Giacomo de Meulenaer

According to our database1, Giacomo de Meulenaer authored at least 9 papers between 2007 and 2010.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2010
Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks.
Proceedings of the Mobile Lightweight Wireless Systems, 2010

Group Signatures are Suitable for Constrained Devices.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

2009
Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ?
IACR Cryptology ePrint Archive, 2009

Breaking ECC2K-130.
IACR Cryptology ePrint Archive, 2009

The Certicom Challenges ECC2-X.
IACR Cryptology ePrint Archive, 2009

IMAPS: Imbricated authentication protocol suite for mobile users and groups.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

2008
Improving the Rules of the DPA Contest.
IACR Cryptology ePrint Archive, 2008

On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

2007
Integer Factorization Based on Elliptic Curve Method: Towards Better Exploitation of Reconfigurable Hardware.
Proceedings of the IEEE Symposium on Field-Programmable Custom Computing Machines, 2007


  Loading...