François Koeune

According to our database1, François Koeune authored at least 26 papers between 1998 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
SWAT: Seamless Web Authentication Technology.
Proceedings of the World Wide Web Conference, 2019

2018
Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2016
Leakage-Resilient and Misuse-Resistant Authenticated Encryption.
IACR Cryptology ePrint Archive, 2016

2015
Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security.
Proceedings of the Smart Card Research and Advanced Applications, 2015

2012
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices.
IACR Cryptology ePrint Archive, 2012

Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

Security Analysis of Image-Based PUFs for Anti-counterfeiting.
Proceedings of the Communications and Multimedia Security, 2012

Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2012

Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
Timing Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Pseudorandom Number Generator.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

SWISH: Secure WiFi sharing.
Computer Networks, 2011

2009
Authenticated wireless roaming via tunnels: making mobile guests feel at home.
Proceedings of the 2009 ACM Symposium on Information, 2009

How to Compare Profiled Side-Channel Attacks?.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
WiFi Roaming: Legal Implications and Security Constraints.
I. J. Law and Information Technology, 2008

Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home.
IACR Cryptology ePrint Archive, 2008

The Swiss-Knife RFID Distance Bounding Protocol.
Proceedings of the Information Security and Cryptology, 2008

2005
Pseudo-random number generator.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

2004
A Tutorial on Physical Security and Side-Channel Attacks.
Proceedings of the Foundations of Security Analysis and Design III, 2004

2003
A New Type of Timing Attack: Application to GPS.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

2002
An FPGA Implementation of the Linear Cryptanalysis.
Proceedings of the Field-Programmable Logic and Applications, 2002

2001
Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies.
Proceedings of the Cryptography and Coding, 2001

2000
Biometrics, Access Control, Smart Cards: A not so Simple Combination.
Proceedings of the Smart Card Research and Advanced Applications, 2000

From Fixed-Length to Arbitrary-Length RSA Padding Schemes.
Proceedings of the Advances in Cryptology, 2000

1999
Robust Object Watermarking: Application to Code.
Proceedings of the Information Hiding, Third International Workshop, 1999

1998
A Practical Implementation of the Timing Attack.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998


  Loading...