Guillaume Poupard
According to our database1,
Guillaume Poupard
authored at least 23 papers
between 1997 and 2006.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2006
J. Cryptol., 2006
Proceedings of the Public Key Cryptography, 2006
Cryptanalysis of a Partially Blind Signature Scheme or How to Make $100 Bills with $1 and $2 Ones.
Proceedings of the Financial Cryptography and Data Security, 2006
2005
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005
2004
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004
2003
A New NP-Complete Problem and Public-Key Identification.
Des. Codes Cryptogr., 2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
2001
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001
Proceedings of the Financial Cryptography, 2001
2000
Proceedings of the Public Key Cryptography, 2000
Proceedings of the Financial Cryptography, 2000
1999
1998
Security Analysis of a Practical "on the fly" Authentication and Signature Generation.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
Decorrelated Fast Cipher: An AES Candidate Well Suited for Low Cost Smart Card Applications.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
Proceedings of the Advances in Cryptology, 1998
1997
A realistic security analysis of identification schemes based on combinatorial problems.
Eur. Trans. Telecommun., 1997
Proceedings of the Information and Communication Security, First International Conference, 1997