Cristina Onete

According to our database1, Cristina Onete authored at least 41 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Privacy-preserving Attestation for Virtualized Network Infrastructures.
IACR Cryptol. ePrint Arch., 2023

Towards a Privacy-Preserving Attestation for Virtualized Networks.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Pairing-free secure-channel establishment in mobile networks with fine-grained lawful interception.
IACR Cryptol. ePrint Arch., 2022

MARSHAL: Messaging with Asynchronous Ratchets and Signatures for faster HeALing.
IACR Cryptol. ePrint Arch., 2022

How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment.
IACR Cryptol. ePrint Arch., 2022

2021
A Cryptographic View of Deep-Attestation, or how to do Provably-Secure Layer-Linking.
IACR Cryptol. ePrint Arch., 2021

How to (Legally) Keep Secrets from Mobile Operators.
Proceedings of the Computer Security - ESORICS 2021, 2021

From Relay Attacks to Distance-Bounding Protocols.
Proceedings of the Security of Ubiquitous Computing Systems, 2021

2020
Designing Reverse Firewalls for the Real World.
IACR Cryptol. ePrint Arch., 2020

Legally keeping secrets from mobile operators: Lawful Interception Key Exchange (LIKE).
IACR Cryptol. ePrint Arch., 2020

2019
The privacy of the TLS 1.3 protocol.
Proc. Priv. Enhancing Technol., 2019

SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting.
IACR Cryptol. ePrint Arch., 2019

2018
A Formal Treatment of Accountable Proxying Over TLS.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Pattern Matching on Encrypted Streams.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Pattern Matching on Encrypted Streams: Applications to DPI and searches on genomic data.
IACR Cryptol. ePrint Arch., 2017

Multi-Hop Distance Estimation: How Far are You?
IACR Cryptol. ePrint Arch., 2017

Breaking and Fixing the HB+DB protocol.
IACR Cryptol. ePrint Arch., 2017

A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol.
IACR Cryptol. ePrint Arch., 2017

Content delivery over TLS: a cryptographic analysis of keyless SSL.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

2016
Achieving Better Privacy for the 3GPP AKA Protocol.
Proc. Priv. Enhancing Technol., 2016

A Cryptographic Analysis of UMTS/LTE AKA.
IACR Cryptol. ePrint Arch., 2016

A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

2015
(De-)Constructing TLS 1.3.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015

The Not-so-Distant Future: Distance-Bounding Protocols on Smartphones.
Proceedings of the Smart Card Research and Advanced Applications, 2015

2014
(De-)Constructing TLS.
IACR Cryptol. ePrint Arch., 2014

Prover Anonymous and Deniable Distance-Bounding Authentication.
IACR Cryptol. ePrint Arch., 2014

Private Asymmetric Fingerprinting: A Protocol with Optimal Traitor Tracing Using Tardos Codes.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

2013
Location Leakage in Distance Bounding: Why Location Privacy does not Work.
IACR Cryptol. ePrint Arch., 2013

Anonymity-preserving Public-Key Encryption: A Constructive Approach.
IACR Cryptol. ePrint Arch., 2013

A Cryptographic Analysis of OPACITY.
IACR Cryptol. ePrint Arch., 2013

Efficient, secure, private distance bounding without key updates.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Subtle kinks in distance-bounding: an analysis of prominent protocols.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

A Cryptographic Analysis of OPACITY - (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2013, 2013

Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy.
IACR Cryptol. ePrint Arch., 2012

Provably Secure Distance-Bounding: an Analysis of Prominent Protocols.
IACR Cryptol. ePrint Arch., 2012

Mafia fraud attack against the RČ Distance-Bounding Protocol.
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012

2011
Security & Indistinguishability in the Presence of Traffic Analysis.
IACR Cryptol. ePrint Arch., 2011

A Formal Approach to Distance-Bounding RFID Protocols.
IACR Cryptol. ePrint Arch., 2011

Relaxed Security Notions for Signatures of Knowledge.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010


  Loading...