Julien P. Stern

According to our database1, Julien P. Stern authored at least 18 papers between 1996 and 2013.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Certification validation: Back to the past.
Comput. Math. Appl., 2013

2010
Observations on Certification Authority Key Compromise.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010

2008
Cryptanalysis of ISO/IEC 9796-1.
J. Cryptol., 2008

2007
Addendum to "Scalable secure storage when half the system is faulty" [Inform. Comput 174 (2)(2002) 203-213].
Inf. Comput., 2007

2006
Index Calculation Attacks on RSA Signature and Encryption.
Des. Codes Cryptogr., 2006

2005
Digital Signatures Do Not Guarantee Exclusive Ownership.
Proceedings of the Applied Cryptography and Network Security, 2005

2003
Cryptanalysis of the OTM Signature Scheme from FC'02.
Proceedings of the Financial Cryptography, 2003

2002
Scalable Secure Storage When Half the System Is Faulty.
Inf. Comput., 2002

2001
Lessons learned from SDMI.
Proceedings of the Fourth IEEE Workshop on Multimedia Signal Processing, 2001

Automatic Detection of a Watermarked Document Using a Private Key.
Proceedings of the Information Hiding, 4th International Workshop, 2001

An Analysis of One of the SDMI Candidates.
Proceedings of the Information Hiding, 4th International Workshop, 2001

1999
Secure and Lightweight Advertising on the Web.
Comput. Networks, 1999

How to Copyright a Function?
Proceedings of the Public Key Cryptography, 1999

Robust Object Watermarking: Application to Code.
Proceedings of the Information Hiding, Third International Workshop, 1999

Scramble All, Encrypt Small.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

On the Security of RSA Padding.
Proceedings of the Advances in Cryptology, 1999

1998
A New Efficient All-Or-Nothing Disclosure of Secrets Protocol.
Proceedings of the Advances in Cryptology, 1998

1996
Understanding the Shape Properties of Trihedral Polyhedra.
Proceedings of the Computer Vision, 1996


  Loading...