Guillaume Poupard

According to our database1, Guillaume Poupard authored at least 23 papers between 1997 and 2006.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2006
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order.
J. Cryptology, 2006

Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm.
Proceedings of the Public Key Cryptography, 2006

Cryptanalysis of a Partially Blind Signature Scheme or How to Make $100 Bills with $1 and $2 Ones.
Proceedings of the Financial Cryptography and Data Security, 2006

2005
A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005

2004
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

Defeating Countermeasures Based on Randomized BSD Representations.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

2003
A New NP-Complete Problem and Public-Key Identification.
Des. Codes Cryptogr., 2003

New Attacks against Standardized MACs.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

Practical Symmetric On-Line Encryption.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

On the Security of RDSA.
Proceedings of the Advances in Cryptology, 2003

Attacking Unbalanced RSA-CRT Using SPA.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

The Insecurity of Esign in Practical Implementations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

2001
Practical multi-candidate election system.
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001

On the Security of Homage Group Authentication Protocol.
Proceedings of the Financial Cryptography, 2001

2000
Short Proofs of Knowledge for Factoring.
Proceedings of the Public Key Cryptography, 2000

Sharing Decryption in the Context of Voting or Lotteries.
Proceedings of the Financial Cryptography, 2000

Fair Encryption of RSA Keys.
Proceedings of the Advances in Cryptology, 2000

1999
On the Fly Signatures Based on Factoring.
Proceedings of the CCS '99, 1999

1998
Security Analysis of a Practical "on the fly" Authentication and Signature Generation.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

Decorrelated Fast Cipher: An AES Candidate Well Suited for Low Cost Smart Card Applications.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

Generation of Shared RSA Keys by Two Parties.
Proceedings of the Advances in Cryptology, 1998

1997
A realistic security analysis of identification schemes based on combinatorial problems.
European Transactions on Telecommunications, 1997

Efficient scalable fair cash with off-line extortion prevention.
Proceedings of the Information and Communication Security, First International Conference, 1997


  Loading...