The SCEAS System
Navigation Menu

Search the dblp DataBase


Henri Gilbert: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Henri Gilbert, Marine Minier
    A Collision Attack on 7 Rounds of Rijndael. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:230-241 [Conf]
  2. Olivier Billet, Henri Gilbert
    A Traceable Block Cipher. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:331-346 [Conf]
  3. Thomas Peyrin, Henri Gilbert, Frédéric Muller, Matthew J. B. Robshaw
    Combining Compression Functions and Block Cipher-Based Hash Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2006, pp:315-331 [Conf]
  4. Henri Gilbert
    Techniques for Low Cost Authentication and Message Authentication. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:183-192 [Conf]
  5. David Arditti, Côme Berbain, Olivier Billet, Henri Gilbert
    Compact FPGA implementations of QUAD. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:347-349 [Conf]
  6. Thierry Baritaud, Mireille Campana, Pascal Chauvaud, Henri Gilbert
    On the Security of the Permuted Kernel Identification Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1992, pp:305-311 [Conf]
  7. Henri Gilbert, Guy Chassé
    A Statistical Attack of the FEAL-8 Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1990, pp:22-33 [Conf]
  8. Henri Gilbert, Pascal Chauvaud
    A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:359-368 [Conf]
  9. Anne Tardy-Corfdir, Henri Gilbert
    A Known Plaintext Attack of FEAL-4 and FEAL-6. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1991, pp:172-181 [Conf]
  10. Olivier Billet, Henri Gilbert
    Resistance of SNOW 2.0 Against Algebraic Attacks. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:19-28 [Conf]
  11. Côme Berbain, Henri Gilbert, Jacques Patarin
    QUAD: A Practical Stream Cipher with Provable Security. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:109-128 [Conf]
  12. Thierry Baritaud, Henri Gilbert, Marc Girault
    FFT Hashing is not Collision-free. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:35-44 [Conf]
  13. Henri Gilbert, Marine Minier
    Cryptanalysis of SFLASH. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:288-298 [Conf]
  14. Christophe Debaert, Henri Gilbert
    The RIPEMD and RIPEMD Improved Variants of MD4 Are Not Collision Free. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:52-65 [Conf]
  15. Henri Gilbert
    The Security of "One-Block-to-Many" Modes of Operation. [Citation Graph (0, 0)][DBLP]
    FSE, 2003, pp:376-395 [Conf]
  16. Henri Gilbert, Helena Handschuh, Antoine Joux, Serge Vaudenay
    A Statistical Attack on RC6. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:64-74 [Conf]
  17. Henri Gilbert, Marine Minier
    New Results on the Pseudorandomness of Some Blockcipher Constructions. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:248-266 [Conf]
  18. Helena Handschuh, Henri Gilbert
    x2 Cryptanalysis of the SEAL Encryption Algorithm. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:1-12 [Conf]
  19. Marine Minier, Henri Gilbert
    Stochastic Cryptanalysis of Crypton. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:121-133 [Conf]
  20. Côme Berbain, Henri Gilbert, Alexander Maximov
    Cryptanalysis of Grain. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:15-29 [Conf]
  21. Henri Gilbert, Helena Handschuh
    Security Analysis of SHA-256 and Sisters. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2003, pp:175-193 [Conf]
  22. Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi
    Cryptanalysis of a White Box AES Implementation. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:227-240 [Conf]
  23. Olivier Billet, Henri Gilbert
    Cryptanalysis of Rainbow. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:336-347 [Conf]
  24. Henri Gilbert, Dipankar Gupta, Andrew M. Odlyzko, Jean-Jacques Quisquater
    Attacks on Shamir's `RSA for Paranoids'. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1998, v:68, n:4, pp:197-199 [Journal]
  25. Côme Berbain, Henri Gilbert
    On the Security of IV Dependent Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:254-273 [Conf]
  26. Côme Berbain, Olivier Billet, Henri Gilbert
    Efficient Implementations of Multivariate Quadratic Systems. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:174-187 [Conf]

  27. An efficient forward private RFID protocol. [Citation Graph (, )][DBLP]

  28. QUAD: Overview and Recent Developments. [Citation Graph (, )][DBLP]

  29. HB#: Increasing the Security and Efficiency of HB+. [Citation Graph (, )][DBLP]

  30. Good Variants of HB+ Are Hard to Find. [Citation Graph (, )][DBLP]

  31. Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher. [Citation Graph (, )][DBLP]

  32. Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations. [Citation Graph (, )][DBLP]

  33. How to Encrypt with the LPN Problem. [Citation Graph (, )][DBLP]

  34. Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers. [Citation Graph (, )][DBLP]

  35. SOSEMANUK: a fast software-oriented stream cipher [Citation Graph (, )][DBLP]

Search in 0.005secs, Finished in 0.006secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002