Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Julien P. Stern"'
Autor:
Julien P. Stern, Moez Ben Mbarka
Publikováno v:
Computers & Mathematics with Applications. 65(5):799-811
In MBarka and Stern (2011) [3], we proposed a new algorithm to validate certificates in the past with the goals of it being simple to present, simple to implement and to fall back on standard algorithms with current time settings. This paper improves
Autor:
Charanjit S. Jutla, Don Coppersmith, Shai Halevi, Jean-Sébastien Coron, Julien P. Stern, F. Grieu, David Naccache
Publikováno v:
Journal of Cryptology. 21:27-51
We describe two different attacks against the ISO/IEC 9796-1 signature standard for RSA and Rabin. Both attacks consist in an existential forgery under a chosen-message attack: the attacker asks for the signature of some messages of his choice, and i
Publikováno v:
Information and Computation. 174(2):203-213
In this paper, we provide a method to safely store a document in perhaps the most challenging settings, a highly decentralized replicated storage system where up to half of the storage servers may incur arbitrary failures, including alterations to da
Publikováno v:
Computer Networks. 31:1101-1109
We consider how to obtain a safe and efficient scheme for Web advertising. We introduce to cryptography the market model, a common concept from economics. This corresponds to an assumption of rational behavior of protocol participants. Making this as
Autor:
Julien P. Stern, Moez Ben Mbarka
Publikováno v:
Public Key Infrastructures, Services and Applications ISBN: 9783642298035
EuroPKI
EuroPKI
Asymmetric cryptography based on public-private key pairs is nowadays used in many applications, notably for authentication and digital signature. It is very frequently used together with digital certificates which link public keys to real-world iden
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7ea26932178de581c215d54f0f1322d5
https://doi.org/10.1007/978-3-642-29804-2_11
https://doi.org/10.1007/978-3-642-29804-2_11
Autor:
Julien P. Stern, Moez Ben Mbarka
Publikováno v:
Public Key Infrastructures, Services and Applications ISBN: 9783642226328
EuroPKI
EuroPKI
The most critical requirement for a Certification Authority (CA) is to protect its signing key from compromise. CA keys are typically stored in tamper resistant Hardware Security Modules (HSM). While, in a realistic deployment, the HSM may prevent th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::99a225d6d0d569ad75283e4585cb5a5d
https://doi.org/10.1007/978-3-642-22633-5_13
https://doi.org/10.1007/978-3-642-22633-5_13
Autor:
Benoit Chevallier-Mames, David Pointcheval, Julien P. Stern, Pierre-Alain Fouque, Jacques Traore
Publikováno v:
Towards Trustworthy Elections
D. Chaum, R. Rivest, M. Jakobsson, B. Schoenmakers, P. Ryan, and J. Benaloh. Towards Trustworthy Elections, 6000, springer, pp.191--199, 2010, lncs
Towards Trustworthy Elections ISBN: 9783642129797
D. Chaum, R. Rivest, M. Jakobsson, B. Schoenmakers, P. Ryan, and J. Benaloh. Towards Trustworthy Elections, 6000, springer, pp.191--199, 2010, lncs
Towards Trustworthy Elections ISBN: 9783642129797
In this paper, we study the problem of simultaneously achieving several security properties, for voting schemes, without non-standard assumptions. More specifically, we focus on the universal verifiability of the computation of the tally, on the unco
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::58b56253f2d02b4312c5accf2c9528bc
https://hal.inria.fr/inria-00539539
https://hal.inria.fr/inria-00539539
Autor:
Thomas Pornin, Julien P. Stern
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783540262237
ACNS
ACNS
Digital signature systems provide a way to transfer trust from the public key to the signed data; this is used extensively within PKIs. However, some applications need a transfer of trust in the other direction, from the signed data to the public key
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7e71ad7e644dc0a5ea75661fe77177b7
https://doi.org/10.1007/11496137_10
https://doi.org/10.1007/11496137_10
Autor:
Jacques Stern, Julien P. Stern
Publikováno v:
Financial Cryptography ISBN: 9783540406631
Financial Cryptography
Financial Cryptography
At Financial Cryptography 02, Okamoto, Tada, and Miyagi [8] proposed a new fast signature scheme of the Schorr/DSS family, without on line multiplication. Following earlier proposals [5, 10, 11], a part of the data, independent of the message to sign
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5dd5328b3fd29e1e66b1e25ebe6a98df
https://doi.org/10.1007/978-3-540-45126-6_10
https://doi.org/10.1007/978-3-540-45126-6_10
Autor:
Jean-Pierre Tillich, Julien P. Stern
Publikováno v:
Information Hiding ISBN: 9783540427339
Information Hiding
Information Hiding
Many algorithms which mark data in order to enforce copyright protection have recently been proposed. Among these, the family of spread-spectrum based schemes is predominant. This family has an inherent weakness when used to mark several documents: e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1d54ce8578bfc6aaebc62926b544ddd0
https://doi.org/10.1007/3-540-45496-9_19
https://doi.org/10.1007/3-540-45496-9_19