default search action
Jacques Stern
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2011
- [c85]Jacques Stern, Robert Madelin, Norbert Kroó, Paul F. M. J. Verschure, Jerzy Langer, Paul 't Hoen:
Large Scale Funding vs. Small Scale Funding. FET 2011: 125 - 2010
- [c84]Jacques Stern:
Mathematics, Cryptology, Security. STACS 2010: 33-34
2000 – 2009
- 2008
- [c83]Pierre-Alain Fouque, Gilles Macario-Rat, Jacques Stern:
Key Recovery on Hidden Monomial Multivariate Schemes. EUROCRYPT 2008: 19-30 - [c82]Pierre-Alain Fouque, Gilles Macario-Rat, Ludovic Perret, Jacques Stern:
Total Break of the l-IC Signature Scheme. Public Key Cryptography 2008: 1-17 - [c81]Pierre-Alain Fouque, Jacques Stern, Sébastien Zimmer:
Cryptanalysis of Tweaked Versions of SMASH and Reparation. Selected Areas in Cryptography 2008: 136-150 - [c80]Benoît Chevallier-Mames, David Naccache, Jacques Stern:
Linear Bandwidth Naccache-Stern Encryption. SCN 2008: 327-339 - [i6]Benoît Chevallier-Mames, David Naccache, Jacques Stern:
Linear Bandwidth Naccache-Stern Encryption. IACR Cryptol. ePrint Arch. 2008: 119 (2008) - 2007
- [c79]Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern:
Cryptanalysis of the SFLASH Signature Scheme. Inscrypt 2007: 1-4 - [c78]Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern:
Practical Cryptanalysis of SFLASH. CRYPTO 2007: 1-12 - [c77]Vivien Dubois, Pierre-Alain Fouque, Jacques Stern:
Cryptanalysis of SFLASH with Slightly Modified Parameters. EUROCRYPT 2007: 264-275 - [c76]Vivien Dubois, Louis Granboulan, Jacques Stern:
Cryptanalysis of HFE with Internal Perturbation. Public Key Cryptography 2007: 249-265 - [c75]Thomas Baignères, Jacques Stern, Serge Vaudenay:
Linear Cryptanalysis of Non Binary Ciphers. Selected Areas in Cryptography 2007: 184-211 - [i5]Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern:
Practical Cryptanalysis of SFLASH. IACR Cryptol. ePrint Arch. 2007: 141 (2007) - 2006
- [j17]Marc Girault, Guillaume Poupard, Jacques Stern:
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order. J. Cryptol. 19(4): 463-487 (2006) - [c74]Louis Granboulan, Antoine Joux, Jacques Stern:
Inverting HFE Is Quasipolynomial. CRYPTO 2006: 345-356 - [c73]Vivien Dubois, Louis Granboulan, Jacques Stern:
An Efficient Provable Distinguisher for HFE. ICALP (2) 2006: 156-167 - [c72]Pierre-Alain Fouque, David Pointcheval, Jacques Stern, Sébastien Zimmer:
Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes. ICALP (2) 2006: 240-251 - [c71]Sébastien Kunz-Jacques, Gwenaëlle Martinet, Guillaume Poupard, Jacques Stern:
Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm. Public Key Cryptography 2006: 27-43 - 2005
- [c70]Phong Q. Nguyen, Jacques Stern:
Adapting Density Attacks to Low-Weight Knapsacks. ASIACRYPT 2005: 41-58 - [c69]Pierre-Alain Fouque, Louis Granboulan, Jacques Stern:
Differential Cryptanalysis for Multivariate Schemes. EUROCRYPT 2005: 341-353 - 2004
- [j16]Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern:
RSA-OAEP Is Secure under the RSA Assumption. J. Cryptol. 17(2): 81-104 (2004) - [c68]David Naccache, Nigel P. Smart, Jacques Stern:
Projective Coordinates Leak. EUROCRYPT 2004: 257-267 - [c67]Jacques Stern:
Cryptography and the French Banking Cards: Past, Present, Future. Financial Cryptography 2004: 68-69 - 2003
- [c66]Jacques Stern:
Cryptography and the Methodology of Provable Security. AAECC 2003: 1-5 - [c65]Tatsuaki Okamoto, Jacques Stern:
Almost Uniform Density of Power Residues and the Provable Security of ESIGN. ASIACRYPT 2003: 287-301 - [c64]Jacques Stern:
Why Provable Security Matters? EUROCRYPT 2003: 449-461 - [c63]Jacques Stern, Julien P. Stern:
Cryptanalysis of the OTM Signature Scheme from FC'02. Financial Cryptography 2003: 138-148 - [c62]Antoine Joux, Guillaume Poupard, Jacques Stern:
New Attacks against Standardized MACs. FSE 2003: 170-181 - [i4]David Naccache, Nigel P. Smart, Jacques Stern:
Projective Coordinates Leak. IACR Cryptol. ePrint Arch. 2003: 191 (2003) - 2002
- [c61]Dario Catalano, Phong Q. Nguyen, Jacques Stern:
The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm. ASIACRYPT 2002: 299-310 - [c60]Jacques Stern, David Pointcheval, John Malone-Lee, Nigel P. Smart:
Flaws in Applying Proof Methodologies to Signature Schemes. CRYPTO 2002: 93-110 - [c59]Emmanuel Bresson, Jacques Stern, Michael Szydlo:
Threshold Ring Signatures and Applications to Ad-hoc Groups. CRYPTO 2002: 465-480 - [c58]Pierre-Alain Fouque, Jacques Stern, Jan-Geert Wackers:
CryptoComputing with Rationals. Financial Cryptography 2002: 136-146 - [c57]Emmanuel Bresson, Jacques Stern:
Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications. ISC 2002: 272-288 - 2001
- [c56]Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo:
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. ASIACRYPT 2001: 1-20 - [c55]Pierre-Alain Fouque, Jacques Stern:
Fully Distributed Threshold RSA under Standard Assumptions. ASIACRYPT 2001: 310-330 - [c54]Phong Q. Nguyen, Jacques Stern:
The Two Faces of Lattices in Cryptology. CaLC 2001: 146-180 - [c53]David Naccache, David Pointcheval, Jacques Stern:
Twin signatures: an alternative to the hash-and-sign paradigm. CCS 2001: 20-27 - [c52]Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern:
RSA-OAEP Is Secure under the RSA Assumption. CRYPTO 2001: 260-274 - [c51]Olivier Baudron, Jacques Stern:
Non-interactive Private Auctions. Financial Cryptography 2001: 354- - [c50]Emmanuel Bresson, Jacques Stern:
Efficient Revocation in Group Signatures. Public Key Cryptography 2001: 190-206 - [c49]Pierre-Alain Fouque, Jacques Stern:
One Round Threshold Discrete-Log Key Generation without Private Channels. Public Key Cryptography 2001: 300-316 - [c48]Olivier Baudron, Pierre-Alain Fouque, David Pointcheval, Jacques Stern, Guillaume Poupard:
Practical multi-candidate election system. PODC 2001: 274-283 - [i3]Pierre-Alain Fouque, Jacques Stern:
Fully Distributed Threshold RSA under Standard Assumptions. IACR Cryptol. ePrint Arch. 2001: 8 (2001) - 2000
- [j15]David Pointcheval, Jacques Stern:
Security Arguments for Digital Signatures and Blind Signatures. J. Cryptol. 13(3): 361-396 (2000) - [c47]Phong Q. Nguyen, Jacques Stern:
Lattice Reduction in Cryptology: An Update. ANTS 2000: 85-112 - [c46]Thomas Pornin, Jacques Stern:
Software-Hardware Trade-Offs: Application to A5/1 Cryptanalysis. CHES 2000: 318-327 - [c45]Guillaume Poupard, Jacques Stern:
Fair Encryption of RSA Keys. EUROCRYPT 2000: 172-189 - [c44]Pierre-Alain Fouque, Guillaume Poupard, Jacques Stern:
Sharing Decryption in the Context of Voting or Lotteries. Financial Cryptography 2000: 90-104 - [c43]David Naccache, Jacques Stern:
Signing on a Postcard. Financial Cryptography 2000: 121-135 - [c42]Olivier Baudron, David Pointcheval, Jacques Stern:
Extended Notions of Security for Multicast Public Key Cryptosystems. ICALP 2000: 499-511 - [c41]Guillaume Poupard, Jacques Stern:
Short Proofs of Knowledge for Factoring. Public Key Cryptography 2000: 147-166 - [i2]Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern:
RSA-OAEP is Secure under the RSA Assumption. IACR Cryptol. ePrint Arch. 2000: 61 (2000)
1990 – 1999
- 1999
- [c40]Guillaume Poupard, Jacques Stern:
On the Fly Signatures Based on Factoring. CCS 1999: 37-45 - [c39]Helena Handschuh, Pascal Paillier, Jacques Stern:
Probing Attacks on Tamper-Resistant Devices. CHES 1999: 303-315 - [c38]Phong Q. Nguyen, Jacques Stern:
The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications. CRYPTO 1999: 31-46 - [c37]Christophe Coupé, Phong Q. Nguyen, Jacques Stern:
The Effectiveness of Lattice Attacks Against Low-Exponent RSA. Public Key Cryptography 1999: 204-218 - [e1]Jacques Stern:
Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding. Lecture Notes in Computer Science 1592, Springer 1999, ISBN 3-540-65889-0 [contents] - 1998
- [j14]Antoine Joux, Jacques Stern:
Lattice Reduction: A Toolbox for the Cryptanalyst. J. Cryptol. 11(3): 161-185 (1998) - [j13]Joel Friedman, Antoine Joux, Yuval Roichman, Jacques Stern, Jean-Pierre Tillich:
The action of a few permutations on r-tuples is quickly transitive. Random Struct. Algorithms 12(4): 335-350 (1998) - [c36]Guillaume Poupard, Jacques Stern:
Generation of Shared RSA Keys by Two Parties. ASIACRYPT 1998: 11-24 - [c35]Phong Q. Nguyen, Jacques Stern:
The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure. ASIACRYPT 1998: 372-379 - [c34]David Naccache, Jacques Stern:
A New Public Key Cryptosystem Based on Higher Residues. CCS 1998: 59-66 - [c33]Phong Q. Nguyen, Jacques Stern:
Cryptanalysis of the Ajtai-Dwork Cryptosystem. CRYPTO 1998: 223-242 - [c32]Guillaume Poupard, Jacques Stern:
Security Analysis of a Practical "on the fly" Authentication and Signature Generation. EUROCRYPT 1998: 422-436 - [c31]Jacques Stern, Serge Vaudenay:
CS-Cipher. FSE 1998: 189-205 - [c30]Jacques Stern:
Lattices and Cryptography: An Overview. Public Key Cryptography 1998: 50-54 - [c29]Phong Q. Nguyen, Jacques Stern:
Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC '97. Selected Areas in Cryptography 1998: 213-218 - [i1]Phong Q. Nguyen, Jacques Stern:
A Converse to the Ajtai-Dwork Security Proof and its Cryptographic Implications. Electron. Colloquium Comput. Complex. TR98 (1998) - 1997
- [j12]Sanjeev Arora, László Babai, Jacques Stern, Z. Sweedyk:
The Hardness of Approximate Optima in Lattices, Codes, and Systems of Linear Equations. J. Comput. Syst. Sci. 54(2): 317-331 (1997) - [j11]Don Coppersmith, Jacques Stern, Serge Vaudenay:
The Security of the Birational Permutation Signature Schemes. J. Cryptol. 10(3): 207-221 (1997) - [c28]David Pointcheval, Jacques Stern:
New Blind Signatures Equivalent to Factorization (extended abstract). CCS 1997: 92-99 - [c27]Phong Q. Nguyen, Jacques Stern:
Merkle-Hellman Revisited: A Cryptanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizations. CRYPTO 1997: 198-212 - [c26]David Naccache, Jacques Stern:
A New Public-Key Cryptosystem. EUROCRYPT 1997: 27-36 - [c25]Jacques Stern, Serge Vaudenay:
SVP: A Flexible Micropayment Scheme. Financial Cryptography 1997: 161-172 - [c24]David M'Raïhi, David Naccache, Jacques Stern, Serge Vaudenay:
XMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications. FSE 1997: 166-171 - 1996
- [j10]Jacques Stern:
A new paradigm for public key identification. IEEE Trans. Inf. Theory 42(6): 1757-1768 (1996) - [c23]David Pointcheval, Jacques Stern:
Provably Secure Blind Signature Schemes. ASIACRYPT 1996: 252-265 - [c22]Jacques Stern:
The Validation of Cryptographic Algorithms. ASIACRYPT 1996: 301-310 - [c21]Florent Chabaud, Jacques Stern:
The Cryptographic Security of the Syndrome Decoding Problem for Rank Distance Codes. ASIACRYPT 1996: 368-381 - [c20]Jean-Bernard Fischer, Jacques Stern:
An Efficient Pseudo-Random Generator Provably as Secure as Syndrome Decoding. EUROCRYPT 1996: 245-255 - [c19]David Pointcheval, Jacques Stern:
Security Proofs for Signature Schemes. EUROCRYPT 1996: 387-398 - [c18]Joel Friedman, Antoine Joux, Yuval Roichman, Jacques Stern, Jean-Pierre Tillich:
The Action of a Few Random Permutations on r-Tuples and an Application to Cryptography. STACS 1996: 375-386 - 1995
- [j9]Simon R. Blackburn, Sean Murphy, Jacques Stern:
The Cryptanalysis of a Public-Key Implementation of Finite Group Mappings. J. Cryptol. 8(3): 157-166 (1995) - 1994
- [j8]Gilles Lachaud, Jacques Stern:
Polynomial-time construction of codes II. Spherical codes and the kissing number of spheres. IEEE Trans. Inf. Theory 40(4): 1140-1146 (1994) - [c17]Jacques Stern:
Can One Design a Signature Scheme Based on Error-Correctin Codes? ASIACRYPT 1994: 424-426 - [c16]Jacques Stern:
Designing Identification Schemes with Keys of Short Size. CRYPTO 1994: 164-173 - [c15]Marc Girault, Jacques Stern:
On the Length of Cryptographic Hash-Values Used in Identification Schemes. CRYPTO 1994: 202-215 - 1993
- [c14]Jacques Stern:
Approximating the Number of Error Locations within a Constant Ratio is NP-complete. AAECC 1993: 325-331 - [c13]Jacques Stern:
A New Identification Scheme Based on Syndrome Decoding. CRYPTO 1993: 13-21 - [c12]Don Coppersmith, Jacques Stern, Serge Vaudenay:
Attacks on the Birational Permutation Signature Schemes. CRYPTO 1993: 435-443 - [c11]Simon R. Blackburn, Sean Murphy, Jacques Stern:
Weakness of a Public-Key Cryptosystem Based on Factorizations of Finite Groups. EUROCRYPT 1993: 50-54 - [c10]Sanjeev Arora, László Babai, Jacques Stern, Z. Sweedyk:
The Hardness of Approximate Optimia in Lattices, Codes, and Systems of Linear Equations. FOCS 1993: 724-733 - 1992
- [j7]Gilles Lachaud, Jacques Stern:
Polynomial-Time Construction of Codes I: Linear Codes with Almost Equal Weights. Appl. Algebra Eng. Commun. Comput. 3: 151-161 (1992) - [j6]Matthijs J. Coster, Antoine Joux, Brian A. LaMacchia, Andrew M. Odlyzko, Claus-Peter Schnorr, Jacques Stern:
Improved Low-Density Subset Sum Algorithms. Comput. Complex. 2: 111-128 (1992) - 1991
- [c9]Gilles Lachaud, Jacques Stern:
Polynomial-Time Construction of Spherical Codes. AAECC 1991: 218-223 - [c8]Antoine Joux, Jacques Stern:
Cryptanalysis of Another Knapsack Cryptosystem. ASIACRYPT 1991: 470-476 - [c7]Yeow Meng Chee, Antoine Joux, Jacques Stern:
The Cryptanalysis of a New Public-Key Cryptosystem Based on Modular Knapsacks. CRYPTO 1991: 204-212 - [c6]Antoine Joux, Jacques Stern:
Improving the Critical Density of the Lagarias-Odlyzko Attack Against Subset Sum Problems. FCT 1991: 258-264 - 1990
- [c5]Jacques Stern, Philippe Toffin:
Cryptanalysis of a Public-Key Cryptosystem Based on Approximations by Rational Numbers. EUROCRYPT 1990: 313-317
1980 – 1989
- 1989
- [c4]Jacques Stern:
An Alternative to the Fiat-Shamir Protocol. EUROCRYPT 1989: 173-180 - 1988
- [c3]Jacques Stern:
A method for finding codewords of small weight. Coding Theory and Applications 1988: 106-113 - 1987
- [c2]Jacques Stern:
Secret Linear Congruential Generators Are Not Cryptographically Secure. FOCS 1987: 421-426 - 1985
- [j5]Jacques Stern:
Regularity properties of definable sets of reals. Ann. Pure Appl. Log. 29(3): 289-324 (1985) - [j4]Jacques Stern:
Complexity of Some Problems from the Theory of Automata. Inf. Control. 66(3): 163-176 (1985) - [j3]Jacques Stern:
Characterizations of Some Classes of Regular Events. Theor. Comput. Sci. 35: 17-42 (1985) - 1983
- [j2]Jacques Stern:
The Herbrand Symposium: (Marseilles July 16-July 24 1981). J. Symb. Log. 48(4): 1210-1232 (1983)
1970 – 1979
- 1978
- [c1]Jacques Stern:
Communication Systems. Jerusalem Conference on Information Technology 1978: 271-277 - 1975
- [j1]Jacques Stern:
A New Look at the Interpolation Problem. J. Symb. Log. 40(1): 1-13 (1975)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint