Jorge Guajardo

According to our database1, Jorge Guajardo authored at least 64 papers between 1997 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks (Extended Version).
CoRR, 2018

Revisiting Private Stream Aggregation: Lattice-Based PSA.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Oblivious Dynamic Searchable Encryption on Distributed Cloud Systems.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

ASHES 2018- Workshop on Attacks and Solutions in Hardware Security.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2018

2017
A High-Security Searchable Encryption Framework for Privacy-Critical Cloud Storage Services.
IACR Cryptology ePrint Archive, 2017

Oblivious Dynamic Searchable Encryption via Distributed PIR and ORAM.
IACR Cryptology ePrint Archive, 2017

S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing.
IACR Cryptology ePrint Archive, 2017

Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things.
IEEE Access, 2017

SOMAR: Privacy-Preserving SOcial Media Advertising ARchitecture.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

LWE-based lossless computational fuzzy extractor for the Internet of Things.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

Towards a new privacy-preserving social media advertising architecture (invited position paper).
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
MEMS-based Gyroscopes as Physical Unclonable Functions.
IACR Cryptology ePrint Archive, 2016

Physical Layer Group Key Agreement for Automotive Controller Area Networks.
IACR Cryptology ePrint Archive, 2016

Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT.
IACR Cryptology ePrint Archive, 2016

Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

Physical Layer Group Key Agreement for Automotive Controller Area Networks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

MEMS Gyroscopes as Physical Unclonable Functions.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Practical and secure dynamic searchable encryption via oblivious access on distributed data structure.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware.
IACR Cryptology ePrint Archive, 2015

Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Fifth International Workshop on Trustworthy Embedded Devices (TrustED 2015).
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Fourth International Workshop on Trustworthy Embedded Devices (TrustED 2014).
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference.
Proceedings of the Financial Cryptography and Data Security, 2013

OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Privacy preserving ECG quality evaluation.
Proceedings of the Multimedia and Security Workshop, 2012

2011
Physical Unclonable Functions (PUFs).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Itoh-Tsujii Inversion Algorithm.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2010
Towards Reliable Remote Healthcare Applications Using Combined Fuzzy Extraction.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures?
IACR Cryptology ePrint Archive, 2010

Efficient strategies to play the indistinguishability game for fuzzy sketches.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Privacy preserving evaluation of signal quality with application to ECG analysis.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

On Side-Channel Resistant Block Cipher Usage.
Proceedings of the Information Security - 13th International Conference, 2010

Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Anonymous Credential Schemes with Encrypted Attributes.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

2009
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions.
Information Systems Frontiers, 2009

Physical Unclonable Functions and Their Applications to Vehicle System Security.
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009

Privacy-Preserving Face Recognition.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

Secure IP-Block Distribution for Hardware Devices.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2009

A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

09282 Abstracts Collection - Foundations for Forgery-Resilient Cryptographic Hardware.
Proceedings of the Foundations for Forgery-Resilient Cryptographic Hardware, 05.07., 2009

09282 Executive Summary - Foundations for Forgery-Resilient Cryptographic Hardware.
Proceedings of the Foundations for Forgery-Resilient Cryptographic Hardware, 05.07., 2009

2008
Brand and IP protection with physical unclonable functions.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008

The Butterfly PUF: Protecting IP on every FPGA.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008

Efficient Helper Data Key Extractor on FPGAs.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

2007
Public-Key Cryptography for RFID-Tags.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

Intrinsic Physical Unclonable Functions in Field Programmable Gate Arrays.
Proceedings of the ISSE/SECURE 2007, 2007

Physical Unclonable Functions, FPGAs and Public-Key Crypto for IP Protection.
Proceedings of the FPL 2007, 2007

ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007

FPGA Intrinsic PUFs and Their Use for IP Protection.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007

2006
An Elliptic Curve Processor Suitable For RFID-Tags.
IACR Cryptology ePrint Archive, 2006

2004
Security on FPGAs: State-of-the-art implementations and attacks.
ACM Trans. Embedded Comput. Syst., 2004

Provably Secure Masking of AES.
IACR Cryptology ePrint Archive, 2004

Provably Secure Masking of AES.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

2003
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves (Update).
IACR Cryptology ePrint Archive, 2003

Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(pm).
Proceedings of the Progress in Cryptology, 2003

Efficient GF(pm) Arithmetic Architectures for Cryptographic Applications.
Proceedings of the Topics in Cryptology, 2003

Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

2002
Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes.
Des. Codes Cryptogr., 2002

RSA Key Generation with Verifiable Randomness.
Proceedings of the Public Key Cryptography, 2002

2001
Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP 430x33x Family of Microcontrollers.
Proceedings of the Public Key Cryptography, 2001

2000
How Well Are High-End DSPs Suited for the AES Algorithms? AES Algorithms on the TMS320C6x DSP.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

1997
Efficient Algorithms for Elliptic Curve Cryptosystems.
Proceedings of the Advances in Cryptology, 1997


  Loading...