Aline Gouget

According to our database1, Aline Gouget authored at least 31 papers between 2002 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Unpredictability properties in Algorand consensus protocol.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

Revisiting security properties in Single Secret Leader Election.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

Leader election protocol based on external RNG services.
Proceedings of the 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2021

2020
Achieving privacy and accountability in traceable digital currency.
IACR Cryptol. ePrint Arch., 2020

(Quantum) Cryptanalysis of Misty Schemes.
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020

2017
Flexible Transparency: A Privacy Enabler in Blockchain Technologies.
ERCIM News, 2017

2012
Formal Verification of the mERA-Based eServices with Trusted Third Party Protocol.
Proceedings of the Information Security and Privacy Research, 2012

Plaintext-Checkable Encryption.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

2011
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping.
IACR Cryptol. ePrint Arch., 2011

Achieving Optimal Anonymity in Transferable E-Cash with a Judge.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011

2010
SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications.
Proceedings of the Financial Cryptography and Data Security, 2010

Multiple Denominations in E-cash with Compact Transaction Data.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2009
Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers.
IACR Cryptol. ePrint Arch., 2009

Fair E-Cash: Be Compact, Spend Faster.
Proceedings of the Information Security, 12th International Conference, 2009

Fault Analysis of Grain-128.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2009

2008
Sosemanuk, a Fast Software-Oriented Stream Cipher.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008


Understanding Phase Shifting Equivalent Keys and Exhaustive Search.
IACR Cryptol. ePrint Arch., 2008

SOSEMANUK: a fast software-oriented stream cipher
CoRR, 2008

How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions.
Proceedings of the Provable Security, Second International Conference, 2008

Improvement of Efficiency in (Unconditional) Anonymous Transferable E-Cash.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Recent Advances in Electronic Cash Design.
Proceedings of the Smart Card Research and Advanced Applications, 2008

Anonymity in Transferable E-cash.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Revisiting Correlation-Immunity in Filter Generators.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007

Divisible E-Cash Systems Can Be Truly Anonymous.
Proceedings of the Advances in Cryptology, 2007

2006
The GAIA sensor: an early DDoS detection tool.
SIGMETRICS Perform. Evaluation Rev., 2006

A handy multi-coupon system.
IACR Cryptol. ePrint Arch., 2006

Probabilistic Multivariate Cryptography.
Proceedings of the Progressin Cryptology, 2006

How to Strengthen Pseudo-random Generators by Using Compression.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

2005
Analysis of the Bit-Search Generator and Sequence Compression Techniques.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

2002
An Upper Bound on the Number of m-Resilient Boolean Functions.
Proceedings of the Advances in Cryptology, 2002


  Loading...