


Остановите войну!
for scientists:


default search action
Serge Vaudenay
Person information

- affiliation: Swiss Federal Institute of Technology in Lausanne, Switzerland
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j28]Hailun Yan, Serge Vaudenay, Daniel Collins, Andrea Caforio:
Optimal Symmetric Ratcheting for Secure Communication. Comput. J. 66(4): 987-1016 (2023) - [c165]Bénédikt Tran, Serge Vaudenay:
A Gapless Post-quantum Hash Proof System in the Hamming Metric. ACNS (1) 2023: 664-694 - [c164]Khashayar Barooti, Daniel Collins, Simone Colombo, Loïs Huguenin-Dumittan, Serge Vaudenay:
On Active Attack Detection in Messaging with Immediate Decryption. CRYPTO (4) 2023: 362-395 - [c163]Melissa Chase, F. Betül Durak, Serge Vaudenay:
Anonymous Tokens with Stronger Metadata Bit Hiding from Algebraic MACs. CRYPTO (2) 2023: 418-449 - [c162]Iraklis Leontiadis, Serge Vaudenay:
Private Message Franking with After Opening Privacy. ICICS 2023: 197-214 - [c161]Bénédikt Tran, Serge Vaudenay:
Extractable Witness Encryption for the Homogeneous Linear Equations Problem. IWSEC 2023: 152-172 - [c160]Laurane Marco, Abdullah Talayhan, Serge Vaudenay:
Making Classical (Threshold) Signatures Post-quantum for Single Use on a Public Ledger. IWSEC 2023: 173-192 - [c159]David Balbás, Daniel Collins, Serge Vaudenay:
Cryptographic Administration for Secure Group Messaging. USENIX Security Symposium 2023: 1253-1270 - [i49]Laurane Marco, Abdullah Talayhan, Serge Vaudenay:
Making Classical (Threshold) Signatures Post-Quantum for Single Use on a Public Ledger. IACR Cryptol. ePrint Arch. 2023: 420 (2023) - [i48]Khashayar Barooti, Daniel Collins, Simone Colombo, Loïs Huguenin-Dumittan, Serge Vaudenay:
On Active Attack Detection in Messaging with Immediate Decryption. IACR Cryptol. ePrint Arch. 2023: 880 (2023) - 2022
- [c158]Bénédikt Tran, Serge Vaudenay:
Solving the Learning Parity with Noise Problem Using Quantum Algorithms. AFRICACRYPT 2022: 295-322 - [c157]Loïs Huguenin-Dumittan, Serge Vaudenay:
On IND-qCCA Security in the ROM and Its Applications - CPA Security Is Sufficient for TLS 1.3. EUROCRYPT (3) 2022: 613-642 - [i47]Subhadeep Banik, Khashayar Barooti, Andrea Caforio, Serge Vaudenay:
Memory-Efficient Single Data-Complexity Attacks on LowMC Using Partial Sets. IACR Cryptol. ePrint Arch. 2022: 688 (2022) - [i46]David Balbás, Daniel Collins, Serge Vaudenay:
Cryptographic Administration for Secure Group Messaging. IACR Cryptol. ePrint Arch. 2022: 1411 (2022) - [i45]F. Betül Durak, Serge Vaudenay, Melissa Chase:
Anonymous Tokens with Hidden Metadata Bit from Algebraic MACs. IACR Cryptol. ePrint Arch. 2022: 1622 (2022) - 2021
- [c156]Sonia Bogos, Dario Korolija, Thomas Locher, Serge Vaudenay:
Towards Efficient LPN-Based Symmetric Encryption. ACNS (2) 2021: 208-230 - [c155]Subhadeep Banik
, Khashayar Barooti, Serge Vaudenay, Hailun Yan:
New Attacks on LowMC Instances with a Single Plaintext/Ciphertext Pair. ASIACRYPT (1) 2021: 303-331 - [c154]F. Betül Durak, Henning Horst, Michael Horst, Serge Vaudenay:
FAST: Secure and High Performance Format-Preserving Encryption and Tokenization. ASIACRYPT (3) 2021: 465-489 - [c153]Loïs Huguenin-Dumittan, Serge Vaudenay:
FO-like Combiners and Hybrid Post-Quantum Cryptography. CANS 2021: 225-244 - [c152]Gwangbae Choi, F. Betül Durak, Serge Vaudenay:
Post-Compromise Security in Self-Encryption. ITC 2021: 25:1-25:23 - [c151]Vincenzo Iovino, Serge Vaudenay, Martin Vuagnoux:
On the Effectiveness of Time Travel to Inject COVID-19 Alerts. CT-RSA 2021: 422-443 - [c150]Gwangbae Choi, Serge Vaudenay:
Towards Witness Encryption Without Multilinear Maps - Extractable Witness Encryption for Multi-subset Sum Instances with No Small Solution to the Homogeneous Problem. ICISC 2021: 28-47 - [c149]Andrea Caforio, F. Betül Durak, Serge Vaudenay:
Beyond Security and Efficiency: On-Demand Ratcheting with Security Awareness. Public Key Cryptography (2) 2021: 649-677 - [i44]Loïs Huguenin-Dumittan, Serge Vaudenay:
A note on IND-qCCA security in the ROM and its applications. IACR Cryptol. ePrint Arch. 2021: 844 (2021) - [i43]F. Betül Durak, Henning Horst, Michael Horst, Serge Vaudenay:
FAST: Secure and High Performance Format-Preserving Encryption and Tokenization. IACR Cryptol. ePrint Arch. 2021: 1171 (2021) - [i42]Loïs Huguenin-Dumittan, Serge Vaudenay:
FO-like Combiners and Hybrid Post-Quantum Cryptography. IACR Cryptol. ePrint Arch. 2021: 1288 (2021) - [i41]Subhadeep Banik, Khashayar Barooti, Serge Vaudenay, Hailun Yan:
New Attacks on LowMC instances with a Single Plaintext/Ciphertext pair. IACR Cryptol. ePrint Arch. 2021: 1345 (2021) - 2020
- [j27]Subhadeep Banik
, Fatih Balli, Francesco Regazzoni, Serge Vaudenay:
Swap and Rotate: Lightweight Linear Layers for SPN-based Blockciphers. IACR Trans. Symmetric Cryptol. 2020(1): 185-232 (2020) - [j26]Subhadeep Banik
, Khashayar Barooti, F. Betül Durak, Serge Vaudenay:
Cryptanalysis of LowMC instances using single plaintext/ciphertext pair. IACR Trans. Symmetric Cryptol. 2020(4): 130-146 (2020) - [c148]F. Betül Durak, Loïs Huguenin-Dumittan, Serge Vaudenay:
\(\mathsf {BioLocker}\): A Practical Biometric Authentication Mechanism Based on 3D Fingervein. ACNS (2) 2020: 62-80 - [c147]Loïs Huguenin-Dumittan, Serge Vaudenay:
Classical Misuse Attacks on NIST Round 2 PQC - The Power of Rank-Based Schemes. ACNS (1) 2020: 208-227 - [c146]Fatih Balli, Paul Rösler
, Serge Vaudenay:
Determining the Core Primitive for Optimally Secure Ratcheting. ASIACRYPT (3) 2020: 621-650 - [c145]Serge Fehr, Serge Vaudenay:
Sublinear Bounds on the Distinguishing Advantage for Multiple Samples. IWSEC 2020: 165-183 - [c144]Hailun Yan, Serge Vaudenay:
Symmetric Asynchronous Ratcheted Communication with Associated Data. IWSEC 2020: 184-204 - [e11]Stephan Krenn, Haya Schulmann, Serge Vaudenay:
Cryptology and Network Security - 19th International Conference, CANS 2020, Vienna, Austria, December 14-16, 2020, Proceedings. Lecture Notes in Computer Science 12579, Springer 2020, ISBN 978-3-030-65410-8 [contents] - [i40]Fatih Balli, Paul Rösler, Serge Vaudenay:
Determining the Core Primitive for Optimally Secure Ratcheting. IACR Cryptol. ePrint Arch. 2020: 148 (2020) - [i39]Serge Vaudenay:
Analysis of DP3T. IACR Cryptol. ePrint Arch. 2020: 399 (2020) - [i38]Loïs Huguenin-Dumittan, Serge Vaudenay:
Classical Misuse Attacks on NIST Round 2 PQC: The Power of Rank-Based Schemes. IACR Cryptol. ePrint Arch. 2020: 409 (2020) - [i37]F. Betül Durak, Loïs Huguenin-Dumittan, Serge Vaudenay:
BioLocker: A Practical Biometric Authentication Mechanism based on 3D Fingervein. IACR Cryptol. ePrint Arch. 2020: 453 (2020) - [i36]Serge Vaudenay:
Centralized or Decentralized? The Contact Tracing Dilemma. IACR Cryptol. ePrint Arch. 2020: 531 (2020) - [i35]Vincenzo Iovino, Serge Vaudenay, Martin Vuagnoux:
On the Effectiveness of Time Travel to Inject COVID-19 Alerts. IACR Cryptol. ePrint Arch. 2020: 1393 (2020)
2010 – 2019
- 2019
- [j25]Gildas Avoine
, Muhammed Ali Bingöl
, Ioana Boureanu, Srdjan Capkun, Gerhard P. Hancke
, Süleyman Kardas, Chong Hee Kim, Cédric Lauradoux, Benjamin Martin, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen, Dave Singelée, Aslan Tchamkerten, Rolando Trujillo-Rasua
, Serge Vaudenay:
Security of Distance-Bounding: A Survey. ACM Comput. Surv. 51(5): 94:1-94:33 (2019) - [j24]Gwangbae Choi, Serge Vaudenay:
Timed-Release Encryption With Master Time Bound Key (Extended). J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10(4): 88-108 (2019) - [c143]Ciprian Baetu, F. Betül Durak, Loïs Huguenin-Dumittan, Abdullah Talayhan, Serge Vaudenay:
Misuse Attacks on Post-quantum Cryptosystems. EUROCRYPT (2) 2019: 747-776 - [c142]F. Betül Durak, Serge Vaudenay:
Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity. IWSEC 2019: 343-362 - [c141]Fatih Balli, F. Betül Durak, Serge Vaudenay:
BioID: A Privacy-Friendly Identity Document. STM 2019: 53-70 - [c140]Gwangbae Choi, Serge Vaudenay:
Timed-Release Encryption with Master Time Bound Key. WISA 2019: 167-179 - [i34]Ciprian Baetu, F. Betül Durak, Loïs Huguenin-Dumittan, Abdullah Talayhan, Serge Vaudenay:
Misuse Attacks on Post-Quantum Cryptosystems. IACR Cryptol. ePrint Arch. 2019: 525 (2019) - [i33]Fatih Balli, F. Betül Durak, Serge Vaudenay:
BioID: a Privacy-Friendly Identity Document. IACR Cryptol. ePrint Arch. 2019: 894 (2019) - [i32]Gwangbae Choi, Serge Vaudenay:
Timed-Release Encryption With Master Time Bound Key (Full Version). IACR Cryptol. ePrint Arch. 2019: 904 (2019) - [i31]Andrea Caforio, F. Betül Durak, Serge Vaudenay:
On-Demand Ratcheting with Security Awareness. IACR Cryptol. ePrint Arch. 2019: 965 (2019) - [i30]Divesh Aggarwal, Bogdan Ursu, Serge Vaudenay:
Faster Sieving Algorithm for Approximate SVP with Constant Approximation Factors. IACR Cryptol. ePrint Arch. 2019: 1028 (2019) - [i29]Subhadeep Banik, Fatih Balli, Francesco Regazzoni, Serge Vaudenay:
Swap and Rotate: Lightweight linear layers for SPN-based blockciphers. IACR Cryptol. ePrint Arch. 2019: 1212 (2019) - 2018
- [j23]Sonia Bogos
, John Gaspoz, Serge Vaudenay:
Cryptanalysis of a homomorphic encryption scheme. Cryptogr. Commun. 10(1): 27-39 (2018) - [c139]Handan Kilinç, Serge Vaudenay:
Secure Contactless Payment. ACISP 2018: 579-597 - [c138]F. Betül Durak, Serge Vaudenay:
Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains. ACNS 2018: 440-458 - [c137]Serge Vaudenay, Damian Vizár:
Can Caesar Beat Galois? - Robustness of CAESAR Candidates Against Nonce Reusing and High Data Complexity Attacks. ACNS 2018: 476-494 - [c136]Handan Kilinç, Serge Vaudenay:
Formal Analysis of Distance Bounding with Secure Hardware. ACNS 2018: 579-597 - [i28]F. Betül Durak, Serge Vaudenay:
Generic Round-Function Recovery for Feistel Networks over Small Domains. IACR Cryptol. ePrint Arch. 2018: 108 (2018) - [i27]Handan Kilinç, Serge Vaudenay:
Formal Analysis of Distance Bounding with Secure Hardware. IACR Cryptol. ePrint Arch. 2018: 440 (2018) - [i26]F. Betül Durak, Serge Vaudenay:
Bidirectional Asynchronous Ratcheted Key Agreement without Key-Update Primitives. IACR Cryptol. ePrint Arch. 2018: 889 (2018) - [i25]Iraklis Leontiadis, Serge Vaudenay:
Private Message Franking with After Opening Privacy. IACR Cryptol. ePrint Arch. 2018: 938 (2018) - [i24]Subhadeep Banik, Francesco Regazzoni, Serge Vaudenay:
Lightweight Circuits with Shift and Swap. IACR Cryptol. ePrint Arch. 2018: 1114 (2018) - 2017
- [j22]Lauren De Meyer, Serge Vaudenay:
DES S-box generator. Cryptologia 41(2): 153-171 (2017) - [c135]F. Betül Durak, Serge Vaudenay:
Breaking the FF3 Format-Preserving Encryption Standard over Small Domains. CRYPTO (2) 2017: 679-707 - [c134]Handan Kilinç, Serge Vaudenay:
Contactless Access Control Based on Distance Bounding. ISC 2017: 195-213 - [i23]F. Betül Durak, Serge Vaudenay:
Breaking the FF3 Format-Preserving Encryption Standard Over Small Domains. IACR Cryptol. ePrint Arch. 2017: 521 (2017) - [i22]Serge Vaudenay, Damian Vizár:
Under Pressure: Security of Caesar Candidates beyond their Guarantees. IACR Cryptol. ePrint Arch. 2017: 1147 (2017) - 2016
- [j21]Sonia Bogos, Florian Tramèr
, Serge Vaudenay:
On solving L P N using B K W and variants - Implementation and analysis. Cryptogr. Commun. 8(3): 331-369 (2016) - [j20]Serge Vaudenay:
Privacy failure in the public-key distance-bounding protocols. IET Inf. Secur. 10(4): 188-193 (2016) - [j19]Petr Susil, Pouyan Sepehrdad, Serge Vaudenay, Nicolas T. Courtois:
On selection of samples in algebraic attacks and a new technique to find hidden low degree equations. Int. J. Inf. Sec. 15(1): 51-65 (2016) - [c133]Reza Reyhanitabar, Serge Vaudenay, Damian Vizár:
Authenticated Encryption with Variable Stretch. ASIACRYPT (1) 2016: 396-425 - [c132]Sonia Bogos, Serge Vaudenay:
Optimization of \mathsf LPN Solving Algorithms. ASIACRYPT (1) 2016: 703-728 - [c131]Handan Kilinç, Serge Vaudenay:
Efficient Public-Key Distance Bounding Protocol. ASIACRYPT (2) 2016: 873-901 - [c130]Serge Vaudenay:
Clever Arbiters Versus Malicious Adversaries - On the Gap Between Known-Input Security and Chosen-Input Security. The New Codebreakers 2016: 497-517 - [c129]Serge Vaudenay:
Side-Channel Attacks on Threshold Implementations Using a Glitch Algebra. CANS 2016: 55-70 - [c128]Thierry Kaufmann, Hervé Pelletier, Serge Vaudenay, Karine Villegas:
When Constant-Time Source Yields Variable-Time Binary: Exploiting Curve25519-donna Built with MSVC 2015. CANS 2016: 573-582 - [c127]Mathilde Igier, Serge Vaudenay:
Distance Bounding Based on PUF. CANS 2016: 701-710 - [c126]F. Betül Durak, Serge Vaudenay:
Circular Security Reconsidered. SECITC 2016: 3-19 - [i21]Jialin Huang, Serge Vaudenay, Xuejia Lai, Kaisa Nyberg:
Capacity and Data Complexity in Multidimensional Linear Attack. IACR Cryptol. ePrint Arch. 2016: 51 (2016) - [i20]Sonia Bogos, Serge Vaudenay:
Optimization of LPN Solving Algorithms. IACR Cryptol. ePrint Arch. 2016: 288 (2016) - [i19]Sonia Bogos, Serge Vaudenay:
How to Sequentialize Independent Parallel Attacks? IACR Cryptol. ePrint Arch. 2016: 296 (2016) - [i18]Sonia Bogos, Serge Vaudenay:
Observations on the LPN Solving Algorithm from Eurocrypt'16. IACR Cryptol. ePrint Arch. 2016: 437 (2016) - [i17]Reza Reyhanitabar, Serge Vaudenay, Damian Vizár:
Authenticated Encryption with Variable Stretch. IACR Cryptol. ePrint Arch. 2016: 463 (2016) - [i16]Sonia Bogos, John Gaspoz, Serge Vaudenay:
Cryptanalysis of a Homomorphic Encryption Scheme. IACR Cryptol. ePrint Arch. 2016: 775 (2016) - [i15]Mathilde Igier, Serge Vaudenay:
Distance Bounding based on PUF. IACR Cryptol. ePrint Arch. 2016: 901 (2016) - 2015
- [j18]Ioana Boureanu, Serge Vaudenay:
Challenges in Distance Bounding. IEEE Secur. Priv. 13(1): 41-48 (2015) - [j17]Ioana Boureanu, Aikaterini Mitrokotsa
, Serge Vaudenay:
Practical and provably secure distance-bounding. J. Comput. Secur. 23(2): 229-257 (2015) - [j16]Christos Dimitrakakis
, Aikaterini Mitrokotsa
, Serge Vaudenay:
Expected loss analysis for authentication in constrained channels. J. Comput. Secur. 23(3): 309-329 (2015) - [c125]Handan Kilinç, Serge Vaudenay:
Optimal Proximity Proofs Revisited. ACNS 2015: 478-494 - [c124]Sonia Bogos, Serge Vaudenay:
How to Sequentialize Independent Parallel Attacks? - Biased Distributions Have a Phase Transition. ASIACRYPT (2) 2015: 704-731 - [c123]Ioana Boureanu, Miyako Ohkubo, Serge Vaudenay:
The Limits of Composable Crypto with Transferable Setup Devices. AsiaCCS 2015: 381-392 - [c122]Jialin Huang, Serge Vaudenay, Xuejia Lai, Kaisa Nyberg:
Capacity and Data Complexity in Multidimensional Linear Attack. CRYPTO (1) 2015: 141-160 - [c121]Alexandre Duc, Florian Tramèr, Serge Vaudenay:
Better Algorithms for LWE and LWR. EUROCRYPT (1) 2015: 173-202 - [c120]Serge Vaudenay:
Private and Secure Public-Key Distance Bounding - Application to NFC Payment. Financial Cryptography 2015: 207-216 - [c119]Céline Blondeau, Aslí Bay, Serge Vaudenay:
Protecting Against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation. FSE 2015: 73-91 - [c118]Reza Reyhanitabar, Serge Vaudenay, Damian Vizár:
Boosting OMD for Almost Free Authentication of Associated Data. FSE 2015: 411-427 - [c117]Serge Vaudenay:
On Privacy for RFID. ProvSec 2015: 3-20 - [c116]Serge Vaudenay:
Sound Proof of Proximity of Knowledge. ProvSec 2015: 105-126 - [i14]Sonia Bogos, Florian Tramèr
, Serge Vaudenay:
On Solving Lpn using BKW and Variants. IACR Cryptol. ePrint Arch. 2015: 49 (2015) - [i13]Alexandre Duc, Florian Tramèr
, Serge Vaudenay:
Better Algorithms for LWE and LWR. IACR Cryptol. ePrint Arch. 2015: 56 (2015) - [i12]Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
Towards Secure Distance Bounding. IACR Cryptol. ePrint Arch. 2015: 208 (2015) - [i11]Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux:
Tornado Attack on RC4 with Applications to WEP & WPA. IACR Cryptol. ePrint Arch. 2015: 254 (2015) - [i10]Reza Reyhanitabar, Serge Vaudenay, Damian Vizár:
Boosting OMD for Almost Free Authentication of Associated Data. IACR Cryptol. ePrint Arch. 2015: 302 (2015) - [i9]Céline Blondeau, Aslí Bay, Serge Vaudenay:
Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation. IACR Cryptol. ePrint Arch. 2015: 380 (2015) - 2014
- [j15]Aslí Bay, Atefeh Mashatan, Serge Vaudenay:
Revisiting iterated attacks in the context of decorrelation theory. Cryptogr. Commun. 6(4): 279-311 (2014) - [j14]Aikaterini Mitrokotsa
, Cristina Onete, Serge Vaudenay:
Location leakage in distance bounding: Why location privacy does not work. Comput. Secur. 45: 199-209 (2014) - [c115]Petr Susil, Pouyan Sepehrdad, Serge Vaudenay:
On Selection of Samples in Algebraic Attacks and a New Technique to Find Hidden Low Degree Equations. ACISP 2014: 50-65 - [c114]Paul Bottinelli, Reza Reyhanitabar, Serge Vaudenay:
Breaking the IOC Authenticated Encryption Mode. AFRICACRYPT 2014: 126-135 - [c113]Ioana Boureanu, Serge Vaudenay:
Optimal Proximity Proofs. Inscrypt 2014: 170-190 - [c112]Ioana Boureanu, Serge Vaudenay:
Compact and Efficient UC Commitments Under Atomic-Exchanges. ICISC 2014: 381-401 - [c111]Jialin Huang, Serge Vaudenay, Xuejia Lai:
On the Key Schedule of Lightweight Block Ciphers. INDOCRYPT 2014: 124-142 - [c110]Aslí Bay, Jialin Huang, Serge Vaudenay:
Improved Linear Cryptanalysis of Reduced-Round MIBS. IWSEC 2014: 204-220 - [c109]Reza Reyhanitabar, Serge Vaudenay, Damian Vizár:
Misuse-Resistant Variants of the OMD Authenticated Encryption Mode. ProvSec 2014: 55-70 - [c108]Simon Cogliani, Diana-Stefania Maimut, David Naccache, Rodrigo Portella do Canto, Reza Reyhanitabar, Serge Vaudenay, Damian Vizár:
OMD: A Compression Function Mode of Operation for Authenticated Encryption. Selected Areas in Cryptography 2014: 112-128 - [e10]Ioana Boureanu, Philippe Owesarski, Serge Vaudenay:
Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings. Lecture Notes in Computer Science 8479, Springer 2014, ISBN 978-3-319-07535-8 [contents] - [i8]Ioana Boureanu, Serge Vaudenay:
Optimal Proximity Proofs. IACR Cryptol. ePrint Arch. 2014: 693 (2014) - [i7]Serge Vaudenay:
Proof of Proximity of Knowledge. IACR Cryptol. ePrint Arch. 2014: 695 (2014) - 2013
- [j13]Aikaterini Mitrokotsa
, Pedro Peris-Lopez
, Christos Dimitrakakis
, Serge Vaudenay:
On Selecting the Nonce Length in Distance-Bounding Protocols. Comput. J. 56(10): 1216-1227 (2013) - [j12]Ioana Boureanu, Serge Vaudenay:
UC and EUC Weak Bit-Commitments Using Seal-Once Tamper-Evidence. Sci. Ann. Comput. Sci. 23(2): 191-228 (2013) - [c107]Sonia Bogos, Ioana Boureanu, Serge Vaudenay:
Primeless Factoring-Based Cryptography - -Solving the Complexity Bottleneck of Public-Key Generation-. ACNS 2013: 552-569 - [c106]Alexandre Duc, Serge Vaudenay:
HELEN: A Public-Key Cryptosystem Based on the LPN and the Decisional Minimal Distance Problems. AFRICACRYPT 2013: 107-126 - [c105]Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
Towards Secure Distance Bounding. FSE 2013: 55-67 - [c104]Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux:
Smashing WEP in a Passive Attack. FSE 2013: 155-178 - [c103]Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
Practical and Provably Secure Distance-Bounding. ISC 2013: 248-258 - [c102]Ioana Boureanu, Aikaterini Mitrokotsa
, Serge Vaudenay:
Secure and Lightweight Distance-Bounding. LightSec 2013: 97-113 - [c101]