Pascal Junod
Pascal Junod
Cryptographer at Snap Inc.
Adresse e-mail validée de snap.com - Page d'accueil
TitreCitée parAnnée
How far can we go beyond linear cryptanalysis?
T Baigneres, P Junod, S Vaudenay
Advances in Cryptology-Asiacrypt 2004, 113-128, 2004
1992004
Long-term performance of the SwissQuantum quantum key distribution network in a field environment
D Stucki, M Legré, F Buntschu, B Clausen, N Felber, N Gisin, L Henzen, ...
New Journal of Physics 13, 123001, 2011
1752011
FOX: a new family of block ciphers
P Junod, S Vaudenay
Selected Areas in Cryptography, 114-129, 2005
1262005
On the complexity of Matsui’s attack
P Junod
Selected Areas in Cryptography, 199-211, 2001
972001
Perfect Diffusion Primitives for Block Ciphers -- Building Efficient MDS Matrices
P Junod, S Vaudenay
Selected Areas in Cryptography, 84-99, 2005
96*2005
Obfuscator-LLVM—Software Protection for the Masses
P Junod, J Rinaldini, J Wehrli, J Michielin
Proceedings of the IEEE/ACM 1st International Workshop on Software …, 2015
952015
Characterization and improvement of time-memory trade-off based on perfect tables
G Avoine, P Junod, P Oechslin
ACM Transactions on Information and System Security (TISSEC) 11 (4), 17, 2008
852008
Cryptographie: théorie et pratique
DR Stinson, S Vaudenay
International Thompson Publ. France, 1996
80*1996
On the optimality of linear, differential, and sequential distinguishers
P Junod
Advances in Cryptology—EUROCRYPT 2003, 643-643, 2003
742003
A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing
N Walenta, A Burg, D Caselunghe, J Constantin, N Gisin, O Guinnard, ...
New Journal of Physics 16 (1), 013047, 2014
732014
Optimal key ranking procedures in a statistical cryptanalysis
P Junod, S Vaudenay
Fast Software Encryption, 235-246, 2003
722003
Time-memory trade-offs: False alarm detection using checkpoints
G Avoine, P Junod, P Oechslin
Progress in Cryptology-INDOCRYPT 2005, 183-196, 2005
622005
An efficient public-key attribute-based broadcast encryption scheme allowing arbitrary access policies
P Junod, A Karlov
Proceedings of the tenth annual ACM workshop on Digital rights management, 13-24, 2010
452010
Statistical cryptanalysis of block ciphers
P Junod
EPFL, 2005
442005
Cryptographic secure pseudo-random bits generation: The Blum-Blum-Shub generator
P Junod
Viewed 11/12/2006, http://crypto. junod. info/bbs, 1999
38*1999
New attacks against reduced-round versions of IDEA
P Junod
Fast Software Encryption, 111-129, 2005
232005
A classical introduction to cryptography exercise book
T Baignères, P Junod, Y Lu, J Monnerat, S Vaudenay
Springer-Verlag New York Inc, 2006
222006
Device and a method for generating software code
P Junod
US Patent 9,053,300, 2015
192015
A device and a method for generating software code
P Junod
EP Patent 2,398,182, 2011
19*2011
Linear cryptanalysis of DES
P Junod
Master's thesis, Swiss Institute of Technology, Zurich, 2000
182000
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20