default search action
François Koeune
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c19]Melissa Azouaoui, Davide Bellizia, Ileana Buhan, Nicolas Debande, Sébastien Duval, Christophe Giraud, Éliane Jaulmes, François Koeune, Elisabeth Oswald, François-Xavier Standaert, Carolyn Whitnall:
A Systematic Appraisal of Side Channel Evaluation Strategies. SSR 2020: 46-66 - [i4]Melissa Azouaoui, Davide Bellizia, Ileana Buhan, Nicolas Debande, Sébastien Duval, Christophe Giraud, Éliane Jaulmes, François Koeune, Elisabeth Oswald, François-Xavier Standaert, Carolyn Whitnall:
A Systematic Appraisal of Side Channel Evaluation Strategies. IACR Cryptol. ePrint Arch. 2020: 1347 (2020)
2010 – 2019
- 2019
- [c18]Florentin Rochet, Kyriakos Efthymiadis, François Koeune, Olivier Pereira:
SWAT: Seamless Web Authentication Technology. WWW 2019: 1579-1589 - 2018
- [c17]Francesco Berti, François Koeune, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives. AsiaCCS 2018: 37-50 - 2016
- [i3]Francesco Berti, François Koeune, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Leakage-Resilient and Misuse-Resistant Authenticated Encryption. IACR Cryptol. ePrint Arch. 2016: 996 (2016) - 2015
- [c16]Christoph Dobraunig, François Koeune, Stefan Mangard, Florian Mendel, François-Xavier Standaert:
Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security. CARDIS 2015: 225-241 - 2012
- [c15]Thomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof, François Koeune, Tomislav Nad, Thomas Plos, Francesco Regazzoni, François-Xavier Standaert, Loïc van Oldeneel tot Oldenzeel:
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices. AFRICACRYPT 2012: 172-187 - [c14]Josep Balasch, Baris Ege, Thomas Eisenbarth, Benoît Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, François Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, François-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loïc van Oldeneel tot Oldenzeel, Ingo von Maurich:
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices. CARDIS 2012: 158-172 - [c13]Saloomeh Shariati, François Koeune, François-Xavier Standaert:
Security Analysis of Image-Based PUFs for Anti-counterfeiting. Communications and Multimedia Security 2012: 26-38 - [c12]François Durvaux, Benoît Gérard, Stéphanie Kerckhof, François Koeune, François-Xavier Standaert:
Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions. WISA 2012: 208-225 - [i2]Josep Balasch, Baris Ege, Thomas Eisenbarth, Benoît Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, François Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, François-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loïc van Oldeneel tot Oldenzeel, Ingo von Maurich:
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices. IACR Cryptol. ePrint Arch. 2012: 507 (2012) - 2011
- [j2]Damien Leroy, Gregory Detal, Julien Cathalo, Mark Manulis, François Koeune, Olivier Bonaventure:
SWISH: Secure WiFi sharing. Comput. Networks 55(7): 1614-1630 (2011) - [r4]François Koeune:
Pseudorandom Number Generator. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 995-996 - [r3]François Koeune:
Timing Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1303-1305
2000 – 2009
- 2009
- [c11]François-Xavier Standaert, François Koeune, Werner Schindler:
How to Compare Profiled Side-Channel Attacks?. ACNS 2009: 485-498 - [c10]Mark Manulis, Damien Leroy, François Koeune, Olivier Bonaventure, Jean-Jacques Quisquater:
Authenticated wireless roaming via tunnels: making mobile guests feel at home. AsiaCCS 2009: 92-103 - 2008
- [j1]Romain Robert, Mark Manulis, Florence De Villenfagne, Damien Leroy, Julien Jost, François Koeune, Caroline Ker, Jean-Marc Dinant, Yves Poullet, Olivier Bonaventure, Jean-Jacques Quisquater:
WiFi Roaming: Legal Implications and Security Constraints. Int. J. Law Inf. Technol. 16(3): 205-241 (2008) - [c9]Chong Hee Kim, Gildas Avoine, François Koeune, François-Xavier Standaert, Olivier Pereira:
The Swiss-Knife RFID Distance Bounding Protocol. ICISC 2008: 98-115 - [i1]Mark Manulis, Damien Leroy, François Koeune, Olivier Bonaventure, Jean-Jacques Quisquater:
Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home. IACR Cryptol. ePrint Arch. 2008: 382 (2008) - 2005
- [r2]François Koeune:
Pseudo-random number generator. Encyclopedia of Cryptography and Security 2005 - [r1]François Koeune:
Timing attack. Encyclopedia of Cryptography and Security 2005 - 2004
- [c8]François Koeune, François-Xavier Standaert:
A Tutorial on Physical Security and Side-Channel Attacks. FOSAD 2004: 78-108 - 2003
- [c7]Julien Cathalo, François Koeune, Jean-Jacques Quisquater:
A New Type of Timing Attack: Application to GPS. CHES 2003: 291-303 - 2002
- [c6]François Koeune, Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Pierre David, Jean-Didier Legat:
An FPGA Implementation of the Linear Cryptanalysis. FPL 2002: 845-852 - 2001
- [c5]Werner Schindler, François Koeune, Jean-Jacques Quisquater:
Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies. IMACC 2001: 245-267 - 2000
- [c4]Jean-Sébastien Coron, François Koeune, David Naccache:
From Fixed-Length to Arbitrary-Length RSA Padding Schemes. ASIACRYPT 2000: 90-96 - [c3]Gaël Hachez, François Koeune, Jean-Jacques Quisquater:
Biometrics, Access Control, Smart Cards: A not so Simple Combination. CARDIS 2000: 273-288
1990 – 1999
- 1999
- [c2]Julien P. Stern, Gaël Hachez, François Koeune, Jean-Jacques Quisquater:
Robust Object Watermarking: Application to Code. Information Hiding 1999: 368-378 - 1998
- [c1]Jean-François Dhem, François Koeune, Philippe-Alexandre Leroux, Patrick Mestré, Jean-Jacques Quisquater, Jean-Louis Willems:
A Practical Implementation of the Timing Attack. CARDIS 1998: 167-182
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint