The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Christophe Tymen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Helena Handschuh, David Naccache, Pascal Paillier, Christophe Tymen
    Provably Secure Chipcard Personalization, or, How to Fool Malicious Insiders. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2002, pp:- [Conf]
  2. Eric Brier, Helena Handschuh, Christophe Tymen
    Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:16-27 [Conf]
  3. Marc Joye, Christophe Tymen
    Protections against Differential Analysis for Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:377-390 [Conf]
  4. Jovan Dj. Golic, Christophe Tymen
    Multiplicative Masking and Power Analysis of AES. [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:198-212 [Conf]
  5. Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen
    GEM: A Generic Chosen-Ciphertext Secure Encryption Method. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:263-276 [Conf]
  6. David Naccache, David Pointcheval, Christophe Tymen
    Monotone Signatures. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2001, pp:295-308 [Conf]
  7. David Naccache, Alexei Tchoulkine, Christophe Tymen, Elena Trichina
    Reducing the Memory Complexity of Type-Inference Algorithms. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:109-121 [Conf]
  8. Nils Maltesson, David Naccache, Elena Trichina, Christophe Tymen
    Applet Verification Strategiesfor RAM-Constrained Devices. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:118-137 [Conf]
  9. Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen
    Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:17-33 [Conf]
  10. Marc Joye, Christophe Tymen
    Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:353-364 [Conf]
  11. Jean-Sébastien Coron, David M'Raïhi, Christophe Tymen
    Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:151-164 [Conf]

Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002