A practical implementation of the timing attack JF Dhem, F Koeune, PA Leroux, P Mestré, JJ Quisquater, JL Willems International Conference on Smart Card Research and Advanced Applications …, 1998 | 455 | 1998 |
The swiss-knife RFID distance bounding protocol CH Kim, G Avoine, F Koeune, FX Standaert, O Pereira International conference on information security and cryptology, 98-115, 2008 | 237 | 2008 |
Robust object watermarking: Application to code JP Stern, G Hachez, F Koeune, JJ Quisquater International Workshop on Information Hiding, 368-378, 1999 | 188 | 1999 |
Compact implementation and performance evaluation of block ciphers in ATtiny devices T Eisenbarth, Z Gong, T Güneysu, S Heyse, S Indesteege, S Kerckhof, ... International Conference on Cryptology in Africa, 172-187, 2012 | 134 | 2012 |
A tutorial on physical security and side-channel attacks F Koeune, FX Standaert Foundations of Security Analysis and Design III, 78-108, 2005 | 115 | 2005 |
How to compare profiled side-channel attacks? FX Standaert, F Koeune, W Schindler International Conference on Applied Cryptography and Network Security, 485-498, 2009 | 90 | 2009 |
A timing attack against Rijndael F Koeune, JJ Quisquater, JJ Quisquater | 89 | 1999 |
Biometrics, access control, smart cards: a not so simple combination G Hachez, JJ Quisquater, F Koeune Smart Card Research and Advanced Applications, 273-288, 2000 | 83 | 2000 |
Compact implementation and performance evaluation of hash functions in attiny devices J Balasch, B Ege, T Eisenbarth, B Gérard, Z Gong, T Güneysu, S Heyse, ... International Conference on Smart Card Research and Advanced Applications …, 2012 | 65 | 2012 |
Improving divide and conquer attacks against cryptosystems by better error detection/correction strategies W Schindler, F Koeune, JJ Quisquater IMA International Conference on Cryptography and Coding, 245-267, 2001 | 43 | 2001 |
Towards fresh and hybrid re-keying schemes with beyond birthday security C Dobraunig, F Koeune, S Mangard, F Mendel, FX Standaert International Conference on Smart Card Research and Advanced Applications …, 2015 | 41 | 2015 |
cAESar results: Implementation of four AES candidates on two smart cards G Hachez, F Koeune, JJ Quisquater Second Advanced Encryption Standard Candidate Conference, 95-108, 1999 | 40 | 1999 |
Timing attack: what can be achieved by a powerful adversary? G Hachez, F Koeune, JJ Quisquater SYMPOSIUM ON INFORMATION THEORY IN THE BENELUX, 63-70, 1999 | 36 | 1999 |
Linear feedback shift registers A Klein Stream Ciphers, 17-58, 2013 | 34 | 2013 |
A new type of timing attack: Application to GPS J Cathalo, F Koeune, JJ Quisquater International Workshop on Cryptographic Hardware and Embedded Systems, 291-303, 2003 | 34 | 2003 |
Comments by the NESSIE Project on the AES Finalists B Preneel, A Bosselaers, B Preneel, A Bosselaers, V Rijmen, J Stern, ... | 27 | 2000 |
SWISH: secure WiFi sharing D Leroy, G Detal, J Cathalo, M Manulis, F Koeune, O Bonaventure Computer Networks 55 (7), 1614-1630, 2011 | 24 | 2011 |
Authenticated wireless roaming via tunnels: Making mobile guests feel at home M Manulis, D Leroy, F Koeune, O Bonaventure, JJ Quisquater Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 23 | 2009 |
Ciphertext integrity with misuse and leakage: definition and efficient constructions with symmetric primitives F Berti, F Koeune, O Pereira, T Peters, FX Standaert Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 21 | 2018 |
Short private exponent attacks on fast variants of RSA M Ciet, F Koeune, F Laguillaumie, JJ Quisquater UCL Crypto Group Technical Report Series CG-2002/4, University Catholique de …, 2002 | 21 | 2002 |