Olivier Markowitch

According to our database1, Olivier Markowitch authored at least 75 papers between 2000 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Comment on "Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption With Verifiable Delegation in Cloud Computing".
IEEE Trans. Parallel Distributed Syst., 2021

Comment on "Efficient Secure Outsourcing of Large-Scale Sparse Linear Systems of Equations".
IEEE Trans. Big Data, 2021

A note on "new quantum key agreement protocols based on Bell states".
Quantum Inf. Process., 2021

Exploring the security landscape: NoC-based MPSoC to Cloud-of-Chips.
Microprocess. Microsystems, 2021

Anonymous Fair Auction on Blockchain.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021

2020
SENSSE: Simple, Efficient Searchable Symmetric Encryption for Sensor Networks.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Towards NoC Protection of HT-Greyhole Attack.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

A novel Network-on-Chip security algorithm for tolerating Byzantine faults.
Proceedings of the IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2020

2019
Efficient Profiled Attacks on Masking Schemes.
IEEE Trans. Inf. Forensics Secur., 2019

Comment on "Highly Efficient Linear Regression Outsourcing to a Cloud".
IEEE Trans. Cloud Comput., 2019

SSPSoC: A Secure SDN-Based Protocol over MPSoC.
Secur. Commun. Networks, 2019

Public-Key Encryption with Integrated Keyword Search.
J. Hardw. Syst. Secur., 2019

A twofold group key agreement protocol for NoC-based MPSoCs.
Trans. Emerg. Telecommun. Technol., 2019

Identity-based TLS for Cloud of Chips.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

MicroLET: A New SDNoC-Based Communication Protocol for ChipLET-Based Systems.
Proceedings of the 22nd Euromicro Conference on Digital System Design, 2019

2018
Start Simple and then Refine: Bias-Variance Decomposition as a Diagnosis Tool for Leakage Profiling.
IEEE Trans. Computers, 2018

Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version.
J. Cryptogr. Eng., 2018

Higher Order Side-Channel Attacks Resilient S-boxes.
IACR Cryptol. ePrint Arch., 2018

Secure Communication on NoC Based MPSoC.
Proceedings of the Security and Privacy in Communication Networks, 2018

A SDN solution for system-on-chip world.
Proceedings of the Fifth International Conference on Software Defined Systems, 2018

A Twofold Group Key Agreement Protocol for NoC based MPSoCs.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Anonymous yet Traceable Strong Designated Verifier Signature.
Proceedings of the Information Security - 21st International Conference, 2018

Fully Homomorphic Distributed Identity-based Encryption Resilient to Continual Auxiliary Input Leakage.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Reducing Data Complexity in Feature Extraction and Feature Selection for Big Data Security Analytics.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

Automating Feature Extraction and Feature Selection in Big Data Security Analytics.
Proceedings of the Artificial Intelligence and Soft Computing, 2018

Higher order side-channel attack resilient S-boxes.
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018

2017
Analysis of One Scheme for Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates.
Int. J. Netw. Secur., 2017

Robust profiled attacks: should the adversary trust the dataset?
IET Inf. Secur., 2017

Feature Extraction and Feature Selection: Reducing Data Complexity with Apache Spark.
CoRR, 2017

Secure Certificateless Proxy Re-encryption Without Pairing.
Proceedings of the Advances in Information and Computer Security, 2017

Generic Framework for Attribute-Based Group Signature.
Proceedings of the Information Security Practice and Experience, 2017

On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

Multi-party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

Authenticated Group Key Agreement Protocol Without Pairing.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

On the Construction of Side-Channel Attack Resilient S-boxes.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017

2016
On Two Kinds of Flaws in Some Server-Aided Verification Schemes.
Int. J. Netw. Secur., 2016

Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2016

SAT-based cryptanalysis of ACORN.
IACR Cryptol. ePrint Arch., 2016

Breaking Kalyna 128/128 with Power Attacks.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016

A Framework for Threat Detection in Communication Systems.
Proceedings of the 20th Pan-Hellenic Conference on Informatics, 2016

Multi-authority Distributed Attribute-Based Encryption with Application to Searchable Encryption on Lattices.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

A Categorical Approach in Handling Event-Ordering in Distributed Systems.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Identity-Based Threshold Encryption on Lattices with Application to Searchable Encryption.
Proceedings of the Applications and Techniques in Information Security, 2016

2015
The bias-variance decomposition in profiled attacks.
J. Cryptogr. Eng., 2015

A machine learning approach against a masked AES - Reaching the limit of side-channel attacks with a learning model.
J. Cryptogr. Eng., 2015

SAT based analysis of LTE stream cipher ZUC.
J. Inf. Secur. Appl., 2015

Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis).
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015

2014
Power analysis attack: an approach based on machine learning.
Int. J. Appl. Cryptogr., 2014

2013
A Time Series Approach for Profiling Attack.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013

Authenticated key agreement in wireless networks with automated key management.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

A Note on a Signature Building Block and Relevant Security Reduction in the Green-Hohenberger OT Scheme.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

A Machine Learning Approach Against a Masked AES.
Proceedings of the Smart Card Research and Advanced Applications, 2013

2012
Semi-Supervised Template Attack.
IACR Cryptol. ePrint Arch., 2012

Key Management as a Service.
Proceedings of the SECRYPT 2012, 2012

Vertical Handover Security in 4G Heterogeneous Networks: Threat Analysis and Open Challenges.
Proceedings of the Future Generation Information Technology - 4th International Conference, 2012

Coercion-Freeness in E-voting via Multi-Party Designated Verifier Schemes.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012

2009
Security Analysis of One Quantum Digital Signature Scheme.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

A Tripartite Strong Designated Verifier Scheme Based On Threshold RSA Signatures.
Proceedings of the 2009 International Conference on Security & Management, 2009

Generalized Greedy Algorithm for Shortest Superstring.
Proceedings of the Complex Sciences, 2009

Different Authentication Properties and a Signcryption Scheme Revisited.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2007
Exclusions and related trust relationships in multi-party fair exchange protocols.
Electron. Commer. Res. Appl., 2007

2004
A New Key-Insulated Signature Scheme.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Voting with Designated Verifier Signature-Like Protocol.
Proceedings of the IADIS International Conference WWW/Internet 2004, 2004

2003
Cryptanalysis of the Wu-Varadhrajan fair exchange protocol.
Inf. Process. Lett., 2003

Fair multi-party non-repudiation protocols.
Int. J. Inf. Sec., 2003

An Efficient Strong Designated Verifier Signature Scheme.
Proceedings of the Information Security and Cryptology, 2003

2002
An intensive survey of fair non-repudiation protocols.
Comput. Commun., 2002

Exclusion-Freeness in Multi-party Exchange Protocols.
Proceedings of the Information Security, 5th International Conference, 2002

On Fairness in Exchange Protocols.
Proceedings of the Information Security and Cryptology, 2002

2001
An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party.
Proceedings of the Information Security, 4th International Conference, 2001

Selective Receipt in Certified E-mail.
Proceedings of the Progress in Cryptology, 2001

An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements.
Proceedings of the Information Security and Cryptology, 2001

Optimistic Fair Exchange with Transparent Signature Recovery.
Proceedings of the Financial Cryptography, 2001

2000
A Multi-Party Non-Repudiation Protocol.
Proceedings of the Information Security for Global Information Infrastructures, 2000

A Multi-party Optimistic Non-repudiation Protocol.
Proceedings of the Information Security and Cryptology, 2000


  Loading...