WorldCat Identities

Naccache, David 1967-

Overview
Works: 52 works in 186 publications in 4 languages and 3,497 library holdings
Genres: Conference papers and proceedings 
Roles: Editor, Author, Other, Thesis advisor, 958, Opponent, Creator, 956
Publication Timeline
.
Most widely held works by David Naccache
Towards hardware-intrinsic security : foundations and practice by Ahmad-Reza Sadeghi( )

15 editions published between 2010 and 2013 in English and held by 445 WorldCat member libraries worldwide

Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time. The field is extending to hardware-based security primitives and protocols such as block ciphers and stream ciphers entangled with the hardware, thus improving IC security. While at the application level there is a growing interest in hardware security fo
Cryptography and security : from theory to applications ; essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday by David Naccache( )

11 editions published in 2012 in English and held by 444 WorldCat member libraries worldwide

Annotation This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jaques dedicated his work during his academic career. Focusing on personal tributes and re-visits of Jean-Jaques Quisquater's legacy, the volume addresses the following central topics: symmetric and asymmetric cryptography, side-channels attacks, hardware and implementations, smart cards, and information security. In addition there are four more contributions just "as diverse as Jean-Jacques' scientific interests."
Topics in Cryptology -- CT-RSA 2001 the Cryptographers' Track at RSA Conference 2001 San Francisco, CA, USA, April 8-12, 2001 Proceedings by David Naccache( )

23 editions published in 2001 in English and held by 397 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the Cryptographers' Track at RSA Conference 2001, CT-RSA 2001, in San Francisco, CA, USA in April 2001. The 33 revised full papers presented were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on new cryptosystems; RSA; symmetric cryptography; gambling and lotteries; reductions, constructions, and security proofs; flaws and attacks; implementation; multivariate cryptography; number theoretic problems; passwords and credentials; and protocols
Information security theory and practice : securing the internet of things : 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30-July 2, 2014 : proceedings by David Naccache( )

16 editions published in 2014 in English and held by 392 WorldCat member libraries worldwide

This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held in Heraklion, Crete, Greece, in June/July 2014. The 8 revised full papers and 6 short papers presented together with 2 keynote talks were carefully reviewed and selected from 33 submissions. The papers have been organized in topical sections on cryptography and cryptanalysis, smart cards and embedded devices, and privacy
Cryptographic hardware and embedded systems--CHES 2001 : third international workshop, Paris, France, May 14-16, 2001 : proceedings by Çetin K Koç( Book )

16 editions published in 2001 in English and held by 379 WorldCat member libraries worldwide

These are the proceedings of CHES 2001, the third Workshop on Cryptographic Hardware and Embedded Systems. The ?rst two CHES Workshops were held in Massachusetts, and this was the ?rst Workshop to be held in Europe. There was a large number of submissions this year, and in response the technical program was extended to 2 1/2 days. As is evident by the papers in these proceedings, many excellent submissions were made. Selecting the papers for this year’s CHES was not an easy task, and weregretthatwehadtorejectseveralveryinterstingpapersduetotheac l kof time. There were 66 submitted contributions this year, of which 31, or 47%, were selected for presentation. If we look at the number of submitted papers at CHES ’99 (42 papers) and CHES 2001 (51 papers), we observe a steady increase. We interpret this as a continuing need for a workshop series which combines theory and practice for integrating strong security features into modern communications and computer applications. In addition to the submitted contributions, Ross Anderson from Cambridge University, UK, and Adi Shamir from The Weizmann Institute, Israel, gave invited talks. As in previous years, the focus of the workshop is on all aspects of cryp- graphichardwareandembeddedsystemdesign.Ofspecialinterestwerecont- butions that describe new methods for e?cient hardware implementations and high-speed software for embedded systems, e.g., smart cards, microprocessors, DSPs, etc. CHES also continues to be an important forum for new theoretical andpractical?ndingsintheimportantandgrowing?eldofside-channelattacks
The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthday( )

12 editions published in 2016 in English and German and held by 304 WorldCat member libraries worldwide

This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn@0394@03C3s 80th birthday. The title of this books leans on the title of a serious history of cryptology named @0394@03C6The Cryptographers@0394@03C7, written by David Kahn and published in 1967. This book contains 35 talks dealing with cryptography as a whole. They are organized in topical section named: history; technology @0394@03BC past, present, future; efficient cryptographic implementations; treachery and perfidy; information security; cryptanalysis; side-channel attacks; randomness embedded system security; public-key cryptography; and models and protocols
Public key cryptography : 4th [i.e. 5th] International Workshop on Practice and Theory in Public Key Cryptosystems [i.e. Cryptography], PKC 2002, Paris, France, February 12-14, 2002 : proceedings by David Naccache( )

17 editions published in 2002 in English and held by 297 WorldCat member libraries worldwide

This book constitutes the thoroughly refereed proceedings of the PKC Public Key Cryptography, PKC 2002, held in Paris, France in February 2002. This book presents 26 carefully reviewed papers selected from 69 submissions plus one invited talk. Among the topics addressed are encryption schemes, signature schemes, protocols, cryptanalysis, elliptic curve cryptography, and side channels
Innovative Security Solutions for Information Technology and Communications 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers by Ion Bica( )

9 editions published between 2015 and 2016 in English and German and held by 297 WorldCat member libraries worldwide

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Security for Information Technology and Communications, SECITC 2015, held in Bucharest, Romania, in June 2015. The 17 revised full papers were carefully reviewed and selected from 36 submissions. In addition with 5 invited talks the papers cover topics such as Cryptographic Algorithms and Protocols, Security Technologies for IT & C, Information Security Management, Cyber Defense, and Digital Forensics
Cryptology and network security : 14th international conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings by International Conference on Cryptology and Network Security( )

7 editions published in 2015 in English and held by 259 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 14th International Conference on Cryptology and Network Security, CANS 2015, held in Marrakesh, Morocco, in December 2015. The 12 full papers presented together with 6 short papers were carefully reviewed and selected from numerous submissions. The papers cover topics of interest such as internet of things and privacy; password-based authentication; attacks and malicious code; security modeling and verification; secure multi-party computation; and cryptography and VPNs
Information and communications security : 20th international conference, ICICS 2018, Lille, France, October 29-31, 2018 : proceedings by ICICS( )

4 editions published in 2018 in English and held by 116 WorldCat member libraries worldwide

Public Key Cryptography 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002 Paris, France, February 12-14, 2002 Proceedings by David Naccache( )

3 editions published in 2002 in English and held by 49 WorldCat member libraries worldwide

Information and Communications Security : 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings( )

1 edition published in 2018 in English and held by 34 WorldCat member libraries worldwide

Public key cryptography : proceedings( Book )

2 editions published in 2002 in English and held by 23 WorldCat member libraries worldwide

Fault diagnosis and tolerance in cryptography : third international workshop, FDTC 2006, Yokohama, Japan, October 10, 2006 : proceedings by Luca Breveglieri( )

6 editions published in 2006 in English and held by 22 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the Third International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2006, held in Yokohama, Japan in October 2006. The 12 revised papers of FDTC 2006 are presented together with 9 papers from FDTC 2004 and FDTC 2005 that passed a second round of reviewing. They all provide a comprehensive introduction to the issues faced by designers of robust cryptographic devices and to the currently available methodologies and techniques for protecting these devices against fault injection attacks. The papers are organized in topical sections on attacks on public key systems, protection of public key systems, attacks on and protection of symmetric key systems, models for fault attacks on cryptographic devices, fault-resistant arithmetic for cryptography, as well as fault attacks and other security threats
Topics in cryptology : CT-RSA 2001 : the Cryptographers's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001 : proceedings( Book )

2 editions published in 2001 in English and held by 3 WorldCat member libraries worldwide

Validation des logiciels d'expertise judiciaire de preuves informatiques by Elina Nikooazm( )

2 editions published in 2015 in French and held by 3 WorldCat member libraries worldwide

In criminal cases, judges confronted with questions of technical order in computer technology, designate expert witnesses who put their expertise at the service of justice. Duly appointed by the courts, they help the judge by providing evidence relevant to the investigation.They search the suspect's seized digital devices for elements of computer related crime, while preserving the integrity of the data and avoiding any alteration of the original media.The evidence thus collected is analyzed by a digital forensic expert who will document their findings to the judge in a report.Technical investigations are conducted by using powerful and sophisticated tools to find the current files and recover deleted, hidden or encrypted data from the digital media device examined.This requires perfect control of the utilized equipment and a clear identification of the methods used during the analysis. This research project aims to highlight the technical challenges which experts face, the complexity of digital forensic tools used for technical investigations, and the importance of their validation to understand the capabilities and limitations of each tool
L'expertise et la lutte contre la fraude monétique by Thomas Souvignet( )

2 editions published in 2014 in French and held by 3 WorldCat member libraries worldwide

Le montant annuel de la fraude européenne à la carte de paiement se monte à plus d'1,5 milliard d'euros. Cette manne aiguise l'appétit des groupes criminels qui exploitent la moindre faille de la monétique (écosystème de la carte de paiement). Les cinq principaux acteurs de la monétique (porteurs, émetteurs, accepteurs, acquéreurs et systèmes de paiement) s'appuient pourtant sur des systèmes et réseaux normalisés dont la sécurité est encadrée par des standards internationaux contraignants. Néanmoins, la fraude monétique ne cesse de progresser alors que les moyens de lutte (étatiques, collaboratifs ou individuels) restent limités.Après étude de la fraude monétique, cette thèse propose différentes actions (passives,réactives et proactives) visant à améliorer la lutte contre la fraude monétique. D'abord,il convient de mieux connaître la fraude en étudiant la provenance des données volées et plus seulement leur usage. Ensuite l'expertise de ces fraudes doit être améliorée, en développant par exemple une captation du progrès scientifique. Une expertise qui doit être en partie transmise aux enquêteurs afin qu'ils puissent conduire leurs enquêtes. Enquêtes qui peuvent être dynamisées par des opérations réactives associant investigateurs et sachants techniques. Enfin, de manière proactive, les enquêtes et analyses de demain doivent être facilitées par les technologies monétiques conçues aujourd'hui
Respect de la vie privée en matière de nouvelles technologies à travers des études de cas by André-Jacques Augand( )

2 editions published in 2015 in French and held by 3 WorldCat member libraries worldwide

The development of the Internet and online services have resulted in a proliferation of information collected from users - explicitly or without their knowledge. Furthermore, such information may be disclosed to third parties, or crossed with other data to create user profiles, or contribute to the identification of an individual.-The intensity of human activities in social networks is therefore a breeding ground for potential violations of user privacy. This research aims to study first the socio-economic determinants of the use and adoption of the Internet in a developing society. Then we studied the perception, risk control, and trust perceived by the user of the Internet in the context of online networks (Facebook, LinkedIn, Twitter, Myspace, Viadeo, Hi5 etc.). We developed a questionnaire that was administered to Gabon surfers. Our results showed that socio-economic status and people's living conditions strongly influence the use of the Internet in Libreville and Port-Gentil. Regarding the perceived trust and user behavior, three types of determinants of trust were identified: the website-related factors (social networks), factors related to various public and private organizations of Gabon (Army, police, judiciary, administrations and companies) and factors related to the user (risk aversion). These results are sufficient to relativize the effectiveness of Gabonese policies to ensure broad coverage of countries by ICT supposed to create added value and improve the living standards and social welfare of citizens. From these results, managerial recommendations for managers of social networks and regulatory bodies including the Gabonese National Commission for the Protection of Personal Data (CNPDCP) are proposed. We will propose practices to better protect the privacy of users of online social networks
Etude de la vulnérabilité des circuits cryptographiques l'injection de fautes par laser. by Amir-Pasha Mirbaha( )

1 edition published in 2011 in French and held by 2 WorldCat member libraries worldwide

Cryptographic circuits may be victims of fault attacks on their hardware implementations. fault attacks consist of creating intentional faults during cryptographic calculations in order to infer secrets. in the context of security characterization of circuits, we have examined practical feasibility of some theoretical models of fault attacks. we used a laser bench as a means of the fault injection.at the beginning, we performed laser fault injections on a microcontroller implementing an aes cryptographic algorithm. we succeeded to exclude the logical effect of mismatched faults by temporal and spatial accuracy in fault injection. moreover, we identified extended new dfa attacks.then, we extended our research to identify and to implement new fault attack models. with the precision obtained in our earlier work, we developed new round modification analysis (rma) attacks.in conclusion, the experiments give a warning for the feasibility of described attacks in the literature by laser. our tests have demonstrated that single-byte or single-bit attacks are still feasible with a laser beam that hits additional bytes on the circuit when the laser emission is accurate and associated with other techniques. they also revealed new attack possibilities. therefore, it conducted us to study of appropriate countermeasures
Criptografie şi securitatea informaţiei : aplicaţii( Book )

1 edition published in 2011 in Romanian and held by 2 WorldCat member libraries worldwide

 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.59 (from 0.48 for Informatio ... to 0.98 for Criptograf ...)

WorldCat IdentitiesRelated Identities
Public key cryptography : 4th [i.e. 5th] International Workshop on Practice and Theory in Public Key Cryptosystems [i.e. Cryptography], PKC 2002, Paris, France, February 12-14, 2002 : proceedings Public Key Cryptography 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002 Paris, France, February 12-14, 2002 Proceedings Public key cryptography : proceedings
Covers
Topics in Cryptology -- CT-RSA 2001 the Cryptographers' Track at RSA Conference 2001 San Francisco, CA, USA, April 8-12, 2001 ProceedingsCryptographic hardware and embedded systems--CHES 2001 : third international workshop, Paris, France, May 14-16, 2001 : proceedingsPublic key cryptography : 4th [i.e. 5th] International Workshop on Practice and Theory in Public Key Cryptosystems [i.e. Cryptography], PKC 2002, Paris, France, February 12-14, 2002 : proceedingsPublic Key Cryptography 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002 Paris, France, February 12-14, 2002 ProceedingsPublic key cryptography : proceedingsFault diagnosis and tolerance in cryptography : third international workshop, FDTC 2006, Yokohama, Japan, October 10, 2006 : proceedingsTopics in cryptology : CT-RSA 2001 : the Cryptographers's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001 : proceedings
Alternative Names
David Naccache cryptographe

David Naccache cryptographer

David Naccache Frans cryptograaf

Naccache, D.

Naccache, D. 1967-

دايفيد نقاش

Languages
English (142)

French (7)

German (2)

Romanian (1)