What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jacques Stern
Google Scholar
71
publications in security and cryptology related venues
Year
Venue
Title
2008
conf/pkc
-IC Signature Scheme.
Pierre-Alain Fouque
Gilles Macario-Rat
Ludovic Perret
Jacques Stern
2008
conf/eurocrypt
Key Recovery on Hidden Monomial Multivariate Schemes.
Pierre-Alain Fouque
Gilles Macario-Rat
Jacques Stern
2008
conf/sacrypt
Cryptanalysis of Tweaked Versions of SMASH and Reparation.
Pierre-Alain Fouque
Jacques Stern
Sébastien Zimmer
2007
conf/crypto
Practical Cryptanalysis of SFLASH.
Vivien Dubois
Pierre-Alain Fouque
Adi Shamir
Jacques Stern
2007
conf/pkc
Cryptanalysis of HFE with Internal Perturbation.
Vivien Dubois
Louis Granboulan
Jacques Stern
2007
conf/eurocrypt
Cryptanalysis of SFLASH with Slightly Modified Parameters.
Vivien Dubois
Pierre-Alain Fouque
Jacques Stern
2007
conf/sacrypt
Linear Cryptanalysis of Non Binary Ciphers.
Thomas Baignères
Jacques Stern
Serge Vaudenay
2006
journals/joc
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order.
Marc Girault
Guillaume Poupard
Jacques Stern
2006
conf/crypto
Inverting HFE Is Quasipolynomial.
Louis Granboulan
Antoine Joux
Jacques Stern
2006
conf/pkc
Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm.
Sébastien Kunz-Jacques
Gwenaëlle Martinet
Guillaume Poupard
Jacques Stern
2005
conf/eurocrypt
Differential Cryptanalysis for Multivariate Schemes.
Pierre-Alain Fouque
Louis Granboulan
Jacques Stern
2005
conf/asiacrypt
Adapting Density Attacks to Low-Weight Knapsacks.
Phong Q. Nguyen
Jacques Stern
2004
journals/joc
RSA-OAEP Is Secure under the RSA Assumption.
Eiichiro Fujisaki
Tatsuaki Okamoto
David Pointcheval
Jacques Stern
2004
conf/fc
Cryptography and the French Banking Cards: Past, Present, Future.
Jacques Stern
2004
conf/eurocrypt
Projective Coordinates Leak.
David Naccache
Nigel P. Smart
Jacques Stern
2003
conf/fse
New Attacks against Standardized MACs.
Antoine Joux
Guillaume Poupard
Jacques Stern
2003
conf/fc
Cryptanalysis of the OTM Signature Scheme from FC'02.
Jacques Stern
Julien P. Stern
2003
conf/eurocrypt
Why Provable Security Matters?
Jacques Stern
2003
conf/asiacrypt
Almost Uniform Density of Power Residues and the Provable Security of ESIGN.
Tatsuaki Okamoto
Jacques Stern
2002
conf/crypto
Flaws in Applying Proof Methodologies to Signature Schemes.
Jacques Stern
David Pointcheval
John Malone-Lee
Nigel P. Smart
2002
conf/crypto
Threshold Ring Signatures and Applications to Ad-hoc Groups.
Emmanuel Bresson
Jacques Stern
Michael Szydlo
2002
conf/fc
CryptoComputing with Rationals.
Pierre-Alain Fouque
Jacques Stern
Jan-Geert Wackers
2002
conf/asiacrypt
The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm.
Dario Catalano
Phong Q. Nguyen
Jacques Stern
2001
conf/ccs
Twin signatures: an alternative to the hash-and-sign paradigm.
David Naccache
David Pointcheval
Jacques Stern
2001
conf/crypto
RSA-OAEP Is Secure under the RSA Assumption.
Eiichiro Fujisaki
Tatsuaki Okamoto
David Pointcheval
Jacques Stern
2001
conf/fc
Non-interactive Private Auctions.
Olivier Baudron
Jacques Stern
2001
conf/pkc
Efficient Revocation in Group Signatures.
Emmanuel Bresson
Jacques Stern
2001
conf/pkc
One Round Threshold Discrete-Log Key Generation without Private Channels.
Pierre-Alain Fouque
Jacques Stern
2001
conf/asiacrypt
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001.
Craig Gentry
Jakob Jonsson
Jacques Stern
Michael Szydlo
2001
conf/asiacrypt
Fully Distributed Threshold RSA under Standard Assumptions.
Pierre-Alain Fouque
Jacques Stern
2000
journals/joc
Security Arguments for Digital Signatures and Blind Signatures.
David Pointcheval
Jacques Stern
2000
conf/fc
Sharing Decryption in the Context of Voting or Lotteries.
Pierre-Alain Fouque
Guillaume Poupard
Jacques Stern
2000
conf/fc
Signing on a Postcard.
David Naccache
Jacques Stern
2000
conf/ches
Software-Hardware Trade-Offs: Application to A5/1 Cryptanalysis.
Thomas Pornin
Jacques Stern
2000
conf/pkc
Short Proofs of Knowledge for Factoring.
Guillaume Poupard
Jacques Stern
2000
conf/eurocrypt
Fair Encryption of RSA Keys.
Guillaume Poupard
Jacques Stern
1999
conf/ccs
On the Fly Signatures Based on Factoring.
Guillaume Poupard
Jacques Stern
1999
conf/crypto
The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications.
Phong Q. Nguyen
Jacques Stern
1999
conf/ches
Probing Attacks on Tamper-Resistant Devices.
Helena Handschuh
Pascal Paillier
Jacques Stern
1999
conf/pkc
The Effectiveness of Lattice Attacks Against Low-Exponent RSA.
Christophe Coupé
Phong Q. Nguyen
Jacques Stern
1998
journals/joc
Lattice Reduction: A Toolbox for the Cryptanalyst.
Antoine Joux
Jacques Stern
1998
conf/fse
CS-Cipher.
Jacques Stern
Serge Vaudenay
1998
conf/ccs
A New Public Key Cryptosystem Based on Higher Residues.
David Naccache
Jacques Stern
1998
conf/crypto
Cryptanalysis of the Ajtai-Dwork Cryptosystem.
Phong Q. Nguyen
Jacques Stern
1998
conf/pkc
Lattices and Cryptography: An Overview.
Jacques Stern
1998
conf/eurocrypt
Security Analysis of a Practical "on the fly" Authentication and Signature Generation.
Guillaume Poupard
Jacques Stern
1998
conf/asiacrypt
Generation of Shared RSA Keys by Two Parties.
Guillaume Poupard
Jacques Stern
1998
conf/asiacrypt
The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure.
Phong Q. Nguyen
Jacques Stern
1998
conf/sacrypt
Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC '97.
Phong Q. Nguyen
Jacques Stern
1997
journals/joc
The Security of the Birational Permutation Signature Schemes.
Don Coppersmith
Jacques Stern
Serge Vaudenay
1997
conf/fse
XMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications.
David M'Raïhi
David Naccache
Jacques Stern
Serge Vaudenay
1997
conf/ccs
New Blind Signatures Equivalent to Factorization (extended abstract).
David Pointcheval
Jacques Stern
1997
conf/crypto
Merkle-Hellman Revisited: A Cryptanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizations.
Phong Q. Nguyen
Jacques Stern
1997
conf/fc
SVP: A Flexible Micropayment Scheme.
Jacques Stern
Serge Vaudenay
1997
conf/eurocrypt
A New Public-Key Cryptosystem.
David Naccache
Jacques Stern
1996
conf/eurocrypt
An Efficient Pseudo-Random Generator Provably as Secure as Syndrome Decoding.
Jean-Bernard Fischer
Jacques Stern
1996
conf/eurocrypt
Security Proofs for Signature Schemes.
David Pointcheval
Jacques Stern
1996
conf/asiacrypt
Provably Secure Blind Signature Schemes.
David Pointcheval
Jacques Stern
1996
conf/asiacrypt
The Cryptographic Security of the Syndrome Decoding Problem for Rank Distance Codes.
Florent Chabaud
Jacques Stern
1996
conf/asiacrypt
The Validation of Cryptographic Algorithms.
Jacques Stern
1995
journals/joc
The Cryptanalysis of a Public-Key Implementation of Finite Group Mappings.
Simon R. Blackburn
Sean Murphy
Jacques Stern
1994
conf/crypto
On the Length of Cryptographic Hash-Values Used in Identification Schemes.
Marc Girault
Jacques Stern
1994
conf/crypto
Designing Identification Schemes with Keys of Short Size.
Jacques Stern
1994
conf/asiacrypt
Can One Design a Signature Scheme Based on Error-Correctin Codes?
Jacques Stern
1993
conf/crypto
A New Identification Scheme Based on Syndrome Decoding.
Jacques Stern
1993
conf/crypto
Attacks on the Birational Permutation Signature Schemes.
Don Coppersmith
Jacques Stern
Serge Vaudenay
1993
conf/eurocrypt
Weakness of a Public-Key Cryptosystem Based on Factorizations of Finite Groups.
Simon R. Blackburn
Sean Murphy
Jacques Stern
1991
conf/crypto
The Cryptanalysis of a New Public-Key Cryptosystem Based on Modular Knapsacks.
Yeow Meng Chee
Antoine Joux
Jacques Stern
1991
conf/asiacrypt
Cryptanalysis of Another Knapsack Cryptosystem.
Antoine Joux
Jacques Stern
1990
conf/eurocrypt
Cryptanalysis of a Public-Key Cryptosystem Based on Approximations by Rational Numbers.
Jacques Stern
Philippe Toffin
1989
conf/eurocrypt
An Alternative to the Fiat-Shamir Protocol.
Jacques Stern
Coauthors
Adi Shamir
(1)
Antoine Joux
(5)
Christophe Coupé
(1)
Craig Gentry
(1)
Dario Catalano
(1)
David M'Raïhi
(1)
David Naccache
(6)
David Pointcheval
(8)
Don Coppersmith
(2)
Eiichiro Fujisaki
(2)
Emmanuel Bresson
(2)
Florent Chabaud
(1)
Gilles Macario-Rat
(2)
Guillaume Poupard
(9)
Gwenaëlle Martinet
(1)
Helena Handschuh
(1)
Jacques Stern
(71)
Jakob Jonsson
(1)
Jan-Geert Wackers
(1)
Jean-Bernard Fischer
(1)
John Malone-Lee
(1)
Julien P. Stern
(1)
Louis Granboulan
(3)
Ludovic Perret
(1)
Marc Girault
(2)
Michael Szydlo
(2)
Nigel P. Smart
(2)
Olivier Baudron
(1)
Pascal Paillier
(1)
Philippe Toffin
(1)
Phong Q. Nguyen
(8)
Pierre-Alain Fouque
(10)
Sean Murphy
(2)
Sébastien Kunz-Jacques
(1)
Sébastien Zimmer
(1)
Serge Vaudenay
(6)
Simon R. Blackburn
(2)
Tatsuaki Okamoto
(3)
Thomas Baignères
(1)
Thomas Pornin
(1)
Vivien Dubois
(3)
Yeow Meng Chee
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to