Olivier Pereira

According to our database1, Olivier Pereira authored at least 79 papers between 2001 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

2019
Knights and Knaves Run Elections: Internet Voting and Undetectable Electoral Fraud.
IEEE Security & Privacy, 2019

Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge.
IACR Cryptology ePrint Archive, 2019

Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher.
IACR Cryptology ePrint Archive, 2019

Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions.
IACR Cryptology ePrint Archive, 2019

TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications.
IACR Cryptology ePrint Archive, 2019

Flexible Anonymous Network.
CoRR, 2019

SWAT: Seamless Web Authentication Technology.
Proceedings of the World Wide Web Conference, 2019

SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019

Pluginizing QUIC.
Proceedings of the ACM Special Interest Group on Data Communication, 2019

Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract).
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019

Universally Verifiable MPC and IRV Ballot Counting.
Proceedings of the Financial Cryptography and Data Security, 2019

Reducing the Cost of Authenticity with Leakages: a \mathsf CIML2 -Secure \mathsf AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019

2018
Dropping on the Edge: Flexibility and Traffic Confirmation in Onion Routing Protocols.
PoPETs, 2018

Task-structured probabilistic I/O automata.
J. Comput. Syst. Sci., 2018

Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions.
IACR Cryptology ePrint Archive, 2018

Universally Verifiable MPC with Applications to IRV Ballot Counting.
IACR Cryptology ePrint Archive, 2018

Reconsidering Generic Composition: the Tag-then-Encrypt case.
IACR Cryptology ePrint Archive, 2018

SoK: Uncentralisable Ledgers and their Impact on Voting Systems.
CoRR, 2018

Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
On Leakage-Resilient Authenticated Encryption with Decryption Leakages.
IACR Trans. Symmetric Cryptol., 2017

Waterfilling: Balancing the Tor network with maximum diversity.
PoPETs, 2017

Clash Attacks and the STAR-Vote System.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017

Securing multipath TCP: Design & implementation.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Formal Analysis of the FIDO 1.x Protocol.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

Marked Mix-Nets.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Leakage-Resilient and Misuse-Resistant Authenticated Encryption.
IACR Cryptology ePrint Archive, 2016

How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios.
IACR Cryptology ePrint Archive, 2016

Adapting Helios for provable ballot privacy.
IACR Cryptology ePrint Archive, 2016

Waterfiling: Balancing the Tor network with maximum diversity.
CoRR, 2016

Verifiable Multi-party Computation with Perfectly Private Audit Trail.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
A comprehensive analysis of game-based ballot privacy definitions.
IACR Cryptology ePrint Archive, 2015

SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Verifiable Elections with Commitment Consistent Encryption - A Primer.
CoRR, 2014

2013
Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions.
IACR Cryptology ePrint Archive, 2013

Election Verifiability or Ballot Privacy: Do We Need to Choose?
IACR Cryptology ePrint Archive, 2013

STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System.
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013

Unconditionally Secure Oblivious Transfer from Real Network Behavior.
Proceedings of the Advances in Information and Computer Security, 2013

Securely Solving Simple Combinatorial Graph Problems.
Proceedings of the Financial Cryptography and Data Security, 2013

2012
On Necessary and Sufficient Conditions for Private Ballot Submission.
IACR Cryptology ePrint Archive, 2012

STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System
CoRR, 2012

Measuring vote privacy, revisited.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Elliptic Curve Cryptography in JavaScript.
IACR Cryptology ePrint Archive, 2011

Leftover Hash Lemma, Revisited.
IACR Cryptology ePrint Archive, 2011

Running Mixnet-Based Elections with Helios.
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011

Secure Two-Party Computation over a Z-Channel.
Proceedings of the Provable Security - 5th International Conference, 2011

Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

Ballot Aggregation and Mixnet Based Open-Audit Elections - (Extended Abstract).
Proceedings of the Public Key Infrastructures, Services and Applications, 2011

2010
Leakage Resilient Cryptography in Practice.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

Group Signatures are Suitable for Constrained Devices.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

Building Oblivious Transfer on Channel Delays.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Practical leakage-resilient pseudorandom generators.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Leakage Resilient Cryptography in Practice.
IACR Cryptology ePrint Archive, 2009

Simulation based security in the applied pi calculus.
IACR Cryptology ePrint Archive, 2009

Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009

2008
Universally Composable Security Analysis of TLS - Secure Sessions with Handshake and Record Layer Protocols.
IACR Cryptology ePrint Archive, 2008

Modeling Computational Security in Long-Lived Systems, Version 2.
IACR Cryptology ePrint Archive, 2008

Analyzing Security Protocols Using Time-Bounded Task-PIOAs.
Discrete Event Dynamic Systems, 2008

On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

Universally Composable Security Analysis of TLS.
Proceedings of the Provable Security, Second International Conference, 2008

The Swiss-Knife RFID Distance Bounding Protocol.
Proceedings of the Information Security and Cryptology, 2008

A block cipher based pseudo random number generator secure against side-channel key recovery.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

Automatic Verification of Simulatability in Security Protocols.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
A Block Cipher based PRNG Secure Against Side-Channel Key Recovery.
IACR Cryptology ePrint Archive, 2007

Verifying Statistical Zero Knowledge with Approximate Implementations.
IACR Cryptology ePrint Archive, 2007

On the Role of Scheduling in Simulation-Based Security.
IACR Cryptology ePrint Archive, 2007

Modeling Computational Security in Long-Lived Systems.
IACR Cryptology ePrint Archive, 2007

Simulation-based analysis of E2E voting systems.
Proceedings of the Frontiers of Electronic Voting, 29.07. - 03.08.2007, 2007

Compositional Security for Task-PIOAs.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

2006
On the impossibility of building secure Cliques-type authenticated group key agreement protocols.
Journal of Computer Security, 2006

Time-Bounded Task-PIOAs: A Framework for Analyzing Security Protocols.
Proceedings of the Distributed Computing, 20th International Symposium, 2006

2005
Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol.
IACR Cryptology ePrint Archive, 2005

2004
Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols.
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004

2003
Modelling and Security Analysis of Authenticated Group Key Agreement Protocols.
PhD thesis, 2003

Some Attacks Upon Authenticated Group Key Agreement Protocols.
Journal of Computer Security, 2003

2001
On the Wagner-Whitin Lot-Sizing Polyhedron.
Math. Oper. Res., 2001

Security Analysis of the Cliques Protocols Suites: First Results.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

A Security Analysis of the Cliques Protocols Suites.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001


  Loading...