The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Gilles Piret: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gilles Piret, François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater
    On the Security of the DeKaRT Primitive. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2004, pp:241-254 [Conf]
  2. François-Xavier Standaert, Gilles Piret, Neil Gershenfeld, Jean-Jacques Quisquater
    SEA: A Scalable Encryption Algorithm for Small Embedded Applications. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:222-236 [Conf]
  3. Gilles Piret, Jean-Jacques Quisquater
    A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD. [Citation Graph (0, 0)][DBLP]
    CHES, 2003, pp:77-88 [Conf]
  4. François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat
    ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:279-299 [Conf]
  5. Louis Granboulan, Éric Levieil, Gilles Piret
    Pseudorandom Permutation Families over Abelian Groups. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:57-77 [Conf]
  6. François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater
    FPGA Implementations of the ICEBERG Block Cipher. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:556-561 [Conf]
  7. Gilles Piret, Jean-Jacques Quisquater
    Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:100-113 [Conf]
  8. Gilles Piret
    Luby-Rackoff Revisited: On the Use of Permutations as Inner Functions of a Feistel Scheme. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:39, n:2, pp:233-245 [Journal]
  9. François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater
    FPGA implementations of the ICEBERG block cipher. [Citation Graph (0, 0)][DBLP]
    Integration, 2007, v:40, n:1, pp:20-27 [Journal]

  10. Provable security of block ciphers against linear cryptanalysis: a mission impossible? [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002