The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Aline Gouget: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sébastien Canard, Aline Gouget, Emeline Hufschmitt
    A Handy Multi-coupon System. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:66-81 [Conf]
  2. Claude Carlet, Aline Gouget
    An Upper Bound on the Number of m-Resilient Boolean Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:484-496 [Conf]
  3. Aline Gouget, Hervé Sibert
    How to Strengthen Pseudo-random Generators by Using Compression. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:129-146 [Conf]
  4. Aline Gouget, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize, Chris J. Mitchell
    Analysis of the Bit-Search Generator and Sequence Compression Techniques. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:196-214 [Conf]
  5. Aline Gouget, Jacques Patarin
    Probabilistic Multivariate Cryptography. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:1-18 [Conf]
  6. Emmanuel Besson, Aline Gouget, Hervé Sibert
    The GAIA sensor: an early DDoS detection tool. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS Performance Evaluation Review, 2006, v:34, n:2, pp:7-8 [Journal]
  7. Sébastien Canard, Aline Gouget
    Divisible E-Cash Systems Can Be Truly Anonymous. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:482-497 [Conf]

  8. Anonymity in Transferable E-cash. [Citation Graph (, )][DBLP]


  9. Recent Advances in Electronic Cash Design. [Citation Graph (, )][DBLP]


  10. Improvement of Efficiency in (Unconditional) Anonymous Transferable E-Cash. [Citation Graph (, )][DBLP]


  11. Multiple Denominations in E-cash with Compact Transaction Data. [Citation Graph (, )][DBLP]


  12. SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications. [Citation Graph (, )][DBLP]


  13. Fair E-Cash: Be Compact, Spend Faster. [Citation Graph (, )][DBLP]


  14. Revisiting Correlation-Immunity in Filter Generators. [Citation Graph (, )][DBLP]


  15. How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions. [Citation Graph (, )][DBLP]


  16. Fault Analysis of Grain-128. [Citation Graph (, )][DBLP]


  17. SOSEMANUK: a fast software-oriented stream cipher [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002