Olivier Billet

Orcid: 0000-0002-3742-7169

According to our database1, Olivier Billet authored at least 24 papers between 2002 and 2010.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2010
Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

2009
Analysis of Intermediate Field Systems.
IACR Cryptol. ePrint Arch., 2009

Two Attacks against the <i>F</i><sub><i>f</i></sub> RFID Protocol.
Proceedings of the Progress in Cryptology, 2009

Traitors Collaborating in Public: Pirates 2.0.
Proceedings of the Advances in Cryptology, 2009

An efficient forward private RFID protocol.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Cryptanalysis of the Square Cryptosystems.
Proceedings of the Advances in Cryptology, 2009

The Intel AES Instructions Set and the SHA-3 Candidates.
Proceedings of the Advances in Cryptology, 2009

Overview of Cryptanalysis Techniques in Multivariate Public Key Cryptography.
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009

2008
Sosemanuk, a Fast Software-Oriented Stream Cipher.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008


SOSEMANUK: a fast software-oriented stream cipher
CoRR, 2008

Efficient Traitor Tracing from Collusion Secure Codes.
Proceedings of the Information Theoretic Security, Third International Conference, 2008

Looking Back at a New Hash Function.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Cryptanalysis of FORK-256.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

Drm to counter side-channel attacks?
Proceedings of the Seventh ACM Workshop on Digital Rights Management, 2007

QUAD: Overview and Recent Developments.
Proceedings of the Symmetric Cryptography, 07.01. - 12.01.2007, 2007

Compact FPGA implementations of QUAD.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

On Building Hash Functions from Multivariate Quadratic Equations.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Cryptanalysis of Rainbow.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

Efficient Implementations of Multivariate Quadratic Systems.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006

2005
Resistance of SNOW 2.0 Against Algebraic Attacks.
Proceedings of the Topics in Cryptology, 2005

2004
Cryptanalysis of a White Box AES Implementation.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

2003
A Traceable Block Cipher.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

2002
The Jacobi Model of an Elliptic Curve and Side-Channel Analysis.
IACR Cryptol. ePrint Arch., 2002


  Loading...