Cryptographers' World
 

Frédéric Valette



12 papers in database with 266 citations Star

H-number: 7

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Pierre-Alain Fouque,  Denis Réal,  Frédéric Valette,  M'hamed Drissi,  The Carry Leakage on the Randomized Exponent Countermeasure, pp. 198 - 213, CHES 2008.

[Electronic Edition][Cited 4 times ]

2. Pierre-Alain Fouque,  Gwenaëlle Martinet,  Frédéric Valette,  Sébastien Zimmer,  On the Security of the CCM Encryption Mode and of a Slight Variant, pp. 411 - 428, ACNS 2008.

[Electronic Edition][Cited 3 times ]

3. Frédéric Muller,  Frédéric Valette,  High-Order Attacks Against the Exponent Splitting Protection, pp. 315 - 329, PKC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 3 times ]

4. Pierre-Alain Fouque,  Sébastien Kunz-Jacques,  Gwenaëlle Martinet,  Frédéric Muller,  Frédéric Valette,  Power Attack on Small RSA Public Exponent, pp. 339 - 353, CHES 2006.

[Electronic Edition][Cited 15 times ]

5. Rémy Daudigny,  Hervé Ledig,  Frédéric Muller,  Frédéric Valette,  SCARE of the DES, pp. 393 - 406, ACNS 2005.

[Electronic Edition][Cited 6 times ]

6. Sébastien Kunz-Jacques,  Frédéric Muller,  Frédéric Valette,  The Davies-Murphy Power Attack, pp. 451 - 467, ASIACRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 6 times ]

7. Hervé Ledig,  Frédéric Muller,  Frédéric Valette,  Enhancing Collision Attacks, pp. 176 - 190, CHES 2004.

[Electronic Edition][Cited 30 times ]

8. Pierre-Alain Fouque,  Frédéric Muller,  Guillaume Poupard,  Frédéric Valette,  Defeating Countermeasures Based on Randomized BSD Representations, pp. 312 - 327, CHES 2004.

[Electronic Edition][Cited 24 times ]

9. Pierre-Alain Fouque,  Frédéric Valette,  The Doubling Attack - , pp. 269 - 280, CHES 2003.

[Electronic Edition][Cited 77 times Red Star]

10. Pierre-Alain Fouque,  Antoine Joux,  Gwenaëlle Martinet,  Frédéric Valette,  Authenticated On-Line Encryption, pp. 145 - 159, SAC 2003.

[Electronic Edition][Cited 9 times ]

11. Antoine Joux,  Gwenaëlle Martinet,  Frédéric Valette,  Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC, pp. 17 - 30, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 33 times ]

12. Éliane Jaulmes,  Antoine Joux,  Frédéric Valette,  On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction, pp. 237 - 251, FSE 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 56 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...