Camille Vuillaume

According to our database1, Camille Vuillaume authored at least 20 papers between 2004 and 2012.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
RSA Key Generation: New Attacks.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012

2010
Recursive Double-Size Modular Multiplications from Euclidean and Montgomery Multipliers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

2009
Bipartite modular multiplication with twice the bit-length of multipliers.
Int. J. Inf. Sec., 2009

Faster Double-Size Bipartite Multiplication out of Montgomery Multipliers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients.
Proceedings of the Topics in Cryptology, 2009

2008
Short-Memory Scalar Multiplication for Koblitz Curves.
IEEE Trans. Computers, 2008

Montgomery Multiplication with Twice the Bit-Length of Multipliers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Public Key Authentication with Memory Tokens.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Digital Signatures Out of Second-Preimage Resistant Hash Functions.
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008

A Black Hen Lays White Eggs.
Proceedings of the Smart Card Research and Advanced Applications, 2008

2007
Merkle Signatures with Virtually Unlimited Signature Capacity.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

Double-Size Bipartite Modular Multiplication.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Defeating Simple Power Analysis on Koblitz Curves.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Security Analysis of the SPA-Resistant Fractional Width Method.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006

Flexible Exponentiation with Resistance to Side Channel Attacks.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
On the Importance of Protecting in SFLASH against Side Channel Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
On the Importance of Protecting Delta in SFLASH against Side Channel Attacks.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004


  Loading...