Publications

Search publications by date:
1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004
2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014
2015 | 2016 | 2017 | 2018 | 2019 | Latest | Forthcoming
BibTeX - Year 2008

Publications dated 2008

February 2008

François Mace, François-Xavier Standaert, and Jean-Jacques Quisquater. FPGA Implementation(s) of a Scalable Encryption Algorithm, In IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Volume 16-2, pages 212-216, February 2008 BibTeX

Jean-Jacques Quisquater, Baudoin Collard, and François-Xavier Standaert. Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent, Fast Software Encryption 2008, Volume 5086 of Lecture Notes on Computer Science, pages 382-397, Springer, February 2008 PDF BibTeX

March 2008

Olivier Pereira, Nancy Lynch, Moses Liskov, Dilsun Kaynar, Ling Cheung, Roberto Segala, and Ran Canetti. Analyzing Security Protocols Using Time-Bounded Task-PIOAs, In Discrete Event Dynamic Systems, Volume 18-1, pages 111-159, March 2008 PDF BibTeX

Benoit Libert, and Damien Vergnaud. Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption, In R. Cramer , editor(s), 11th International Workshop on Practice and Theory in Public Key Cryptography (PKC 2008), Volume 4939 of Lecture Notes in Computer Science, pages 360-379, Springer, March 2008 BibTeX

Alexander W. Dent, Benoit Libert, and Kenneth G. Paterson. Certificateless Encryption Schemes Strongly Secure in the Standard Model, In R. Cramer, editor(s), 11th International Workshop on Practice and Theory in Public-Key Cryptography (PKC 2008), Volume 4939 of Lecture Notes in Computer Science, pages 344-359, Springer, March 2008 BibTeX

Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi, and Joerg Schwenk. Provably Secure Browser-Based User-Aware Mutual Authentication over TLS, In M. Abe and V. Gligor, editor(s), ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008), pages 300-311, ACM Press, March 2008 BibTeX

Emmanuel Bresson, and Mark Manulis. Securing Group Key Exchange against Strong Corruptions, In M. Abe and V. Gligor, editor(s), ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008), pages 249-260, ACM Press, March 2008 BibTeX

Christophe Petit, François-Xavier Standaert, Olivier Pereira, Tal G. Malkin, and Moti Yung. A Block Cipher based Pseudo Random Number Generator Secure Against Side-Channel Key Recovery, In M. Abe and V. Gligor, editor(s), ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications security, pages 56--65, ACM, March 2008 PDF BibTeX

April 2008

Frederik Armknecht, Alberto Escalante, Hans Loehr, Mark Manulis, and Ahmad-Reza Sadeghi. Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly, In L. Chen, Y. Mu, and W. Susilo, editor(s), 4th Information Security Practice and Experience Conference (ISPEC 2008), Volume 4991 of Lecture Notes in Computer Science, pages 29-44, Springer, April 2008 BibTeX

May 2008

François Gosset, François-Xavier Standaert, and Jean-Jacques Quisquater. FPGA Implementation of SQUASH, Twenty-ninth Symposium on Information Theory in the Benelux, May 2008 BibTeX

Giacomo de Meulenaer, François Gosset, François-Xavier Standaert, and Luc Vandendorpe. On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks, Twenty-ninth Symposium on Information Theory in the Benelux, May 2008 PDF BibTeX

June 2008

Philippe Bulens, François-Xavier Standaert, Jean-Jacques Quisquater, Pascal Pellegrin, and Gaël Rouvroy. Implementation of the AES-128 on Virtex-5 FPGAs, Progress in Cryptology - AfricaCrypt 2008, Volume 5023 of Lecture Notes in Computer Science, pages 16 - 26, Springer, June 2008 BibTeX

Chong Hee Kim, Philippe Bulens, Christophe Petit, and Jean-Jacques Quisquater. Fault Attacks on Public Key Elements: Application to DLP based Schemes, Fifth European PKI Workshop - EUROPKI 2008, Volume 5057 of Lecture Notes in Computer Science, pages 182 - 195, Springer, June 2008 PDF BibTeX

July 2008

Sebastian Gajek, Mark Manulis, and Joerg Schwenk. Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same-Origin Policy, In Y. Mu, W. Susilo, and J. Seberry, editor(s), 13th Australasian Conference on Information Security and Privacy (ACISP 2008), Volume 5107 of Lecture Notes in Computer Science, pages 6-20, Springer, July 2008 BibTeX

Sébastien Canard, and Iwen Coisel. Data Synchronization in Privacy-Preserving RFID Authentication Schemes, Workshop on RFID Security -- RFIDSec'08, July 2008 PDF BibTeX

Ben Adida, and Olivier Pereira. Proceedings of WOTE 2008 -- IAVoSS Workshop On Trustworthy Elections , July 2008 BibTeX

August 2008

Ran Canetti, Ling Cheung, Dilsun Kaynar, Nancy Lynch, and Olivier Pereira. Modeling Computational Security in Long-Lived Systems, In van Breugel, Franck; Chechik, Marsha, editor(s), CONCUR 2008 - Concurrency Theory, Volume 5201 of LNCS, Springer, August 2008 PDF BibTeX

Christophe Petit, Jean-Jacques Quisquater, and Nicolas Veyrat-Charvillon. Efficiency and Pseudo-randomness of a Variant of Zémor-Tillich Hash Function, In Joseph Micallef , editor(s), ICECS2008 - IEEE International Conference on Electronics, Circuits, and Systems, pages 906-909, IEEE, August 2008 PDF BibTeX

September 2008

Emmanuel Bresson, and Mark Manulis. Contributory Group Key Exchange in the Presence of Malicious Participants, In IET Information Security, Volume 2-3, pages 85-93, September 2008 BibTeX

Benoit Libert, and Damien Vergnaud. Tracing Malicious Proxies in Proxy Re-Encryption, In S. Galbraith and K. Paterson, editor(s), 2nd International Conference on Pairing-Based Cryptography (Pairing 2008), Volume 5209 of Lecture Notes in Computer Science, pages 332-353, Springer, September 2008, To Appear BibTeX

Chong Hee Kim, and Jean-Jacques Quisquater. New Differential Fault Analysis on AES Key Schedule: Two Faults are enough, Eighth Smart Card Research and Advanced Application IFIP Conference - CARDIS 2008, Volume 5189 of Lecture Notes in Computer Science, pages 48-60, Springer-Verlag, September 2008 BibTeX

Christophe Petit, Kristin Lauter, and Jean-Jacques Quisquater. Full Cryptanalysis of LPS and Morgenstern Hash Functions, In Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti, editor(s), SCN 2008 - Sixth Conference on Security and Cryptography for Networks, Volume 5229 of Lecture Notes in Computer Science, pages 263-277, Springer Verlag, September 2008 PDF BibTeX

Liqun Chen, Hans Loehr, Mark Manulis, and Ahmad-Reza Sadeghi. Property-Based Attestation without a Trusted Third Party, In T.-C. Wu et al., editor(s), 11th Information Security Conference (ISC 2008), Volume 5222 of Lecture Notes in Computer Science, pages 31-46, Springer-Verlag, September 2008 BibTeX

Jörn-Marc Schmidt, and Chong Hee Kim. A Probing Attack on AES, The 9th International Workshop on Information Security Applications - WISA 2008, Lecture Notes in Computer Science, Springer, September 2008, to appear BibTeX

October 2008

Sebastian Gajek, Tibor Jager, Mark Manulis, and Joerg Schwenk. A Browser-Based Kerberos Authentication Scheme, 13th European Symposium on Research in Computer Security (ESORICS 2008), Volume 5283 of LNCS, pages 115-129, Springer, October 2008 BibTeX

Dina Heidar Kamel, David Bol, and Denis Flandre. Impact of Layout Style and Parasitic Capacitances in Full Adder, SOI Conference, IEEE, October 2008 PDF BibTeX

Emmanuel Bresson, and Mark Manulis. Securing Group Key Exchange against Strong Corruptions and Key Registration Attacks, In International Journal of Applied Cryptography, Volume 1-2, pages 91-107, October 2008 BibTeX

Giacomo de Meulenaer, François Gosset, François-Xavier Standaert, and Olivier Pereira. On the Energy Cost of Communications and Cryptography in Wireless Sensor Networks, (extended version), IEEE International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications (SecPriWiMob'2008), pages 580 - 585, October 2008 PDF BibTeX

Chong Hee Kim, and Jean-Jacques Quisquater. Method for Detecting Vulnerability to Doubling Attacks, 10th International Conference on Information and Communications Security - ICICS 2008, Volume 5308 of Lecture Notes in Computer Science, pages 97-110, Springer-Verlag, October 2008 BibTeX

Romain Robert, Mark Manulis, Florence De Villenfagne, Damien Leroy, Julien Jost, François Koeune, Caroline Ker, Jean-Marc Dinant, Yves Poullet, Olivier Bonaventure, and Jean-Jacques Quisquater. WiFi Roaming: Legal Implications and Security Constraints, In International Journal of Law and Information Technology, Volume 16-3, pages 205-241, October 2008 BibTeX

Benoit Libert, and Damien Vergnaud. Multi-Use Unidirectional Proxy Re-Signatures, In P. Syverson and S. Jha, editor(s), 15th ACM Conference on Computer and Communications Security (ACM-CCS 2008), pages 511-520, ACM Press, October 2008, BibTeX

Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, and Joerg Schwenk. Universally Composable Security Analysis of TLS, 2nd International Conference on Provable Security (ProvSec 2008), Volume 5324 of LNCS, pages 313-327, Springer, October 2008 PDF BibTeX

December 2008

Chong Hee Kim, Gildas Avoine, François Koeune, François-Xavier Standaert, and Olivier Pereira. The Swiss-Knife RFID Distance Bounding Protocol, The 11th International Conference on Information Security and Cryptology - ICISC 2008, Volume 5461 of Lecture Notes in Computer Science, pages 98-115, Springer-Verlag, December 2008 BibTeX

Copyright Notice

(click here to expand/retract)