default search action
Helena Handschuh
Person information
- affiliation: Cryptography Research
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [e11]Helena Handschuh, Anna Lysyanskaya:
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14081, Springer 2023, ISBN 978-3-031-38556-8 [contents] - [e10]Helena Handschuh, Anna Lysyanskaya:
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part II. Lecture Notes in Computer Science 14082, Springer 2023, ISBN 978-3-031-38544-5 [contents] - [e9]Helena Handschuh, Anna Lysyanskaya:
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part III. Lecture Notes in Computer Science 14083, Springer 2023, ISBN 978-3-031-38547-6 [contents] - [e8]Helena Handschuh, Anna Lysyanskaya:
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part IV. Lecture Notes in Computer Science 14084, Springer 2023, ISBN 978-3-031-38550-6 [contents] - [e7]Helena Handschuh, Anna Lysyanskaya:
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part V. Lecture Notes in Computer Science 14085, Springer 2023, ISBN 978-3-031-38553-7 [contents] - 2021
- [c29]Jaume Abella, Sergi Alcaide, Jens Anders, Francisco Bas, Steffen Becker, Elke De Mulder, Nourhan Elhamawy, Frank K. Gürkaynak, Helena Handschuh, Carles Hernández, Michael Hutter, Leonidas Kosmidis, Ilia Polian, Matthias Sauer, Stefan Wagner, Francesco Regazzoni:
Security, Reliability and Test Aspects of the RISC-V Ecosystem. ETS 2021: 1-10
2010 – 2019
- 2017
- [e6]Helena Handschuh:
Topics in Cryptology - CT-RSA 2017 - The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings. Lecture Notes in Computer Science 10159, Springer 2017, ISBN 978-3-319-52152-7 [contents] - 2016
- [j3]Tim Güneysu, Helena Handschuh:
Introduction to the CHES 2015 special issue. J. Cryptogr. Eng. 6(2): 83-84 (2016) - 2015
- [e5]Tim Güneysu, Helena Handschuh:
Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings. Lecture Notes in Computer Science 9293, Springer 2015, ISBN 978-3-662-48323-7 [contents] - 2014
- [i8]Frederik Armknecht, Helena Handschuh, Tetsu Iwata, Bart Preneel:
Symmetric Cryptography (Dagstuhl Seminar 14021). Dagstuhl Reports 4(1): 1-16 (2014) - 2012
- [j2]Helena Handschuh:
Hardware-Anchored Security Based on SRAM PUFs, Part 1. IEEE Secur. Priv. 10(3): 80-83 (2012) - [j1]Helena Handschuh:
Hardware-Anchored Security Based on SRAM PUFs, Part 2. IEEE Secur. Priv. 10(4): 80-81 (2012) - [c28]Vincent van der Leest, Erik van der Sluis, Geert Jan Schrijen, Pim Tuyls, Helena Handschuh:
Efficient Implementation of True Random Number Generator Based on SRAM PUFs. Cryptography and Security 2012: 300-318 - 2011
- [c27]Helena Handschuh:
Hardware intrinsic security based on SRAM PUFs: Tales from the industry. HOST 2011: 127 - [r6]Helena Handschuh:
RC5. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1032-1033 - [r5]Helena Handschuh:
RC6. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1033-1034 - [r4]Helena Handschuh:
SHA-0, SHA-1, SHA-2 (Secure Hash Algorithm). Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1190-1193 - 2010
- [c26]Vincent van der Leest, Geert Jan Schrijen, Helena Handschuh, Pim Tuyls:
Hardware intrinsic security from D flip-flops. STC@CCS 2010: 53-62 - [p2]Helena Handschuh, Elena Trichina:
From Secure Memories to Smart Card Security. Secure Integrated Circuits and Systems 2010: 215-234 - [p1]Helena Handschuh, Geert Jan Schrijen, Pim Tuyls:
Hardware Intrinsic Security from Physically Unclonable Functions. Towards Hardware-Intrinsic Security 2010: 39-53 - [i7]Arnaud Boscher, Helena Handschuh, Elena Trichina:
Fault Resistant RSA Signatures: Chinese Remaindering in Both Directions. IACR Cryptol. ePrint Arch. 2010: 38 (2010)
2000 – 2009
- 2009
- [c25]Arnaud Boscher, Helena Handschuh, Elena Trichina:
Blinded Fault Resistant Exponentiation Revisited. FDTC 2009: 3-9 - [e4]Helena Handschuh, Stefan Lucks, Bart Preneel, Phillip Rogaway:
Symmetric Cryptography, 11.01. - 16.01.2009. Dagstuhl Seminar Proceedings 09031, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2009 [contents] - [i6]Helena Handschuh, Stefan Lucks, Bart Preneel, Phillip Rogaway:
09031 Abstracts Collection - Symmetric Cryptography. Symmetric Cryptography 2009 - [i5]Helena Handschuh, Stefan Lucks, Bart Preneel, Phillip Rogaway:
09031 Executive Summary - Symmetric Cryptography. Symmetric Cryptography 2009 - 2008
- [c24]Helena Handschuh, Bart Preneel:
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms. CRYPTO 2008: 144-161 - [c23]Arnaud Boscher, Helena Handschuh:
Masking Does Not Protect Against Differential Fault Attacks. FDTC 2008: 35-40 - [c22]Helena Handschuh, Elena Trichina:
Securing Flash Technology: How Does It Look From Inside? ISSE 2008: 380-389 - 2007
- [c21]Helena Handschuh, Elena Trichina:
Securing Flash Technology. FDTC 2007: 3-17 - [c20]Helena Handschuh, Elena Trichina:
High Density Smart Cards: New Security Challenges and Applications. ISSE 2007: 251-259 - [e3]Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen:
Symmetric Cryptography, 07.01. - 12.01.2007. Dagstuhl Seminar Proceedings 07021, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 [contents] - [i4]Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen:
07021 Executive Summary -- Symmetric Cryptography. Symmetric Cryptography 2007 - [i3]Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen:
07021 Abstracts Collection -- Symmetric Cryptography. Symmetric Cryptography 2007 - 2006
- [c19]Helena Handschuh, Elena Trichina:
Hardware Security Features for Secure Embedded Devices. ISSE 2006: 38-44 - [c18]Helena Handschuh, Bart Preneel:
Blind Differential Cryptanalysis for Enhanced Power Attacks. Selected Areas in Cryptography 2006: 163-173 - 2005
- [e2]Henri Gilbert, Helena Handschuh:
Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3557, Springer 2005, ISBN 3-540-26541-4 [contents] - [r3]Helena Handschuh:
RC5. Encyclopedia of Cryptography and Security 2005 - [r2]Helena Handschuh:
RC6. Encyclopedia of Cryptography and Security 2005 - [r1]Helena Handschuh:
SHA Family (Secure Hash Algorithm). Encyclopedia of Cryptography and Security 2005 - 2004
- [c17]Raphael Chung-Wei Phan, Helena Handschuh:
On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor. ISC 2004: 111-122 - [e1]Helena Handschuh, M. Anwar Hasan:
Selected Areas in Cryptography, 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3357, Springer 2004, ISBN 3-540-24327-5 [contents] - [i2]Olivier Benoît, Nora Dabbous, Laurent Gauteron, Pierre Girard, Helena Handschuh, David Naccache, Stéphane Socié, Claire Whelan:
Mobile Terminal Security. IACR Cryptol. ePrint Arch. 2004: 158 (2004) - 2003
- [c16]Henri Gilbert, Helena Handschuh:
Security Analysis of SHA-256 and Sisters. Selected Areas in Cryptography 2003: 175-193 - 2002
- [c15]Helena Handschuh, David Naccache, Pascal Paillier, Christophe Tymen:
Provably Secure Chipcard Personalization, or, How to Fool Malicious Insiders. CARDIS 2002 - [c14]Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen:
GEM: A Generic Chosen-Ciphertext Secure Encryption Method. CT-RSA 2002: 263-276 - [c13]Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen:
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. Public Key Cryptography 2002: 17-33 - [i1]Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen:
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. IACR Cryptol. ePrint Arch. 2002: 11 (2002) - 2001
- [c12]Eric Brier, Helena Handschuh, Christophe Tymen:
Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware. CHES 2001: 16-27 - [c11]Helena Handschuh, Lars R. Knudsen, Matthew J. B. Robshaw:
Analysis of SHA-1 in Encryption Mode. CT-RSA 2001: 70-83 - 2000
- [c10]Henri Gilbert, Helena Handschuh, Antoine Joux, Serge Vaudenay:
A Statistical Attack on RC6. FSE 2000: 64-74
1990 – 1999
- 1999
- [c9]Jean-Sébastien Coron, Helena Handschuh, David Naccache:
ECC: Do We Need to Count? ASIACRYPT 1999: 122-134 - [c8]Helena Handschuh, Pascal Paillier, Jacques Stern:
Probing Attacks on Tamper-Resistant Devices. CHES 1999: 303-315 - [c7]Helena Handschuh, Bart Preneel:
On the Security of Double and 2-Key Triple Modes of Operation. FSE 1999: 215-230 - [c6]Helena Handschuh, Yiannis Tsiounis, Moti Yung:
Decision Oracles are Equivalent to Matching Oracles. Public Key Cryptography 1999: 276-289 - [c5]Helena Handschuh, Serge Vaudenay:
A Universal Encryption Standard. Selected Areas in Cryptography 1999: 1-12 - 1998
- [c4]Helena Handschuh, Pascal Paillier:
Reducing the Collision Probability of Alleged Comp128. CARDIS 1998: 366-371 - [c3]Helena Handschuh, Pascal Paillier:
Smart Card Crypto-Coprocessors for Public-Key Cryptography. CARDIS 1998: 372-379 - [c2]Helena Handschuh, Howard M. Heys:
A Timing Attack on RC5. Selected Areas in Cryptography 1998: 306-318 - 1997
- [c1]Helena Handschuh, Henri Gilbert:
x2 Cryptanalysis of the SEAL Encryption Algorithm. FSE 1997: 1-12
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint