Edit Profile (opens in new tab) Handschuh, Helena Co-Author Distance Author ID: handschuh.helena Published as: Handschuh, Helena External Links: MGP Documents Indexed: 17 Publications since 1997 9 Contributions as Editor Co-Authors: 25 Co-Authors with 25 Joint Publications 1,088 Co-Co-Authors all top 5 Co-Authors 1 single-authored 5 Lysyanskaya, Anna 4 Gilbert, Henri 3 Coron, Jean-Sébastien 3 Paillier, Pascal 3 Preneel, Bart 3 Tymen, Christophe 2 Joye, Marc 2 Pointcheval, David 2 Vaudenay, Serge 1 Brier, Eric 1 Güneysu, Tim 1 Hasan, M. Anwar 1 Heys, Howard M. 1 Joux, Antoine 1 Knudsen, Lars Ramkilde 1 Naccache, David 1 Phan, Raphael Chung-Wei 1 Robshaw, Matthew J. B. 1 Schrijen, Geert-Jan 1 Stern, Jacques 1 Tsiounis, Yiannis 1 Tuyls, Pim 1 van der Leest, Vincent 1 van der Sluis, Erik H. J. 1 Yung, Moti Serials 9 Lecture Notes in Computer Science all top 5 Fields 24 Information and communication theory, circuits (94-XX) 13 Computer science (68-XX) 9 General and overarching topics; collections (00-XX) 1 Algebraic geometry (14-XX) 1 Statistics (62-XX) 1 Numerical analysis (65-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 15 Publications have been cited 63 times in 60 Documents Cited by ▼ Year ▼ Key-recovery attacks on universal hash function based MAC algorithms. Zbl 1183.94035 Handschuh, Helena; Preneel, Bart 17 2008 Security analysis of SHA-256 and sisters. Zbl 1081.94524 Gilbert, Henri; Handschuh, Helena 11 2004 GEM: a Generic chosen-ciphertext secure Ecryption Method. Zbl 1048.94504 Coron, Jean-Sébastien; Handschuh, Helena; Joye, Marc; Paillier, Pascal; Pointcheval, David; Tymen, Christophe 10 2002 Analysis of SHA-1 in encryption mode. Zbl 0995.94541 Handschuh, Helena; Knudsen, Lars R.; Robshaw, Matthew J. 5 2001 Cryptographic hardware and embedded systems – CHES 2015. 17th international workshop, Saint-Malo, France, September 13–16, 2015. Proceedings. Zbl 1343.68011 5 2015 Efficient implementation of true random number generator based on SRAM PUFs. Zbl 1285.94104 van der Leest, Vincent; van der Sluis, Erik; Schrijen, Geert-Jan; Tuyls, Pim; Handschuh, Helena 3 2012 ECC: Do we need to count? Zbl 0977.94026 Coron, Jean-Sébastien; Handschuh, Helena; Naccache, David 2 1999 A statistical attack on RC6. Zbl 0994.68636 Gilbert, Henri; Handschuh, Helena; Joux, Antoine; Vaudenay, Serge 2 2001 Optimal chosen-ciphertext secure encryption of arbitrary-length messages. Zbl 1056.68542 Coron, Jean-Sébastien; Handschuh, Helena; Joye, Marc; Paillier, Pascal; Pointcheval, David; Tymen, Christophe 2 2002 Decision-oracles are equivalent to matching oracles. Zbl 0929.94014 Handschuh, Helena; Tsiounis, Yiannis; Yung, Moti 1 1999 Probing attacks on tamper-resistant devices. Zbl 0955.94012 Handschuh, Helena; Paillier, Pascal; Stern, Jacques 1 1999 \(\chi^2\) cryptanalysis of the SEAL encryption algorithm. Zbl 1385.94041 Handschuh, Helena; Gilbert, Henri 1 1997 A timing attack on RC5. Zbl 0929.94013 Handschuh, Helena; Heys, Howard M. 1 1999 On related-key and collision attacks: The case for the IBM 4758 cryptoprocessor. Zbl 1109.68483 Phan, Raphael C.-W.; Handschuh, Helena 1 2004 Blind differential cryptanalysis for enhanced power attacks. Zbl 1161.94403 Handschuh, Helena; Preneel, Bart 1 2007 Cryptographic hardware and embedded systems – CHES 2015. 17th international workshop, Saint-Malo, France, September 13–16, 2015. Proceedings. Zbl 1343.68011 5 2015 Efficient implementation of true random number generator based on SRAM PUFs. Zbl 1285.94104 van der Leest, Vincent; van der Sluis, Erik; Schrijen, Geert-Jan; Tuyls, Pim; Handschuh, Helena 3 2012 Key-recovery attacks on universal hash function based MAC algorithms. Zbl 1183.94035 Handschuh, Helena; Preneel, Bart 17 2008 Blind differential cryptanalysis for enhanced power attacks. Zbl 1161.94403 Handschuh, Helena; Preneel, Bart 1 2007 Security analysis of SHA-256 and sisters. Zbl 1081.94524 Gilbert, Henri; Handschuh, Helena 11 2004 On related-key and collision attacks: The case for the IBM 4758 cryptoprocessor. Zbl 1109.68483 Phan, Raphael C.-W.; Handschuh, Helena 1 2004 GEM: a Generic chosen-ciphertext secure Ecryption Method. Zbl 1048.94504 Coron, Jean-Sébastien; Handschuh, Helena; Joye, Marc; Paillier, Pascal; Pointcheval, David; Tymen, Christophe 10 2002 Optimal chosen-ciphertext secure encryption of arbitrary-length messages. Zbl 1056.68542 Coron, Jean-Sébastien; Handschuh, Helena; Joye, Marc; Paillier, Pascal; Pointcheval, David; Tymen, Christophe 2 2002 Analysis of SHA-1 in encryption mode. Zbl 0995.94541 Handschuh, Helena; Knudsen, Lars R.; Robshaw, Matthew J. 5 2001 A statistical attack on RC6. Zbl 0994.68636 Gilbert, Henri; Handschuh, Helena; Joux, Antoine; Vaudenay, Serge 2 2001 ECC: Do we need to count? Zbl 0977.94026 Coron, Jean-Sébastien; Handschuh, Helena; Naccache, David 2 1999 Decision-oracles are equivalent to matching oracles. Zbl 0929.94014 Handschuh, Helena; Tsiounis, Yiannis; Yung, Moti 1 1999 Probing attacks on tamper-resistant devices. Zbl 0955.94012 Handschuh, Helena; Paillier, Pascal; Stern, Jacques 1 1999 A timing attack on RC5. Zbl 0929.94013 Handschuh, Helena; Heys, Howard M. 1 1999 \(\chi^2\) cryptanalysis of the SEAL encryption algorithm. Zbl 1385.94041 Handschuh, Helena; Gilbert, Henri 1 1997 all cited Publications top 5 cited Publications all top 5 Cited by 143 Authors 5 Kiltz, Eike 5 Preneel, Bart 5 Sanadhya, Somitra Kumar 5 Sarkar, Palash 4 Standaert, Francois-Xavier 3 Cid, Carlos Frederico 2 Bibak, Khodakhast 2 Gu, Dawu 2 Kim, Jongsung 2 Mennink, Bart 2 Procter, Gordon 2 Rechberger, Christian 2 Sekar, Gautham 2 Seurin, Yannick 2 Shoup, Victor 1 Abdelkhalek, Ahmed 1 Abe, Masayuki 1 Adhikari, Avishek 1 AlTawy, Riham 1 Alwen, Joël 1 Arapinis, Myrto 1 Aref, Mohammad Reza 1 Armour, Marcel 1 Azarderakhsh, Reza 1 Azimi, Seyyed Arash 1 Barthe, Gilles 1 Bellare, Mihir 1 Bisheh-Niasar, Mojtaba 1 Black, John Richard 1 Blake, Ian F. 1 Blanchet, Bruno 1 Bogdanov, Andrey 1 Bruneau, Nicolas 1 Buchmann, Johannes A. 1 Castagnos, Guilhem 1 Chaturvedi, Atul 1 Chen, Lanxiang 1 Chen, Tzer-Shyong 1 Chen, Yulong 1 Chiann, Chang 1 Cochran, Martin 1 Cogliati, Benoît 1 Dagdelen, Özgür 1 Das, Angsuman 1 De Meyer, Lauren 1 de Souza, Ramon Hugo 1 Dupressoir, François 1 Edla, Damodar Reddy 1 El Bansarkhani, Rachid 1 Faust, Sebastian 1 Fuhr, Thomas 1 Fukushima, Kazuhide 1 Garefalakis, Theo 1 Ge, Jiangxia 1 Ghebleh, Mohammad 1 Gilbert, Henri 1 Grégoire, Benjamin 1 Guilley, Sylvain 1 Hauck, Eduard 1 Heuser, Annelie 1 Hofheinz, Dennis 1 Hölbl, Marko 1 Homma, Naofumi 1 Indesteege, Sebastiaan 1 Jiang, Haodong 1 Joye, Marc 1 Kanso, Ali 1 Kapron, Bruce M. 1 Katsumata, Shuichi 1 Kim, Chong Hee 1 Kircanski, Aleksandar 1 Kiyomoto, Shinsaku 1 Kwiatkowski, Kris 1 Laguillaumie, Fabien 1 Lamprou, Nikolaos 1 Leander, Gregor 1 Lee, Sangjin 1 Lee, Yuseop 1 Leurent, Gaëtan 1 Li, Wei 1 Li, Zhibin 1 Liang, Huicong 1 Lipp, Benjamin 1 Luykx, Atul 1 Ma, Zhi 1 Mendel, Florian 1 Mesnager, Sihem 1 Mishra, Rahul Kumar 1 Misra, Manoj Kumar 1 Mohajeri, Javad 1 Mozaffari-Kermani, Mehran 1 Nakahara, Jorge jun. 1 Nakano, Yuto 1 Nesterenko, Aleksey Yu. 1 Okamoto, Tatsuaki 1 Paar, Christof 1 Paul, Souradyuti 1 Phan, Raphael Chung-Wei 1 Pintore, Federico 1 Poschmann, Axel Y. ...and 43 more Authors all top 5 Cited in 16 Serials 5 Journal of Cryptology 3 Designs, Codes and Cryptography 2 Cryptography and Communications 2 Matematicheskie Voprosy Kriptografii 1 Computers & Mathematics with Applications 1 Information Processing Letters 1 Physics Letters. A 1 Applied Mathematics and Computation 1 Journal of Complexity 1 International Journal of Foundations of Computer Science 1 Nonlinear Dynamics 1 Wuhan University Journal of Natural Sciences (WUJNS) 1 Journal of Discrete Mathematical Sciences & Cryptography 1 Quantum Information Processing 1 Journal of Mathematical Cryptology 1 Arabian Journal for Science and Engineering all top 5 Cited in 7 Fields 60 Information and communication theory, circuits (94-XX) 11 Computer science (68-XX) 4 Quantum theory (81-XX) 1 Combinatorics (05-XX) 1 Number theory (11-XX) 1 Algebraic geometry (14-XX) 1 Ordinary differential equations (34-XX) Citations by Year