The SCEAS System
Navigation Menu

Search the dblp DataBase


Christophe Clavier: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Eric Brier, Christophe Clavier, Francis Olivier
    Correlation Power Analysis with a Leakage Model. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:16-29 [Conf]
  2. Christophe Clavier, Jean-Sébastien Coron, Nora Dabbous
    Differential Power Analysis in the Presence of Hardware Countermeasures. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:252-263 [Conf]
  3. Christophe Clavier, Marc Joye
    Universal Exponentiation Algorithm. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:300-308 [Conf]
  4. Eric Brier, Benoît Chevallier-Mames, Mathieu Ciet, Christophe Clavier
    Why One Should Also Secure RSA Public Key Elements. [Citation Graph (0, 0)][DBLP]
    CHES, 2006, pp:324-338 [Conf]
  5. Eric Brier, Christophe Clavier, Jean-Sébastien Coron, David Naccache
    Cryptanalysis of RSA Signatures with Fixed-Pattern Padding. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2001, pp:433-439 [Conf]
  6. Frederic Amiel, Christophe Clavier, Michael Tunstall
    Fault Analysis of DPA-Resistant Algorithms. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:223-236 [Conf]
  7. Yannick Monnet, Marc Renaudin, Régis Leveugle, Christophe Clavier, Pascal Moitrel
    Case Study of a Fault Attack on Asynchronous DES Crypto-Processors. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:88-97 [Conf]
  8. Christophe Clavier, Jean-Sébastien Coron
    On the Implementation of a Fast Prime Generation Algorithm. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:443-449 [Conf]
  9. Christophe Clavier
    Secret External Encodings Do Not Prevent Transient Fault Analysis. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:181-194 [Conf]

  10. New Families of ECM Curves for Cunningham Numbers. [Citation Graph (, )][DBLP]

  11. Fault Analysis Study of IDEA. [Citation Graph (, )][DBLP]

  12. An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm. [Citation Graph (, )][DBLP]

  13. How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002