devices (2002) (4)
- Cryptographic Test Correction (2008) (4)
- Divisibility, Smoothness and Cryptographic Applications (2008) (4)
- A Number-Theoretic Error-Correcting Code (2015) (4)
- Process Table Covert Channels: Exploitation and Countermeasures (2016) (4)
- Remote Attestation (2011) (3)
- Cellular Network Security (2011) (3)
- TCP SYN Flooding (2004) (3)
- O-line/On-line Generation of RSA Keys with Smart Cards (2002) (3)
- Conceptual Modeling (2012) (3)
- Comparing with RSA (2009) (3)
- Public Key Cryptography : 4th [i.e. 5th] International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002 : proceedings (2002) (3)
- Defensive Leakage Camouflage (2012) (3)
- Generating Functionally Equivalent Programs Having Non-isomorphic Control-Flow Graphs (2017) (3)
- Fault Attacks on Randomized RSA Signatures (2009) (3)
- Implementation of AES Using NVM Memories Based on Comparison Function (2015) (3)
- Public-Key Based Lightweight Swarm Authentication (2016) (3)
- Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95 (2004) (3)
- Padding attacks on RSA (1999) (3)
- How to Explain Side-Channel Leakage to Your Kids (2000) (3)
- ARMv8 Shellcodes from 'A' to 'Z' (2016) (3)
- Public Key Cryptography (2002) (3)
- Applying Cryptographic Acceleration Techniques to Error Correction (2015) (2)
- Communicating Covertly through CPU Monitoring (2013) (2)
- Quotient hash tables: efficiently detecting duplicates in streaming data (2019) (2)
- At Most 43 Moves, At Least 29: Optimal Strategies and Bounds for Ultimate Tic-Tac-Toe (2020) (2)
- Trading-Off Type-Inference Memory Complexity against Communication (2003) (2)
- Factoring Unbalanced Moduli with Known Bits (2009) (2)
- A French cipher from the late 19th century (2020) (2)
- Blind Attacks on Engineering Samples (2005) (2)
- Reverse Public Key Encryption (2009) (2)
- Practical Cryptanalysis of ISO 9796-2 and EMV Signatures (2016) (2)
- From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited (2005) (2)
- Preservation of DNA Privacy During the Large Scale Detection of COVID-19 (2020) (2)
- Montgomery-Suitable Cryptosystems (1993) (2)
- Towards Hardware-Intrinsic Security - ReadingSample (2017) (2)
- Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography (2002) (2)
- Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface (2007) (2)
- Time, Privacy, Robustness, Accuracy: Trade Offs for the Open Vote Network Protocol (2021) (2)
- Integer Reconstruction Public-Key Encryption (2019) (2)
- Dynamic countermeasure against the Zero Power Analysis (2013) (2)
- Federated Learning Aggregation: New Robust Algorithms with Guarantees (2022) (2)
- Cryptography and security : from theory to applications : essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday (2012) (2)
- Decrease of energy deposited during laser decapsulation attacks by dyeing and pigmenting the ECA: Application to the forensic micro-repair of wire bonding (2019) (2)
- Slow Motion Zero Knowledge Identifying with Colliding Commitments (2015) (2)
- Reusing Nonces in Schnorr Signatures (2017) (2)
- Public-Key Authenticated Encryption (2011) (1)
- Noise-Resilient Ensemble Learning using Evidence Accumulation Clustering (2021) (1)
- Computational Improvements to Differential Side Channel Analysis (2005) (1)
- Elementary Attestation of Cryptographically Useful Composite Moduli (2020) (1)
- Generating Local Maps of Science using Deep Bibliographic Coupling (2021) (1)
- A Montgomery-Suitable Fiat-Shamir-like Authenication Scheme (1992) (1)
- Recent Results on Signature Forgery (1999) (1)
- Using Hamiltonian Totems as Passwords (2013) (1)
- The Case for System Command Encryption (2017) (1)
- Operand Folding Hardware Multipliers (2011) (1)
- Mixed-radix Naccache–Stern encryption (2019) (1)
- Fault Diagnosis and Tolerance in Cryptography: Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings (Lecture Notes in Computer Science) (2006) (1)
- Failure is Also an Option (2015) (1)
- The Conjoined Microprocessor (2016) (1)
- Seventh international workshop on Fault Diagnosis and Tolerance in Cryptography, 2010, FDTC 2010, Santa Barbara, California, USA, 21 August 2010 (2010) (1)
- Recovering Secrets From Prefix-Dependent Leakage (2020) (1)
- A Conjecture From a Failed Cryptanalysis (2022) (1)
- Buying AES Design Resistance with Speed and Energy (2015) (1)
- A Fiat-Shamir Implementation Note (2016) (1)
- Convergence Voting: From Pairwise Comparisons to Consensus (2021) (1)
- Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography (2016) (1)
- Provably Secure Chipcard Personalization, or, How to Fool Malicious Insiders (2002) (1)
- Extracting Unknown Keys from Unknown Algorithms Encrypting Unknown Fixed Messages and Returning No Results (2010) (1)
- Backtracking-assisted multiplication (2017) (1)
- Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Survey (2021) (1)
- Explaining the Entombed Algorithm (2021) (1)
- Human Public-Key Encryption (2016) (1)
- Authenticated Key Distribution: When the Coupon Collector is Your Enemy (2019) (1)
- National Security, Forensics and Mobile Communications (2005) (1)
- Software-Based Attestation (2011) (1)
- A forensic analysis of the Google Home: repairing compressed data without error correction (2022) (1)
- A Tribute to David Kahn (2009) (1)
- Accelerating Wilson's primality test (1991) (1)
- Taphonomical Security: (DNA) Information with Foreseeable Lifespan (2021) (1)
- Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007, FDTC 2007: Vienna, Austria, 10 September 2007 (2007) (0)
- Invited Talk: A French Code from the Late 19th Century (2018) (0)
- Subgroup Cryptosystems (2011) (0)
- Stuttering Conway Sequences Are Still Conway Sequences (2020) (0)
- Biometric Cryptosystem (2009) (0)
- The Look-and-Say The Biggest Sequence Eventually Cycles (2020) (0)
- Discovering New L-Function Relations Using Algebraic Sieving (2021) (0)
- Physical Simulation of Inarticulate Robots (2011) (0)
- Multiplicative Knapsack Cryptosystem (2011) (0)
- Procedure of public key cryptography. (1996) (0)
- Ju n 20 21 Near-Optimal Pool Testing under Urgency Constraints (2021) (0)
- Method and device for identifying biometric adapted VERIFICATION on smart cards (2003) (0)
- BIOS Basic Input Output System (2011) (0)
- A method of reducing the energy consumption of an electronic terminal, terminal and corresponding computer program. (2010) (0)
- Proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Securing the Internet of Things - Volume 8501 (2014) (0)
- News and advice on data security and cryptography Bulletin (1998) (0)
- Naccache-Stern Higher Residues Cryptosystem (2011) (0)
- Regulating the pace of von Neumann correctors (2017) (0)
- Credential Verification (2011) (0)
- Approaching Optimal Duplicate Detection in a Sliding Window (2020) (0)
- How to Sign Paper Contracts? Conjectures and Evidence Related to Equitable and Efficient Collaborative Task Scheduling (2014) (0)
- portable device comprising a touch screen and method corresponding use. (2010) (0)
- Countermeasure method in a smart card chip and incorporating said microcircuit. (2001) (0)
- Method aid control of transaction records, transaction device, server, mobile terminal and corresponding computer programs. (2008) (0)
- Chemical Combinatorial Attack (2011) (0)
- Gemplus' Corporate Product R&d Division (1997) (0)
- Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography (2006) (0)
- Terminal biometric electronic payment and transaction process (2006) (0)
- Method of transmitting a secret code, card reader terminal management server and computer program products corresponding (2007) (0)
- Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools (2014) (0)
- How to Scatter a Secret? (2012) (0)
- How to Disembed a Program? (Extended Abstract) (2004) (0)
- MQ or Multivariate Quadratic Public-Key Cryptosystem (MQPKC) (2011) (0)
- How to Claim a Computational Feat (2021) (0)
- Flexible attribute-based encryption applicable to secure e-healthcare records (2015) (0)
- Genealogical Population-Based Training for Hyperparameter Optimization (2021) (0)
- Autotomic Signatures (2011) (0)
- When organized crime applies academic results: a forensic analysis of an in-card listening device (2015) (0)
- enciphering method digital data, method of masking a biometric fingerprint, and application to the security of a security document (2004) (0)
- Method of access control, device and corresponding computer program product. (2008) (0)
- CRYPTOGRAPHIC SM CARDS (1996) (0)
- Procede d'impression de tickets (2007) (0)
- Greatest Common Factor (2011) (0)
- FedControl: When Control Theory Meets Federated Learning (2022) (0)
- Keyed Non-parametric Hypothesis Tests (2019) (0)
- s ide Channel a ttacks on Cryptographic s oftware (2009) (0)
- Confidential message electronic security with secret identification protocol code having verification process using polynomial formed from release polynomial/second polynomial and zero release where correspondence not found. (2001) (0)
- A Fractional 3n+1 Conjecture (2020) (0)
- von Neumann Correction (2011) (0)
- Method for dynamic authentication programs through an electronic portable object (2004) (0)
- Method for improving a random generator to make it resistant against attacks by measurement of current (1999) (0)
- A Note on the Ramanujan Machine (2022) (0)
- Accelerating Biometric Identification (2012) (0)
- Process for simplifying the entry, by a user, of a numerical sequence of great length, device and product corresponding computer program. (2009) (0)
- data processing method transaction, terminal, server and corresponding computer programs. (2013) (0)
- Tagged Documents Co-Clustering (2021) (0)
- Magnetic RSA (2021) (0)
- Side-ChannelAttackson CryptographicSoftware (2009) (0)
- Cryptology and Network Security (2015) (0)
- Method for verifying communication system (1994) (0)
- Secure and {\sl Practical} Identity-Based Encryption (2005) (0)
- Emulation module to at least one payment card, METHOD, payment device, computer program product and corresponding storage medium (2014) (0)
- Co-Embedding: Discovering Communities on Bipartite Graphs through Projection (2021) (0)
- Near-Optimal Pool Testing under Urgency Constraints (2021) (0)
- Method for auto-detection of an attempted hacking of an electronic payment card, card terminal and corresponding program (2014) (0)
- Control Method for an identity of a payment terminal and terminal and secure. (2013) (0)
- Practical Cryptanalysis of ISO 9796-2 and EMV Signatures (2015) (0)
- Kerckhoffs' Legacy (2020) (0)
- Primary Elements in Cyclotomic Fields with Applications to Power Residue Symbols, and More (2021) (0)
- How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling (2013) (0)
- Method for authenticating a user, server, communication terminal and corresponding programs (2014) (0)
- Method for cryptographic message signature has strengthened security, signature verification process, devices and products corresponding computer programs. (2009) (0)
- Process for management of the input data by presses on a touch surface of an electronic terminal, module, device, computer program product and corresponding storage medium (2014) (0)
- I T ] 1 S ep 2 01 5 A Number-Theoretic Error-Correcting Code (2018) (0)
- Backtracking-assisted multiplication (2017) (0)
- PrimaryElements inCyclotomicFieldswith Applications toPowerResidueSymbols, and More (2021) (0)
- Photonic power firewalls (2015) (0)
- And method for securing mobile device and Secure (2007) (0)
- How to Read a Signature? (2012) (0)
- Proposal for a New Practical Signature Scheme (0)
- In a follow-up paper by Micali and Shamir (2016) (0)
- Process for the fight against flight tickets, ticket, corresponding inactivation device and activation device. (2006) (0)
- On Squaring Modulo Mersenne Numbers (2022) (0)
- Apparatus for masking operations in a microprocessor card (1999) (0)
- Cryptography Method has public key based on the discrete logarithm (1995) (0)
- Method of cryptography using a symmetric cryptographic algorithm and application flow has a chip because you have (2002) (0)
- Devices to hide the transactions effected in a microprocessor card (1998) (0)
- Method for manufacturing portable payment terminal, terminal, corresponding device and battery (2007) (0)
- e-Passportt hreats (2007) (0)
- On Catalan Constant Continued Fractions (2022) (0)
- Barrett's Algorithm (2011) (0)
- Device and rapid propagation system (2011) (0)
- Electronic payment terminal and setting method for disposal of electronic payment terminals (2006) (0)
- Security, Cryptography: Theory and Practice. (Sécurité, Cryptographie : Théorie et Pratique) (2004) (0)
- The Polynomial Composition Problem in (Z/nZ)[X] (2010) (0)
- Process for provision of transaction data, terminal, transaction process, METHOD bank statements enrichment, server, signal products and corresponding computer program. (2006) (0)
- Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems (1999) (0)
- Eight international workshop on Fault Diagnosis and Tolerance in Cryptography, 2011, FDTC 2011, Nara, Japan, 28 September 2011 (2011) (0)
- Method and process of the monitoring device of a program, program device for monitoring the program (1999) (0)
- Mixed-radix Naccache–Stern encryption (2018) (0)
- Temperature Attack (2011) (0)
- Method for authentication, portable object and corresponding computer program (2007) (0)
- XTS:AModeofAES forEncryptingHardDisks (2010) (0)
- Cryptology and network security : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, proceedings (2015) (0)
- Alarm device comprising an electronic payment terminal and use thereof. (2006) (0)
- RISC-V: #AlphanumericShellcoding (2019) (0)
- Information and Communications Security (2018) (0)
- Invisible Formula Attacks (2022) (0)
- Access Lists (2020) (0)
- Method and apparatus for applying a system for controlling access to protect video flows in direct mode (2016) (0)
- From Rational Number Reconstruction to Set Reconciliation and File Synchronization (2012) (0)
- Card Detection Method has inauthentic microprocessor card microprocessor card reader terminal and corresponding programs (2008) (0)
- Noise-Resilient Ensemble Learning Using Evidence Accumulation (2022) (0)
- Index t-SNE: Tracking Dynamics of High-Dimensional Datasets with Coherent Embeddings (2021) (0)
- on Projective-to-Affine Coordinates Conversion (2013) (0)
- Pseudo random generator based on a cryptographic hash function for systems requiring a draw for aleas (1997) (0)
- Opportunitiesin White-BoxCryptography (2010) (0)
- Automated Discovery of New $L$-Function Relations (2022) (0)
- Another Look at Affine-Padding RSA Signatures (2012) (0)
- Pattern Recognition Experiments on Mathematical Expressions (2022) (0)
- On Unpadded NTRU Quantum (In)Security (2021) (0)
- Process for countermeasure against an electronic component implementing a cryptographic algorithm secret key (1998) (0)
- Security, Cryptography: Theory and Practice (2004) (0)
- The process of DSA signature generation with portable devices at low cost. (1994) (0)
- Method and system for validating a transaction, transaction terminal and corresponding program. (2010) (0)
- Runtime Analysis (2011) (0)
- of access control has a data processing means (2000) (0)
- Another Look at RSA Signatures With Affine Padding (2011) (0)
- A method for performing a communication protocol with a secret key between two processing devices (1995) (0)
- Method for monitoring the program execution (2000) (0)
- Blackmailing Attacks (2011) (0)
- Process for the implementation of a communication protocol private key between two processing devices (1994) (0)
- Method of generating DSA signatures with low-cost portable units (1994) (0)
- Method for managing IT applications by the operating system of a multi-computer system applications (2001) (0)
- Chip card reader, system and method of performing a pairing operation on an elliptic curve (2005) (0)
- A Conjecture on Hermite Constants (2022) (0)
- t hev irtuesofm ature andm inimalistCryptography (2008) (0)
- Linear Bandwidth Naccache-Stern Encryption (To appear in R. Ostrovsky, Ed., Sixth Conference on Security and Cryptography for Networks - SCN 2008 , vol. ? of Lecture Notes in Computer Science, pp. ???{???, Springer-Verlag, 2008.) (2008) (0)
- 76 30 Report on the PhD thesis entitled “ Usability: low tech, high security ” by Nikola (2019) (0)
- Private Key Cryptosystem (2006) (0)
- The Multiplicative Persistence Conjecture Is True for Odd Targets (2021) (0)
- Securing a validation of a sequence of characters, process, apparatus and computer program product corresponding (2015) (0)
- Device for encrypted transmission of video signals (1992) (0)
- Method for securing a microprocessor, computer program and corresponding device (2007) (0)
- Room at the Bottom (2011) (0)
- The bank card (2013) (0)
- A data processing from memory card without contact, corresponding method and computer program (2014) (0)
- Speaker Identification and Verification (SIV) (2011) (0)
- Method and device for verification of detention given a confidential communication without it, in a process called "a zero-knowledge" (2001) (0)
- How to (Carefully) Breach a Service Contract? (2013) (0)
- Payment terminal, METHOD and associate program (2007) (0)
- Twin Signatures (2011) (0)
- Securing E-passports with Elliptic Curves (2011) (0)
- Process for securisation of a computer program, device, update PROCESS and update server has corresponding day. (2008) (0)
- Method of generating DSA signatures from portable devices at low cost. (1994) (0)
- Method for deactivation of a payment module, computer program product, storage medium and corresponding payment module (2014) (0)
- Internet Engineering Task Force (ietf) (2011) (0)
- Process to access a data processing means. (2001) (0)
- Control Method of shares through a touch screen. (2010) (0)
- A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards (2013) (0)
- Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption (2014) (0)
This paper list is powered by the following services:
Other Resources About David Naccache
What Schools Are Affiliated With David Naccache?
David Naccache is affiliated with the following schools: