Cristina Onete
Orcid: 0009-0009-4638-0639
According to our database1,
Cristina Onete
authored at least 43 papers
between 2010 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2025
Quantum-resistant secret handshakes with dynamic joining, leaving, and banishment: GCD revisited.
IACR Cryptol. ePrint Arch., 2025
2024
IACR Cryptol. ePrint Arch., 2024
2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
2022
Pairing-free secure-channel establishment in mobile networks with fine-grained lawful interception.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment.
IACR Cryptol. ePrint Arch., 2022
2021
A Cryptographic View of Deep-Attestation, or how to do Provably-Secure Layer-Linking.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the Security of Ubiquitous Computing Systems, 2021
2020
Legally keeping secrets from mobile operators: Lawful Interception Key Exchange (LIKE).
IACR Cryptol. ePrint Arch., 2020
2019
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting.
IACR Cryptol. ePrint Arch., 2019
2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
2017
Pattern Matching on Encrypted Streams: Applications to DPI and searches on genomic data.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
2016
Proc. Priv. Enhancing Technol., 2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
2015
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015
Proceedings of the Smart Card Research and Advanced Applications, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Comput. Secur., 2014
Private Asymmetric Fingerprinting: A Protocol with Optimal Traitor Tracing Using Tardos Codes.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
2012
Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012
2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010