Publications

Search publications by date:
1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004
2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014
2015 | 2016 | 2017 | 2018 | Latest | Forthcoming
BibTeX - Year 2010

Publications dated 2010

January 2010

Sébastien Canard, Iwen Coisel, and Jonathan Etrog. Lighten Encryption Schemes for Secure and Private RFID Systems, In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, Francesc Sebé, editor(s), Financial Cryptography Workshops, Volume 6054 of Lecture Notes in Computer Science (LNCS), pages 19 - 33, Spinger, January 2010 PDF BibTeX

February 2010

Benoit Libert, and Moti Yung. Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs, In D. Micciancio, editor(s), Theory of Cryptography Conference 2010 (TCC'10), Volume 5978 of Lecture Notes in Computer Science (LNCS), pages 499-517, Spinger, February 2010, BibTeX

March 2010

Antonino Tumeo, Francesco Regazzoni, Gianluca Palermo, Fabrizio Ferrandi, and Donatella Sciuto. A Reconfigurable Multiprocessor Architecture for a Reliable Face Recognition Implementation, Proceedings of Design, Automation and Test in Europe, 2010, March 2010 BibTeX

Giacomo de Meulenaer, and François-Xavier Standaert. Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks, March 2010, Extended abstract of the poster presented at the third ACM conference on Wireless Network Security (WiSec ’10) PDF BibTeX

April 2010

Benoit Libert, and Moti Yung. Dynamic Fully Foward-Secure Group Signatures, In D. Basin and P. Liu, editor(s), 5th ACM Symposium on Information, Computer and Communications Security (AsiaCCS 2010), ACM Press, April 2010, to appear BibTeX

May 2010

David Galindo, Benoit Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis, and Dominique Schröder. Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions, In D. Bernstein and T. Lange, editor(s), Progress in Cryptology - Africacrypt 2010, Volume 6055 of Lecture Notes in Computer Science (LNCS), pages 333-350, Springer, May 2010 BibTeX

Marcel Medwed, François-Xavier Standaert, Johann Großschädl, and Francesco Regazzoni. Fresh Re-Keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices, Progress in Cryptology - Africacrypt 2010, Volume 6055 of Lecture Notes in Computer Science (LNCS), pages 279-296, Springer Verlag, May 2010 BibTeX

Giacomo de Meulenaer, and François-Xavier Standaert. Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks, 2nd International Conference on Mobile Lightweight Wireless Systems (MOBILIGHT 2010), Springer's Lecture Notes of ICST - LNICST, May 2010 PDF BibTeX

Saloomeh Shariati, François-Xavier Standaert, Laurent Jacques, Benoit Macq, Mohamad Amine Salhi, and Philippe Antoine. Random Profiles of Laser Marks, In Proceedings of the 31th symposium on Information Theory in the Benelux, pages 27-34, May 2010 PDF BibTeX

Nuttapong Attrapadung, and Benoit Libert. Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation, In P. Nguyen and D. Pointcheval, editor(s), 13th International Conference on Practice and Theory in Public Key Cryptography (PKC 2010), Volume 6056 of Lecture Notes in Computer Science (LNCS), pages 384-402, Springer, May 2010 BibTeX

June 2010

Gildas Avoine, Iwen Coisel, and Tania Martin. Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols, In S.B. Ors Yalcin, editor(s), Workshop on RFID Security -- RFIDSec'10, Volume 6370 of Lecture Notes in Computer Science (LNCS), pages 138--157, Spinger, June 2010 PDF BibTeX

Sébastien Canard, Iwen Coisel, and Marc Girault. Security of Privacy-Preserving RFID Systems, IEEE International Conference on RFID-Technology and Applications -- RFID-TA'10, pages 269--274, IEEE, June 2010 BibTeX

Baudoin Collard, and François-Xavier Standaert. Multi-Trail Statistical Saturation Attacks, ACNS 2010, Volume 6487 of Lecture Notes in Computer Science, pages 123-138, Springer, June 2010 PDF BibTeX

Mathieu Renauld, and François-Xavier Standaert. Representation-, Leakage- and Cipher- Dependencies in Algebraic Side-Channel Attacks, industrial track of ACNS 2010, June 2010 PDF BibTeX

July 2010

Benoit Libert, and Moti Yung. Efficient Completely Non-Malleable Public Key Encryption, In P. Spirakis, S. Abramsky & F. Meyer auf der Heide, editor(s), 37th International Colloquium on Automata, Languages and Programming (ICALP 2010) - Track A, Volume 6198 of Lecture Notes in Computer Science (LNCS), pages 127-139, Springer, July 2010, To appear BibTeX

Sébastien Canard, Iwen Coisel, Jonathan Etrog, and Marc Girault. Privacy-Preserving RFID Systems: Model and Constructions, In Cryptology ePrint Archive, July 2010 PDF BibTeX

August 2010

François-Xavier Standaert. How Leaky is an Extractor?, proceedings of LatinCrypt 2010, Volume 6212 of Lecture Notes in Computer Science, pages 294-304, Spinger, August 2010 BibTeX

Ben Adida, and Olivier Pereira. State of Helios 2010: features and deployments, EVT/WOTE'10 -- Rump Session Talk, August 2010 PDF BibTeX

Christophe Petit, and Jean-Jacques Quisquater. Preimages for the Tillich-Zémor hash function, In Alex Biryukov and Guang Gong and Douglas R. Stinson, editor(s), SAC2010 Selected Areas in Cryptography, Volume 6544 of Lecture Notes in Computer Science, pages 282-301, Springer, August 2010 PDF BibTeX

September 2010

Philippe Bulens, François-Xavier Standaert, and Jean-Jacques Quisquater. How to Strongly Link Data and its Medium: the Paper Case, In IET Information Security, Volume 2-4, pages 125-236, September 2010 BibTeX

Dina Heidar Kamel, Cédric Hocquet, François-Xavier Standaert, Denis Flandre, and David Bol. Glitch-Induced Within-Die Variations of Dynamic Energy in Voltage-Scaled Nano-CMOS Circuits, proceedings of ESSCIRC 2010, September 2010 BibTeX

Saloomeh Shariati, Laurent Jacques, François-Xavier Standaert, Benoit Macq, Mohamad Amine Salhi, and Philippe Antoine. Randomly Driven Fuzzy Key Extraction of Uncloneable Images, In The International Conference on Image Processing (ICIP), September 2010 PDF BibTeX

October 2010

Yu Yu, François-Xavier Standaert, Olivier Pereira, and Moti Yung. Practical leakage-resilient pseudorandom generators, Proceedings of the 17th ACM conference on Computer and communications security, pages 141--151 , ACM, October 2010 PDF BibTeX

Paolo Palmieri, and Olivier Pereira. Building Oblivious Transfer on Channel Delays, In X. Lai, M. Yung and D. Lin, editor(s), 6th China International Conference on Information Security and Cryptology (Inscrypt 2010), Volume 6584 of Lecture Notes in Computer Science (LNCS), pages 125-138, Springer, October 2010 PDF BibTeX

Alessandro Barenghi, Luca Breveglieri, Israel Koren, Gerardo Pelosi, and Francesco Regazzoni. Low Cost Software Countermeasures Against Fault Attacks: Implementation and Performances Trade Offs, In Proceedings of 5th Workshop on Embedded Systems Security (WESS) 2010, October 2010 BibTeX

Julien Cathalo, and Christophe Petit. One-time trapdoor one-way functions, In Mike Burmester and Gene Tsudik and Spyros S. Magliveras and Ivana Ilic, editor(s), Information Security - 13th International Conference (ISC 2010) , Volume 6531 of Lecture Notes in Computer Science, pages 283-298, Springer, October 2010 PDF BibTeX

November 2010

François-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, and Elisabeth Oswald. Leakage Resilient Cryptography in Practice, In Towards Hardware Intrinsic Security: Foundation and Practice, pages 105-139, Springer, November 2010 BibTeX

Sophie Mawet, Olivier Pereira, and Christophe Petit. Equitable cake cutting without mediator, In Svetla Nikova and Lejla Batina, editor(s), 5th Benelux Workshop on Information and System Security, November 2010 PDF BibTeX

December 2010

Jörn-Marc Schmidt, and Marcel Medwed. Fault Attacks on the Montgomery Powering Ladder, ICISC 2010, pages in press, December 2010 PDF BibTeX

Sébastien Canard, Iwen Coisel, Giacomo de Meulenaer, and Olivier Pereira. Group Signatures are Suitable for Constrained Devices, ICISC 2010, Lecture Notes in Computer Science (LNCS), Springer, December 2010 PDF BibTeX

Benoit Libert, Jean-Jacques Quisquater, and Moti Yung. Key Evolution Systems in Untrusted Update Environments, In ACM Transactions on Information and System Security (TISSEC), Volume 13-4, December 2010 BibTeX

Jean-Francois Gallais, Johann Großschädl, Neil Hanley, Marcel Medwed, Markus Kasper, Francesco Regazzoni, Jörn-Marc Schmidt, Stefan Tillich, and Marcin Wojcik. Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software, In Proceedings of 2nd International Conference on Trusted Systems, (INTRUST) 2010, December 2010 BibTeX

Copyright Notice

(click here to expand/retract)