What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Guillaume Poupard
Google Scholar
19
publications in security and cryptology related venues
Year
Venue
Title
2006
journals/joc
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order.
Marc Girault
Guillaume Poupard
Jacques Stern
2006
conf/fc
Cryptanalysis of a Partially Blind Signature Scheme or How to Make $100 Bills with $1 and $2 Ones.
Gwenaëlle Martinet
Guillaume Poupard
Philippe Sola
2006
conf/pkc
Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm.
Sébastien Kunz-Jacques
Gwenaëlle Martinet
Guillaume Poupard
Jacques Stern
2005
conf/ches
A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis.
Jean-Sébastien Coron
David Lefranc
Guillaume Poupard
2004
conf/ches
Defeating Countermeasures Based on Randomized BSD Representations.
Pierre-Alain Fouque
Frédéric Muller
Guillaume Poupard
Frédéric Valette
2004
conf/sacrypt
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes.
Pierre-Alain Fouque
Antoine Joux
Guillaume Poupard
2003
conf/fse
Practical Symmetric On-Line Encryption.
Pierre-Alain Fouque
Gwenaëlle Martinet
Guillaume Poupard
2003
conf/fse
New Attacks against Standardized MACs.
Antoine Joux
Guillaume Poupard
Jacques Stern
2003
conf/ches
Attacking Unbalanced RSA-CRT Using SPA.
Pierre-Alain Fouque
Gwenaëlle Martinet
Guillaume Poupard
2003
conf/eurocrypt
On the Security of RDSA.
Pierre-Alain Fouque
Guillaume Poupard
2003
conf/asiacrypt
The Insecurity of Esign in Practical Implementations.
Pierre-Alain Fouque
Nick Howgrave-Graham
Gwenaëlle Martinet
Guillaume Poupard
2001
conf/fc
On the Security of Homage Group Authentication Protocol.
Éliane Jaulmes
Guillaume Poupard
2000
conf/fc
Sharing Decryption in the Context of Voting or Lotteries.
Pierre-Alain Fouque
Guillaume Poupard
Jacques Stern
2000
conf/pkc
Short Proofs of Knowledge for Factoring.
Guillaume Poupard
Jacques Stern
2000
conf/eurocrypt
Fair Encryption of RSA Keys.
Guillaume Poupard
Jacques Stern
1999
conf/ccs
On the Fly Signatures Based on Factoring.
Guillaume Poupard
Jacques Stern
1998
conf/eurocrypt
Security Analysis of a Practical "on the fly" Authentication and Signature Generation.
Guillaume Poupard
Jacques Stern
1998
conf/asiacrypt
Generation of Shared RSA Keys by Two Parties.
Guillaume Poupard
Jacques Stern
1997
conf/icics
Efficient scalable fair cash with off-line extortion prevention.
Holger Peterson
Guillaume Poupard
Coauthors
Antoine Joux
(2)
David Lefranc
(1)
Éliane Jaulmes
(1)
Frédéric Muller
(1)
Frédéric Valette
(1)
Guillaume Poupard
(19)
Gwenaëlle Martinet
(5)
Holger Peterson
(1)
Jacques Stern
(9)
Jean-Sébastien Coron
(1)
Marc Girault
(1)
Nick Howgrave-Graham
(1)
Philippe Sola
(1)
Pierre-Alain Fouque
(7)
Sébastien Kunz-Jacques
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to