François Koeune
François Koeune
UCL Crypto Group
Verified email at uclouvain.be
Title
Cited by
Cited by
Year
A practical implementation of the timing attack
JF Dhem, F Koeune, PA Leroux, P Mestré, JJ Quisquater, JL Willems
International Conference on Smart Card Research and Advanced Applications …, 1998
4051998
The swiss-knife RFID distance bounding protocol
CH Kim, G Avoine, F Koeune, FX Standaert, O Pereira
International Conference on Information Security and Cryptology, 98-115, 2008
2102008
Robust object watermarking: Application to code
JP Stern, G Hachez, F Koeune, JJ Quisquater
International Workshop on Information Hiding, 368-378, 1999
1731999
Compact implementation and performance evaluation of block ciphers in ATtiny devices
T Eisenbarth, Z Gong, T Güneysu, S Heyse, S Indesteege, S Kerckhof, ...
International Conference on Cryptology in Africa, 172-187, 2012
1072012
A tutorial on physical security and side-channel attacks
F Koeune, FX Standaert
Foundations of Security Analysis and Design III, 78-108, 2005
792005
A timing attack against Rijndael
F Koeune, JJ Quisquater, JJ Quisquater
791999
Biometrics, access control, smart cards: a not so simple combination
G Hachez, JJ Quisquater, F Koeune
Smart Card Research and Advanced Applications, 273-288, 2000
772000
How to compare profiled side-channel attacks?
FX Standaert, F Koeune, W Schindler
International Conference on Applied Cryptography and Network Security, 485-498, 2009
752009
Compact implementation and performance evaluation of hash functions in attiny devices
J Balasch, B Ege, T Eisenbarth, B Gérard, Z Gong, T Güneysu, S Heyse, ...
International Conference on Smart Card Research and Advanced Applications …, 2012
482012
Improving divide and conquer attacks against cryptosystems by better error detection/correction strategies
W Schindler, F Koeune, JJ Quisquater
IMA International Conference on Cryptography and Coding, 245-267, 2001
412001
cAESar results: Implementation of four AES candidates on two smart cards
G Hachez, F Koeune, JJ Quisquater
Second Advanced Encryption Standard Candidate Conference, 95-108, 1999
391999
Timing attack: what can be achieved by a powerful adversary?
G Hachez, F Koeune, JJ Quisquater
SYMPOSIUM ON INFORMATION THEORY IN THE BENELUX, 63-70, 1999
321999
A new type of timing attack: Application to GPS
J Cathalo, F Koeune, JJ Quisquater
International Workshop on Cryptographic Hardware and Embedded Systems, 291-303, 2003
312003
Towards fresh and hybrid re-keying schemes with beyond birthday security
C Dobraunig, F Koeune, S Mangard, F Mendel, FX Standaert
International Conference on Smart Card Research and Advanced Applications …, 2015
262015
SWISH: secure WiFi sharing
D Leroy, G Detal, J Cathalo, M Manulis, F Koeune, O Bonaventure
Computer Networks 55 (7), 1614-1630, 2011
212011
Comments by the NESSIE Project on the AES Finalists
B Preneel, A Bosselaers, B Preneel, A Bosselaers, V Rijmen, J Stern, ...
212000
Authenticated wireless roaming via tunnels: Making mobile guests feel at home
M Manulis, D Leroy, F Koeune, O Bonaventure, JJ Quisquater
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
192009
Linear feedback shift registers
A Klein
Stream Ciphers, 17-58, 2013
182013
Short private exponent attacks on fast variants of RSA
M Ciet, F Koeune, F Laguillaumie, JJ Quisquater
UCL Crypto Group Technical Report Series CG-2002/4, University Catholique de …, 2002
182002
Ciphertext integrity with misuse and leakage: definition and efficient constructions with symmetric primitives
F Berti, F Koeune, O Pereira, T Peters, FX Standaert
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
172018
The system can't perform the operation now. Try again later.
Articles 1–20