Articles published in refereed conferences (see also DBLP
or Google Scholar):
-
Lightweight Privacy Preserving Authentication for RFID Based on a Stream Cipher
with J. Etrog, and H. Gilbert,
in FSE 2010, Springer, ©IACR (2010).
-
An Efficient Forward-Private RFID Protocol
with C. Berbain, J. Etrog, and H. Gilbert,
in ACM CCS 2009, ACM, ©ACM Press (2009).
-
Two Attacks against the Ff RFID Protocol
with K. El-Khiyaoui,
in INDOCRYPT 2009, Springer, ©Springer (2009).
-
The Intel AES Instructions Set and the SHA-3 Candidates
with R. Benadjila, S. Gueron, and M. Robshaw,
in ASIACRYPT 2009, Springer, ©IACR (2009).
-
Cryptanalysis of the Square Cryptosystems
with G. Macario-Rat,
in ASIACRYPT 2009, Springer, ©IACR (2009).
-
Traitors Collaborating in Public: Pirates 2.0
with D. H. Phan,
in EUROCRYPT 2009, Springer, ©IACR (2009).
-
Efficient Traitor Tracing based on Collusion Secure Codes
with D. H. Phan,
in ICITS 2008, Springer, ©Springer (2008).
-
Looking Back at a New Hash Function
with M. Robshaw, Y. Seurin, and Y.L. Yin,
in ACISP 2008, Springer, ©Springer (2008).
-
Analysis of Intermediate Field Systems
with J. Patarin and Y. Seurin,
in SCC 2008 (2008).
-
DRM to Counter Side-Channel Attacks?
with R. Benadjila and S. Francfort,
in DRM 2007, ACM, ©ACM Press (2007).
-
On Building Hash Functions From Multivariate Quadratic Equations
with M. Robshaw and T. Peyrin,
in ACISP 2007, Springer, ©Springer (2007).
-
Cryptanalysis of FORK-256
with T. Peyrin, K. Matusiewicz, S. Contini, and J. Pieprzyk,
in FSE 2007, Springer, ©IACR (2007).
-
Compact FPGA implementations of QUAD
with D. Arditti, C. Berbain, and H. Gilbert,
in ASIACCS 2007, ©ACM Press (2007).
-
Cryptanalysis of Rainbow
with H. Gilbert,
in SCN 2006, ©Springer (2006).
-
Efficient Implementations of Multivariate Quadratic Systems
with C. Berbain and H. Gilbert,
in SAC 2006, ©Springer (2006).
-
Resistance of SNOW 2.0 against Algebraic Attacks
with H. Gilbert,
in CT–RSA 2005, ©Springer (2005).
-
Cryptanalysis of a White Box AES Implementation
with H. Gilbert and C. Ech-Chatbi (شرف الشطبي ),
in SAC 2004, Springer, ©IACR (2004).
-
A Traceable Block Cipher
with H. Gilbert,
in ASIACRYPT 2003, Springer, ©IACR (2003).
-
The Jacobi Model of an Elliptic Curve and Side-Channel Analysis
with M. Joye,
in AAECC 15, ©Springer (2003).