Follow
Pascal Junod
Pascal Junod
Cryptographer
Verified email at junod.info - Homepage
Title
Cited by
Cited by
Year
Long-term performance of the SwissQuantum quantum key distribution network in a field environment
D Stucki, M Legré, F Buntschu, B Clausen, N Felber, N Gisin, L Henzen, ...
New Journal of Physics 13, 123001, 2011
3882011
Obfuscator-LLVM—Software Protection for the Masses
P Junod, J Rinaldini, J Wehrli, J Michielin
Proceedings of the IEEE/ACM 1st International Workshop on Software …, 2015
3512015
How far can we go beyond linear cryptanalysis?
T Baigneres, P Junod, S Vaudenay
Advances in Cryptology-Asiacrypt 2004, 113-128, 2004
2682004
FOX: a new family of block ciphers
P Junod, S Vaudenay
Selected Areas in Cryptography, 114-129, 2005
1922005
Perfect Diffusion Primitives for Block Ciphers -- Building Efficient MDS Matrices
P Junod, S Vaudenay
Selected Areas in Cryptography, 84-99, 2005
135*2005
On the complexity of Matsui’s attack
P Junod
Selected Areas in Cryptography, 199-211, 2001
1312001
A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing
N Walenta, A Burg, D Caselunghe, J Constantin, N Gisin, O Guinnard, ...
New Journal of Physics 16 (1), 013047, 2014
1262014
Characterization and improvement of time-memory trade-off based on perfect tables
G Avoine, P Junod, P Oechslin
ACM Transactions on Information and System Security (TISSEC) 11 (4), 1-22, 2008
1062008
Cryptographie: théorie et pratique
DR Stinson, S Vaudenay
International Thompson Publ. France, 1996
104*1996
On the optimality of linear, differential, and sequential distinguishers
P Junod
Advances in Cryptology—EUROCRYPT 2003, 643-643, 2003
812003
Optimal key ranking procedures in a statistical cryptanalysis
P Junod, S Vaudenay
Fast Software Encryption, 235-246, 2003
802003
Time-memory trade-offs: False alarm detection using checkpoints
G Avoine, P Junod, P Oechslin
Progress in Cryptology-INDOCRYPT 2005, 183-196, 2005
732005
An efficient public-key attribute-based broadcast encryption scheme allowing arbitrary access policies
P Junod, A Karlov
Proceedings of the tenth annual ACM workshop on Digital rights management, 13-24, 2010
612010
Cryptographic secure pseudo-random bits generation: The Blum-Blum-Shub generator
P Junod
Viewed 11/12/2006, http://crypto. junod. info/bbs, 1999
56*1999
Statistical cryptanalysis of block ciphers
P Junod
EPFL, 2005
522005
An FPGA-based 4 Mbps secret key distillation engine for quantum key distribution systems
J Constantin, R Houlmann, N Preyss, N Walenta, H Zbinden, P Junod, ...
Journal of Signal Processing Systems 86, 1-15, 2017
332017
A classical introduction to cryptography exercise book
T Baignères, P Junod, Y Lu, J Monnerat, S Vaudenay
Springer-Verlag New York Inc, 2006
282006
Linear cryptanalysis of DES
P Junod
Master's thesis, Swiss Institute of Technology, Zurich, 2000
282000
Device and a method for generating software code
P Junod
US Patent 9,053,300, 2015
232015
Advanced Linear Cryptanalysis of Block and Stream Ciphers
P Junod, A Canteaut
IOS Press, 2011
232011
The system can't perform the operation now. Try again later.
Articles 1–20