Côme Berbain

According to our database1, Côme Berbain authored at least 17 papers between 2005 and 2009.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2009
QUAD: A multivariate stream cipher with provable security.
J. Symb. Comput., 2009

An efficient forward private RFID protocol.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Sosemanuk, a Fast Software-Oriented Stream Cipher.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008


Understanding Phase Shifting Equivalent Keys and Exhaustive Search.
IACR Cryptol. ePrint Arch., 2008

SOSEMANUK: a fast software-oriented stream cipher
CoRR, 2008

Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

2007
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions.
IACR Cryptol. ePrint Arch., 2007

On the Security of IV Dependent Stream Ciphers.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

QUAD: Overview and Recent Developments.
Proceedings of the Symmetric Cryptography, 07.01. - 12.01.2007, 2007

Compact FPGA implementations of QUAD.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Efficient Implementations of Multivariate Quadratic Systems.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006

Non-randomness in eSTREAM Candidates Salsa20 and TSC-4.
Proceedings of the Progress in Cryptology, 2006

Cryptanalysis of Grain.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

QUAD: A Practical Stream Cipher with Provable Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions.
Proceedings of the Advances in Cryptology, 2006

2005
Analysis of the Bit-Search Generator and Sequence Compression Techniques.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005


  Loading...