Volgen
Helena Handschuh
Helena Handschuh
Cryptography Research
Geverifieerd e-mailadres voor cryptography.com
Titel
Geciteerd door
Geciteerd door
Jaar
Security analysis of SHA-256 and sisters
H Gilbert, H Handschuh
International workshop on selected areas in cryptography, 175-193, 2003
5132003
Randomized RSA-based cryptographic exponentiation resistant to side channel and fault attacks
A Boscher, EV Trichina, H Handschuh
US Patent 8,139,763, 2012
2642012
Memory device and chip set processor pairing
J Le Bihan, C Carvounas, VC Colnot, E Trichina, H Handschuh
US Patent 8,650,399, 2014
2012014
Hardware intrinsic security from D flip-flops
V Van der Leest, GJ Schrijen, H Handschuh, P Tuyls
Proceedings of the fifth ACM workshop on Scalable trusted computing, 53-62, 2010
1492010
Key-recovery attacks on universal hash function based MAC algorithms
H Handschuh, B Preneel
Annual International Cryptology Conference, 144-161, 2008
1482008
Efficient implementation of true random number generator based on SRAM PUFs
V Van der Leest, E Van der Sluis, GJ Schrijen, P Tuyls, H Handschuh
Cryptography and Security: From Theory to Applications: Essays Dedicated to …, 2012
1262012
Device and method for obtaining a cryptographic key
H Handschuh, PT Tuyls
US Patent App. 13/574,311, 2013
1122013
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
1122006
Smart card crypto-coprocessors for public-key cryptography
H Handschuh, P Paillier
International Conference on Smart Card Research and Advanced Applications …, 1998
1101998
A timing attack on RC5
H Handschuh, HM Heys
Selected Areas in Cryptography: 5th Annual International Workshop, SAC’98 …, 1999
951999
Probing attacks on tamper-resistant devices
H Handschuh, P Paillier, J Stern
Cryptographic Hardware and Embedded Systems: First InternationalWorkshop …, 1999
861999
GEM: A Generic Chosen-Ciphertext Secure Encryption Method
C Jean-Sébastien, H Handschuh, M Joye, P Paillier, D Pointcheval, ...
Topics in Cryptology—CT-RSA 2002: The Cryptographers’ Track at the RSA …, 2002
842002
Hardware intrinsic security from physically unclonable functions
H Handschuh, GJ Schrijen, P Tuyls
Towards Hardware-Intrinsic Security: Foundations and Practice, 39-53, 2010
812010
SHACAL (-Submission to NESSIE-)
H Handschuh, D Naccache
75*2000
Random number generation through use of memory cell activity
E Trichina, H Handschuh
US Patent 8,130,955, 2012
712012
Analysis of SHA-1 in encryption mode
H Handschuh, LR Knudsen, MJ Robshaw
Cryptographers’ Track at the RSA Conference, 70-83, 2001
612001
Susceptibility of eSTREAM candidates towards side channel analysis
B Gierlichs, L Batina, C Clavier, T Eisenbarth, A Gouget, H Handschuh, ...
Leuven: Sl, 2008
582008
System for establishing a cryptographic key depending on a physical system
GJ Schrijen, PT Tuyls, H Handschuh
US Patent 9,252,960, 2016
572016
Random number generating system based on memory start-up noise
E Van Der Sluis, GJ Schrijen, H Handschuh
US Patent 9,383,969, 2016
522016
χ2 cryptanalysis of the SEAL encryption algorithm
H Handschuh, H Gilbert
International Workshop on Fast Software Encryption, 1-12, 1997
511997
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20