S
Sébastien Kunz-Jacques
Researcher at École Normale Supérieure
Publications - 14
Citations - 273
Sébastien Kunz-Jacques is an academic researcher from École Normale Supérieure. The author has contributed to research in topics: Cryptography & Public-key cryptography. The author has an hindex of 10, co-authored 14 publications receiving 264 citations.
Papers
More filters
Journal Article
Power attack on small RSA public exponent
Pierre-Alain Fouque,Sébastien Kunz-Jacques,Gwenaëlle Martinet,Frédéric Muller,Frédéric Valette +4 more
TL;DR: A new attack on RSA when the public exponent is short, for instance 3 or 2 16 +1, and when the classical exponent randomization is used, and it is shown that such information can be gained from sliding window implementations not protected against SPA.
Book ChapterDOI
Power attack on small RSA public exponent
Pierre-Alain Fouque,Sébastien Kunz-Jacques,Gwenaëlle Martinet,Frédéric Muller,Frédéric Valette +4 more
TL;DR: In this article, the problem of recovering the RSA private key when non consecutive bits of it leak from the implementation was studied, and it was shown that such information can be gained from sliding window implementations not protected against Simple Power Analysis (SPA).
Book ChapterDOI
About the security of MTI/C0 and MQV
TL;DR: This paper focuses on the two most famous signature-less authenticated key exchange protocols, MTI/C0 and MQV and points out algorithmic assumptions on which some security proofs can be built in the random oracle model.
Journal Article
About the security of MTI/C0 and MQV
TL;DR: In this paper, the authors focus on the two signatureless authenticated key exchange protocols, MTI/CO and MQV, and point out algorithmic assumptions on which some security proofs can be built in the random oracle model.
Book ChapterDOI
Cryptanalysis of an efficient proof of knowledge of discrete logarithm
TL;DR: An attack is described that enables the verifier to recover the full secret with essentially no computing power beyond what is required to run the protocol and after only a few iterations of it.