default search action
Olivier Pereira
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c61]Thi Van Thao Doan, Olivier Pereira, Thomas Peters:
Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable Elections. ACNS (1) 2024: 257-287 - [c60]Thi Van Thao Doan, Olivier Pereira, Thomas Peters:
Threshold Receipt-Free Single-Pass eVoting. E-Vote-ID 2024: 20-36 - [c59]Henri Devillez, Olivier Pereira, Thomas Peters:
Practical Traceable Receipt-Free Encryption. SCN (1) 2024: 367-387 - [c58]Henri Devillez, Olivier Pereira, Thomas Peters, Quentin Yang:
Can we cast a ballot as intended and be receipt free? SP 2024: 3440-3457 - [c57]Josh Benaloh, Michael Naehrig, Olivier Pereira, Dan S. Wallach:
ElectionGuard: a Cryptographic Toolkit to Enable Verifiable Elections. USENIX Security Symposium 2024 - [i42]Josh Benaloh, Michael Naehrig, Olivier Pereira:
REACTIVE: Rethinking Effective Approaches Concerning Trustees in Verifiable Elections. IACR Cryptol. ePrint Arch. 2024: 915 (2024) - [i41]Henri Devillez, Olivier Pereira, Thomas Peters:
Verifiable and Private Vote-by-Mail. IACR Cryptol. ePrint Arch. 2024: 926 (2024) - [i40]Josh Benaloh, Michael Naehrig, Olivier Pereira, Dan S. Wallach:
ElectionGuard: a Cryptographic Toolkit to Enable Verifiable Elections. IACR Cryptol. ePrint Arch. 2024: 955 (2024) - [i39]Henri Devillez, Olivier Pereira, Thomas Peters:
Practical Traceable Receipt-Free Encryption. IACR Cryptol. ePrint Arch. 2024: 1162 (2024) - 2023
- [i38]Louis Navarre, Olivier Pereira, Olivier Bonaventure:
MCQUIC: Multicast and unicast in a single transport protocol. CoRR abs/2309.06633 (2023) - 2022
- [c56]Henri Devillez, Olivier Pereira, Thomas Peters:
Traceable Receipt-Free Encryption. ASIACRYPT (3) 2022: 273-303 - [c55]Henri Devillez, Olivier Pereira, Thomas Peters:
How to Verifiably Encrypt Many Bits for an Election? ESORICS (2) 2022: 653-671 - [c54]Thomas Haines, Olivier Pereira, Vanessa Teague:
Running the Race: A Swiss Voting Story. E-Vote-ID 2022: 53-69 - [c53]Olivier Pereira:
Individual Verifiability and Revoting in the Estonian Internet Voting System. Financial Cryptography Workshops 2022: 315-324 - [i37]Henri Devillez, Olivier Pereira, Thomas Peters:
Traceable Receipt-Free Encryption. IACR Cryptol. ePrint Arch. 2022: 822 (2022) - [i36]Henri Devillez, Olivier Pereira, Thomas Peters:
How to Verifiably Encrypt Many Bits for an Election? IACR Cryptol. ePrint Arch. 2022: 1051 (2022) - 2021
- [i35]Olivier Pereira:
Individual Verifiability and Revoting in the Estonian Internet Voting System. IACR Cryptol. ePrint Arch. 2021: 1098 (2021) - 2020
- [j13]Thien-Nam Dinh, Florentin Rochet, Olivier Pereira, Dan S. Wallach:
Scaling Up Anonymous Communication with Efficient Nanopayment Channels. Proc. Priv. Enhancing Technol. 2020(3): 175-203 (2020) - [j12]Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1): 256-320 (2020) - [j11]Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction. IACR Trans. Symmetric Cryptol. 2020(1): 6-42 (2020) - [j10]Davide Bellizia, Francesco Berti, Olivier Bronchain, Gaëtan Cassiers, Sébastien Duval, Chun Guo, Gregor Leander, Gaëtan Leurent, Itamar Levi, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert, Balazs Udvarhelyi, Friedrich Wiemer:
Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher. IACR Trans. Symmetric Cryptol. 2020(S1): 295-349 (2020) - [c52]Florentin Rochet, Ryan Wails, Aaron Johnson, Prateek Mittal, Olivier Pereira:
CLAPS: Client-Location-Aware Path Selection in Tor. CCS 2020: 17-34 - [c51]Davide Bellizia, Olivier Bronchain, Gaëtan Cassiers, Vincent Grosso, Chun Guo, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography - A Practical Guide Through the Leakage-Resistance Jungle. CRYPTO (1) 2020: 369-400 - [c50]Eleanor McMurtry, Olivier Pereira, Vanessa Teague:
When Is a Test Not a Proof? ESORICS (2) 2020: 23-41 - [c49]Thomas Haines, Olivier Pereira, Peter B. Rønne:
Short Paper: An Update on Marked Mix-Nets: An Attack, a Fix and PQ Possibilities. Financial Cryptography Workshops 2020: 360-368 - [c48]Thomas Haines, Sarah Jamie Lewis, Olivier Pereira, Vanessa Teague:
How not to prove your election outcome. SP 2020: 644-660 - [i34]Davide Bellizia, Olivier Bronchain, Gaëtan Cassiers, Vincent Grosso, Chun Guo, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle. IACR Cryptol. ePrint Arch. 2020: 211 (2020) - [i33]Eleanor McMurtry, Olivier Pereira, Vanessa Teague:
When is a test not a proof? IACR Cryptol. ePrint Arch. 2020: 909 (2020)
2010 – 2019
- 2019
- [j9]Chris Culnane, Aleksander Essex, Sarah Jamie Lewis, Olivier Pereira, Vanessa Teague:
Knights and Knaves Run Elections: Internet Voting and Undetectable Electoral Fraud. IEEE Secur. Priv. 17(4): 62-70 (2019) - [c47]Francesco Berti, Olivier Pereira, François-Xavier Standaert:
Reducing the Cost of Authenticity with Leakages: a \mathsf CIML2 -Secure \mathsf AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher. AFRICACRYPT 2019: 229-249 - [c46]Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions. Inscrypt 2019: 517-532 - [c45]Kim Ramchen, Chris Culnane, Olivier Pereira, Vanessa Teague:
Universally Verifiable MPC and IRV Ballot Counting. Financial Cryptography 2019: 301-319 - [c44]Olivier Pereira, Peter B. Rønne:
End-to-End Verifiable Quadratic Voting with Everlasting Privacy. Financial Cryptography Workshops 2019: 314-329 - [c43]Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract). LATINCRYPT 2019: 150-172 - [c42]Quentin De Coninck, François Michel, Maxime Piraux, Florentin Rochet, Thomas Given-Wilson, Axel Legay, Olivier Pereira, Olivier Bonaventure:
Pluginizing QUIC. SIGCOMM 2019: 59-74 - [c41]Gaëtan Cassiers, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security. SPACE 2019: 67-85 - [c40]Florentin Rochet, Kyriakos Efthymiadis, François Koeune, Olivier Pereira:
SWAT: Seamless Web Authentication Technology. WWW 2019: 1579-1589 - [i32]Florentin Rochet, Olivier Bonaventure, Olivier Pereira:
Flexible Anonymous Network. CoRR abs/1906.11520 (2019) - [i31]Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications. IACR Cryptol. ePrint Arch. 2019: 137 (2019) - [i30]Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge. IACR Cryptol. ePrint Arch. 2019: 193 (2019) - [i29]Francesco Berti, Olivier Pereira, François-Xavier Standaert:
Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher. IACR Cryptol. ePrint Arch. 2019: 451 (2019) - [i28]Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions. IACR Cryptol. ePrint Arch. 2019: 1413 (2019) - 2018
- [j8]Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Moses D. Liskov, Nancy A. Lynch, Olivier Pereira, Roberto Segala:
Task-structured probabilistic I/O automata. J. Comput. Syst. Sci. 94: 63-97 (2018) - [j7]Florentin Rochet, Olivier Pereira:
Dropping on the Edge: Flexibility and Traffic Confirmation in Onion Routing Protocols. Proc. Priv. Enhancing Technol. 2018(2): 27-46 (2018) - [c39]Francesco Berti, François Koeune, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives. AsiaCCS 2018: 37-50 - [c38]Francesco Berti, Olivier Pereira, Thomas Peters:
Reconsidering Generic Composition: The Tag-then-Encrypt Case. INDOCRYPT 2018: 70-90 - [i27]Lionel Dricot, Olivier Pereira:
SoK: Uncentralisable Ledgers and their Impact on Voting Systems. CoRR abs/1801.08064 (2018) - [i26]Chris Culnane, Olivier Pereira, Kim Ramchen, Vanessa Teague:
Universally Verifiable MPC with Applications to IRV Ballot Counting. IACR Cryptol. ePrint Arch. 2018: 246 (2018) - [i25]Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions. IACR Cryptol. ePrint Arch. 2018: 484 (2018) - [i24]Francesco Berti, Olivier Pereira, Thomas Peters:
Reconsidering Generic Composition: the Tag-then-Encrypt case. IACR Cryptol. ePrint Arch. 2018: 991 (2018) - 2017
- [j6]Florentin Rochet, Olivier Pereira:
Waterfilling: Balancing the Tor network with maximum diversity. Proc. Priv. Enhancing Technol. 2017(2): 4-22 (2017) - [j5]Francesco Berti, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
On Leakage-Resilient Authenticated Encryption with Decryption Leakages. IACR Trans. Symmetric Cryptol. 2017(3): 271-293 (2017) - [c37]Olivier Pereira, Ronald L. Rivest:
Marked Mix-Nets. Financial Cryptography Workshops 2017: 353-369 - [c36]Olivier Pereira, Florentin Rochet, Cyrille Wiedling:
Formal Analysis of the FIDO 1.x Protocol. FPS 2017: 68-82 - [c35]Mathieu Jadin, Gautier Tihon, Olivier Pereira, Olivier Bonaventure:
Securing multipath TCP: Design & implementation. INFOCOM 2017: 1-9 - [c34]Olivier Pereira, Dan S. Wallach:
Clash Attacks and the STAR-Vote System. E-VOTE-ID 2017: 228-247 - [e2]Robert Krimmer, Melanie Volkamer, Nadja Braun Binder, Norbert Kersting, Olivier Pereira, Carsten Schürmann:
Electronic Voting - Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings. Lecture Notes in Computer Science 10615, Springer 2017, ISBN 978-3-319-68686-8 [contents] - 2016
- [c33]Edouard Cuvelier, Olivier Pereira:
Verifiable Multi-party Computation with Perfectly Private Audit Trail. ACNS 2016: 367-385 - [i23]Florentin Rochet, Olivier Pereira:
Waterfiling: Balancing the Tor network with maximum diversity. CoRR abs/1609.04203 (2016) - [i22]David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi:
Adapting Helios for provable ballot privacy. IACR Cryptol. ePrint Arch. 2016: 756 (2016) - [i21]David Bernhard, Olivier Pereira, Bogdan Warinschi:
How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios. IACR Cryptol. ePrint Arch. 2016: 771 (2016) - [i20]Francesco Berti, François Koeune, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Leakage-Resilient and Misuse-Resistant Authenticated Encryption. IACR Cryptol. ePrint Arch. 2016: 996 (2016) - 2015
- [c32]Olivier Pereira, François-Xavier Standaert, Srinivas Vivek:
Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives. CCS 2015: 96-108 - [c31]David Bernhard, Véronique Cortier, David Galindo, Olivier Pereira, Bogdan Warinschi:
SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions. IEEE Symposium on Security and Privacy 2015: 499-516 - [i19]David Bernhard, Véronique Cortier, David Galindo, Olivier Pereira, Bogdan Warinschi:
A comprehensive analysis of game-based ballot privacy definitions. IACR Cryptol. ePrint Arch. 2015: 255 (2015) - 2014
- [i18]Olivier Pereira:
Verifiable Elections with Commitment Consistent Encryption - A Primer. CoRR abs/1412.7358 (2014) - 2013
- [c30]François-Xavier Standaert, Olivier Pereira, Yu Yu:
Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions. CRYPTO (1) 2013: 335-352 - [c29]Edouard Cuvelier, Olivier Pereira, Thomas Peters:
Election Verifiability or Ballot Privacy: Do We Need to Choose? ESORICS 2013: 481-498 - [c28]Abdelrahaman Aly, Edouard Cuvelier, Sophie Mawet, Olivier Pereira, Mathieu Van Vyve:
Securely Solving Simple Combinatorial Graph Problems. Financial Cryptography 2013: 239-257 - [c27]Paolo Palmieri, Olivier Pereira:
Unconditionally Secure Oblivious Transfer from Real Network Behavior. IWSEC 2013: 168-182 - [c26]Josh Benaloh, Michael D. Byrne, Bryce Eakin, Philip T. Kortum, Neal McBurnett, Olivier Pereira, Philip B. Stark, Dan S. Wallach, Gail Fisher, Julian Montoya, Michelle Parker, Michael Winn:
STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System. EVT/WOTE 2013 - [i17]Edouard Cuvelier, Olivier Pereira, Thomas Peters:
Election Verifiability or Ballot Privacy: Do We Need to Choose? IACR Cryptol. ePrint Arch. 2013: 216 (2013) - [i16]François-Xavier Standaert, Olivier Pereira, Yu Yu:
Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions. IACR Cryptol. ePrint Arch. 2013: 370 (2013) - 2012
- [c25]David Bernhard, Olivier Pereira, Bogdan Warinschi:
How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios. ASIACRYPT 2012: 626-643 - [c24]David Bernhard, Véronique Cortier, Olivier Pereira, Bogdan Warinschi:
Measuring vote privacy, revisited. CCS 2012: 941-952 - [e1]J. Alex Halderman, Olivier Pereira:
2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, EVT/WOTE '12, Bellevue, WA, USA, August 6-7, 2012. USENIX Association 2012 [contents] - [i15]Josh Benaloh, Mike Byrne, Philip T. Kortum, Neal McBurnett, Olivier Pereira, Philip B. Stark, Dan S. Wallach:
STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System. CoRR abs/1211.1904 (2012) - [i14]David Bernhard, Olivier Pereira, Bogdan Warinschi:
On Necessary and Sufficient Conditions for Private Ballot Submission. IACR Cryptol. ePrint Arch. 2012: 236 (2012) - 2011
- [c23]Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, Yu Yu:
Leftover Hash Lemma, Revisited. CRYPTO 2011: 1-20 - [c22]David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi:
Adapting Helios for Provable Ballot Privacy. ESORICS 2011: 335-354 - [c21]Olivier Pereira:
Ballot Aggregation and Mixnet Based Open-Audit Elections - (Extended Abstract). EuroPKI 2011: 123-127 - [c20]Paolo Palmieri, Olivier Pereira:
Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering. ICISC 2011: 332-345 - [c19]Paolo Palmieri, Olivier Pereira:
Secure Two-Party Computation over a Z-Channel. ProvSec 2011: 3-15 - [c18]Philippe Bulens, Damien Giry, Olivier Pereira:
Running Mixnet-Based Elections with Helios. EVT/WOTE 2011 - [i13]Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, Yu Yu:
Leftover Hash Lemma, Revisited. IACR Cryptol. ePrint Arch. 2011: 88 (2011) - [i12]Laurie Haustenne, Quentin De Neyer, Olivier Pereira:
Elliptic Curve Cryptography in JavaScript. IACR Cryptol. ePrint Arch. 2011: 654 (2011) - 2010
- [c17]Yu Yu, François-Xavier Standaert, Olivier Pereira, Moti Yung:
Practical leakage-resilient pseudorandom generators. CCS 2010: 141-151 - [c16]Paolo Palmieri, Olivier Pereira:
Building Oblivious Transfer on Channel Delays. Inscrypt 2010: 125-138 - [c15]Sébastien Canard, Iwen Coisel, Giacomo de Meulenaer, Olivier Pereira:
Group Signatures are Suitable for Constrained Devices. ICISC 2010: 133-150 - [p1]François-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald:
Leakage Resilient Cryptography in Practice. Towards Hardware-Intrinsic Security 2010: 99-134
2000 – 2009
- 2009
- [c14]Stéphanie Delaune, Steve Kremer, Olivier Pereira:
Simulation based security in the applied pi calculus. FSTTCS 2009: 169-180 - [c13]Olivier de Marneffe, Olivier Pereira, Jean-Jacques Quisquater:
Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios. EVT/WOTE 2009 - [i11]Stéphanie Delaune, Steve Kremer, Olivier Pereira:
Simulation based security in the applied pi calculus. IACR Cryptol. ePrint Arch. 2009: 267 (2009) - [i10]François-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald:
Leakage Resilient Cryptography in Practice. IACR Cryptol. ePrint Arch. 2009: 341 (2009) - 2008
- [j4]Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Moses D. Liskov, Nancy A. Lynch, Olivier Pereira, Roberto Segala:
Analyzing Security Protocols Using Time-Bounded Task-PIOAs. Discret. Event Dyn. Syst. 18(1): 111-159 (2008) - [c12]Tadashi Araragi, Olivier Pereira:
Automatic Verification of Simulatability in Security Protocols. IAS 2008: 275-280 - [c11]Christophe Petit, François-Xavier Standaert, Olivier Pereira, Tal Malkin, Moti Yung:
A block cipher based pseudo random number generator secure against side-channel key recovery. AsiaCCS 2008: 56-65 - [c10]Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nancy A. Lynch, Olivier Pereira:
Modeling Computational Security in Long-Lived Systems. CONCUR 2008: 114-130 - [c9]Chong Hee Kim, Gildas Avoine, François Koeune, François-Xavier Standaert, Olivier Pereira:
The Swiss-Knife RFID Distance Bounding Protocol. ICISC 2008: 98-115 - [c8]Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk:
Universally Composable Security Analysis of TLS. ProvSec 2008: 313-327 - [c7]Giacomo de Meulenaer, François Gosset, François-Xavier Standaert, Olivier Pereira:
On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks. WiMob 2008: 580-585 - [i9]Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nancy A. Lynch, Olivier Pereira:
Modeling Computational Security in Long-Lived Systems. Theoretical Foundations of Practical Information Security 2008 - [i8]Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk:
Universally Composable Security Analysis of TLS - Secure Sessions with Handshake and Record Layer Protocols. IACR Cryptol. ePrint Arch. 2008: 251 (2008) - [i7]Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nancy A. Lynch, Olivier Pereira:
Modeling Computational Security in Long-Lived Systems, Version 2. IACR Cryptol. ePrint Arch. 2008: 492 (2008) - 2007
- [c6]Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nancy A. Lynch, Olivier Pereira:
Compositional Security for Task-PIOAs. CSF 2007: 125-139 - [c5]Olivier de Marneffe, Olivier Pereira, Jean-Jacques Quisquater:
Simulation-Based Analysis of E2E Voting Systems. VOTE-ID 2007: 137-149 - [i6]Olivier de Marneffe, Olivier Pereira, Jean-Jacques Quisquater:
Simulation-based analysis of E2E voting systems. Frontiers of Electronic Voting 2007 - [i5]Ran Canetti, Ling Cheung, Nancy A. Lynch, Olivier Pereira:
On the Role of Scheduling in Simulation-Based Security. IACR Cryptol. ePrint Arch. 2007: 102 (2007) - [i4]Ling Cheung, Sayan Mitra, Olivier Pereira:
Verifying Statistical Zero Knowledge with Approximate Implementations. IACR Cryptol. ePrint Arch. 2007: 195 (2007) - [i3]Christophe Petit, François-Xavier Standaert, Olivier Pereira, Tal Malkin, Moti Yung:
A Block Cipher based PRNG Secure Against Side-Channel Key Recovery. IACR Cryptol. ePrint Arch. 2007: 356 (2007) - [i2]Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nancy A. Lynch, Olivier Pereira:
Modeling Computational Security in Long-Lived Systems. IACR Cryptol. ePrint Arch. 2007: 406 (2007) - 2006
- [j3]Olivier Pereira, Jean-Jacques Quisquater:
On the impossibility of building secure Cliques-type authenticated group key agreement protocols. J. Comput. Secur. 14(2): 197-246 (2006) - [c4]Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Moses D. Liskov, Nancy A. Lynch, Olivier Pereira, Roberto Segala:
Time-Bounded Task-PIOAs: A Framework for Analyzing Security Protocols. DISC 2006: 238-253 - 2005
- [i1]Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Moses D. Liskov, Nancy A. Lynch, Olivier Pereira, Roberto Segala:
Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol. IACR Cryptol. ePrint Arch. 2005: 452 (2005) - 2004
- [c3]Olivier Pereira, Jean-Jacques Quisquater:
Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols. CSFW 2004: 16-19 - 2003
- [b1]Olivier Pereira:
Modelling and Security Analysis of Authenticated Group Key Agreement Protocols. Catholic University of Louvain, Louvain-la-Neuve, Belgium, 2003 - [j2]Olivier Pereira, Jean-Jacques Quisquater:
Some Attacks Upon Authenticated Group Key Agreement Protocols. J. Comput. Secur. 11(4): 555-580 (2003) - 2001
- [j1]Olivier Pereira, Laurence A. Wolsey:
On the Wagner-Whitin Lot-Sizing Polyhedron. Math. Oper. Res. 26(3): 591-600 (2001) - [c2]Olivier Pereira, Jean-Jacques Quisquater:
A Security Analysis of the Cliques Protocols Suites. CSFW 2001: 73-81 - [c1]Olivier Pereira, Jean-Jacques Quisquater:
Security Analysis of the Cliques Protocols Suites: First Results. SEC 2001: 151-166
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint