Profil

CORON Jean-Sébastien

University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)

Main Referenced Co-authors
TIBOUCHI, Mehdi  (7)
Zeitoun, Rina (6)
Naccache, David (5)
KIZHVATOV, Ilya  (4)
Prouff, Emmanuel (4)
Main Referenced Keywords
countermeasures (3); cryptanalysis (2); digital signatures (2); DPA (2); ISO/IEC 9796-2 (2);
Main Referenced Disciplines
Computer science (40)
Mathematics (4)

Publications (total 43)

The most downloaded
1256 downloads
Coron, J.-S., Mandal, A., Naccache, D., & Tibouchi, M. (2011). Fully Homomorphic Encryption over the Integers with Shorter Public Keys. In CRYPTO. https://hdl.handle.net/10993/12396

The most cited

324 citations (Scopus®)

Coron, J.-S., Mandal, A., Naccache, D., & Tibouchi, M. (2011). Fully Homomorphic Encryption over the Integers with Shorter Public Keys. In CRYPTO. https://hdl.handle.net/10993/12396

Coron, J.-S., Gérard, F., Montoya, S., & Zeitoun, R. (2023). High-order Polynomial Comparison and Masking Lattice-based Encryption. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023 (1), 153--192. doi:10.46586/tches.v2023.i1.153-192
Peer reviewed

Coron, J.-S., Gérard, F., Trannoy, M., & Zeitoun, R. (2023). High-order masking of NTRU. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023 (2), 180--211. doi:10.46586/tches.v2023.i2.180-211
Peer reviewed

Coron, J.-S., & Gini, A. (March 2022). Provably Solving the Hidden Subset Sum Problem via Statistical Learning. Mathematical Cryptology, 1.
Peer reviewed

Coron, J.-S., Gerard, F., Montoya, S., & Zeitoun, R. (2022). High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption. IACR Transactions on Cryptographic Hardware and Embedded Systems.
Peer reviewed

Coron, J.-S., & Spignoli, L. (2021). Secure Wire Shuffling in the Probing Model. In Crypto 2021. doi:10.1007/978-3-030-84252-9_8
Peer reviewed

Coron, J.-S., Notarnicola, L., & Wiese, G. (2020). Simultaneous Diagonalization of Incomplete Matrices and Applications. In Proceedings of the Fourteenth Algorithmic Number Theory Symposium (ANTS-XIV), edited by Steven Galbraith, Open Book Series 4, Mathematical Sciences Publishers, Berkeley, 2020 (pp. 127-142).
Peer reviewed

Coron, J.-S., & Gini, A. (2020). A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem. In Advances in Cryptology -- CRYPTO 2020 (pp. 3--31). Cham, Unknown/unspecified: Springer International Publishing. doi:10.1007/978-3-030-56880-1_1
Peer reviewed

Coron, J.-S., Greuet, A., & Zeitoun, R. (2020). Side-Channel Masking with Pseudo-Random Generator. In Eurocrypt 2020.
Peer reviewed

Coron, J.-S., Belaid, S., Prouff, E., Rivain, M., & Taleb, A. R. (2020). Random Probing Security: Verification, Composition, Expansion and New Constructions. In CRYPTO 2020. doi:10.1007/978-3-030-56784-2_12
Peer reviewed

Coron, J.-S., & Notarnicola, L. (2019). Cryptanalysis of CLT13 Multilinear Maps with Independent Slots [Paper presentation]. ASIACRYPT 2019, Kobe, Japan.

Coron, J.-S., & Notarnicola, L. (2019). Cryptanalysis of CLT13 Multilinear Maps with Independent Slots. In Advances in Cryptology – ASIACRYPT 2019, 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II. Springer.
Peer reviewed

Coron, J.-S., & Gini, A. (2019). Improved Cryptanalysis of the AJPS Mersenne Based Cryptosystem. Journal of Mathematical Cryptology. doi:10.1515/jmc-2019-0027
Peer Reviewed verified by ORBi

Coron, J.-S., & Pereira, V. (2019). On Kilian's Randomization of Multilinear Map Encodings. In J.-S. Coron & V. Pereira, On Kilian's Randomization of Multilinear Map Encodings.
Peer reviewed

Coron, J.-S. (2017). High-Order Conversion from Boolean to Arithmetic Masking. In Proceedings of CHES 2017.
Peer reviewed

Coron, J.-S., Lee, M. S., Lepoint, T., & Tibouchi, M. (2017). Zeroizing Attacks on Indistinguishability Obfuscation over CLT13. In Proceedings of PKC 2017. doi:10.1007/978-3-662-54365-8_3
Peer reviewed

Coron, J.-S., Greuet, A., Prouff, E., & Zeitoun, R. (2016). Faster Evaluation of SBoxes via Common Shares. Proceedings of CHES 2016. doi:10.1007/978-3-662-53140-2_24
Peer reviewed

Coron, J.-S., Battistello, A., Prouff, E., & Zeitoun, R. (2016). Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme. Proceedings of CHES 2016. doi:10.1007/978-3-662-53140-2_2
Peer reviewed

Coron, J.-S., Lee, M. S., Lepoint, T., & Tibouchi, M. (2016). Cryptanalysis of GGH15 Multilinear Maps. Proceedings of Crypto 2016. doi:10.1007/978-3-662-53008-5_21
Peer reviewed

Coron, J.-S., Lepoint, T., & Tibouchi, M. (2015). New Multilinear Maps over the Integers. Proceedings of Crypto 2015. doi:10.1007/978-3-662-47989-6_13
Peer reviewed

Coron, J.-S. (2015). Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations. Proceedings of Crypto 2015. doi:10.1007/978-3-662-47989-6_12
Peer reviewed

Coron, J.-S., Groszschädl, J., Tibouchi, M., & Vadnala, P. K. (2015). Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity. In G. Leander (Ed.), Fast Software Encryption, 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers (pp. 130-149). Springer Verlag. doi:10.1007/978-3-662-48116-5_7
Peer reviewed

Coron, J.-S., Groszschädl, J., & Vadnala, P. K. (2014). Secure Conversion between Boolean and Arithmetic Masking of Any Order. In L. Batina & M. Robshaw (Eds.), Cryptographic Hardware and Embedded Systems - CHES 2014, 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings (pp. 188-205). Springer Verlag.
Peer reviewed

Coron, J.-S. (2014). Higher Order Masking of Look-Up Tables. Proceedings of Eurocrypt 2014.
Peer reviewed

Coron, J.-S., Roy, A., & Venkatesh, S. V. (2014). Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures. In L. Batina & M. Robshaw (Eds.), Cryptographic Hardware and Embedded Systems – CHES 2014 (pp. 170-187). Springer. doi:10.1007/978-3-662-44709-3_10
Peer reviewed

Coron, J.-S., Kirichenko, A., & Tibouchi, M. (2013). A Note on the Bivariate Coppersmith Theorem. Journal of Cryptology, 26 (2), 246-250. doi:10.1007/s00145-012-9121-x
Peer reviewed

Cheon, J. H., Coron, J.-S., Kim, J., Lee, M. S., Lepoint, T., Tibouchi, M., & Yun, A. (2013). Batch Fully Homomorphic Encryption over the Integers. In EUROCRYPT. doi:10.1016/j.ins.2015.03.019
Peer reviewed

Coron, J.-S., Lepoint, T., & Tibouchi, M. (2013). Practical Multilinear Maps over the Integers. In CRYPTO (1).
Peer reviewed

Coron, J.-S., Christophe, G., Emmanuel, P., Soline, R., Matthieu, R., & Praveen Kumar, V. (2012). Conversion of Security Proofs from One Leakage Model to Another: A New Issue. In Proceedings of COSADE 2012 (pp. 69-81). Springer, Lecture Notes in Computer Science, 2012.
Peer reviewed

Coron, J.-S., Naccache, D., & Tibouchi, M. (2012). Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers. In EUROCRYPT.
Peer reviewed

Becker, A., Coron, J.-S., & Joux, A. (2011). Improved Generic Algorithms for Hard Knapsacks. In EUROCRYPT.
Peer reviewed

Coron, J.-S., Mandal, A., Naccache, D., & Tibouchi, M. (2011). Fully Homomorphic Encryption over the Integers with Shorter Public Keys. In CRYPTO.
Peer reviewed

Coron, J.-S., & Kizhvatov, I. (2010). Analysis and Improvement of the Random Delay Countermeasure of CHES 2009. In Proceedings of CHES 2010 (pp. 95 - 109). Springer. doi:10.1007/978-3-642-15031-9_7
Peer reviewed

Coron, J.-S., Dodis, Y., Mandal, A., & Seurin, Y. (2010). A Domain Extender for the Ideal Cipher. In Proceedings of TCC 2010 (pp. 273-289). Springer.
Peer reviewed

Brier, E., Coron, J.-S., Icart, T., Madore, D., Randriam, H., & Tibouchi, M. (2010). Efficient Indifferentiable Hashing into Ordinary Elliptic Curves. In CRYPTO.
Peer reviewed

Coron, J.-S., Joux, A., Kizhvatov, I., Naccache, D., & Paillier, P. (2009). Fault Attacks on RSA Signatures with Partially Unknown Messages. In Proceedings of CHES 2009 (pp. 444-456). Springer. doi:10.1007/978-3-642-04138-9
Peer reviewed

Coron, J.-S., & Kizhvatov, I. (2009). Analysis of the split mask countermeasure for embedded systems. In 4th Workshop on Embedded Systems Security (pp. 1-10). ACM. doi:10.1145/1631716.1631719
Peer reviewed

Coron, J.-S., & Kizhvatov, I. (2009). An Efficient Method for Random Delay Generation in Embedded Software. In Proceedings of CHES 2009 (pp. 156-170). Springer. doi:10.1007/978-3-642-04138-9
Peer reviewed

Coron, J.-S., & Mandal, A. (2009). PSS Is Secure against Random Fault Attacks. In Proceedings of Asiacrypt 2009 (pp. 653-666). Springer.
Peer reviewed

Coron, J.-S., Naccache, D., Tibouchi, M., & Weinmann, R.-P. (2009). Practical Cryptanalysis of ISO/IEC 9796-2 and EMV Signatures. In Proceedings of CRYPTO 2009 (pp. 428-444). Springer. doi:10.1007/978-3-642-03356-8_25
Peer reviewed

Coron, J.-S., Patarin, J., & Seurin, Y. (2008). The Random Oracle Model and the Ideal Cipher Model Are Equivalent. Advances in Cryptography, 1–20.
Peer reviewed

Coron, J.-S. (2008). A New DPA Countermeasure Based on Permutation Tables. Advances in Cryptography, 278–292.
Peer reviewed

Coppersmith, D., Coron, J.-S., Grieu, F., Halevi, S., Jutla, C. S., Naccache, D., & Stern, J. P. (2008). Cryptanalysis of ISO/IEC 9796-1. Journal of Cryptology, 21 (1), 27–51. doi:10.1007/s00145-007-9007-5
Peer reviewed

Coron, J.-S., Giraud, C., Prouff, E., & Rivain, M. (2008). Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform. Advances in Cryptography, 1–14.
Peer reviewed

Contact ORBilu