Follow
Pascal Junod
Pascal Junod
Applied Cryptographer
Verified email at junod.info - Homepage
Title
Cited by
Cited by
Year
Long-term performance of the SwissQuantum quantum key distribution network in a field environment
D Stucki, M Legré, F Buntschu, B Clausen, N Felber, N Gisin, L Henzen, ...
New Journal of Physics 13, 123001, 2011
4332011
Obfuscator-LLVM—Software Protection for the Masses
P Junod, J Rinaldini, J Wehrli, J Michielin
Proceedings of the IEEE/ACM 1st International Workshop on Software …, 2015
3972015
How far can we go beyond linear cryptanalysis?
T Baigneres, P Junod, S Vaudenay
Advances in Cryptology-Asiacrypt 2004, 113-128, 2004
2742004
FOX: a new family of block ciphers
P Junod, S Vaudenay
Selected Areas in Cryptography, 114-129, 2005
1982005
Perfect Diffusion Primitives for Block Ciphers -- Building Efficient MDS Matrices
P Junod, S Vaudenay
Selected Areas in Cryptography, 84-99, 2005
144*2005
A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing
N Walenta, A Burg, D Caselunghe, J Constantin, N Gisin, O Guinnard, ...
New Journal of Physics 16 (1), 013047, 2014
1382014
On the complexity of Matsui’s attack
P Junod
Selected Areas in Cryptography, 199-211, 2001
1302001
Characterization and improvement of time-memory trade-off based on perfect tables
G Avoine, P Junod, P Oechslin
ACM Transactions on Information and System Security (TISSEC) 11 (4), 1-22, 2008
1122008
Cryptographie: théorie et pratique
DR Stinson, S Vaudenay
International Thompson Publ. France, 1996
97*1996
Optimal key ranking procedures in a statistical cryptanalysis
P Junod, S Vaudenay
Fast Software Encryption, 235-246, 2003
802003
On the optimality of linear, differential, and sequential distinguishers
P Junod
Advances in Cryptology—EUROCRYPT 2003, 643-643, 2003
802003
Time-memory trade-offs: False alarm detection using checkpoints
G Avoine, P Junod, P Oechslin
Progress in Cryptology-INDOCRYPT 2005, 183-196, 2005
762005
An efficient public-key attribute-based broadcast encryption scheme allowing arbitrary access policies
P Junod, A Karlov
Proceedings of the tenth annual ACM workshop on Digital rights management, 13-24, 2010
652010
Cryptographic secure pseudo-random bits generation: The Blum-Blum-Shub generator
P Junod
Viewed 11/12/2006, http://crypto. junod. info/bbs, 1999
56*1999
Statistical cryptanalysis of block ciphers
P Junod
EPFL, 2005
552005
An FPGA-based 4 Mbps secret key distillation engine for quantum key distribution systems
J Constantin, R Houlmann, N Preyss, N Walenta, H Zbinden, P Junod, ...
Journal of Signal Processing Systems 86, 1-15, 2017
362017
A classical introduction to cryptography exercise book
T Baignères, P Junod, Y Lu, J Monnerat, S Vaudenay
Springer-Verlag New York Inc, 2006
292006
New attacks against reduced-round versions of IDEA
P Junod
Fast Software Encryption, 111-129, 2005
252005
Linear cryptanalysis of DES
P Junod
Master's thesis, Swiss Institute of Technology, Zurich, 2000
25*2000
Device and method for encrypting and decrypting a block of data
S Vaudenay, P Junod
US Patent 7,499,542, 2009
232009
The system can't perform the operation now. Try again later.
Articles 1–20