Publications

Search publications by date:
1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004
2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014
2015 | 2016 | 2017 | 2018 | 2019 | Latest | Forthcoming
BibTeX - Year 2009

Publications dated 2009

January 2009

Julien Cathalo, David Naccache, and Jean-Jacques Quisquater. Comparing With RSA, In Cryptology ePrint Archive, January 2009, Report 2009/021 BibTeX

February 2009

Francesco Regazzoni, Thomas Eisenbarth, Axel Poschmann, Johann Großschädl, Frank Gurkaynak, Marco Macchetti, Zeynep Toprak, Laura Pozzi, Christof Paar, Yusuf Leblebici, and Paolo Ienne. Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology, In Transactions on Computational Science, Volume 5430, pages 230-243, February 2009 BibTeX

March 2009

Mark Manulis, Damien Leroy, François Koeune, Olivier Bonaventure, and Jean-Jacques Quisquater. Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home, In R. Safavi-Naini and V. Varadharajan, editor(s), ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009), March 2009, to appear BibTeX

Benoit Libert, and Damien Vergnaud. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys, In G. Tsudik and S. Jarecki, editor(s), Public Key Cryptography 2009 (PKC 2009), Volume 5443 of Lecture Notes in Computer Science, pages 235-255, Springer, March 2009 BibTeX

April 2009

Baudoin Collard, and François-Xavier Standaert. A Statistical Saturation Attack on the Block Cipher PRESENT, CT-RSA 2009, Volume 5473 of Lecture Notes in Computer Science, pages 195-210, Springer, April 2009 PDF BibTeX

Benoit Libert, and Damien Vergnaud. Adaptive-ID Secure Revocable Identity-Based Encryption, In M. Fischlin, editor(s), Topics in Cryptology - CT-RSA 2009, Volume 5473 of Lecture Notes in Computer Science, pages 1-15, Springer, April 2009 BibTeX

Christophe Petit, Jean-Jacques Quisquater, Jean-Pierre Tillich, and Gilles Zémor. Hard and Easy Components of Collision Search for the Zémor-Tillich Hash Function : new Attacks and reduced variants with equival, In Marc Fischlin, editor(s), CT-RSA, Lecture Notes in Computer Science, pages 182-194, Springer, April 2009 PDF BibTeX

May 2009

Giacomo de Meulenaer, Christophe Petit, and Jean-Jacques Quisquater. Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ?, In Cryptology ePrint Archive, May 2009, Report 2009/229 PDF BibTeX

Dina Heidar Kamel, François-Xavier Standaert, and Denis Flandre. Scaling trends of the AES S-Box low power consumption in 130 and 65 nm CMOS technology nodes, ISCAS, IEEE Circuits and Systems Society, IEEE, May 2009 PDF BibTeX

Mathieu Renauld, and François-Xavier Standaert. Combining Algebraic and Side-Channel Cryptanalysis against Block Ciphers, 30-th Symposium on Information Theory in the Benelux, May 2009 PDF BibTeX

Paolo Palmieri, and Olivier Pereira. Building Oblivious Transfer from communication delays, 30-th Symposium on Information Theory in the Benelux, May 2009 PDF BibTeX

June 2009

François-Xavier Standaert, François Koeune, and Werner Schindler. How to Compare Profiled Side-Channel Attacks, proceedings of ACNS 2009, Volume 5536 of Lecture Notes in Computer Science, pages 485-498, Spinger, June 2009 BibTeX

August 2009

Ben Adida, Olivier de Marneffe, Olivier Pereira, and Jean-Jacques Quisquater. Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios, In D. Jefferson, J.L. Hall, T. Moran, editor(s), Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, Usenix, August 2009 PDF BibTeX

Benoit Libert, and Moti Yung. Efficient Traceable Signatures in the Standard Model, In H. Shacham and B. Waters, editor(s), 3rd International Conference on Pairing-Based Cryptography (Pairing 2009), Volume 5671 of Lecture Notes in Computer Science, pages 187-205, Springer, August 2009 BibTeX

September 2009

Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris Mitchell, and Jean-Jacques Quisquater. 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice (WISTP 2009), September 2009 BibTeX

Francesco Regazzoni, Alessandro Cevrero, François-Xavier Standaert, Stephane Badel, Theo Kluter, Philip Brisk, Yusuf Leblebici, and Paolo Ienne. A Design Flow and Evaluation Framework for DPA-resistant Instruction Set Extensions, Workshop on Cryptographic Hardware and Embedded Systems (CHES 2009), Volume 5747 of Lecture Notes in Computer Science, pages 205-219, Springer, September 2009 BibTeX

Mathieu Renauld, François-Xavier Standaert, and Nicolas Veyrat-Charvillon. Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA, Workshop on Cryptographic Hardware and Embedded Systems (CHES 2009), Volume 5747 of Lecture Notes in Computer Science, pages 97-111, Springer, September 2009 PDF BibTeX

Daniel V. Bailey, Brian Baldwin, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Gauthier van Damme, Giacomo de Meulenaer, Junfeng Fan, Frank Gurkaynak, Tim Güneysu, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Christof Paar, Francesco Regazzoni, Peter Schwabe, and Leif Uhsadel. The Certicom Challenges ECC2-X, Workshop on Special Purpose Hardware for Attacking Cryptographic Systems (SHARCS'09), September 2009 PDF BibTeX

October 2009

Dina Heidar Kamel, Mohamed Dessouky, and Denis Flandre. Enhanced performance of SERDES current-mode output driver using 0.13 μm PD SOI CMOS, SOI Conference, IEEE, October 2009 PDF BibTeX

Dina Heidar Kamel, David Bol, François-Xavier Standaert, and Denis Flandre. Comparison of Ultra-Low-Power and static CMOS full adders in 0.15 μm FD SOI CMOS, SOI Conference, IEEE, October 2009 PDF BibTeX

Nidal Aboudagga, Giacomo de Meulenaer, Mohamed Eltoweissy, and Jean-Jacques Quisquater. IMAPS: Imbricated Authentication Protocol Suite for Mobile Users and Groups, IEEE Conference on Local Computer Networks (LCN 2009), IEEE Computer Society, October 2009 PDF BibTeX

December 2009

Julien Cathalo, Benoit Libert, and Moti Yung. Group Encryption: Non-Interactive Realization in the Standard Model, In M. Matsui, editor(s), Asiacrypt 2009, Volume 5912 of Lecture Notes in Computer Science, pages 179-196, Springer, December 2009 BibTeX

Benoit Libert, and Damien Vergnaud. Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model, In A. Miyaji and J. Garay, editor(s), 8th International Conference on Cryptology and Network Security (CANS 2009), Volume 5888 of Lecture Notes in Computer Science, pages 498-517, Springer, December 2009 BibTeX

Mathieu Renauld, and François-Xavier Standaert. Algebraic Side-Channel Attacks, In Feng Bao, Moti Yung, Dongdai Lin, Jiwu Jing, editor(s), Information Security and Cryptology (INSCRYPT) 2009, Volume 6151 of Lecture Notes in Computer Science, pages 393-410, Springer, December 2009 PDF BibTeX

Chong Hee Kim, and Gildas Avoine. RFID distance bounding protocol with mixed challenges to prevent relay attacks, The 8th International Conference on Cryptology and Network Security - CANS2009, Volume 5888 of Lecture Notes in Computer Science, pages 119-133, Springer, December 2009 BibTeX

Stephanie Delaune, Steve Kremer, and Olivier Pereira. Simulation based security in the applied pi calculus, In R. Kannan and K. Kumar, editor(s), Foundations of Software Technology and Theoretical Computer Science - FSTTCS 2009, Leibniz International Proceedings in Informatics, December 2009 PDF BibTeX

Julien Cathalo, David Naccache, and Jean-Jacques Quisquater. Comparing with RSA, Twelfth IMA International Conference on Cryptography and Coding, Lecture Notes in Computer Science, Springer-Verlag, December 2009 PDF BibTeX

Copyright Notice

(click here to expand/retract)