2008 |
29 | EE | Helena Handschuh,
Bart Preneel:
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms.
CRYPTO 2008: 144-161 |
28 | EE | Arnaud Boscher,
Helena Handschuh:
Masking Does Not Protect Against Differential Fault Attacks.
FDTC 2008: 35-40 |
2007 |
27 | | Eli Biham,
Helena Handschuh,
Stefan Lucks,
Vincent Rijmen:
Symmetric Cryptography, 07.01. - 12.01.2007
Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 |
26 | EE | Helena Handschuh,
Elena Trichina:
Securing Flash Technology.
FDTC 2007: 3-17 |
25 | EE | Eli Biham,
Helena Handschuh,
Stefan Lucks,
Vincent Rijmen:
07021 Abstracts Collection -- Symmetric Cryptography.
Symmetric Cryptography 2007 |
24 | EE | Eli Biham,
Helena Handschuh,
Stefan Lucks,
Vincent Rijmen:
07021 Executive Summary -- Symmetric Cryptography.
Symmetric Cryptography 2007 |
2006 |
23 | EE | Helena Handschuh,
Bart Preneel:
Blind Differential Cryptanalysis for Enhanced Power Attacks.
Selected Areas in Cryptography 2006: 163-173 |
2005 |
22 | | Henri Gilbert,
Helena Handschuh:
Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers
Springer 2005 |
21 | EE | Helena Handschuh:
RC5.
Encyclopedia of Cryptography and Security 2005 |
20 | EE | Helena Handschuh:
RC6.
Encyclopedia of Cryptography and Security 2005 |
19 | EE | Helena Handschuh:
SHA Family (Secure Hash Algorithm).
Encyclopedia of Cryptography and Security 2005 |
2004 |
18 | | Helena Handschuh,
M. Anwar Hasan:
Selected Areas in Cryptography, 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers
Springer 2004 |
17 | EE | Raphael Chung-Wei Phan,
Helena Handschuh:
On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor.
ISC 2004: 111-122 |
2003 |
16 | EE | Henri Gilbert,
Helena Handschuh:
Security Analysis of SHA-256 and Sisters.
Selected Areas in Cryptography 2003: 175-193 |
2002 |
15 | EE | Helena Handschuh,
David Naccache,
Pascal Paillier,
Christophe Tymen:
Provably Secure Chipcard Personalization, or, How to Fool Malicious Insiders.
CARDIS 2002 |
14 | EE | Jean-Sébastien Coron,
Helena Handschuh,
Marc Joye,
Pascal Paillier,
David Pointcheval,
Christophe Tymen:
GEM: A Generic Chosen-Ciphertext Secure Encryption Method.
CT-RSA 2002: 263-276 |
13 | EE | Jean-Sébastien Coron,
Helena Handschuh,
Marc Joye,
Pascal Paillier,
David Pointcheval,
Christophe Tymen:
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages.
Public Key Cryptography 2002: 17-33 |
2001 |
12 | EE | Eric Brier,
Helena Handschuh,
Christophe Tymen:
Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware.
CHES 2001: 16-27 |
11 | EE | Helena Handschuh,
Lars R. Knudsen,
Matthew J. B. Robshaw:
Analysis of SHA-1 in Encryption Mode.
CT-RSA 2001: 70-83 |
2000 |
10 | EE | Henri Gilbert,
Helena Handschuh,
Antoine Joux,
Serge Vaudenay:
A Statistical Attack on RC6.
FSE 2000: 64-74 |
1999 |
9 | | Jean-Sébastien Coron,
Helena Handschuh,
David Naccache:
ECC: Do We Need to Count?
ASIACRYPT 1999: 122-134 |
8 | EE | Helena Handschuh,
Pascal Paillier,
Jacques Stern:
Probing Attacks on Tamper-Resistant Devices.
CHES 1999: 303-315 |
7 | EE | Helena Handschuh,
Bart Preneel:
On the Security of Double and 2-Key Triple Modes of Operation.
FSE 1999: 215-230 |
6 | EE | Helena Handschuh,
Yiannis Tsiounis,
Moti Yung:
Decision Oracles are Equivalent to Matching Oracles.
Public Key Cryptography 1999: 276-289 |
5 | EE | Helena Handschuh,
Serge Vaudenay:
A Universal Encryption Standard.
Selected Areas in Cryptography 1999: 1-12 |
1998 |
4 | | Helena Handschuh,
Pascal Paillier:
Reducing the Collision Probability of Alleged Comp128.
CARDIS 1998: 366-371 |
3 | | Helena Handschuh,
Pascal Paillier:
Smart Card Crypto-Coprocessors for Public-Key Cryptography.
CARDIS 1998: 372-379 |
2 | EE | Helena Handschuh,
Howard M. Heys:
A Timing Attack on RC5.
Selected Areas in Cryptography 1998: 306-318 |
1997 |
1 | EE | Helena Handschuh,
Henri Gilbert:
x2 Cryptanalysis of the SEAL Encryption Algorithm.
FSE 1997: 1-12 |