New stream cipher designs: the eSTREAM finalists M Robshaw, O Billet Springer, 2008 | 311* | 2008 |
Cryptanalysis of a white box AES implementation O Billet, H Gilbert, C Ech-Chatbi International workshop on selected areas in cryptography, 227-240, 2004 | 268 | 2004 |
Sosemanuk, a Fast Software-Oriented Stream Cipher C Berbain, O Billet, A Canteaut, N Courtois, H Gilbert, L Goubin, A Gouget, ... New stream cipher designs, 98-118, 2008 | 188 | 2008 |
The Jacobi model of an elliptic curve and side-channel analysis O Billet, M Joye International Symposium on Applied Algebra, Algebraic Algorithms, and Error …, 2003 | 160 | 2003 |
Sha-3 proposal: ECHO R Benadjila, O Billet, H Gilbert, G Macario-Rat, T Peyrin, M Robshaw, ... Submission to NIST (updated), 113, 2009 | 86 | 2009 |
Cryptanalysis of rainbow O Billet, H Gilbert International Conference on Security and Cryptography for Networks, 336-347, 2006 | 86 | 2006 |
An efficient forward private RFID protocol C Berbain, O Billet, J Etrog, H Gilbert Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 82 | 2009 |
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ... Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006 | 82 | 2006 |
A traceable block cipher O Billet, H Gilbert International Conference on the Theory and Application of Cryptology and …, 2003 | 69 | 2003 |
Lightweight privacy preserving authentication for RFID using a stream cipher O Billet, J Etrog, H Gilbert International Workshop on Fast Software Encryption, 55-74, 2010 | 54 | 2010 |
Efficient traitor tracing from collusion secure codes O Billet, DH Phan International Conference on Information Theoretic Security, 171-182, 2008 | 52 | 2008 |
Resistance of SNOW 2.0 against algebraic attacks O Billet, H Gilbert Cryptographers’ Track at the RSA Conference, 19-28, 2005 | 45 | 2005 |
On building hash functions from multivariate quadratic equations O Billet, MJB Robshaw, T Peyrin Australasian Conference on Information Security and Privacy, 82-95, 2007 | 44 | 2007 |
The Intel AES instructions set and the SHA-3 candidates R Benadjila, O Billet, S Gueron, MJB Robshaw International Conference on the Theory and Application of Cryptology and …, 2009 | 43 | 2009 |
Efficient implementations of multivariate quadratic systems C Berbain, O Billet, H Gilbert International Workshop on Selected Areas in Cryptography, 174-187, 2006 | 38 | 2006 |
Cryptanalysis of the square cryptosystems O Billet, G Macario-Rat International Conference on the Theory and Application of Cryptology and …, 2009 | 36 | 2009 |
Decim–a new stream cipher for hardware applications C Berbain, O Billet, A Canteaut, N Courtois, B Debraize, H Gilbert, ... ECRYPT Stream Cipher Project Report 4, 2005 | 32 | 2005 |
D ecim v 2 C Berbain, O Billet, A Canteaut, N Courtois, B Debraize, H Gilbert, ... New Stream Cipher Designs, 140-151, 2008 | 29 | 2008 |
Traitors collaborating in public: Pirates 2.0 O Billet, DH Phan Annual International Conference on the Theory and Applications of …, 2009 | 28 | 2009 |
New stream cipher designs DJ Bernstein, M Robshaw, O Billet Berlin, Heidelberg: Springer-Verlag, 84-97, 2008 | 26 | 2008 |