Publications

Search publications by date:
1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004
2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014
2015 | 2016 | 2017 | 2018 | Latest | Forthcoming
BibTeX - Year 2012

Publications dated 2012

January 2012

François-Xavier Standaert, Christophe Petit, and Nicolas Veyrat-Charvillon. Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders, Volume 6805 of Lecture Notes in Computer Science (LNCS), pages 283-299, Springer, January 2012 BibTeX

February 2012

Javier Herranz, Fabien Laguillaumie, Benoit Libert, and Carla Ràfols. Short Attribute-Based Signatures for Threshold Predicates, In O. Dunkelman, editor(s), RSA Conference -- Cryptographers' Track 2012 (CT-RSA 2012), Volume 7178 of Lecture Notes in Computer Sciences, pages 51-67, Springer, February 2012 BibTeX

March 2012

Benoit Libert, and Moti Yung. Non-Interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions, In R. Cramer, editor(s), 9th Theory of Cryptography Conference (TCC 2012), Volume 7194 of Lecture Notes in Computer Science, pages 75-93, Springer, March 2012, BibTeX

April 2012

Benoit Libert, Thomas Peters, and Moti Yung. Scalable Group Signatures with Revocation, In D. Pointcheval & T. Johansson, editor(s), Eurocrypt 2012, Volume 7237 of Lecture Notes in Computer Science, pages 609-627, Springer, April 2012 BibTeX

Jean-Charles Faugère, Christophe Petit, Ludovic Perret, and Guénaël Renault. Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields, Eurocrypt 2012, April 2012 PDF BibTeX

May 2012

Benoit Libert, Kenneth G. Paterson, and Elizabeth A. Quaglia. Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model, In M. Fischlin, J. Buchmann & M. Manulis, editor(s), Public Key Cryptography 2012 (PKC 2012), Volume 7293 of Lecture Notes in Computer Science, pages 206-224, Springer, May 2012 BibTeX

Vincent Grosso, Christina Boura, Benoit Gérard, and François-Xavier Standaert. A Note on the Empirical Evaluation of Security Margins against Algebraic Attacks, May 2012 PDF BibTeX

August 2012

Nicolas Veyrat-Charvillon, Benoit Gérard, Mathieu Renauld, and François-Xavier Standaert. An Optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks, In L. Knudsen, editor(s), Selected Areas in Cryptography (SAC 2012), Lecture Notes in Computer Science (LNCS), August 2012, To appear BibTeX

Benoit Libert, Thomas Peters, and Moti Yung. Group Signatures with Almost-for-free Revocation, In R. Safavi-Naini & R. Canetti, editor(s), Crypto 2012, Volume 7417 of Lecture Notes in Computer Science, pages 571-589, Springer, August 2012 BibTeX

Benoit Gérard, François Durvaux, Stéphanie Kerckhof, François Koeune, and François-Xavier Standaert. Intellectual Property Protection for Integrated Systems using Soft Physical Hash Functions, Workshop on Information Security Applications (WISA 2012), Lecture Notes in Computer Science (LNCS), August 2012, To appear BibTeX

September 2012

Saloomeh Shariati, François Koeune, and François-Xavier Standaert. Security Analysis of Image-Based PUFs for Anti-counterfeiting, Volume 7394 of Lecture Notes in Computer Science (LNCS), pages 26-38, Springer, September 2012 PDF BibTeX

Céline Blondeau, Benoit Gérard, and Kaisa Nyberg. Multiple Differential Cryptanalysis using LLR and χ2 Statistics, In I. Visconti and R. De Prisco, editor(s), Conference on Security and Cryptography for Networks (SCN 2012), Volume 7485 of Lecture Notes in Computer Science (LNCS), pages 343-360, September 2012, To appear BibTeX

Benoit Gérard, and François-Xavier Standaert. Unified and Optimized Linear Collision Attacks and Their Application in a Non-Profiled Setting, Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012), Volume 7428 of Lecture Notes in Computer Science (LNCS), pages 175--192, September 2012 BibTeX

Joel De Coninck, Romain Rioboo, François Koeune, François-Xavier Standaert, and Saloomeh Shariati. Patent : LABELLING SYSTEM, WO/2012/122609, September 2012 BibTeX

Saloomeh Shariati, François-Xavier Standaert, Laurent Jacques, and Benoit Macq. Analysis and experimental evaluation of image-based PUFs, In Journal of Cryptographic Engineering, Volume 2, September 2012 PDF BibTeX

Timothy Hodges, Christophe Petit, and Jacob Schlather. Degree of Regularity for Systems arising from Weil Descent, YAC2012 - Yet Another Conference in Cryptography, September 2012 BibTeX

October 2012

David Bernhard, Veronique Cortier, Olivier Pereira, and Bogdan Warinschi. Measuring vote privacy, revisited, In Ting Yu and George Danezis and Virgil D. Gligor, editor(s), ACM Conference on Computer and Communications Security, pages 941-952, ACM, October 2012 PDF BibTeX

December 2012

Christophe Petit, and Jean-Jacques Quisquater. On polynomial systems arising from a Weil descent, Asiacrypt 2012, Lecture Notes in Computer Science (LNCS), Springer, December 2012 PDF BibTeX

David Bernhard, Olivier Pereira, and Bogdan Warinschi. How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios, In X. Wang and K. Sako, editor(s), ASIACRYPT 2012, Volume 7658 of Lecture Notes in Computer Science, pages 626--643, Springer, December 2012 PDF BibTeX

Nuttapong Attrapadung, Benoit Libert, and Thomas Peters. Computing on Authenticated Data: New Privacy Definitions and Constructions, In X. Wang & K. Sako, editor(s), Asiacrypt 2012, Volume 7658 of Lecture Notes on Computer Science, pages 367-385 , Springer, December 2012 BibTeX

Luca Calderoni, Dario Maio, and Paolo Palmieri. Location-aware Mobile Services for a Smart City: Design, Implementation and Deployment, In Journal of Theoretical and Applied Electronic Commerce Research, Volume 7-3, pages 74-87, December 2012, Special Issue on Smart Applications for Smart Cities - New Approaches to Innovation PDF BibTeX

Copyright Notice

(click here to expand/retract)