The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Olivier Billet: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Olivier Billet, Marc Joye
    The Jacobi Model of an Elliptic Curve and Side-Channel Analysis. [Citation Graph (0, 0)][DBLP]
    AAECC, 2003, pp:34-42 [Conf]
  2. Olivier Billet, Henri Gilbert
    A Traceable Block Cipher. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:331-346 [Conf]
  3. David Arditti, Côme Berbain, Olivier Billet, Henri Gilbert
    Compact FPGA implementations of QUAD. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:347-349 [Conf]
  4. Olivier Billet, Henri Gilbert
    Resistance of SNOW 2.0 Against Algebraic Attacks. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:19-28 [Conf]
  5. Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi
    Cryptanalysis of a White Box AES Implementation. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:227-240 [Conf]
  6. Olivier Billet, Henri Gilbert
    Cryptanalysis of Rainbow. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:336-347 [Conf]
  7. Olivier Billet, Matthew J. B. Robshaw, Thomas Peyrin
    On Building Hash Functions from Multivariate Quadratic Equations. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:82-95 [Conf]
  8. Krystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini, Josef Pieprzyk
    Cryptanalysis of FORK-256. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:19-38 [Conf]
  9. Côme Berbain, Olivier Billet, Henri Gilbert
    Efficient Implementations of Multivariate Quadratic Systems. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:174-187 [Conf]

  10. Looking Back at a New Hash Function. [Citation Graph (, )][DBLP]


  11. Cryptanalysis of the Square Cryptosystems. [Citation Graph (, )][DBLP]


  12. The Intel AES Instructions Set and the SHA-3 Candidates. [Citation Graph (, )][DBLP]


  13. An efficient forward private RFID protocol. [Citation Graph (, )][DBLP]


  14. QUAD: Overview and Recent Developments. [Citation Graph (, )][DBLP]


  15. Drm to counter side-channel attacks? [Citation Graph (, )][DBLP]


  16. Traitors Collaborating in Public: Pirates 2.0. [Citation Graph (, )][DBLP]


  17. Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher. [Citation Graph (, )][DBLP]


  18. Two Attacks against the Ff RFID Protocol. [Citation Graph (, )][DBLP]


  19. Efficient Traitor Tracing from Collusion Secure Codes. [Citation Graph (, )][DBLP]


  20. SOSEMANUK: a fast software-oriented stream cipher [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002