Helena Handschuh
Person information
- affiliation: Cryptography Research
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2017
- [e6]Helena Handschuh:
Topics in Cryptology - CT-RSA 2017 - The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings. Lecture Notes in Computer Science 10159, Springer 2017, ISBN 978-3-319-52152-7 [contents] - 2016
- [j3]Tim Güneysu, Helena Handschuh:
Introduction to the CHES 2015 special issue. J. Cryptographic Engineering 6(2): 83-84 (2016) - 2015
- [e5]Tim Güneysu, Helena Handschuh:
Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings. Lecture Notes in Computer Science 9293, Springer 2015, ISBN 978-3-662-48323-7 [contents] - 2014
- [i8]Frederik Armknecht, Helena Handschuh, Tetsu Iwata, Bart Preneel:
Symmetric Cryptography (Dagstuhl Seminar 14021). Dagstuhl Reports 4(1): 1-16 (2014) - 2012
- [j2]Helena Handschuh:
Hardware-Anchored Security Based on SRAM PUFs, Part 1. IEEE Security & Privacy 10(3): 80-83 (2012) - [j1]Helena Handschuh:
Hardware-Anchored Security Based on SRAM PUFs, Part 2. IEEE Security & Privacy 10(4): 80-81 (2012) - [c28]Vincent van der Leest, Erik van der Sluis, Geert Jan Schrijen, Pim Tuyls, Helena Handschuh:
Efficient Implementation of True Random Number Generator Based on SRAM PUFs. Cryptography and Security 2012: 300-318 - 2011
- [c27]Helena Handschuh:
Hardware intrinsic security based on SRAM PUFs: Tales from the industry. HOST 2011: 127 - [r6]
- [r5]
- [r4]Helena Handschuh:
SHA-0, SHA-1, SHA-2 (Secure Hash Algorithm). Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1190-1193 - 2010
- [c26]Vincent van der Leest, Geert Jan Schrijen, Helena Handschuh, Pim Tuyls:
Hardware intrinsic security from D flip-flops. STC@CCS 2010: 53-62 - [p2]Helena Handschuh, Elena Trichina:
From Secure Memories to Smart Card Security. Secure Integrated Circuits and Systems 2010: 215-234 - [p1]Helena Handschuh, Geert Jan Schrijen, Pim Tuyls:
Hardware Intrinsic Security from Physically Unclonable Functions. Towards Hardware-Intrinsic Security 2010: 39-53 - [i7]Arnaud Boscher, Helena Handschuh, Elena Trichina:
Fault Resistant RSA Signatures: Chinese Remaindering in Both Directions. IACR Cryptology ePrint Archive 2010: 38 (2010)
2000 – 2009
- 2009
- [c25]Arnaud Boscher, Helena Handschuh, Elena Trichina:
Blinded Fault Resistant Exponentiation Revisited. FDTC 2009: 3-9 - [e4]Helena Handschuh, Stefan Lucks, Bart Preneel, Phillip Rogaway:
Symmetric Cryptography, 11.01. - 16.01.2009. Dagstuhl Seminar Proceedings 09031, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2009 [contents] - [i6]Helena Handschuh, Stefan Lucks, Bart Preneel, Phillip Rogaway:
09031 Abstracts Collection - Symmetric Cryptography. Symmetric Cryptography 2009 - [i5]Helena Handschuh, Stefan Lucks, Bart Preneel, Phillip Rogaway:
09031 Executive Summary - Symmetric Cryptography. Symmetric Cryptography 2009 - 2008
- [c24]Helena Handschuh, Bart Preneel:
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms. CRYPTO 2008: 144-161 - [c23]Arnaud Boscher, Helena Handschuh:
Masking Does Not Protect Against Differential Fault Attacks. FDTC 2008: 35-40 - [c22]Helena Handschuh, Elena Trichina:
Securing Flash Technology: How Does It Look From Inside? ISSE 2008: 380-389 - 2007
- [c21]
- [c20]Helena Handschuh, Elena Trichina:
High Density Smart Cards: New Security Challenges and Applications. ISSE 2007: 251-259 - [e3]Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen:
Symmetric Cryptography, 07.01. - 12.01.2007. Dagstuhl Seminar Proceedings 07021, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 [contents] - [i4]Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen:
07021 Executive Summary -- Symmetric Cryptography. Symmetric Cryptography 2007 - [i3]Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen:
07021 Abstracts Collection -- Symmetric Cryptography. Symmetric Cryptography 2007 - 2006
- [c19]Helena Handschuh, Elena Trichina:
Hardware Security Features for Secure Embedded Devices. ISSE 2006: 38-44 - [c18]Helena Handschuh, Bart Preneel:
Blind Differential Cryptanalysis for Enhanced Power Attacks. Selected Areas in Cryptography 2006: 163-173 - 2005
- [e2]Henri Gilbert, Helena Handschuh:
Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3557, Springer 2005, ISBN 3-540-26541-4 [contents] - [r3]
- [r2]
- [r1]Helena Handschuh:
SHA Family (Secure Hash Algorithm). Encyclopedia of Cryptography and Security 2005 - 2004
- [c17]Raphael Chung-Wei Phan, Helena Handschuh:
On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor. ISC 2004: 111-122 - [e1]Helena Handschuh, M. Anwar Hasan:
Selected Areas in Cryptography, 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3357, Springer 2004, ISBN 3-540-24327-5 [contents] - [i2]Olivier Benoît, Nora Dabbous, Laurent Gauteron, Pierre Girard, Helena Handschuh, David Naccache, Stéphane Socié, Claire Whelan:
Mobile Terminal Security. IACR Cryptology ePrint Archive 2004: 158 (2004) - 2003
- [c16]Henri Gilbert, Helena Handschuh:
Security Analysis of SHA-256 and Sisters. Selected Areas in Cryptography 2003: 175-193 - 2002
- [c15]Helena Handschuh, David Naccache, Pascal Paillier, Christophe Tymen:
Provably Secure Chipcard Personalization, or, How to Fool Malicious Insiders. CARDIS 2002 - [c14]Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen:
GEM: A Generic Chosen-Ciphertext Secure Encryption Method. CT-RSA 2002: 263-276 - [c13]Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen:
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. Public Key Cryptography 2002: 17-33 - [i1]Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen:
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. IACR Cryptology ePrint Archive 2002: 11 (2002) - 2001
- [c12]Eric Brier, Helena Handschuh, Christophe Tymen:
Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware. CHES 2001: 16-27 - [c11]Helena Handschuh, Lars R. Knudsen, Matthew J. B. Robshaw:
Analysis of SHA-1 in Encryption Mode. CT-RSA 2001: 70-83 - 2000
- [c10]Henri Gilbert, Helena Handschuh, Antoine Joux, Serge Vaudenay:
A Statistical Attack on RC6. FSE 2000: 64-74
1990 – 1999
- 1999
- [c9]Jean-Sébastien Coron, Helena Handschuh, David Naccache:
ECC: Do We Need to Count? ASIACRYPT 1999: 122-134 - [c8]Helena Handschuh, Pascal Paillier, Jacques Stern:
Probing Attacks on Tamper-Resistant Devices. CHES 1999: 303-315 - [c7]Helena Handschuh, Bart Preneel:
On the Security of Double and 2-Key Triple Modes of Operation. FSE 1999: 215-230 - [c6]Helena Handschuh, Yiannis Tsiounis, Moti Yung:
Decision Oracles are Equivalent to Matching Oracles. Public Key Cryptography 1999: 276-289 - [c5]Helena Handschuh, Serge Vaudenay:
A Universal Encryption Standard. Selected Areas in Cryptography 1999: 1-12 - 1998
- [c4]Helena Handschuh, Pascal Paillier:
Reducing the Collision Probability of Alleged Comp128. CARDIS 1998: 366-371 - [c3]Helena Handschuh, Pascal Paillier:
Smart Card Crypto-Coprocessors for Public-Key Cryptography. CARDIS 1998: 372-379 - [c2]Helena Handschuh, Howard M. Heys:
A Timing Attack on RC5. Selected Areas in Cryptography 1998: 306-318 - 1997
- [c1]
Coauthor Index
last updated on 2019-02-08 22:03 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint