Links between differential and linear cryptanalysis F Chabaud, S Vaudenay Workshop on the Theory and Application of of Cryptographic Techniques, 356-365, 1994 | 499 | 1994 |
On privacy models for RFID S Vaudenay International conference on the theory and application of cryptology and …, 2007 | 480 | 2007 |
Security Flaws Induced by CBC Padding—Applications to SSL, IPSEC, WTLS... S Vaudenay International Conference on the Theory and Applications of Cryptographic …, 2002 | 413 | 2002 |
Secure communications over insecure channels based on short authenticated strings S Vaudenay Annual International Cryptology Conference, 309-326, 2005 | 297 | 2005 |
Authenticated multi-party key agreement M Just, S Vaudenay International Conference on the Theory and Application of Cryptology and …, 1996 | 274 | 1996 |
Password interception in a SSL/TLS channel B Canvel, A Hiltgen, S Vaudenay, M Vuagnoux Annual International Cryptology Conference, 583-599, 2003 | 255 | 2003 |
Can DSA be improved?—Complexity trade-offs with the digital signature standard— D Naccache, D M'RaÏhi, S Vaudenay, D Raphaeli Workshop on the Theory and Application of of Cryptographic Techniques, 77-85, 1994 | 234 | 1994 |
A classical introduction to cryptography: Applications for communications security S Vaudenay Springer Science & Business Media, 2006 | 218 | 2006 |
How far can we go beyond linear cryptanalysis? T Baigneres, P Junod, S Vaudenay International Conference on the Theory and Application of Cryptology and …, 2004 | 218 | 2004 |
On the need for multipermutations: Cryptanalysis of MD4 and SAFER S Vaudenay International Workshop on Fast Software Encryption, 286-297, 1994 | 214 | 1994 |
Decorrelation: a theory for block cipher security S Vaudenay Journal of Cryptology 16 (4), 249-286, 2003 | 190 | 2003 |
Mutual authentication in RFID: security and privacy RI Paise, S Vaudenay Proceedings of the 2008 ACM symposium on Information, computer and …, 2008 | 186 | 2008 |
FOX: a new family of block ciphers P Junod, S Vaudenay International Workshop on Selected Areas in Cryptography, 114-129, 2004 | 146 | 2004 |
Provable security for block ciphers by decorrelation S Vaudenay Annual Symposium on Theoretical Aspects of Computer Science, 249-275, 1998 | 144 | 1998 |
An experiment on DES statistical cryptanalysis S Vaudenay Proceedings of the 3rd ACM Conference on Computer and Communications …, 1996 | 132 | 1996 |
On the Security of HB# against a Man-in-the-Middle Attack K Ouafi, R Overbeck, S Vaudenay International conference on the theory and application of cryptology and …, 2008 | 127 | 2008 |
Perfect diffusion primitives for block ciphers P Junod, S Vaudenay International Workshop on Selected Areas in Cryptography, 84-99, 2004 | 114 | 2004 |
Design validations for discrete logarithm based signature schemes E Brickell, D Pointcheval, S Vaudenay, M Yung International Workshop on Public Key Cryptography, 276-292, 2000 | 111 | 2000 |
On the weak keys of Blowfish S Vaudenay International Workshop on Fast Software Encryption, 27-32, 1996 | 109 | 1996 |
The conditional correlation attack: A practical attack on bluetooth encryption Y Lu, W Meier, S Vaudenay Annual International Cryptology Conference, 97-117, 2005 | 107 | 2005 |