| Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface PK Agarwal, T Akutsu, A Amihood, A Apostolico, C Benham, G Benson, ... Lecture notes in computer science (including subseries lecture notes in …, 2005 | 525* | 2005 |
| New stream cipher designs: the eSTREAM finalists M Robshaw, O Billet Springer, 2008 | 400* | 2008 |
| Cryptanalysis of a white box AES implementation O Billet, H Gilbert, C Ech-Chatbi International workshop on selected areas in cryptography, 227-240, 2004 | 368 | 2004 |
| Sosemanuk, a Fast Software-Oriented Stream Cipher C Berbain, O Billet, A Canteaut, N Courtois, H Gilbert, L Goubin, A Gouget, ... New Stream Cipher Designs: The eSTREAM Finalists, 98-118, 2008 | 241 | 2008 |
| The Jacobi model of an elliptic curve and side-channel analysis O Billet, M Joye International Symposium on Applied Algebra, Algebraic Algorithms, and Error …, 2003 | 178 | 2003 |
| Cryptanalysis of rainbow O Billet, H Gilbert International Conference on Security and Cryptography for Networks, 336-347, 2006 | 114 | 2006 |
| Sha-3 proposal: ECHO R Benadjila, O Billet, H Gilbert, G Macario-Rat, T Peyrin, M Robshaw, ... Submission to NIST (updated), 113, 2009 | 100 | 2009 |
| An efficient forward private RFID protocol C Berbain, O Billet, J Etrog, H Gilbert Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 86 | 2009 |
| Analysis of intermediate field systems O Billet, J Patarin, Y Seurin Cryptology ePrint Archive, 2009 | 86 | 2009 |
| A traceable block cipher O Billet, H Gilbert International Conference on the Theory and Application of Cryptology and …, 2003 | 76 | 2003 |
| Efficient traitor tracing from collusion secure codes O Billet, DH Phan International Conference on Information Theoretic Security, 171-182, 2008 | 60 | 2008 |
| Resistance of SNOW 2.0 against algebraic attacks O Billet, H Gilbert Cryptographers’ Track at the RSA Conference, 19-28, 2005 | 57 | 2005 |
| Lightweight privacy preserving authentication for RFID using a stream cipher O Billet, J Etrog, H Gilbert International Workshop on Fast Software Encryption, 55-74, 2010 | 56 | 2010 |
| The Intel AES instructions set and the SHA-3 candidates R Benadjila, O Billet, S Gueron, MJB Robshaw International Conference on the Theory and Application of Cryptology and …, 2009 | 50 | 2009 |
| Cryptanalysis of the square cryptosystems O Billet, G Macario-Rat International Conference on the Theory and Application of Cryptology and …, 2009 | 48 | 2009 |
| On building hash functions from multivariate quadratic equations O Billet, MJB Robshaw, T Peyrin Australasian Conference on Information Security and Privacy, 82-95, 2007 | 48 | 2007 |
| Efficient implementations of multivariate quadratic systems C Berbain, O Billet, H Gilbert International Workshop on Selected Areas in Cryptography, 174-187, 2006 | 42 | 2006 |
| Decim–a new stream cipher for hardware applications C Berbain, O Billet, A Canteaut, N Courtois, B Debraize, H Gilbert, ... ECRYPT Stream Cipher Project Report 4, 2005 | 35 | 2005 |
| D ecim v 2 C Berbain, O Billet, A Canteaut, N Courtois, B Debraize, H Gilbert, ... New Stream Cipher Designs, 140-151, 2008 | 34 | 2008 |
| Traitors collaborating in public: Pirates 2.0 O Billet, DH Phan Annual International Conference on the Theory and Applications of …, 2009 | 32 | 2009 |