CORON, J.-S., GERARD, F., Lepoint, T., Trannoy, M., & Zeitoun, R. (05 September 2024). Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024 (4), 335 - 354. doi:10.46586/tches.v2024.i4.335-354 Peer Reviewed verified by ORBi |
CORON, J.-S., GERARD, F., Trannoy, M., & Zeitoun, R. (31 August 2023). Improved Gadgets for the High-Order Masking of Dilithium. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023 (4), 110 - 145. doi:10.46586/tches.v2023.i4.110-145 Peer Reviewed verified by ORBi |
CORON, J.-S., Gérard, F., Trannoy, M., & Zeitoun, R. (2023). High-order masking of NTRU. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023 (2), 180--211. doi:10.46586/tches.v2023.i2.180-211 Peer reviewed |
CORON, J.-S., Gérard, F., Montoya, S., & Zeitoun, R. (2023). High-order Polynomial Comparison and Masking Lattice-based Encryption. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023 (1), 153--192. doi:10.46586/tches.v2023.i1.153-192 Peer reviewed |
CORON, J.-S., & GINI, A. (March 2022). Provably Solving the Hidden Subset Sum Problem via Statistical Learning. Mathematical Cryptology, 1. Peer reviewed |
CORON, J.-S., GERARD, F., Montoya, S., & Zeitoun, R. (2022). High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption. IACR Transactions on Cryptographic Hardware and Embedded Systems. doi:10.46586/tches.v2022.i2.1-40 Peer reviewed |
CORON, J.-S., & SPIGNOLI, L. (2021). Secure Wire Shuffling in the Probing Model. In Crypto 2021. doi:10.1007/978-3-030-84252-9_8 Peer reviewed |
CORON, J.-S., NOTARNICOLA, L., & WIESE, G. (2020). Simultaneous Diagonalization of Incomplete Matrices and Applications. In Proceedings of the Fourteenth Algorithmic Number Theory Symposium (ANTS-XIV), edited by Steven Galbraith, Open Book Series 4, Mathematical Sciences Publishers, Berkeley, 2020 (pp. 127-142). Peer reviewed |
CORON, J.-S., & GINI, A. (2020). A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem. In Advances in Cryptology -- CRYPTO 2020 (pp. 3--31). Cham, Unknown/unspecified: Springer International Publishing. doi:10.1007/978-3-030-56880-1_1 Peer reviewed |
CORON, J.-S., Greuet, A., & Zeitoun, R. (2020). Side-Channel Masking with Pseudo-Random Generator. In Eurocrypt 2020. Peer reviewed |
CORON, J.-S., Belaid, S., Prouff, E., Rivain, M., & Taleb, A. R. (2020). Random Probing Security: Verification, Composition, Expansion and New Constructions. In CRYPTO 2020. doi:10.1007/978-3-030-56784-2_12 Peer reviewed |
CORON, J.-S., & NOTARNICOLA, L. (2019). Cryptanalysis of CLT13 Multilinear Maps with Independent Slots [Paper presentation]. ASIACRYPT 2019, Kobe, Japan. |
CORON, J.-S., & NOTARNICOLA, L. (2019). Cryptanalysis of CLT13 Multilinear Maps with Independent Slots. In Advances in Cryptology – ASIACRYPT 2019, 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II. Springer. Peer reviewed |
CORON, J.-S., & PEREIRA, V. (2019). On Kilian's Randomization of Multilinear Map Encodings. In J.-S. CORON & V. PEREIRA, On Kilian's Randomization of Multilinear Map Encodings. Peer reviewed |
CORON, J.-S., & GINI, A. (2019). Improved Cryptanalysis of the AJPS Mersenne Based Cryptosystem. Journal of Mathematical Cryptology. doi:10.1515/jmc-2019-0027 Peer Reviewed verified by ORBi |
CORON, J.-S. (2017). High-Order Conversion from Boolean to Arithmetic Masking. In Proceedings of CHES 2017. Peer reviewed |
CORON, J.-S., Lee, M. S., Lepoint, T., & Tibouchi, M. (2017). Zeroizing Attacks on Indistinguishability Obfuscation over CLT13. In Proceedings of PKC 2017. doi:10.1007/978-3-662-54365-8_3 Peer reviewed |
CORON, J.-S., Greuet, A., Prouff, E., & Zeitoun, R. (2016). Faster Evaluation of SBoxes via Common Shares. Proceedings of CHES 2016. doi:10.1007/978-3-662-53140-2_24 Peer reviewed |
CORON, J.-S., Battistello, A., Prouff, E., & Zeitoun, R. (2016). Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme. Proceedings of CHES 2016. doi:10.1007/978-3-662-53140-2_2 Peer reviewed |
CORON, J.-S., Lee, M. S., Lepoint, T., & Tibouchi, M. (2016). Cryptanalysis of GGH15 Multilinear Maps. Proceedings of Crypto 2016. doi:10.1007/978-3-662-53008-5_21 Peer reviewed |
CORON, J.-S. (2015). Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations. Proceedings of Crypto 2015. doi:10.1007/978-3-662-47989-6_12 Peer reviewed |
CORON, J.-S., Lepoint, T., & Tibouchi, M. (2015). New Multilinear Maps over the Integers. Proceedings of Crypto 2015. doi:10.1007/978-3-662-47989-6_13 Peer reviewed |
CORON, J.-S., GROSZSCHÄDL, J., Tibouchi, M., & VADNALA, P. K. (2015). Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity. In G. Leander (Ed.), Fast Software Encryption, 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers (pp. 130-149). Springer Verlag. doi:10.1007/978-3-662-48116-5_7 Peer reviewed |
CORON, J.-S., GROSZSCHÄDL, J., & VADNALA, P. K. (2014). Secure Conversion between Boolean and Arithmetic Masking of Any Order. In L. Batina & M. Robshaw (Eds.), Cryptographic Hardware and Embedded Systems - CHES 2014, 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings (pp. 188-205). Springer Verlag. Peer reviewed |
CORON, J.-S. (2014). Higher Order Masking of Look-Up Tables. Proceedings of Eurocrypt 2014. Peer reviewed |
CORON, J.-S., Roy, A., & VENKATESH, S. V. (2014). Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures. In L. Batina & M. Robshaw (Eds.), Cryptographic Hardware and Embedded Systems – CHES 2014 (pp. 170-187). Springer. doi:10.1007/978-3-662-44709-3_10 Peer reviewed |
Cheon, J. H., CORON, J.-S., Kim, J., Lee, M. S., LEPOINT, T., TIBOUCHI, M., & Yun, A. (2013). Batch Fully Homomorphic Encryption over the Integers. In EUROCRYPT. doi:10.1016/j.ins.2015.03.019 Peer reviewed |
CORON, J.-S., LEPOINT, T., & TIBOUCHI, M. (2013). Practical Multilinear Maps over the Integers. In CRYPTO (1). Peer reviewed |
CORON, J.-S., Kirichenko, A., & TIBOUCHI, M. (2013). A Note on the Bivariate Coppersmith Theorem. Journal of Cryptology, 26 (2), 246-250. doi:10.1007/s00145-012-9121-x Peer reviewed |
CORON, J.-S., Christophe, G., Emmanuel, P., Soline, R., Matthieu, R., & PRAVEEN KUMAR, V. (2012). Conversion of Security Proofs from One Leakage Model to Another: A New Issue. In Proceedings of COSADE 2012 (pp. 69-81). Springer, Lecture Notes in Computer Science, 2012. Peer reviewed |
CORON, J.-S., Naccache, D., & TIBOUCHI, M. (2012). Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers. In EUROCRYPT. Peer reviewed |
Becker, A., CORON, J.-S., & Joux, A. (2011). Improved Generic Algorithms for Hard Knapsacks. In EUROCRYPT. Peer reviewed |
CORON, J.-S., MANDAL, A., Naccache, D., & TIBOUCHI, M. (2011). Fully Homomorphic Encryption over the Integers with Shorter Public Keys. In CRYPTO. Peer reviewed |
CORON, J.-S., & KIZHVATOV, I. (2010). Analysis and Improvement of the Random Delay Countermeasure of CHES 2009. In Proceedings of CHES 2010 (pp. 95 - 109). Springer. doi:10.1007/978-3-642-15031-9_7 Peer reviewed |
CORON, J.-S., Dodis, Y., MANDAL, A., & Seurin, Y. (2010). A Domain Extender for the Ideal Cipher. In Proceedings of TCC 2010 (pp. 273-289). Springer. Peer reviewed |
Brier, E., CORON, J.-S., ICART, T., Madore, D., Randriam, H., & TIBOUCHI, M. (2010). Efficient Indifferentiable Hashing into Ordinary Elliptic Curves. In CRYPTO. Peer reviewed |
CORON, J.-S., Joux, A., KIZHVATOV, I., Naccache, D., & Paillier, P. (2009). Fault Attacks on RSA Signatures with Partially Unknown Messages. In Proceedings of CHES 2009 (pp. 444-456). Springer. Peer reviewed |
CORON, J.-S., & KIZHVATOV, I. (2009). Analysis of the split mask countermeasure for embedded systems. In 4th Workshop on Embedded Systems Security (pp. 1-10). ACM. doi:10.1145/1631716.1631719 Peer reviewed |
CORON, J.-S., & KIZHVATOV, I. (2009). An Efficient Method for Random Delay Generation in Embedded Software. In Proceedings of CHES 2009 (pp. 156-170). Springer. Peer reviewed |
CORON, J.-S., & MANDAL, A. (2009). PSS Is Secure against Random Fault Attacks. In Proceedings of Asiacrypt 2009 (pp. 653-666). Springer. Peer reviewed |
CORON, J.-S., Naccache, D., TIBOUCHI, M., & WEINMANN, R.-P. (2009). Practical Cryptanalysis of ISO/IEC 9796-2 and EMV Signatures. In Proceedings of CRYPTO 2009 (pp. 428-444). Springer. doi:10.1007/978-3-642-03356-8_25 Peer reviewed |
Coppersmith, D., CORON, J.-S., Grieu, F., Halevi, S., Jutla, C. S., Naccache, D., & Stern, J. P. (2008). Cryptanalysis of ISO/IEC 9796-1. Journal of Cryptology, 21 (1), 27–51. doi:10.1007/s00145-007-9007-5 Peer reviewed |
CORON, J.-S., Patarin, J., & Seurin, Y. (2008). The Random Oracle Model and the Ideal Cipher Model Are Equivalent. Advances in Cryptography, 1–20. Peer reviewed |
CORON, J.-S. (2008). A New DPA Countermeasure Based on Permutation Tables. Advances in Cryptography, 278–292. Peer reviewed |
CORON, J.-S., Giraud, C., Prouff, E., & RIVAIN, M. (2008). Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform. Advances in Cryptography, 1–14. Peer reviewed |