BibTeX records: Gildas Avoine

download as .bib file

@inproceedings{DBLP:conf/esorics/AvoineCL21,
  author    = {Gildas Avoine and
               Xavier Carpent and
               Diane Leblanc{-}Albarel},
  editor    = {Elisa Bertino and
               Haya Shulman and
               Michael Waidner},
  title     = {Precomputation for Rainbow Tables has Never Been so Fast},
  booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
               in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {12973},
  pages     = {215--234},
  publisher = {Springer},
  year      = {2021},
  url       = {https://doi.org/10.1007/978-3-030-88428-4\_11},
  doi       = {10.1007/978-3-030-88428-4\_11},
  timestamp = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/esorics/AvoineCL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tweb/LaperdrixBBA20,
  author    = {Pierre Laperdrix and
               Nataliia Bielova and
               Benoit Baudry and
               Gildas Avoine},
  title     = {Browser Fingerprinting: {A} Survey},
  journal   = {{ACM} Trans. Web},
  volume    = {14},
  number    = {2},
  pages     = {8:1--8:33},
  year      = {2020},
  url       = {https://doi.org/10.1145/3386040},
  doi       = {10.1145/3386040},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tweb/LaperdrixBBA20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AvoineCF20,
  author    = {Gildas Avoine and
               S{\'{e}}bastien Canard and
               Lo{\"{\i}}c Ferreira},
  editor    = {Stanislaw Jarecki},
  title     = {Symmetric-Key Authenticated Key Exchange {(SAKE)} with Perfect Forward
               Secrecy},
  booktitle = {Topics in Cryptology - {CT-RSA} 2020 - The Cryptographers' Track at
               the {RSA} Conference 2020, San Francisco, CA, USA, February 24-28,
               2020, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {12006},
  pages     = {199--224},
  publisher = {Springer},
  year      = {2020},
  url       = {https://doi.org/10.1007/978-3-030-40186-3\_10},
  doi       = {10.1007/978-3-030-40186-3\_10},
  timestamp = {Fri, 14 Feb 2020 13:00:36 +0100},
  biburl    = {https://dblp.org/rec/conf/ctrsa/AvoineCF20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/AvoineBBCHKKLMM19,
  author    = {Gildas Avoine and
               Muhammed Ali Bing{\"{o}}l and
               Ioana Boureanu and
               Srdjan Capkun and
               Gerhard P. Hancke and
               S{\"{u}}leyman Kardas and
               Chong Hee Kim and
               C{\'{e}}dric Lauradoux and
               Benjamin Martin and
               Jorge Munilla and
               Alberto Peinado and
               Kasper Bonne Rasmussen and
               Dave Singel{\'{e}}e and
               Aslan Tchamkerten and
               Rolando Trujillo{-}Rasua and
               Serge Vaudenay},
  title     = {Security of Distance-Bounding: {A} Survey},
  journal   = {{ACM} Comput. Surv.},
  volume    = {51},
  number    = {5},
  pages     = {94:1--94:33},
  year      = {2019},
  url       = {https://doi.org/10.1145/3264628},
  doi       = {10.1145/3264628},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/csur/AvoineBBCHKKLMM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/LaperdrixABN19,
  author    = {Pierre Laperdrix and
               Gildas Avoine and
               Benoit Baudry and
               Nick Nikiforakis},
  editor    = {Roberto Perdisci and
               Cl{\'{e}}mentine Maurice and
               Giorgio Giacinto and
               Magnus Almgren},
  title     = {Morellian Analysis for Browsers: Making Web Authentication Stronger
               with Canvas Fingerprinting},
  booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment
               - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden,
               June 19-20, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11543},
  pages     = {43--66},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-22038-9\_3},
  doi       = {10.1007/978-3-030-22038-9\_3},
  timestamp = {Tue, 29 Dec 2020 18:36:17 +0100},
  biburl    = {https://dblp.org/rec/conf/dimva/LaperdrixABN19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AvoineCF19,
  author    = {Gildas Avoine and
               S{\'{e}}bastien Canard and
               Lo{\"{\i}}c Ferreira},
  editor    = {Kazue Sako and
               Steve A. Schneider and
               Peter Y. A. Ryan},
  title     = {IoT-Friendly {AKE:} Forward Secrecy and Session Resumption Meet Symmetric-Key
               Cryptography},
  booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
               in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11736},
  pages     = {463--483},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-29962-0\_22},
  doi       = {10.1007/978-3-030-29962-0\_22},
  timestamp = {Fri, 07 Aug 2020 17:57:31 +0200},
  biburl    = {https://dblp.org/rec/conf/esorics/AvoineCF19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-01051,
  author    = {Pierre Laperdrix and
               Nataliia Bielova and
               Benoit Baudry and
               Gildas Avoine},
  title     = {Browser Fingerprinting: {A} survey},
  journal   = {CoRR},
  volume    = {abs/1905.01051},
  year      = {2019},
  url       = {http://arxiv.org/abs/1905.01051},
  eprinttype = {arXiv},
  eprint    = {1905.01051},
  timestamp = {Mon, 27 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1905-01051.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvoineCF19,
  author    = {Gildas Avoine and
               S{\'{e}}bastien Canard and
               Lo{\"{\i}}c Ferreira},
  title     = {Symmetric-key Authenticated Key Exchange {(SAKE)} with Perfect Forward
               Secrecy},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {444},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/444},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AvoineCF19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvoineCF19a,
  author    = {Gildas Avoine and
               S{\'{e}}bastien Canard and
               Lo{\"{\i}}c Ferreira},
  title     = {IoT-Friendly {AKE:} Forward Secrecy and Session Resumption Meet Symmetric-Key
               Cryptography},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {911},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/911},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AvoineCF19a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AvoineF18,
  author    = {Gildas Avoine and
               Lo{\"{\i}}c Ferreira},
  title     = {Attacking GlobalPlatform SCP02-compliant Smart Cards Using a Padding
               Oracle Attack},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {2},
  pages     = {149--170},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i2.149-170},
  doi       = {10.13154/tches.v2018.i2.149-170},
  timestamp = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/AvoineF18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AvoineF18,
  author    = {Gildas Avoine and
               Lo{\"{\i}}c Ferreira},
  editor    = {Sarah Meiklejohn and
               Kazue Sako},
  title     = {Rescuing LoRaWAN 1.0},
  booktitle = {Financial Cryptography and Data Security - 22nd International Conference,
               {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018,
               Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10957},
  pages     = {253--271},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-662-58387-6\_14},
  doi       = {10.1007/978-3-662-58387-6\_14},
  timestamp = {Fri, 30 Aug 2019 11:17:01 +0200},
  biburl    = {https://dblp.org/rec/conf/fc/AvoineF18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/GougeonBLAR17,
  author    = {Thomas Gougeon and
               Morgan Barbier and
               Patrick Lacharme and
               Gildas Avoine and
               Christophe Rosenberger},
  title     = {Memory carving can finally unveil your embedded personal data},
  booktitle = {Proceedings of the 12th International Conference on Availability,
               Reliability and Security, Reggio Calabria, Italy, August 29 - September
               01, 2017},
  pages     = {18:1--18:9},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3098954.3098978},
  doi       = {10.1145/3098954.3098978},
  timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/IEEEares/GougeonBLAR17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AvoineCKT17,
  author    = {Gildas Avoine and
               Xavier Carpent and
               Barbara Kordy and
               Florent Tardif},
  editor    = {Josef Pieprzyk and
               Suriadi Suriadi},
  title     = {How to Handle Rainbow Tables with External Memory},
  booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
               2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10342},
  pages     = {306--323},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-60055-0\_16},
  doi       = {10.1007/978-3-319-60055-0\_16},
  timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/acisp/AvoineCKT17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AvoineBGG0OR17,
  author    = {Gildas Avoine and
               Xavier Bultel and
               S{\'{e}}bastien Gambs and
               David G{\'{e}}rault and
               Pascal Lafourcade and
               Cristina Onete and
               Jean{-}Marc Robert},
  editor    = {Ramesh Karri and
               Ozgur Sinanoglu and
               Ahmad{-}Reza Sadeghi and
               Xun Yi},
  title     = {A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding
               Protocol},
  booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
               Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
               2017},
  pages     = {800--814},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3052973.3053000},
  doi       = {10.1145/3052973.3053000},
  timestamp = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/AvoineBGG0OR17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AvoineC17,
  author    = {Gildas Avoine and
               Xavier Carpent},
  editor    = {Ramesh Karri and
               Ozgur Sinanoglu and
               Ahmad{-}Reza Sadeghi and
               Xun Yi},
  title     = {Heterogeneous Rainbow Table Widths Provide Faster Cryptanalyses},
  booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
               Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
               2017},
  pages     = {815--822},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3052973.3053030},
  doi       = {10.1145/3052973.3053030},
  timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ccs/AvoineC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/GougeonBLAR17,
  author    = {Thomas Gougeon and
               Morgan Barbier and
               Patrick Lacharme and
               Gildas Avoine and
               Christophe Rosenberger},
  title     = {Retrieving dates in smart card dumps is as hard as finding a needle
               in a haystack},
  booktitle = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
               2017, Rennes, France, December 4-7, 2017},
  pages     = {1--6},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {https://doi.org/10.1109/WIFS.2017.8267663},
  doi       = {10.1109/WIFS.2017.8267663},
  timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/wifs/GougeonBLAR17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvoineBGGLOR17,
  author    = {Gildas Avoine and
               Xavier Bultel and
               S{\'{e}}bastien Gambs and
               David G{\'{e}}rault and
               Pascal Lafourcade and
               Cristina Onete and
               Jean{-}Marc Robert},
  title     = {A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding
               Protocol},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {297},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/297},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AvoineBGGLOR17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/AvoineBHDT16,
  author    = {Gildas Avoine and
               Antonin Beaujeant and
               Julio C. Hernandez{-}Castro and
               Louis Demay and
               Philippe Teuwen},
  title     = {A Survey of Security and Privacy Issues in ePassport Protocols},
  journal   = {{ACM} Comput. Surv.},
  volume    = {48},
  number    = {3},
  pages     = {47:1--47:37},
  year      = {2016},
  url       = {https://doi.org/10.1145/2825026},
  doi       = {10.1145/2825026},
  timestamp = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/csur/AvoineBHDT16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/AvoineCH16,
  author    = {Gildas Avoine and
               Xavier Carpent and
               Julio C. Hernandez{-}Castro},
  title     = {Pitfalls in Ultralightweight Authentication Protocol Designs},
  journal   = {{IEEE} Trans. Mob. Comput.},
  volume    = {15},
  number    = {9},
  pages     = {2317--2332},
  year      = {2016},
  url       = {https://doi.org/10.1109/TMC.2015.2492553},
  doi       = {10.1109/TMC.2015.2492553},
  timestamp = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tmc/AvoineCH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GougeonBLAR16,
  author    = {Thomas Gougeon and
               Morgan Barbier and
               Patrick Lacharme and
               Gildas Avoine and
               Christophe Rosenberger},
  editor    = {Mark Manulis and
               Ahmad{-}Reza Sadeghi and
               Steve A. Schneider},
  title     = {Memory Carving in Embedded Devices: Separate the Wheat from the Chaff},
  booktitle = {Applied Cryptography and Network Security - 14th International Conference,
               {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9696},
  pages     = {592--608},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-39555-5\_32},
  doi       = {10.1007/978-3-319-39555-5\_32},
  timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/acns/GougeonBLAR16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/AvoineMT15,
  author    = {Gildas Avoine and
               Sjouke Mauw and
               Rolando Trujillo{-}Rasua},
  title     = {Comparing distance bounding protocols: {A} critical mission supported
               by decision theory},
  journal   = {Comput. Commun.},
  volume    = {67},
  pages     = {92--102},
  year      = {2015},
  url       = {https://doi.org/10.1016/j.comcom.2015.06.007},
  doi       = {10.1016/j.comcom.2015.06.007},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/comcom/AvoineMT15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AvoineBC15,
  author    = {Gildas Avoine and
               Adrien Bourgeois and
               Xavier Carpent},
  editor    = {Ernest Foo and
               Douglas Stebila},
  title     = {Analysis of Rainbow Tables with Fingerprints},
  booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
               2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9144},
  pages     = {356--374},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-19962-7\_21},
  doi       = {10.1007/978-3-319-19962-7\_21},
  timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/acisp/AvoineBC15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AvoineCL15,
  author    = {Gildas Avoine and
               Xavier Carpent and
               C{\'{e}}dric Lauradoux},
  editor    = {G{\"{u}}nther Pernul and
               Peter Y. A. Ryan and
               Edgar R. Weippl},
  title     = {Interleaving Cryptanalytic Time-Memory Trade-Offs on Non-uniform Distributions},
  booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
               in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9326},
  pages     = {165--184},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-24174-6\_9},
  doi       = {10.1007/978-3-319-24174-6\_9},
  timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/esorics/AvoineCL15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AvoineMT15,
  author    = {Gildas Avoine and
               Sjouke Mauw and
               Rolando Trujillo{-}Rasua},
  title     = {Comparing Distance Bounding Protocols: a Critical Mission Supported
               by Decision Theory},
  journal   = {CoRR},
  volume    = {abs/1503.04593},
  year      = {2015},
  url       = {http://arxiv.org/abs/1503.04593},
  eprinttype = {arXiv},
  eprint    = {1503.04593},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/AvoineMT15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijinfoman/AvoineCDM014,
  author    = {Gildas Avoine and
               Luca Calderoni and
               Jonathan Delvaux and
               Dario Maio and
               Paolo Palmieri},
  title     = {Passengers information in public transport and privacy: Can anonymous
               tickets prevent tracking?},
  journal   = {Int. J. Inf. Manag.},
  volume    = {34},
  number    = {5},
  pages     = {682--688},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.ijinfomgt.2014.05.004},
  doi       = {10.1016/j.ijinfomgt.2014.05.004},
  timestamp = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijinfoman/AvoineCDM014.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/AvoineCM14,
  author    = {Gildas Avoine and
               Iwen Coisel and
               Tania Martin},
  title     = {Untraceability Model for {RFID}},
  journal   = {{IEEE} Trans. Mob. Comput.},
  volume    = {13},
  number    = {10},
  pages     = {2397--2405},
  year      = {2014},
  url       = {https://doi.org/10.1109/TMC.2013.161},
  doi       = {10.1109/TMC.2013.161},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tmc/AvoineCM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/Trujillo-Rasua0A14,
  author    = {Rolando Trujillo{-}Rasua and
               Benjamin Martin and
               Gildas Avoine},
  title     = {Distance Bounding Facing Both Mafia and Distance Frauds},
  journal   = {{IEEE} Trans. Wirel. Commun.},
  volume    = {13},
  number    = {10},
  pages     = {5690--5698},
  year      = {2014},
  url       = {https://doi.org/10.1109/TWC.2014.2323979},
  doi       = {10.1109/TWC.2014.2323979},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/twc/Trujillo-Rasua0A14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Trujillo-RasuaMA14,
  author    = {Rolando Trujillo{-}Rasua and
               Benjamin Martin and
               Gildas Avoine},
  title     = {Distance-bounding facing both mafia and distance frauds: Technical
               report},
  journal   = {CoRR},
  volume    = {abs/1405.5704},
  year      = {2014},
  url       = {http://arxiv.org/abs/1405.5704},
  eprinttype = {arXiv},
  eprint    = {1405.5704},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/Trujillo-RasuaMA14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/DetalPLMAB13,
  author    = {Gregory Detal and
               Christoph Paasch and
               Simon van der Linden and
               Pascal M{\'{e}}rindol and
               Gildas Avoine and
               Olivier Bonaventure},
  title     = {Revisiting flow-based load balancing: Stateless path selection in
               data center networks},
  journal   = {Comput. Networks},
  volume    = {57},
  number    = {5},
  pages     = {1204--1216},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.comnet.2012.12.011},
  doi       = {10.1016/j.comnet.2012.12.011},
  timestamp = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/cn/DetalPLMAB13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcnc/SaponaraSAN13,
  author    = {Sergio Saponara and
               Agusti Solanas and
               Gildas Avoine and
               Bruno Neri},
  title     = {Privacy and Security in Wireless Sensor Networks: Protocols, Algorithms,
               and Efficient Architectures},
  journal   = {J. Comput. Networks Commun.},
  volume    = {2013},
  pages     = {528750:1--528750:3},
  year      = {2013},
  url       = {https://doi.org/10.1155/2013/528750},
  doi       = {10.1155/2013/528750},
  timestamp = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jcnc/SaponaraSAN13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/AvoineK13,
  author    = {Gildas Avoine and
               Chong Hee Kim},
  title     = {Mutual Distance Bounding Protocols},
  journal   = {{IEEE} Trans. Mob. Comput.},
  volume    = {12},
  number    = {5},
  pages     = {830--839},
  year      = {2013},
  url       = {https://doi.org/10.1109/TMC.2012.47},
  doi       = {10.1109/TMC.2012.47},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tmc/AvoineK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/AvoineBCY13,
  author    = {Gildas Avoine and
               Muhammed Ali Bing{\"{o}}l and
               Xavier Carpent and
               Siddika Berna {\"{O}}rs Yal{\c{c}}in},
  title     = {Privacy-Friendly Authentication in {RFID} Systems: On Sublinear Protocols
               Based on Symmetric-Key Cryptography},
  journal   = {{IEEE} Trans. Mob. Comput.},
  volume    = {12},
  number    = {10},
  pages     = {2037--2049},
  year      = {2013},
  url       = {https://doi.org/10.1109/TMC.2012.174},
  doi       = {10.1109/TMC.2012.174},
  timestamp = {Fri, 03 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tmc/AvoineBCY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AvoineC13,
  author    = {Gildas Avoine and
               Xavier Carpent},
  editor    = {Hyang{-}Sook Lee and
               Dong{-}Guk Han},
  title     = {Optimal Storage for Rainbow Tables},
  booktitle = {Information Security and Cryptology - {ICISC} 2013 - 16th International
               Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8565},
  pages     = {144--157},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-319-12160-4\_9},
  doi       = {10.1007/978-3-319-12160-4\_9},
  timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icisc/AvoineC13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/AvoineBCK13,
  author    = {Gildas Avoine and
               Muhammed Ali Bing{\"{o}}l and
               Xavier Carpent and
               S{\"{u}}leyman Kardas},
  editor    = {Michael Hutter and
               J{\"{o}}rn{-}Marc Schmidt},
  title     = {Deploying {OSK} on Low-Resource Mobile Devices},
  booktitle = {Radio Frequency Identification - Security and Privacy Issues 9th International
               Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8262},
  pages     = {3--18},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-41332-2\_1},
  doi       = {10.1007/978-3-642-41332-2\_1},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/rfidsec/AvoineBCK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lightsec/2013,
  editor    = {Gildas Avoine and
               Orhun Kara},
  title     = {Lightweight Cryptography for Security and Privacy - Second International
               Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8162},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40392-7},
  doi       = {10.1007/978-3-642-40392-7},
  isbn      = {978-3-642-40391-0},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/lightsec/2013.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AvoineCM12,
  author    = {Gildas Avoine and
               Xavier Carpent and
               Benjamin Martin},
  title     = {Privacy-friendly synchronized ultralightweight authentication protocols
               in the storm},
  journal   = {J. Netw. Comput. Appl.},
  volume    = {35},
  number    = {2},
  pages     = {826--843},
  year      = {2012},
  url       = {https://doi.org/10.1016/j.jnca.2011.12.001},
  doi       = {10.1016/j.jnca.2011.12.001},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jnca/AvoineCM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/AvoineC12,
  author    = {Gildas Avoine and
               Xavier Carpent},
  editor    = {Jaap{-}Henk Hoepman and
               Ingrid Verbauwhede},
  title     = {Yet Another Ultralightweight Authentication Protocol That Is Broken},
  booktitle = {Radio Frequency Identification. Security and Privacy Issues - 8th
               International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July
               2-3, 2012, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7739},
  pages     = {20--30},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-36140-1\_2},
  doi       = {10.1007/978-3-642-36140-1\_2},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/conf/rfidsec/AvoineC12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AvoineCM12,
  author    = {Gildas Avoine and
               Iwen Coisel and
               Tania Martin},
  editor    = {Marwan Krunz and
               Loukas Lazos and
               Roberto Di Pietro and
               Wade Trappe},
  title     = {A privacy-restoring mechanism for offline {RFID} systems},
  booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
               in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
               16-18, 2012},
  pages     = {63--74},
  publisher = {{ACM}},
  year      = {2012},
  url       = {https://doi.org/10.1145/2185448.2185458},
  doi       = {10.1145/2185448.2185458},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/wisec/AvoineCM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/AvoineBKLM11,
  author    = {Gildas Avoine and
               Muhammed Ali Bing{\"{o}}l and
               S{\"{u}}leyman Kardas and
               C{\'{e}}dric Lauradoux and
               Benjamin Martin},
  title     = {A framework for analyzing {RFID} distance bounding protocols},
  journal   = {J. Comput. Secur.},
  volume    = {19},
  number    = {2},
  pages     = {289--317},
  year      = {2011},
  url       = {https://doi.org/10.3233/JCS-2010-0408},
  doi       = {10.3233/JCS-2010-0408},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jcs/AvoineBKLM11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/KimA11,
  author    = {Chong Hee Kim and
               Gildas Avoine},
  title     = {{RFID} Distance Bounding Protocols with Mixed Challenges},
  journal   = {{IEEE} Trans. Wirel. Commun.},
  volume    = {10},
  number    = {5},
  pages     = {1618--1626},
  year      = {2011},
  url       = {https://doi.org/10.1109/TWC.2011.030411.101158},
  doi       = {10.1109/TWC.2011.030411.101158},
  timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/twc/KimA11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Avoine11,
  author    = {Gildas Avoine},
  editor    = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
               Guillermo Navarro{-}Arribas and
               Nora Cuppens{-}Boulahia and
               Sabrina De Capitani di Vimercati},
  title     = {Privacy Challenges in {RFID}},
  booktitle = {Data Privacy Management and Autonomous Spontaneus Security - 6th International
               Workshop, {DPM} 2011, and 4th International Workshop, {SETOP} 2011,
               Leuven, Belgium, September 15-16, 2011, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7122},
  pages     = {1--8},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-28879-1\_1},
  doi       = {10.1007/978-3-642-28879-1\_1},
  timestamp = {Fri, 27 Dec 2019 21:19:57 +0100},
  biburl    = {https://dblp.org/rec/conf/esorics/Avoine11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AvoineLM11,
  author    = {Gildas Avoine and
               C{\'{e}}dric Lauradoux and
               Benjamin Martin},
  editor    = {Dieter Gollmann and
               Dirk Westhoff and
               Gene Tsudik and
               N. Asokan},
  title     = {How secret-sharing can defeat terrorist fraud},
  booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
               {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages     = {145--156},
  publisher = {{ACM}},
  year      = {2011},
  url       = {https://doi.org/10.1145/1998412.1998437},
  doi       = {10.1145/1998412.1998437},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/wisec/AvoineLM11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/QuisquaterA11,
  author    = {Jean{-}Jacques Quisquater and
               Gildas Avoine},
  editor    = {Henk C. A. van Tilborg and
               Sushil Jajodia},
  title     = {Passport Security},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages     = {913--916},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5\_129},
  doi       = {10.1007/978-1-4419-5906-5\_129},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/reference/crypt/QuisquaterA11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Avoine11,
  author    = {Gildas Avoine},
  editor    = {Henk C. A. van Tilborg and
               Sushil Jajodia},
  title     = {{RFID} Security},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages     = {1044--1045},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5\_134},
  doi       = {10.1007/978-1-4419-5906-5\_134},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/reference/crypt/Avoine11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvoineC11,
  author    = {Gildas Avoine and
               Xavier Carpent},
  title     = {Yet Another Ultralightweight Authentication Protocol that is Broken},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {691},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/691},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AvoineC11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/AvoineCM10,
  author    = {Gildas Avoine and
               Xavier Carpent and
               Benjamin Martin},
  editor    = {Siddika Berna {\"{O}}rs Yal{\c{c}}in},
  title     = {Strong Authentication and Strong Integrity {(SASI)} Is Not That Strong},
  booktitle = {Radio Frequency Identification: Security and Privacy Issues - 6th
               International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9,
               2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6370},
  pages     = {50--64},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-16822-2\_5},
  doi       = {10.1007/978-3-642-16822-2\_5},
  timestamp = {Fri, 03 Sep 2021 17:40:55 +0200},
  biburl    = {https://dblp.org/rec/conf/rfidsec/AvoineCM10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/AvoineMM10,
  author    = {Gildas Avoine and
               Benjamin Martin and
               Tania Martin},
  editor    = {Siddika Berna {\"{O}}rs Yal{\c{c}}in},
  title     = {Tree-Based {RFID} Authentication Protocols Are Definitively Not Privacy-Friendly},
  booktitle = {Radio Frequency Identification: Security and Privacy Issues - 6th
               International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9,
               2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6370},
  pages     = {103--122},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-16822-2\_10},
  doi       = {10.1007/978-3-642-16822-2\_10},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/rfidsec/AvoineMM10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/AvoineCM10a,
  author    = {Gildas Avoine and
               Iwen Coisel and
               Tania Martin},
  editor    = {Siddika Berna {\"{O}}rs Yal{\c{c}}in},
  title     = {Time Measurement Threatens Privacy-Friendly {RFID} Authentication
               Protocols},
  booktitle = {Radio Frequency Identification: Security and Privacy Issues - 6th
               International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9,
               2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6370},
  pages     = {138--157},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-16822-2\_13},
  doi       = {10.1007/978-3-642-16822-2\_13},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/rfidsec/AvoineCM10a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/KaraKBA10,
  author    = {Orhun Kara and
               S{\"{u}}leyman Kardas and
               Muhammed Ali Bing{\"{o}}l and
               Gildas Avoine},
  editor    = {Siddika Berna {\"{O}}rs Yal{\c{c}}in},
  title     = {Optimal Security Limits of {RFID} Distance Bounding Protocols},
  booktitle = {Radio Frequency Identification: Security and Privacy Issues - 6th
               International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9,
               2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6370},
  pages     = {220--238},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-16822-2\_18},
  doi       = {10.1007/978-3-642-16822-2\_18},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/rfidsec/KaraKBA10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/Trujillo-RasuaMA10,
  author    = {Rolando Trujillo{-}Rasua and
               Benjamin Martin and
               Gildas Avoine},
  editor    = {Siddika Berna {\"{O}}rs Yal{\c{c}}in},
  title     = {The Poulidor Distance-Bounding Protocol},
  booktitle = {Radio Frequency Identification: Security and Privacy Issues - 6th
               International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9,
               2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6370},
  pages     = {239--257},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-16822-2\_19},
  doi       = {10.1007/978-3-642-16822-2\_19},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/rfidsec/Trujillo-RasuaMA10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/KimA09,
  author    = {Chong Hee Kim and
               Gildas Avoine},
  editor    = {Juan A. Garay and
               Atsuko Miyaji and
               Akira Otsuka},
  title     = {{RFID} Distance Bounding Protocol with Mixed Challenges to Prevent
               Relay Attacks},
  booktitle = {Cryptology and Network Security, 8th International Conference, {CANS}
               2009, Kanazawa, Japan, December 12-14, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5888},
  pages     = {119--133},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10433-6\_9},
  doi       = {10.1007/978-3-642-10433-6\_9},
  timestamp = {Tue, 14 May 2019 10:00:50 +0200},
  biburl    = {https://dblp.org/rec/conf/cans/KimA09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/AvoineFM09,
  author    = {Gildas Avoine and
               Christian Floerkemeier and
               Benjamin Martin},
  editor    = {Bimal K. Roy and
               Nicolas Sendrier},
  title     = {{RFID} Distance Bounding Multistate Enhancement},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
               on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5922},
  pages     = {290--307},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10628-6\_20},
  doi       = {10.1007/978-3-642-10628-6\_20},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/conf/indocrypt/AvoineFM09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/AvoineT09,
  author    = {Gildas Avoine and
               Aslan Tchamkerten},
  editor    = {Pierangela Samarati and
               Moti Yung and
               Fabio Martinelli and
               Claudio Agostino Ardagna},
  title     = {An Efficient Distance Bounding {RFID} Authentication Protocol: Balancing
               False-Acceptance Rate and Memory Requirement},
  booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
               Italy, September 7-9, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5735},
  pages     = {250--261},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04474-8\_21},
  doi       = {10.1007/978-3-642-04474-8\_21},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/isw/AvoineT09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwrt/Avoine09,
  author    = {Gildas Avoine},
  editor    = {Quan Z. Sheng and
               Aikaterini Mitrokotsa and
               Sherali Zeadally and
               Zakaria Maamar},
  title     = {The Future Security Challenges in {RFID}},
  booktitle = {{RFID} Technology-Concepts, Applications, Challenges, Proceedings
               of the 3rd International Workshop, {IWRT} 2009, In conjunction with
               {ICEIS} 2009, Milan, Italy, May 2009},
  pages     = {3--6},
  publisher = {{INSTICC} {PRESS}},
  year      = {2009},
  timestamp = {Tue, 13 Apr 2010 07:07:35 +0200},
  biburl    = {https://dblp.org/rec/conf/iwrt/Avoine09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AvoineLM09,
  author    = {Gildas Avoine and
               C{\'{e}}dric Lauradoux and
               Tania Martin},
  editor    = {Heung Youl Youm and
               Moti Yung},
  title     = {When Compromised Readers Meet {RFID}},
  booktitle = {Information Security Applications, 10th International Workshop, {WISA}
               2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5932},
  pages     = {36--50},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10838-9\_4},
  doi       = {10.1007/978-3-642-10838-9\_4},
  timestamp = {Tue, 14 May 2019 10:00:35 +0200},
  biburl    = {https://dblp.org/rec/conf/wisa/AvoineLM09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimA09,
  author    = {Chong Hee Kim and
               Gildas Avoine},
  title     = {{RFID} distance bounding protocol with mixed challenges to prevent
               relay attacks},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {310},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/310},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/KimA09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AvoineJO08,
  author    = {Gildas Avoine and
               Pascal Junod and
               Philippe Oechslin},
  title     = {Characterization and Improvement of Time-Memory Trade-Off Based on
               Perfect Tables},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {11},
  number    = {4},
  pages     = {17:1--17:22},
  year      = {2008},
  url       = {https://doi.org/10.1145/1380564.1380565},
  doi       = {10.1145/1380564.1380565},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tissec/AvoineJO08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AvoineKQ08,
  author    = {Gildas Avoine and
               Kassem Kalach and
               Jean{-}Jacques Quisquater},
  editor    = {Gene Tsudik},
  title     = {ePassport: Securing International Contacts with Contactless Chips},
  booktitle = {Financial Cryptography and Data Security, 12th International Conference,
               {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5143},
  pages     = {141--155},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-85230-8\_11},
  doi       = {10.1007/978-3-540-85230-8\_11},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/conf/fc/AvoineKQ08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimAKSP08,
  author    = {Chong Hee Kim and
               Gildas Avoine and
               Fran{\c{c}}ois Koeune and
               Fran{\c{c}}ois{-}Xavier Standaert and
               Olivier Pereira},
  editor    = {Pil Joong Lee and
               Jung Hee Cheon},
  title     = {The Swiss-Knife {RFID} Distance Bounding Protocol},
  booktitle = {Information Security and Cryptology - {ICISC} 2008, 11th International
               Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5461},
  pages     = {98--115},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-642-00730-9\_7},
  doi       = {10.1007/978-3-642-00730-9\_7},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/icisc/KimAKSP08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0809-4183,
  author    = {Gildas Avoine and
               Aslan Tchamkerten},
  title     = {An Asymptotically Optimal {RFID} Authentication Protocol Against Relay
               Attacks},
  journal   = {CoRR},
  volume    = {abs/0809.4183},
  year      = {2008},
  url       = {http://arxiv.org/abs/0809.4183},
  eprinttype = {arXiv},
  eprint    = {0809.4183},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-0809-4183.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvoineT08,
  author    = {Gildas Avoine and
               Aslan Tchamkerten},
  title     = {An asymptotically optimal {RFID} protocol against relay attacks},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {406},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/406},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AvoineT08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0032322,
  author    = {Gildas Avoine and
               Pascal Junod and
               Philippe Oechslin},
  title     = {Computer system security - Basic Concepts and Solved Exercises},
  series    = {Computer and communication sciences},
  publisher = {{CRC} Press},
  year      = {2007},
  url       = {http://ppur.epfl.ch/livres/978-2-940222-14-8.html},
  isbn      = {978-1-4200-4620-5},
  timestamp = {Mon, 16 Dec 2013 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/books/daglib/0032322.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/AvoineV07,
  author    = {Gildas Avoine and
               Serge Vaudenay},
  title     = {How to safely close a discussion},
  journal   = {Inf. Process. Lett.},
  volume    = {102},
  number    = {4},
  pages     = {138--142},
  year      = {2007},
  url       = {https://doi.org/10.1016/j.ipl.2006.12.001},
  doi       = {10.1016/j.ipl.2006.12.001},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ipl/AvoineV07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/AvoineBHV07,
  author    = {Gildas Avoine and
               Levente Butty{\'{a}}n and
               Tam{\'{a}}s Holczer and
               Istv{\'{a}}n Vajda},
  title     = {Group-Based Private Authentication},
  booktitle = {2007 International Symposium on a World of Wireless, Mobile and Multimedia
               Networks (WoWMoM 2007), 18-21 June 2007, Helsinki, Finland, Proceedings},
  pages     = {1--6},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {https://doi.org/10.1109/WOWMOM.2007.4351808},
  doi       = {10.1109/WOWMOM.2007.4351808},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/wowmom/AvoineBHV07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/CastellucciaA06,
  author    = {Claude Castelluccia and
               Gildas Avoine},
  editor    = {Josep Domingo{-}Ferrer and
               Joachim Posegga and
               Daniel Schreckling},
  title     = {Noisy Tags: {A} Pretty Good Key Exchange Protocol for {RFID} Tags},
  booktitle = {Smart Card Research and Advanced Applications, 7th {IFIP} {WG} 8.8/11.2
               International Conference, {CARDIS} 2006, Tarragona, Spain, April 19-21,
               2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3928},
  pages     = {289--299},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11733447\_21},
  doi       = {10.1007/11733447\_21},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/conf/cardis/CastellucciaA06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edcc/AvoineGGV05,
  author    = {Gildas Avoine and
               Felix C. G{\"{a}}rtner and
               Rachid Guerraoui and
               Marko Vukolic},
  editor    = {Mario Dal Cin and
               Mohamed Ka{\^{a}}niche and
               Andr{\'{a}}s Pataricza},
  title     = {Gracefully Degrading Fair Exchange with Security Modules},
  booktitle = {Dependable Computing - EDCC-5, 5th European Dependable Computing Conference,
               Budapest, Hungary, April 20-22, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3463},
  pages     = {55--71},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11408901\_5},
  doi       = {10.1007/11408901\_5},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/edcc/AvoineGGV05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Avoine05,
  author    = {Gildas Avoine},
  editor    = {Andrew S. Patrick and
               Moti Yung},
  title     = {Fraud Within Asymmetric Multi-hop Cellular Networks},
  booktitle = {Financial Cryptography and Data Security, 9th International Conference,
               {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
               3, 2005, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3570},
  pages     = {1--15},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11507840\_1},
  doi       = {10.1007/11507840\_1},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/conf/fc/Avoine05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AvoineO05,
  author    = {Gildas Avoine and
               Philippe Oechslin},
  editor    = {Andrew S. Patrick and
               Moti Yung},
  title     = {{RFID} Traceability: {A} Multilayer Problem},
  booktitle = {Financial Cryptography and Data Security, 9th International Conference,
               {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
               3, 2005, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3570},
  pages     = {125--140},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11507840\_14},
  doi       = {10.1007/11507840\_14},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/fc/AvoineO05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/AvoineJO05,
  author    = {Gildas Avoine and
               Pascal Junod and
               Philippe Oechslin},
  editor    = {Subhamoy Maitra and
               C. E. Veni Madhavan and
               Ramarathnam Venkatesan},
  title     = {Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2005, 6th International Conference
               on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3797},
  pages     = {183--196},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11596219\_15},
  doi       = {10.1007/11596219\_15},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/indocrypt/AvoineJO05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/AvoineO05,
  author    = {Gildas Avoine and
               Philippe Oechslin},
  title     = {A Scalable and Provably Secure Hash-Based {RFID} Protocol},
  booktitle = {3rd {IEEE} Conference on Pervasive Computing and Communications Workshops
               (PerCom 2005 Workshops), 8-12 March 2005, Kauai Island, HI, {USA}},
  pages     = {110--114},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {https://doi.org/10.1109/PERCOMW.2005.12},
  doi       = {10.1109/PERCOMW.2005.12},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/conf/percom/AvoineO05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/AvoineDO05,
  author    = {Gildas Avoine and
               Etienne Dysli and
               Philippe Oechslin},
  editor    = {Bart Preneel and
               Stafford E. Tavares},
  title     = {Reducing Time Complexity in {RFID} Systems},
  booktitle = {Selected Areas in Cryptography, 12th International Workshop, {SAC}
               2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3897},
  pages     = {291--306},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11693383\_20},
  doi       = {10.1007/11693383\_20},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/conf/sacrypt/AvoineDO05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Avoine05,
  author    = {Gildas Avoine},
  title     = {Adversarial Model for Radio Frequency Identification},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {49},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/049},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/Avoine05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AvoineV04,
  author    = {Gildas Avoine and
               Serge Vaudenay},
  editor    = {Huaxiong Wang and
               Josef Pieprzyk and
               Vijay Varadharajan},
  title     = {Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing},
  booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
               2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3108},
  pages     = {74--85},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/978-3-540-27800-9\_7},
  doi       = {10.1007/978-3-540-27800-9\_7},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/conf/acisp/AvoineV04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/Avoine04,
  author    = {Gildas Avoine},
  editor    = {Jean{-}Jacques Quisquater and
               Pierre Paradinas and
               Yves Deswarte and
               Anas Abou El Kalam},
  title     = {Privacy Issues in {RFID} Banknote Protection Schemes},
  booktitle = {Smart Card Research and Advanced Applications VI, {IFIP} 18th World
               Computer Congress, {TC8/WG8.8} {\&} {TC11/WG11.2} Sixth International
               Conference on Smart Card Research and Advanced Applications (CARDIS),
               22-27 August 2004, Toulouse, France},
  series    = {{IFIP}},
  volume    = {153},
  pages     = {33--48},
  publisher = {Kluwer/Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/1-4020-8147-2\_3},
  doi       = {10.1007/1-4020-8147-2\_3},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/cardis/Avoine04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/AvoineMP04,
  author    = {Gildas Avoine and
               Jean Monnerat and
               Thomas Peyrin},
  editor    = {Anne Canteaut and
               Kapalee Viswanathan},
  title     = {Advances in Alternative Non-adjacent Form Representations},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference
               on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3348},
  pages     = {260--274},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/978-3-540-30556-9\_21},
  doi       = {10.1007/978-3-540-30556-9\_21},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/conf/indocrypt/AvoineMP04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AvoineV03,
  author    = {Gildas Avoine and
               Serge Vaudenay},
  editor    = {Kijoon Chae and
               Moti Yung},
  title     = {Optimal Fair Exchange with Guardian Angels},
  booktitle = {Information Security Applications, 4th International Workshop, {WISA}
               2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2908},
  pages     = {188--202},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/978-3-540-24591-9\_15},
  doi       = {10.1007/978-3-540-24591-9\_15},
  timestamp = {Tue, 14 May 2019 10:00:35 +0200},
  biburl    = {https://dblp.org/rec/conf/wisa/AvoineV03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics