Publications

Search publications by date:
1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004
2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014
2015 | 2016 | 2017 | 2018 | 2019 | Latest | Forthcoming
BibTeX - Year 2011

Publications dated 2011

January 2011

Christophe Petit, and Jean-Jacques Quisquater. Cayley hash functions, Henk C. A. van Tilborg and Sushil Jajodia ed., In Encyclopedia of cryptography and security - 2nd edition, Springer, January 2011 BibTeX

February 2011

Francesco Regazzoni, Wang Yi, and François-Xavier Standaert. FPGA Implementations of the AES Masked Against Power Analysis Attacks, In Proceedings of 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE), February 2011 BibTeX

March 2011

Nuttapong Attrapadung, and Benoit Libert. Homomorphic Network Coding Signatures in the Standard Model, In R. Gennaro, editor(s), Public Key Cryptography 2011 (PKC 2011), Volume 6571 of Lecture Notes in Computer Science (LNCS), pages 17-34, Springer, March 2011, BibTeX

Nuttapong Attrapadung, Benoit Libert, and Elie de Panafieu. Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts, In R. Gennaro, editor(s), Public Key Cryptography 2011 (PKC 2011), Volume 6571 of Lecture Notes in Computer Science (LNCS), pages 90-108, Springer, March 2011, BibTeX

Benoit Libert, and Damien Vergnaud. Unidirectional Chosen-Ciphertext Secure Proxy Re- Encryption, In IEEE Transactions on Information Theory, Volume 57-3, pages 1786-1802, March 2011 BibTeX

Benoit Libert, and Moti Yung. Efficient Traceable Signatures in the Standard Model, In Theoretical Computer Science, Volume 412-12-14, pages 1220-1242, March 2011 BibTeX

Marcel Medwed, and Stefan Mangard. Arithmetic Logic Units with High Error Detection Rates to Counteract Fault Attacks, DATE 2011, pages in press, March 2011 PDF BibTeX

Olivier Pereira. Leakage-resilient Stream Ciphers: an Overview, In Ralf Küsters, Michaël Rusinowitch, editor(s), 2011 Grande Region Security and Reliability Day, March 2011 PDF BibTeX

April 2011

Cédric Hocquet, Dina Heidar Kamel, Francesco Regazzoni, Jean-Didier Legat, Denis Flandre, David Bol, and François-Xavier Standaert. Harvesting the potential of nano-CMOS for lightweight cryptography: An ultra-low-voltage 65 nm AES coprocessor for passive RFID tags, In Journal of Cryptographic Engineering, April 2011 BibTeX

June 2011

Ali Galip Bayrak, Francesco Regazzoni, Philip Brisk, François-Xavier Standaert, and Paolo Ienne. A First Step Towards Automatic Application of Power Analysis Countermeasures, In Proceedings of 48th Design Automation Conference (DAC), June 2011 BibTeX

Alessandro Cevrero, Francesco Regazzoni, Michael Schwander, Stephane Badel, Paolo Ienne, and Yusuf Leblebici. Power-Gated MOS Current Mode Logic (PG-MCML): A Power-Aware DPA-Resistant Standard Cell Library, In Proceedings of 48th Design Automation Conference (DAC), June 2011 BibTeX

Alessandro Barenghi, Cédric Hocquet, David Bol, François-Xavier Standaert, Francesco Regazzoni, and Israel Koren. Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-Threshold Devices through an Example of a 65nm AES Implementation, 7th Workshop on RFID Security and Privacy (RFIDSec) 2011, June 2011 BibTeX

July 2011

Benoit Libert, and Moti Yung. Adaptively Secure Non-Interactive Threshold Cryptosystems, In J. Sgall, L. Aceto & M. Henzinger, editor(s), 38th International Colloquium on Automata, Languages and Programming (ICALP 2011) - Track C, Volume 6756 of Lecture Notes in Computer Science (LNCS), pages 588-600, Springer, July 2011, BibTeX

Stéphanie Kerckhof, Baudoin Collard, and François-Xavier Standaert. FPGA Implementation of a Statistical Saturation Attack against PRESENT, In Nitaj, Abderrahmane and Pointcheval, David, editor(s), Progress in Cryptology – AFRICACRYPT 2011, Volume 6737 of Lecture Notes in Computer Science, pages 100-116, Springer, July 2011 PDF BibTeX

August 2011

Philippe Bulens, Damien Giry, and Olivier Pereira. Running Mixnet-Based Elections with Helios, In H. Shacham and V. Teague, editor(s), Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, Usenix, August 2011 BibTeX

Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, and Yu Yu. Leftover Hash Lemma, Revisited, In Phillip Rogaway, editor(s), Advances in Cryptology - CRYPTO 2011, Volume 6841 of Lecture Notes in Computer Science (LNCS), pages 1-20, Springer-Verlag, August 2011 PDF BibTeX

September 2011

David Bernhard, Veronique Cortier, Olivier Pereira, Ben Smyth, and Bogdan Warinschi. Adapting Helios for provable ballot privacy, In Vijay Atluri, Claudia Diaz, editor(s), Computer Security – ESORICS 2011, Lecture Notes in Computer Science, Springer, September 2011 PDF BibTeX

Stéphanie Kerckhof, François Durvaux, Nicolas Veyrat-Charvillon, Francesco Regazzoni, Guerric Meurice de Dormale, and François-Xavier Standaert. Low Cost FPGA Implementations of the SHA-3 Finalists, 10th Smart Card Research and Advanced Application Conference (CARDIS) 2011, September 2011 BibTeX

Marcel Medwed, Christophe Petit, Francesco Regazzoni, Mathieu Renauld, and François-Xavier Standaert. Fresh Re-Keying II: Securing Multiple Parties against Side-Channel and Fault Attacks, 10th Smart Card Research and Advanced Application Conference (CARDIS) 2011, September 2011 BibTeX

October 2011

Paolo Palmieri, and Olivier Pereira. Secure Two-Party Computation Over a Z-Channel, In X. Boyen and X. Chen, editor(s), ProvSec 2011, Volume 6980 of Lecture Notes in Computer Science (LNCS), pages 3-15, Springer, October 2011 PDF BibTeX

November 2011

Céline Blondeau, and Benoit Gérard. Differential Cryptanalysis of PUFFIN and PUFFIN2, November 2011 PDF BibTeX

Laurie Haustenne, Quentin De Neyer, and Olivier Pereira. Elliptic Curve Cryptography in JavaScript, In G. Leander and F.-X. Standaert, editor(s), ECRYPT Workshop on Lightweight Cryptography, November 2011 PDF BibTeX

December 2011

Paolo Palmieri, and Olivier Pereira. Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering, In Howon Kim, editor(s), 14th International Conference on Information Security and Cryptology (ICISC 2011), Volume 7259 of Lecture Notes in Computer Science (LNCS), pages 332–345, Springer, December 2011 PDF BibTeX

Marc Fischlin, Benoit Libert, and Mark Manulis. Non-Interactive and Re-Usable Universally Composable String Commitments with Adaptive Security, In D.-H. Lee & X. Wang, editor(s), Asiacrypt 2011, Volume 7073 of Lecture Notes in Computer Science, pages 468-485, Spinger, December 2011, BibTeX

Brett Hemenway, Benoit Libert, Rafail Ostrovsky, and Damien Vergnaud. Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security, In D.-H. Lee & X. Wang, editor(s), Asiacrypt 2011, Volume 7073 of Lecture Notes in Computer Science, pages 70-88, Spinger, December 2011, BibTeX

Malika Izabachène, Benoit Libert, and Damien Vergnaud. Block-wise P-signatures and Non-Interactive Anonymous Credentials with Efficient Attributes, In L. Chen, editor(s), 13th IMA International Conference on Cryptography and Coding (IMACC 2011), Volume 7089 of Lecture Notes on Computer Science, pages 431-450, Springer, December 2011, BibTeX

Copyright Notice

(click here to expand/retract)