Cryptographers' World
 

Helena Handschuh



15 papers in database with 371 citations Star

Editor of 2 conference proceedings books

H-number: 11

Conference Proceedings

 
1. Henri GilbertHelena Handschuh, editors, Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers. Springer, 2005. ISBN 3-540-26541-4.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Helena HandschuhM. Anwar Hasan, editors, Selected Areas in Cryptography, 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers. Springer, 2004. ISBN 3-540-24327-5.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Helena Handschuh,  Bart Preneel,  Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms, pp. 144 - 161, CRYPTO 2008.

[Electronic Edition][Cited 19 times ]

2. Helena Handschuh,  Bart Preneel,  Blind Differential Cryptanalysis for Enhanced Power Attacks, pp. 163 - 173, SAC 2006.

[Electronic Edition][Cited 15 times ]

3. Henri Gilbert,  Helena Handschuh,  Security Analysis of SHA-256 and Sisters, pp. 175 - 193, SAC 2003.

[Electronic Edition][Cited 67 times Red Star]

4. Jean-Sébastien Coron,  Helena Handschuh,  Marc Joye,  Pascal Paillier,  David Pointcheval,  Christophe Tymen,  Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages, pp. 17 - 33, PKC 2002.

[Electronic Edition][Cited 17 times ]

5. Jean-Sébastien Coron,  Helena Handschuh,  Marc Joye,  Pascal Paillier,  David Pointcheval,  Christophe Tymen,  GEM: A Generic Chosen-Ciphertext Secure Encryption Method, pp. 263 - 276, CT-RSA 2002.

[Electronic Edition][Cited 32 times ]

6. Eric Brier,  Helena Handschuh,  Christophe Tymen,  Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware, pp. 16 - 27, CHES 2001.

[Electronic Edition][Cited 15 times ]

7. Helena Handschuh,  Lars R. Knudsen,  Matthew J. B. Robshaw,  Analysis of SHA-1 in Encryption Mode, pp. 70 - 83, CT-RSA 2001.

[Electronic Edition][Cited 32 times ]

8. Henri Gilbert,  Helena Handschuh,  Antoine Joux,  Serge Vaudenay,  A Statistical Attack on RC6, pp. 64 - 74, FSE 2000.

[Electronic Edition][Cited 30 times ]

9. Jean-Sébastien Coron,  Helena Handschuh,  David Naccache,  ECC: Do We Need to Count?, pp. 122 - 134, ASIACRYPT 1999.

[Electronic Edition][Cited 4 times ]

10. Helena Handschuh,  Pascal Paillier,  Jacques Stern,  Probing Attacks on Tamper-Resistant Devices, pp. 303 - 315, CHES 1999.

[Electronic Edition][Cited 30 times ]

11. Helena Handschuh,  Serge Vaudenay,  A Universal Encryption Standard, pp. 1 - 12, SAC 1999.

[Electronic Edition][Cited 4 times ]

12. Helena Handschuh,  Bart Preneel,  On the Security of Double and 2-Key Triple Modes of Operation, pp. 215 - 230, FSE 1999.

[Electronic Edition][Cited 10 times ]

13. Helena Handschuh,  Yiannis Tsiounis,  Moti Yung,  Decision Oracles are Equivalent to Matching Oracles, pp. 276 - 289, PKC 1999.

[Electronic Edition][Cited 11 times ]

14. Helena Handschuh,  Howard M. Heys,  A Timing Attack on RC5, pp. 306 - 318, SAC 1998.

[Electronic Edition][Cited 51 times Red Star]

15. Helena Handschuh,  Henri Gilbert,  x2 Cryptanalysis of the SEAL Encryption Algorithm, pp. 1 - 12, FSE 1997.

[Electronic Edition][Cited 34 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...