BibTeX records: Pascal Junod

download as .bib file

@article{DBLP:journals/vlsisp/ConstantinHPWZJ17,
  author    = {Jeremy Constantin and
               Rapha{\"{e}}l Houlmann and
               Nicholas Preyss and
               Nino Walenta and
               Hugo Zbinden and
               Pascal Junod and
               Andreas Burg},
  title     = {An FPGA-Based 4 Mbps Secret Key Distillation Engine for Quantum Key
               Distribution Systems},
  journal   = {J. Signal Process. Syst.},
  volume    = {86},
  number    = {1},
  pages     = {1--15},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11265-015-1086-1},
  doi       = {10.1007/s11265-015-1086-1},
  timestamp = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/vlsisp/ConstantinHPWZJ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/WesolowskiJ15,
  author    = {Benjamin Wesolowski and
               Pascal Junod},
  editor    = {Soonhak Kwon and
               Aaram Yun},
  title     = {Ciphertext-Policy Attribute-Based Broadcast Encryption with Small
               Keys},
  booktitle = {Information Security and Cryptology - {ICISC} 2015 - 18th International
               Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9558},
  pages     = {53--68},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-30840-1\_4},
  doi       = {10.1007/978-3-319-30840-1\_4},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/icisc/WesolowskiJ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/JunodRWM15,
  author    = {Pascal Junod and
               Julien Rinaldini and
               Johan Wehrli and
               Julie Michielin},
  editor    = {Paolo Falcarin and
               Brecht Wyseur},
  title     = {Obfuscator-LLVM - Software Protection for the Masses},
  booktitle = {1st {IEEE/ACM} International Workshop on Software Protection, {SPRO}
               2015, Florence, Italy, May 19, 2015},
  pages     = {3--9},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {https://doi.org/10.1109/SPRO.2015.10},
  doi       = {10.1109/SPRO.2015.10},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/conf/icse/JunodRWM15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WesolowskiJ15,
  author    = {Benjamin Wesolowski and
               Pascal Junod},
  title     = {Ciphertext-Policy Attribute-Based Broadcast Encryption with Small
               Keys},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2015},
  pages     = {836},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/836},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/WesolowskiJ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/JunodK10,
  author    = {Pascal Junod and
               Alexandre Karlov},
  editor    = {Ehab Al{-}Shaer and
               Hongxia Jin and
               Marc Joye},
  title     = {An efficient public-key attribute-based broadcast encryption scheme
               allowing arbitrary access policies},
  booktitle = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management,
               Chicago, Illinois, USA, October 4, 2010},
  pages     = {13--24},
  publisher = {{ACM}},
  year      = {2010},
  url       = {https://doi.org/10.1145/1866870.1866875},
  doi       = {10.1145/1866870.1866875},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/drm/JunodK10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JunodM09,
  author    = {Pascal Junod and
               Marco Macchetti},
  editor    = {Orr Dunkelman},
  title     = {Revisiting the {IDEA} Philosophy},
  booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
               Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5665},
  pages     = {277--295},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-03317-9\_17},
  doi       = {10.1007/978-3-642-03317-9\_17},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/fse/JunodM09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JunodKL09,
  author    = {Pascal Junod and
               Alexandre Karlov and
               Arjen K. Lenstra},
  editor    = {Stanislaw Jarecki and
               Gene Tsudik},
  title     = {Improving the Boneh-Franklin Traitor Tracing Scheme},
  booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference
               on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
               March 18-20, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5443},
  pages     = {88--104},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-00468-1\_6},
  doi       = {10.1007/978-3-642-00468-1\_6},
  timestamp = {Fri, 01 May 2020 18:32:25 +0200},
  biburl    = {https://dblp.org/rec/conf/pkc/JunodKL09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AvoineJO08,
  author    = {Gildas Avoine and
               Pascal Junod and
               Philippe Oechslin},
  title     = {Characterization and Improvement of Time-Memory Trade-Off Based on
               Perfect Tables},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {11},
  number    = {4},
  pages     = {17:1--17:22},
  year      = {2008},
  url       = {https://doi.org/10.1145/1380564.1380565},
  doi       = {10.1145/1380564.1380565},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tissec/AvoineJO08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JunodKL08,
  author    = {Pascal Junod and
               Alexandre Karlov and
               Arjen K. Lenstra},
  title     = {Improving the Boneh-Franklin Traitor Tracing Scheme},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2008},
  pages     = {384},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/384},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/JunodKL08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0032322,
  author    = {Gildas Avoine and
               Pascal Junod and
               Philippe Oechslin},
  title     = {Computer system security - Basic Concepts and Solved Exercises},
  series    = {Computer and communication sciences},
  publisher = {{CRC} Press},
  year      = {2007},
  url       = {http://ppur.epfl.ch/livres/978-2-940222-14-8.html},
  isbn      = {978-1-4200-4620-5},
  timestamp = {Mon, 16 Dec 2013 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/books/daglib/0032322.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0014553,
  author    = {Thomas Baign{\`{e}}res and
               Pascal Junod and
               Yi Lu and
               Jean Monnerat and
               Serge Vaudenay},
  title     = {A classical introduction to cryptography exercise book},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/0-387-28835-X},
  doi       = {10.1007/0-387-28835-X},
  isbn      = {978-0-387-27934-3},
  timestamp = {Tue, 16 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/books/daglib/0014553.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Junod05,
  author    = {Pascal Junod},
  editor    = {Henri Gilbert and
               Helena Handschuh},
  title     = {New Attacks Against Reduced-Round Versions of {IDEA}},
  booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
               Paris, France, February 21-23, 2005, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3557},
  pages     = {384--397},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11502760\_26},
  doi       = {10.1007/11502760\_26},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/fse/Junod05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/AvoineJO05,
  author    = {Gildas Avoine and
               Pascal Junod and
               Philippe Oechslin},
  editor    = {Subhamoy Maitra and
               C. E. Veni Madhavan and
               Ramarathnam Venkatesan},
  title     = {Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2005, 6th International Conference
               on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3797},
  pages     = {183--196},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11596219\_15},
  doi       = {10.1007/11596219\_15},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/conf/indocrypt/AvoineJO05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/KunzliJM05,
  author    = {Simon K{\"{u}}nzli and
               Pascal Junod and
               Willi Meier},
  editor    = {Ed Dawson and
               Serge Vaudenay},
  title     = {Distinguishing Attacks on T-Functions},
  booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference
               on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
               2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3715},
  pages     = {2--15},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11554868\_2},
  doi       = {10.1007/11554868\_2},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/conf/mycrypt/KunzliJM05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BaigneresJV04,
  author    = {Thomas Baign{\`{e}}res and
               Pascal Junod and
               Serge Vaudenay},
  editor    = {Pil Joong Lee},
  title     = {How Far Can We Go Beyond Linear Cryptanalysis?},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Jeju Island, Korea, December 5-9, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3329},
  pages     = {432--450},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/978-3-540-30539-2\_31},
  doi       = {10.1007/978-3-540-30539-2\_31},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/conf/asiacrypt/BaigneresJV04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/JunodV04,
  author    = {Pascal Junod and
               Serge Vaudenay},
  editor    = {Helena Handschuh and
               M. Anwar Hasan},
  title     = {Perfect Diffusion Primitives for Block Ciphers},
  booktitle = {Selected Areas in Cryptography, 11th International Workshop, {SAC}
               2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3357},
  pages     = {84--99},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/978-3-540-30564-4\_6},
  doi       = {10.1007/978-3-540-30564-4\_6},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/conf/sacrypt/JunodV04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/JunodV04a,
  author    = {Pascal Junod and
               Serge Vaudenay},
  editor    = {Helena Handschuh and
               M. Anwar Hasan},
  title     = {{FOX} : {A} New Family of Block Ciphers},
  booktitle = {Selected Areas in Cryptography, 11th International Workshop, {SAC}
               2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3357},
  pages     = {114--129},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/978-3-540-30564-4\_8},
  doi       = {10.1007/978-3-540-30564-4\_8},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/sacrypt/JunodV04a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Junod03,
  author    = {Pascal Junod},
  editor    = {Eli Biham},
  title     = {On the Optimality of Linear, Differential, and Sequential Distinguishers},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
               on the Theory and Applications of Cryptographic Techniques, Warsaw,
               Poland, May 4-8, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2656},
  pages     = {17--32},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/3-540-39200-9\_2},
  doi       = {10.1007/3-540-39200-9\_2},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/Junod03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JunodV03,
  author    = {Pascal Junod and
               Serge Vaudenay},
  editor    = {Thomas Johansson},
  title     = {Optimal Key Ranking Procedures in a Statistical Cryptanalysis},
  booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
               Lund, Sweden, February 24-26, 2003, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2887},
  pages     = {235--246},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/978-3-540-39887-5\_18},
  doi       = {10.1007/978-3-540-39887-5\_18},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/fse/JunodV03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CourtoisJJPS03,
  author    = {Nicolas T. Courtois and
               Robert T. Johnson and
               Pascal Junod and
               Thomas Pornin and
               Michael Scott},
  title     = {Did Filiol Break {AES} ?},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2003},
  pages     = {22},
  year      = {2003},
  url       = {http://eprint.iacr.org/2003/022},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CourtoisJJPS03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Junod03,
  author    = {Pascal Junod},
  title     = {On the Optimality of Linear, Differential and Sequential Distinguishers},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2003},
  pages     = {64},
  year      = {2003},
  url       = {http://eprint.iacr.org/2003/064},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/Junod03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Junod01,
  author    = {Pascal Junod},
  editor    = {Serge Vaudenay and
               Amr M. Youssef},
  title     = {On the Complexity of Matsui's Attack},
  booktitle = {Selected Areas in Cryptography, 8th Annual International Workshop,
               {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2259},
  pages     = {199--211},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-45537-X\_16},
  doi       = {10.1007/3-540-45537-X\_16},
  timestamp = {Tue, 01 Jun 2021 15:22:31 +0200},
  biburl    = {https://dblp.org/rec/conf/sacrypt/Junod01.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Junod01,
  author    = {Pascal Junod},
  title     = {On the Complexity of Matsui's Attack},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2001},
  pages     = {56},
  year      = {2001},
  url       = {http://eprint.iacr.org/2001/056},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/Junod01.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics