David Naccache
I head the ENS‘ ISG. My research areas are code security, forensics, the automated and the manual detection of vulnerabilities. Before joining ENS Paris (PSL) I was a professor during 10 years at UP2 (Sorbonne Universités). I previously worked for 15 years for Gemplus (now Gemalto), Philips (now Oberthur) and Thomson (now Technicolor). I studied at UP13 (BSc), UP6 (MSc), IMAC (Eng), TPT (PhD), UP7 (HDR), IHEDN and ICP (STB underway). I am a forensic expert by several courts, a member of OSCP and the incumbant of the Law and IT forensics chair at EOGN. Click here for contact information, affiliations, ex-PhD students, editorial boards, awards, publications and hobbies.
Here are some of my recent (2015-2018) publications (see also dblp for real-time updates):
Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Hang Zhou: Backtracking-assisted multiplication. Cryptography and Communications 10(1): 17-26 (2018)
Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Amaury de Wargny: Regulating the pace of von Neumann correctors. J. Cryptographic Engineering 8(1): 85-91 (2018)
Marc Beunardeau, Aisling Connolly, Houda Ferradi, Rémi Géraud, David Naccache, Damien Vergnaud: Reusing Nonces in Schnorr Signatures. IACR Cryptology ePrint Archive 2018: 69 (2018) and ESORICS (1) 2017: 224-241
Rémi Géraud, David Naccache: Mixed-radix Naccache-Stern encryption. IACR Cryptology ePrint Archive 2018: 278 (2018)
Thibaut Heckmann, Thomas Souvignet, David Naccache: Electrically conductive adhesives, thermally conductive adhesives and UV adhesives in data extraction forensics. Digital Investigation 21: 53-64 (2017)
Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache: The Case for System Command Encryption. AsiaCCS 2017: 6
Fabrice Benhamouda, Houda Ferradi, Rémi Géraud, David Naccache: Non-interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms. ESORICS (1) 2017: 206-223 and IACR Cryptology ePrint Archive 2017: 640 (2017)
Rémi Géraud, Mirko Koscina, Paul Lenczner, David Naccache, David Saulpic: Generating Functionally Equivalent Programs Having Non-isomorphic Control-Flow Graphs. NordSec 2017: 265-279 and CoRR abs/1709.08357 (2017)
Brier, Rémi Géraud, David Naccache: Exploring Naccache-Stern Knapsack Encryption. SECITC 2017: 67-82 and IACR Cryptology ePrint Archive 2017: 421 (2017)
Rémi Géraud, David Naccache, Razvan Rosie: Twisting Lattice and Graph Techniques to Compress Transactional Ledgers. SecureComm 2017: 108-127 and IACR Cryptology ePrint Archive 2017: 751 (2017)
Marc Beunardeau, Houda Ferradi, Rémi Géraud, David Naccache: Honey Encryption for Language. IACR Cryptology ePrint Archive 2017: 31 (2017) and Mycrypt 2016: 127-144
Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache: On the Hardness of the Mersenne Low Hamming Ratio Assumption. IACR Cryptology ePrint Archive 2017: 522 (2017)
Rémi Géraud, David Naccache, Razvan Rosie: Houda Ferradi, David Naccache: Integer Reconstruction Public-Key Encryption. IACR Cryptology ePrint Archive 2017: 1231 (2017)
Thibaut Heckmann, Thomas Souvignet, S. Lepeer, David Naccache: Low-temperature low-cost 58 Bismuth – 42 Tin alloy forensic chip re-balling and re-soldering. Digital Investigation 19: 60-68 (2016)
Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache: Fully Homomorphic Encryption: Computations with a Blindfold. IEEE Security & Privacy 14(1): 63-67 (2016)
Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache: Cdoe Obofsucaitn: Securing Software from Within. IEEE Security & Privacy 14(3): 78-81 (2016)
Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache: White-Box Cryptography: Security in an Insecure Environment. IEEE Security & Privacy 14(5): 88-92 (2016)
Houda Ferradi, Rémi Géraud, David Naccache, Assia Tria: When organized crime applies academic results: a forensic analysis of an in-card listening device. J. Cryptographic Engineering 6(1): 49-59 (2016)
Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann: Practical Cryptanalysis of ISO 9796-2 and EMV Signatures. J. Cryptology 29(3): 632-656 (2016)
Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, David Pointcheval: Legally Fair Contract Signing Without Keystones. ACNS 2016: 175-190
Rodrigo Portella do Canto, Roman Korkikian, David Naccache: Buying AES Design Resistance with Speed and Energy. The New Codebreakers 2016: 134-147
Rémi Géraud, Diana Maimut, David Naccache: Double-Speed Barrett Moduli. The New Codebreakers 2016: 148-158
Céline Chevalier, Damien Gaumont, David Naccache, Rodrigo Portella do Canto: How to (Carefully) Breach a Service Contract? The New Codebreakers 2016: 166-173
Jean-Max Dutertre, Amir-Pasha Mirbaha, David Naccache, Assia Tria: Photonic Power Firewalls. The New Codebreakers 2016: 342-354
Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache: Improving the Big Mac Attack on Elliptic Curve Cryptography. The New Codebreakers 2016: 374-386
Pierre-Alain Fouque, Sylvain Guilley, Cédric Murdica, David Naccache: Safe-Errors on SPA Protected Implementations with the Atomicity Technique. The New Codebreakers 2016: 479-493
Ehsan Aerabi, A. Elhadi Amirouche, Houda Ferradi, Rémi Géraud, David Naccache, Jean Vuillemin: The Conjoined Microprocessor. HOST 2016: 67-70
Simon Cogliani, Houda Ferradi, Rémi Géraud, David Naccache: Thrifty Zero-Knowledge – When Linear Programming Meets Cryptography. ISPEC 2016: 344-353
Hadrien Barral, Houda Ferradi, Rémi Géraud, Georges-Axel Jaloyan, David Naccache: ARMv8 Shellcodes from ‘A’ to ‘Z’. ISPEC 2016: 354-377 and CoRR abs/1608.03415 (2016)
Peter Y. A. Ryan, David Naccache, Jean-Jacques Quisquater: The New Codebreakers – Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Lecture Notes in Computer Science 9100, Springer 2016, ISBN 978-3-662-49300-7
Jean-Michel Cioranesco, Houda Ferradi, Rémi Géraud, David Naccache: Process Table Covert Channels: Exploitation and Countermeasures. IACR Cryptology ePrint Archive 2016: 227 (2016)
Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, David Pointcheval: Legally Fair Contract Signing Without Keystones. IACR Cryptology ePrint Archive 2016: 363 (2016)
Houda Ferradi, Rémi Géraud, David Naccache: Slow Motion Zero Knowledge Identifying With Colliding Commitments. IACR Cryptology ePrint Archive 2016: 399 (2016)
Simon Cogliani, Houda Ferradi, Rémi Géraud, David Naccache: Thrifty Zero-Knowledge – When Linear Programming Meets Cryptography. IACR Cryptology ePrint Archive 2016: 443 (2016)
Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, David Naccache, Houda Ferradi: Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing. IACR Cryptology ePrint Archive 2016: 634 (2016)
Simon Cogliani, Feng Bao, Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Rodrigo Portella do Canto, Guilin Wang: Public-Key Based Lightweight Swarm Authentication. IACR Cryptology ePrint Archive 2016: 750 (2016)
Houda Ferradi, Rémi Géraud, David Naccache: Human Public-Key Encryption. IACR Cryptology ePrint Archive 2016: 763 (2016) and Mycrypt 2016: 494-505
Simon Cogliani, Rémi Géraud, David Naccache: A Fiat-Shamir Implementation Note. IACR Cryptology ePrint Archive 2016: 1039 (2016)
Houda Ferradi, Rémi Géraud, David Naccache, Assia Tria: When Organized Crime Applies Academic Results – A Forensic Analysis of an In-Card Listening Device. IACR Cryptology ePrint Archive 2015: 963 (2015) this article got extensive web coverage from Wired, IBTimes, Arstechnica, Finextra, CSOonline, PYMNTS, Business Insider etc.
Antoine Amarilli, Marc Beunardeau, Rémi Géraud, and David Naccache, Failure is Also an Option. The New Codebreakers 2016: 161-165
I recently co-chaired the PCs of CANS 2015 (with Mike Reiter) and SECITC 2015 (with Emil Simion).