Jean-Sébastien Coron
Orcid: 0000-0003-1021-3344Affiliations:
- University of Luxembourg
According to our database1,
Jean-Sébastien Coron
authored at least 116 papers
between 1998 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on wwwfr.uni.lu
-
on id.loc.gov
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
2024
Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium.
IACR Cryptol. ePrint Arch., 2024
2023
IACR Cryptol. ePrint Arch., 2023
2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018
Formal Verification of Side-Channel Countermeasures via Elementary Circuit Transformations.
Proceedings of the Applied Cryptography and Network Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017
2016
J. Cryptol., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016
Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol.
Proceedings of the New Codebreakers, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
A Variant of Coppersmith's Algorithm with Improved Complexity and Efficient Exhaustive Search.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
Proceedings of the Advances in Cryptology, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012
Proceedings of the Smart Card Research and Advanced Applications, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010
SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications.
Proceedings of the Financial Cryptography and Data Security, 2010
Proceedings of the Advances in Cryptology, 2010
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
Proceedings of the Smart Card Research and Advanced Application, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
Des. Codes Cryptogr., 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
Proceedings of the 4th Workshop on Embedded Systems Security, 2009
Proceedings of the Advances in Cryptology, 2009
2008
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
2006
Des. Codes Cryptogr., 2006
2005
Proceedings of the Public Key Cryptography, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005
2004
Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring.
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem.
Proceedings of the Public Key Cryptography, 2004
Proceedings of the Biometric Authentication, First International Conference, 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Topics in Cryptology, 2004
2003
Cryptanalysis of the Repaired Public-key Encryption Scheme Based on the Polynomial Reconstruction Problem.
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
2002
Proceedings of the Public Key Cryptography, 2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
Proceedings of the Topics in Cryptology, 2002
Proceedings of the Advances in Cryptology, 2002
2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
Proceedings of the Advances in Cryptology, 2001
2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999
1998
Proceedings of the Selected Areas in Cryptography '98, 1998