Security analysis of SHA-256 and sisters H Gilbert, H Handschuh Selected Areas in Cryptography: 10th Annual International Workshop, SAC 2003 …, 2004 | 425 | 2004 |
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ... Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006 | 292 | 2006 |
Randomized RSA-based cryptographic exponentiation resistant to side channel and fault attacks A Boscher, EV Trichina, H Handschuh US Patent 8,139,763, 2012 | 260 | 2012 |
Memory device and chip set processor pairing J Le Bihan, C Carvounas, VC Colnot, E Trichina, H Handschuh US Patent 8,650,399, 2014 | 176 | 2014 |
Hardware intrinsic security from D flip-flops V Van der Leest, GJ Schrijen, H Handschuh, P Tuyls Proceedings of the fifth ACM workshop on Scalable trusted computing, 53-62, 2010 | 140 | 2010 |
Key-recovery attacks on universal hash function based MAC algorithms H Handschuh, B Preneel Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008 | 138 | 2008 |
Efficient implementation of true random number generator based on sram pufs V Van der Leest, E Van der Sluis, GJ Schrijen, P Tuyls, H Handschuh Cryptography and Security: From Theory to Applications: Essays Dedicated to …, 2012 | 111 | 2012 |
Smart card crypto-coprocessors for public-key cryptography H Handschuh, P Paillier Smart Card Research and Applications: Third International Conference, CARDIS …, 2000 | 111 | 2000 |
Device and method for obtaining a cryptographic key H Handschuh, PT Tuyls US Patent App. 13/574,311, 2013 | 102 | 2013 |
A timing attack on RC5 H Handschuh, HM Heys Selected Areas in Cryptography: 5th Annual International Workshop, SAC’98 …, 1999 | 88 | 1999 |
Probing attacks on tamper-resistant devices H Handschuh, P Paillier, J Stern Cryptographic Hardware and Embedded Systems: First InternationalWorkshop …, 1999 | 82 | 1999 |
GEM: A generic chosen-ciphertext secure encryption method JS Coron, H Handschuh, M Joye, P Paillier, D Pointcheval, C Tymen CT-RSA 2271, 263-276, 2002 | 80 | 2002 |
Hardware intrinsic security from physically unclonable functions H Handschuh, GJ Schrijen, P Tuyls Towards Hardware-Intrinsic Security: Foundations and Practice, 39-53, 2010 | 72 | 2010 |
SHACAL (-Submission to NESSIE-) H Handschuh, D Naccache | 72* | 2000 |
Random number generation through use of memory cell activity E Trichina, H Handschuh US Patent 8,130,955, 2012 | 64 | 2012 |
Analysis of SHA-1 in encryption mode H Handschuh, LR Knudsen, MJ Robshaw Topics in Cryptology—CT-RSA 2001: The Cryptographers’ Track at RSA …, 2001 | 60 | 2001 |
Susceptibility of eSTREAM candidates towards side channel analysis B Gierlichs, L Batina, C Clavier, T Eisenbarth, A Gouget, H Handschuh, ... Leuven: Sl, 2008 | 56 | 2008 |
System for establishing a cryptographic key depending on a physical system GJ Schrijen, PT Tuyls, H Handschuh US Patent 9,252,960, 2016 | 52 | 2016 |
χ2 cryptanalysis of the SEAL encryption algorithm H Handschuh, H Gilbert Fast Software Encryption: 4th International Workshop, FSE’97 Haifa, Israel …, 1997 | 51 | 1997 |
Report on the AES Candidates O Baudron, H Gilbert, L Granboulan, H Handschuh, A Joux, P Nguyen, ... The Second AES Candidate Conference, printed by The National Institute of …, 1999 | 50 | 1999 |