Cédric Lauradoux

Orcid: 0000-0001-6987-2403

According to our database1, Cédric Lauradoux authored at least 57 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Un jeu a debattre pour sensibiliser a l'Intelligence Artificielle dans le contexte de la pandemie de COVID-19.
CoRR, 2023

2022
Desire: Leveraging the Best of Centralized and Decentralized Contact Tracing Systems.
DTRAP, 2022

Robust PDF Files Forensics Using Coding Style.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

A Serious Game for Debating about the Use of Artificial Intelligence during the COVID-19 Pandemic.
Proceedings of the 19th International Conference on Information Systems for Crisis Response and Management, 2022

Can Authoritative Governments Abuse the Right to Access?
Proceedings of the Privacy Technologies and Policy - 10th Annual Privacy Forum, 2022

2021
Exploitation and Sanitization of Hidden Data in PDF Files.
CoRR, 2021

IP-based Subject Access Requests Denied.
CoRR, 2021

Can You Accept LaTeX Files from Strangers? Ten Years Later.
CoRR, 2021

How are PDF files published in the Scientific Community?
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

Exploitation and Sanitization of Hidden Data in PDF Files: Do Security Agencies Sanitize Their PDF Files?
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

2020
DESIRE: A Third Way for a European Exposure Notification System Leveraging the best of centralized and decentralized systems.
CoRR, 2020

2019
Security of Distance-Bounding: A Survey.
ACM Comput. Surv., 2019

Security Analysis of Subject Access Request Procedures - How to Authenticate Data Subjects Safely When They Request for Their Data.
Proceedings of the Privacy Technologies and Policy - 7th Annual Privacy Forum, 2019

2018
The Pitfalls of Hashing for Privacy.
IEEE Commun. Surv. Tutorials, 2018

2017
Duck Attack on Accountable Distributed Systems.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

Decompression Quines and Anti-Viruses.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
Ephemeral: Lightweight pseudonyms for 6LoWPAN MAC addresses.
Proceedings of the 27th IEEE Annual International Symposium on Personal, 2016

A Privacy Analysis of Google and Yandex Safe Browsing.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

2015
Preserving privacy in secured ZigBee wireless sensor networks.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Time Distortion Anonymization for the Publication of Mobility Data with High Utility.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Survey of Alerting Websites: Risks and Solutions.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Interleaving Cryptanalytic Time-Memory Trade-Offs on Non-uniform Distributions.
Proceedings of the Computer Security - ESORICS 2015, 2015

The Power of Evil Choices in Bloom Filters.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

2014
Differentially Private Location Privacy in Practice.
CoRR, 2014

Private Password Auditing - Short Paper.
Proceedings of the Technology and Practice of Passwords, 2014

Analysing the privacy policies of Wi-Fi trackers.
Proceedings of the 2014 Workshop on Physical Analytics, 2014

Performances of cryptographic accumulators.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

The entropy of wireless statistics.
Proceedings of the European Conference on Networks and Communications, 2014

2013
Entropy harvesting from physical sensors.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Distributed Key Certification Using Accumulators for Wireless Sensor Networks.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

Private and resilient data aggregation.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

2012
Energy efficient authentication strategies for network coding.
Concurr. Comput. Pract. Exp., 2012

Towards stronger jamming model: Application to TH-UWB radio.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

Hardware implementation of the GPS authentication.
Proceedings of the 2012 International Conference on Reconfigurable Computing and FPGAs, 2012

2011
A framework for analyzing RFID distance bounding protocols.
J. Comput. Secur., 2011

Authentication planning for XOR network coding
CoRR, 2011

How secret-sharing can defeat terrorist fraud.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Overflow of fountain codes in multi-hop wireless sensor networks.
Proceedings of the IEEE 22nd International Symposium on Personal, 2011

Flooding attacks against network coding and countermeasures.
Proceedings of the 5th International Conference on Network and System Security, 2011

2010
Energy Friendly Integrity for Network Coding in Wireless Sensor Networks.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Distance Bounding Protocols on TH-UWB Radios.
Proceedings of the Global Communications Conference, 2010

2009
A new approach for FCSRs.
IACR Cryptol. ePrint Arch., 2009

When Compromised Readers Meet RFID.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Aggregated Authentication (AMAC) Using Universal Hash Functions.
Proceedings of the Security and Privacy in Communication Networks, 2009

Extended windmill polynomials.
Proceedings of the IEEE International Symposium on Information Theory, 2009

2008
Sosemanuk, a Fast Software-Oriented Stream Cipher.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008


F-FCSR Stream Ciphers.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008

SOSEMANUK: a fast software-oriented stream cipher
CoRR, 2008

Parallel Generation of l-Sequences.
Proceedings of the Sequences and Their Applications, 2008

Matriochka symmetric Boolean functions.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Bit matrix multiplication in commodity processors.
Proceedings of the 19th IEEE International Conference on Application-Specific Systems, 2008

2007
X-FCSR: a new software oriented stream cipher based upon FCSRs.
IACR Cryptol. ePrint Arch., 2007

SYND: a Fast Code-Based Stream Cipher with a Security Reduction.
Proceedings of the IEEE International Symposium on Information Theory, 2007

From Hardware to Software Synthesis of Linear Feedback Shift Registers.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

2005
CryptoPage : Support matériel pour cryptoprocessus.
Tech. Sci. Informatiques, 2005

Collision attacks on processors with cache and countermeasures.
Proceedings of the WEWoRC 2005, 2005


  Loading...