dblp.uni-trier.dewww.uni-trier.de

Frédéric Valette

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
15EEPierre-Alain Fouque, Gwenaëlle Martinet, Frédéric Valette, Sébastien Zimmer: On the Security of the CCM Encryption Mode and of a Slight Variant. ACNS 2008: 411-428
14EEDenis Réal, Vivien Dubois, Anne-Marie Guilloux, Frédéric Valette, M'hamed Drissi: SCARE of an Unknown Hardware Feistel Implementation. CARDIS 2008: 218-227
13EEPierre-Alain Fouque, Denis Réal, Frédéric Valette, M'hamed Drissi: The Carry Leakage on the Randomized Exponent Countermeasure. CHES 2008: 198-213
12EEDenis Réal, Cécile Canovas, Jessy Clédière, M'hamed Drissi, Frédéric Valette: Defeating classical Hardware Countermeasures: a new processing for Side Channel Analysis. DATE 2008: 1274-1279
11EEPierre-Alain Fouque, Reynald Lercier, Denis Réal, Frédéric Valette: Fault Attack onElliptic Curve Montgomery Ladder Implementation. FDTC 2008: 92-98
2006
10EEPierre-Alain Fouque, Sébastien Kunz-Jacques, Gwenaëlle Martinet, Frédéric Muller, Frédéric Valette: Power Attack on Small RSA Public Exponent. CHES 2006: 339-353
9EEFrédéric Muller, Frédéric Valette: High-Order Attacks Against the Exponent Splitting Protection. Public Key Cryptography 2006: 315-329
2005
8EERémy Daudigny, Hervé Ledig, Frédéric Muller, Frédéric Valette: SCARE of the DES. ACNS 2005: 393-406
2004
7EESébastien Kunz-Jacques, Frédéric Muller, Frédéric Valette: The Davies-Murphy Power Attack. ASIACRYPT 2004: 451-467
6EEHervé Ledig, Frédéric Muller, Frédéric Valette: Enhancing Collision Attacks. CHES 2004: 176-190
5EEPierre-Alain Fouque, Frédéric Muller, Guillaume Poupard, Frédéric Valette: Defeating Countermeasures Based on Randomized BSD Representations. CHES 2004: 312-327
2003
4EEPierre-Alain Fouque, Frédéric Valette: The Doubling Attack - Why Upwards Is Better than Downwards. CHES 2003: 269-280
3EEPierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette: Authenticated On-Line Encryption. Selected Areas in Cryptography 2003: 145-159
2002
2EEAntoine Joux, Gwenaëlle Martinet, Frédéric Valette: Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC. CRYPTO 2002: 17-30
1EEÉliane Jaulmes, Antoine Joux, Frédéric Valette: On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction. FSE 2002: 237-251

Coauthor Index

1Cécile Canovas [12]
2Jessy Clédière [12]
3Rémy Daudigny [8]
4M'hamed Drissi [12] [13] [14]
5Vivien Dubois [14]
6Pierre-Alain Fouque [3] [4] [5] [10] [11] [13] [15]
7Anne-Marie Guilloux [14]
8Éliane Jaulmes [1]
9Antoine Joux [1] [2] [3]
10Sébastien Kunz-Jacques [7] [10]
11Hervé Ledig [6] [8]
12Reynald Lercier [11]
13Gwenaëlle Martinet [2] [3] [10] [15]
14Frédéric Muller [5] [6] [7] [8] [9] [10]
15Guillaume Poupard [5]
16Denis Réal [11] [12] [13] [14]
17Sébastien Zimmer [15]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)