|
Search the dblp DataBase
Helena Handschuh:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jean-Sébastien Coron, Helena Handschuh, David Naccache
ECC: Do We Need to Count? [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:122-134 [Conf]
- Helena Handschuh, David Naccache, Pascal Paillier, Christophe Tymen
Provably Secure Chipcard Personalization, or, How to Fool Malicious Insiders. [Citation Graph (0, 0)][DBLP] CARDIS, 2002, pp:- [Conf]
- Helena Handschuh, Pascal Paillier
Reducing the Collision Probability of Alleged Comp128. [Citation Graph (0, 0)][DBLP] CARDIS, 1998, pp:366-371 [Conf]
- Helena Handschuh, Pascal Paillier
Smart Card Crypto-Coprocessors for Public-Key Cryptography. [Citation Graph (0, 0)][DBLP] CARDIS, 1998, pp:372-379 [Conf]
- Helena Handschuh, Pascal Paillier, Jacques Stern
Probing Attacks on Tamper-Resistant Devices. [Citation Graph (0, 0)][DBLP] CHES, 1999, pp:303-315 [Conf]
- Eric Brier, Helena Handschuh, Christophe Tymen
Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware. [Citation Graph (0, 0)][DBLP] CHES, 2001, pp:16-27 [Conf]
- Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen
GEM: A Generic Chosen-Ciphertext Secure Encryption Method. [Citation Graph (0, 0)][DBLP] CT-RSA, 2002, pp:263-276 [Conf]
- Helena Handschuh, Lars R. Knudsen, Matthew J. B. Robshaw
Analysis of SHA-1 in Encryption Mode. [Citation Graph (0, 0)][DBLP] CT-RSA, 2001, pp:70-83 [Conf]
- Henri Gilbert, Helena Handschuh, Antoine Joux, Serge Vaudenay
A Statistical Attack on RC6. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:64-74 [Conf]
- Helena Handschuh, Henri Gilbert
x2 Cryptanalysis of the SEAL Encryption Algorithm. [Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1997, pp:1-12 [Conf]
- Helena Handschuh, Bart Preneel
On the Security of Double and 2-Key Triple Modes of Operation. [Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1999, pp:215-230 [Conf]
- Raphael Chung-Wei Phan, Helena Handschuh
On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor. [Citation Graph (0, 0)][DBLP] ISC, 2004, pp:111-122 [Conf]
- Helena Handschuh, Yiannis Tsiounis, Moti Yung
Decision Oracles are Equivalent to Matching Oracles. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1999, pp:276-289 [Conf]
- Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2002, pp:17-33 [Conf]
- Henri Gilbert, Helena Handschuh
Security Analysis of SHA-256 and Sisters. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2003, pp:175-193 [Conf]
- Helena Handschuh, Howard M. Heys
A Timing Attack on RC5. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1998, pp:306-318 [Conf]
- Helena Handschuh, Serge Vaudenay
A Universal Encryption Standard. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1999, pp:1-12 [Conf]
- Helena Handschuh, Bart Preneel
Blind Differential Cryptanalysis for Enhanced Power Attacks. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2006, pp:163-173 [Conf]
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms. [Citation Graph (, )][DBLP]
07021 Executive Summary -- Symmetric Cryptography. [Citation Graph (, )][DBLP]
07021 Abstracts Collection -- Symmetric Cryptography. [Citation Graph (, )][DBLP]
Securing Flash Technology. [Citation Graph (, )][DBLP]
Masking Does Not Protect Against Differential Fault Attacks. [Citation Graph (, )][DBLP]
Blinded Fault Resistant Exponentiation Revisited. [Citation Graph (, )][DBLP]
Hardware Security Features for Secure Embedded Devices. [Citation Graph (, )][DBLP]
Securing Flash Technology: How Does It Look From Inside? [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.304secs
|