Pascal Junod

Orcid: 0000-0001-8068-7401

According to our database1, Pascal Junod authored at least 19 papers between 2001 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2017
An FPGA-Based 4 Mbps Secret Key Distillation Engine for Quantum Key Distribution Systems.
J. Signal Process. Syst., 2017

2015
Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys.
IACR Cryptol. ePrint Arch., 2015

Obfuscator-LLVM - Software Protection for the Masses.
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015

2010
An efficient public-key attribute-based broadcast encryption scheme allowing arbitrary access policies.
Proceedings of the 10th ACM Workshop on Digital Rights Management, 2010

2009
Revisiting the IDEA Philosophy.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

2008
Characterization and Improvement of Time-Memory Trade-Off Based on Perfect Tables.
ACM Trans. Inf. Syst. Secur., 2008

Improving the Boneh-Franklin Traitor Tracing Scheme.
IACR Cryptol. ePrint Arch., 2008

2007
Computer system security - Basic Concepts and Solved Exercises.
Computer and communication sciences, CRC Press, ISBN: 978-1-4200-4620-5, 2007

2006
A classical introduction to cryptography exercise book.
Springer, ISBN: 978-0-387-27934-3, 2006

2005
Distinguishing Attacks on T-Functions.
Proceedings of the Progress in Cryptology, 2005

Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints.
Proceedings of the Progress in Cryptology, 2005

New Attacks Against Reduced-Round Versions of IDEA.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

2004
FOX : A New Family of Block Ciphers.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

Perfect Diffusion Primitives for Block Ciphers.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

How Far Can We Go Beyond Linear Cryptanalysis?
Proceedings of the Advances in Cryptology, 2004

2003
On the Optimality of Linear, Differential and Sequential Distinguishers.
IACR Cryptol. ePrint Arch., 2003

Did Filiol Break AES ?
IACR Cryptol. ePrint Arch., 2003

Optimal Key Ranking Procedures in a Statistical Cryptanalysis.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

2001
On the Complexity of Matsui's Attack.
IACR Cryptol. ePrint Arch., 2001


  Loading...