Jean-Philippe Aumasson
According to our database1,
Jean-Philippe Aumasson
authored at least 50 papers
between 2006 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
2021
2020
2019
2017
2015
RFC, November, 2015
IACR Cryptol. ePrint Arch., 2015
2014
Information Security and Cryptography, Springer, ISBN: 978-3-662-44757-4, 2014
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
2012
2011
IEEE Trans. Very Large Scale Integr. Syst., 2011
On the cryptanalysis of the hash function Fugue: Partitioning and inside-out distinguishers.
Inf. Process. Lett., 2011
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011
2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010
2009
Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
Proceedings of the Progress in Cryptology, 2008
2007
Int. J. Artif. Intell. Tools, 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Information Security and Cryptology, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006