The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Louis Goubin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Louis Goubin, Nicolas Courtois
    Cryptanalysis of the TTM Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:44-57 [Conf]
  2. Jacques Patarin, Louis Goubin, Nicolas Courtois
    C*-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:35-49 [Conf]
  3. Jean-Sébastien Coron, Louis Goubin
    On Boolean and Arithmetic Masking against Differential Power Analysis. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:231-237 [Conf]
  4. Louis Goubin
    A Sound Method for Switching between Boolean and Arithmetic Masking. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:3-15 [Conf]
  5. Louis Goubin, Jacques Patarin
    DES and Differential Power Analysis (The "Duplication" Method). [Citation Graph (0, 0)][DBLP]
    CHES, 1999, pp:158-172 [Conf]
  6. Jacques Patarin, Nicolas Courtois, Louis Goubin
    QUARTZ, 128-Bit Long Digital Signatures. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:282-297 [Conf]
  7. Jacques Patarin, Nicolas Courtois, Louis Goubin
    FLASH, a Fast Multivariate Signature Algorithm. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:298-307 [Conf]
  8. Aviad Kipnis, Jacques Patarin, Louis Goubin
    Unbalanced Oil and Vinegar Signature Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:206-222 [Conf]
  9. Jacques Patarin, Louis Goubin, Nicolas Courtois
    Improved Algorithms for Isomorphisms of Polynomials. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:184-200 [Conf]
  10. Mehdi-Laurent Akkar, Régis Bevan, Louis Goubin
    Two Power Analysis Attacks against One-Mask Methods. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:332-347 [Conf]
  11. Mehdi-Laurent Akkar, Louis Goubin
    A Generic Protection against High-Order Differential Power Analysis. [Citation Graph (0, 0)][DBLP]
    FSE, 2003, pp:192-205 [Conf]
  12. Jacques Patarin, Louis Goubin
    Trapdoor one-way permutations and multivariate polynominals. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:356-368 [Conf]
  13. Jacques Patarin, Louis Goubin
    Asymmetric cryptography with S-Boxes. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:369-380 [Conf]
  14. Nicolas Courtois, Louis Goubin
    An Algebraic Masking Method to Protect AES Against Power Attacks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:199-209 [Conf]
  15. Mehdi-Laurent Akkar, Nicolas Courtois, Romain Duteuil, Louis Goubin
    A Fast and Secure Implementation of Sflash. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:267-278 [Conf]
  16. Louis Goubin
    A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:199-210 [Conf]
  17. Nicolas Courtois, Louis Goubin, Willi Meier, Jean-Daniel Tacier
    Solving Underdefined Systems of Multivariate Quadratic Equations. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:211-227 [Conf]

  18. Perturbating RSA Public Keys: An Improved Attack. [Citation Graph (, )][DBLP]


  19. Public Key Perturbation of Randomized RSA Implementations. [Citation Graph (, )][DBLP]


  20. Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable. [Citation Graph (, )][DBLP]


  21. In(security) Against Fault Injection Attacks for CRT-RSA Implementations. [Citation Graph (, )][DBLP]


  22. Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator. [Citation Graph (, )][DBLP]


  23. Fault Analysis of Rabbit: Toward a Secret Key Leakage. [Citation Graph (, )][DBLP]


  24. Cryptanalysis of White Box DES Implementations. [Citation Graph (, )][DBLP]


  25. Fault Analysis of Grain-128. [Citation Graph (, )][DBLP]


  26. SOSEMANUK: a fast software-oriented stream cipher [Citation Graph (, )][DBLP]


  27. Fault Attacks on RSA Public Keys: Left-To-Right Implementations are also Vulnerable [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002