| A practical implementation of the timing attack JF Dhem, F Koeune, PA Leroux, P Mestré, JJ Quisquater, JL Willems International Conference on Smart Card Research and Advanced Applications …, 1998 | 523 | 1998 |
| The swiss-knife RFID distance bounding protocol CH Kim, G Avoine, F Koeune, FX Standaert, O Pereira International conference on information security and cryptology, 98-115, 2008 | 248 | 2008 |
| Robust object watermarking: Application to code JP Stern, G Hachez, F Koeune, JJ Quisquater International Workshop on Information Hiding, 368-378, 1999 | 203 | 1999 |
| Compact implementation and performance evaluation of block ciphers in ATtiny devices T Eisenbarth, Z Gong, T Güneysu, S Heyse, S Indesteege, S Kerckhof, ... International Conference on Cryptology in Africa, 172-187, 2012 | 165 | 2012 |
| A tutorial on physical security and side-channel attacks F Koeune, FX Standaert International School on Foundations of Security Analysis and Design, 78-108, 2004 | 152 | 2004 |
| How to compare profiled side-channel attacks? FX Standaert, F Koeune, W Schindler International Conference on Applied Cryptography and Network Security, 485-498, 2009 | 116 | 2009 |
| A timing attack against Rijndael F Koeune, JJ Quisquater Université catholique de Louvain, 1999 | 98 | 1999 |
| Biometrics, access control, smart cards: a not so simple combination G Hachez, JJ Quisquater, F Koeune Smart Card Research and Advanced Applications: IFIP TC8/WG8. 8 Fourth …, 2000 | 90 | 2000 |
| A systematic appraisal of side channel evaluation strategies M Azouaoui, D Bellizia, I Buhan, N Debande, S Duval, C Giraud, ... International Conference on Research in Security Standardisation, 46-66, 2020 | 71 | 2020 |
| Compact implementation and performance evaluation of hash functions in attiny devices J Balasch, B Ege, T Eisenbarth, B Gérard, Z Gong, T Güneysu, S Heyse, ... International conference on smart card research and advanced applications …, 2012 | 70 | 2012 |
| Towards fresh and hybrid re-keying schemes with beyond birthday security C Dobraunig, F Koeune, S Mangard, F Mendel, FX Standaert International Conference on Smart Card Research and Advanced Applications …, 2015 | 60 | 2015 |
| Linear feedback shift registers A Klein Stream Ciphers, 17-58, 2013 | 52 | 2013 |
| Improving divide and conquer attacks against cryptosystems by better error detection/correction strategies W Schindler, F Koeune, JJ Quisquater IMA International Conference on Cryptography and Coding, 245-267, 2001 | 49 | 2001 |
| cAESar results: Implementation of four AES candidates on two smart cards G el Hachez, F cois Koeune, JJ Quisquater | 40 | 1999 |
| Ciphertext integrity with misuse and leakage: Definition and efficient constructions with symmetric primitives F Berti, F Koeune, O Pereira, T Peters, FX Standaert Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 39 | 2018 |
| Timing attack: what can be achieved by a powerful adversary? G Hachez, F Koeune, JJ Quisquater SYMPOSIUM ON INFORMATION THEORY IN THE BENELUX, 63-70, 1999 | 37 | 1999 |
| A new type of timing attack: Application to GPS J Cathalo, F Koeune, JJ Quisquater International Workshop on Cryptographic Hardware and Embedded Systems, 291-303, 2003 | 36 | 2003 |
| Comments by the NESSIE Project on the AES Finalists B Preneel, A Bosselaers, V Rijmen, B Van Rompay, L Granboulan, ... AES Round 2, 2000 | 30 | 2000 |
| SWISH: secure WiFi sharing D Leroy, G Detal, J Cathalo, M Manulis, F Koeune, O Bonaventure Computer Networks 55 (7), 1614-1630, 2011 | 29 | 2011 |
| Short private exponent attacks on fast variants of RSA M Ciet, F Koeune, F Laguillaumie, JJ Quisquater UCL Crypto Group Technical Report Series CG-2002/4, University Catholique de …, 2002 | 27 | 2002 |