On the energy cost of communication and cryptography in wireless sensor networks G De Meulenaer, F Gosset, FX Standaert, O Pereira 2008 IEEE International Conference on Wireless and Mobile Computing …, 2008 | 398 | 2008 |
Electing a university president using open-audit voting: Analysis of real-world use of Helios B Adida, O De Marneffe, O Pereira, JJ Quisquater EVT/WOTE 9 (10), 2009 | 325 | 2009 |
How not to prove yourself: Pitfalls of the fiat-shamir heuristic and applications to helios D Bernhard, O Pereira, B Warinschi Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012 | 290 | 2012 |
The swiss-knife RFID distance bounding protocol CH Kim, G Avoine, F Koeune, FX Standaert, O Pereira Information Security and Cryptology–ICISC 2008: 11th International …, 2009 | 241 | 2009 |
SoK: A comprehensive analysis of game-based ballot privacy definitions D Bernhard, V Cortier, D Galindo, O Pereira, B Warinschi 2015 IEEE Symposium on Security and Privacy, 499-516, 2015 | 170 | 2015 |
Leftover hash lemma, revisited B Barak, Y Dodis, H Krawczyk, O Pereira, K Pietrzak, FX Standaert, Y Yu Annual Cryptology Conference, 1-20, 2011 | 160 | 2011 |
{STAR-Vote}: A secure, transparent, auditable, and reliable voting system S Bell, J Benaloh, MD Byrne, D DeBeauvoir, B Eakin, P Kortum, ... 2013 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections …, 2013 | 145 | 2013 |
Leakage resilient cryptography in practice FX Standaert, O Pereira, Y Yu, JJ Quisquater, M Yung, E Oswald Towards Hardware-Intrinsic Security: Foundations and Practice, 99-134, 2010 | 144 | 2010 |
A security analysis of the Cliques protocols suites O Pereira, JJ Quisquater Proc. 14th IEEE Computer Security Foundations Workshop, 73-81, 2001 | 142 | 2001 |
Adapting Helios for provable ballot privacy D Bernhard, V Cortier, O Pereira, B Smyth, B Warinschi Computer Security–ESORICS 2011, 335-354, 2011 | 117 | 2011 |
Practical leakage-resilient pseudorandom generators Y Yu, FX Standaert, O Pereira, M Yung Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 113 | 2010 |
A block cipher based pseudo random number generator secure against side-channel key recovery C Petit, FX Standaert, O Pereira, TG Malkin, M Yung Proceedings of the 2008 ACM symposium on Information, computer and …, 2008 | 104 | 2008 |
Pluginizing quic Q De Coninck, F Michel, M Piraux, F Rochet, T Given-Wilson, A Legay, ... Proceedings of the ACM Special Interest Group on Data Communication, 59-74, 2019 | 95 | 2019 |
Leakage-resilient authentication and encryption from symmetric cryptographic primitives O Pereira, FX Standaert, S Vivek Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 93 | 2015 |
Universally composable security analysis of TLS S Gajek, M Manulis, O Pereira, AR Sadeghi, J Schwenk Provable Security: Second International Conference, ProvSec 2008, Shanghai …, 2008 | 89 | 2008 |
Securely solving simple combinatorial graph problems A Aly, E Cuvelier, S Mawet, O Pereira, M Van Vyve Financial Cryptography and Data Security: 17th International Conference, FC …, 2013 | 81 | 2013 |
Leakage-resilient symmetric cryptography under empirically verifiable assumptions FX Standaert, O Pereira, Y Yu Annual Cryptology Conference, 335-352, 2013 | 80 | 2013 |
Election verifiability or ballot privacy: Do we need to choose? E Cuvelier, O Pereira, T Peters Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 79 | 2013 |
Mode-level vs. implementation-level physical security in symmetric cryptography: a practical guide through the leakage-resistance jungle D Bellizia, O Bronchain, G Cassiers, V Grosso, C Guo, C Momin, ... Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 74 | 2020 |
Spook: Sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher D Bellizia, F Berti, O Bronchain, G Cassiers, S Duval, C Guo, G Leander, ... IACR Transactions on Symmetric Cryptology 2020 (S1), 295--349, 2020 | 73 | 2020 |