Author of the publication

Security, Cryptography: Theory and Practice. (Sécurité, Cryptographie : Théorie et Pratique).

. (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Operand Folding Hardware Multipliers, , , , and . CoRR, (2011)Temperature Attacks., , , and . IEEE Secur. Priv., 7 (2): 79-82 (2009)Finding Faults.. IEEE Secur. Priv., 3 (5): 61-65 (2005)Cryptography, Law Enforcement, and Mobile Communications., and . IEEE Secur. Priv., 4 (6): 67-70 (2006)Secure Delegation of Elliptic-Curve Pairing., , , , and . CARDIS, volume 6035 of Lecture Notes in Computer Science, page 24-35. Springer, (2010)A French cipher from the late 19th century., and . IACR Cryptology ePrint Archive, (2020)Padding attacks on RSA.. Inf. Secur. Tech. Rep., 4 (4): 28-33 (1999)A Fractional 3n+1 Conjecture., , and . CoRR, (2020)A New Public Key Cryptosystem Based on Higher Residues., and . ACM Conference on Computer and Communications Security, page 59-66. ACM, (1998)HOTP: An HMAC-Based One-Time Password Algorithm., , , , and . RFC, (December 2005)