Éliane Jaulmes

According to our database1, Éliane Jaulmes authored at least 16 papers between 2000 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
A Systematic Appraisal of Side Channel Evaluation Strategies.
IACR Cryptol. ePrint Arch., 2020

2019
Horizontal Collision Correlation Attack on Elliptic Curves.
IACR Cryptol. ePrint Arch., 2019

2015
Horizontal collision correlation attack on elliptic curves - - Extended Version -.
Cryptogr. Commun., 2015

2014
Side-Channel Analysis of Montgomery's Representation Randomization.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

Side-Channel Attack against RSA Key Generation Algorithms.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

2013
Horizontal Collision Correlation Attack on Elliptic Curves.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

Correlation Analysis against Protected SFM Implementations of RSA.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013

Fault Attacks on AES with Faulty Ciphertexts Only.
Proceedings of the 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013

Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

2005
Cryptanalysis of the F-FCSR Stream Cipher Family.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005

2004
FRMAC, a Fast Randomized Message Authentication Code.
IACR Cryptol. ePrint Arch., 2004

2001
On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit - A New Construction.
IACR Cryptol. ePrint Arch., 2001

Cryptanalysis of PKP: A New Approach.
Proceedings of the Public Key Cryptography, 2001

On the Security of Homage Group Authentication Protocol.
Proceedings of the Financial Cryptography, 2001

2000
A NICE Cryptanalysis.
Proceedings of the Advances in Cryptology, 2000

A Chosen-Ciphertext Attack against NTRU.
Proceedings of the Advances in Cryptology, 2000


  Loading...