The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Helena Handschuh: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jean-Sébastien Coron, Helena Handschuh, David Naccache
    ECC: Do We Need to Count? [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:122-134 [Conf]
  2. Helena Handschuh, David Naccache, Pascal Paillier, Christophe Tymen
    Provably Secure Chipcard Personalization, or, How to Fool Malicious Insiders. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2002, pp:- [Conf]
  3. Helena Handschuh, Pascal Paillier
    Reducing the Collision Probability of Alleged Comp128. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:366-371 [Conf]
  4. Helena Handschuh, Pascal Paillier
    Smart Card Crypto-Coprocessors for Public-Key Cryptography. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:372-379 [Conf]
  5. Helena Handschuh, Pascal Paillier, Jacques Stern
    Probing Attacks on Tamper-Resistant Devices. [Citation Graph (0, 0)][DBLP]
    CHES, 1999, pp:303-315 [Conf]
  6. Eric Brier, Helena Handschuh, Christophe Tymen
    Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:16-27 [Conf]
  7. Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen
    GEM: A Generic Chosen-Ciphertext Secure Encryption Method. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:263-276 [Conf]
  8. Helena Handschuh, Lars R. Knudsen, Matthew J. B. Robshaw
    Analysis of SHA-1 in Encryption Mode. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:70-83 [Conf]
  9. Henri Gilbert, Helena Handschuh, Antoine Joux, Serge Vaudenay
    A Statistical Attack on RC6. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:64-74 [Conf]
  10. Helena Handschuh, Henri Gilbert
    x2 Cryptanalysis of the SEAL Encryption Algorithm. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:1-12 [Conf]
  11. Helena Handschuh, Bart Preneel
    On the Security of Double and 2-Key Triple Modes of Operation. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:215-230 [Conf]
  12. Raphael Chung-Wei Phan, Helena Handschuh
    On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:111-122 [Conf]
  13. Helena Handschuh, Yiannis Tsiounis, Moti Yung
    Decision Oracles are Equivalent to Matching Oracles. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:276-289 [Conf]
  14. Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen
    Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:17-33 [Conf]
  15. Henri Gilbert, Helena Handschuh
    Security Analysis of SHA-256 and Sisters. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2003, pp:175-193 [Conf]
  16. Helena Handschuh, Howard M. Heys
    A Timing Attack on RC5. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:306-318 [Conf]
  17. Helena Handschuh, Serge Vaudenay
    A Universal Encryption Standard. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:1-12 [Conf]
  18. Helena Handschuh, Bart Preneel
    Blind Differential Cryptanalysis for Enhanced Power Attacks. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:163-173 [Conf]

  19. Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms. [Citation Graph (, )][DBLP]


  20. 07021 Executive Summary -- Symmetric Cryptography. [Citation Graph (, )][DBLP]


  21. 07021 Abstracts Collection -- Symmetric Cryptography. [Citation Graph (, )][DBLP]


  22. Securing Flash Technology. [Citation Graph (, )][DBLP]


  23. Masking Does Not Protect Against Differential Fault Attacks. [Citation Graph (, )][DBLP]


  24. Blinded Fault Resistant Exponentiation Revisited. [Citation Graph (, )][DBLP]


  25. Hardware Security Features for Secure Embedded Devices. [Citation Graph (, )][DBLP]


  26. Securing Flash Technology: How Does It Look From Inside? [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.304secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002