Olivier Pereira

According to our database1, Olivier Pereira authored at least 100 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Practical Traceable Receipt-Free Encryption.
IACR Cryptol. ePrint Arch., 2024

Verifiable and Private Vote-by-Mail.
IACR Cryptol. ePrint Arch., 2024

ElectionGuard: a Cryptographic Toolkit to Enable Verifiable Elections.
IACR Cryptol. ePrint Arch., 2024

REACTIVE: Rethinking Effective Approaches Concerning Trustees in Verifiable Elections.
IACR Cryptol. ePrint Arch., 2024

Can we cast a ballot as intended and be receipt free?
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Threshold Receipt-Free Single-Pass eVoting.
Proceedings of the Electronic Voting - 9th International Joint Conference, 2024

Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable Elections.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
MCQUIC: Multicast and unicast in a single transport protocol.
CoRR, 2023

2022
How to Verifiably Encrypt Many Bits for an Election?
IACR Cryptol. ePrint Arch., 2022

Traceable Receipt-Free Encryption.
IACR Cryptol. ePrint Arch., 2022

Running the Race: A Swiss Voting Story.
Proceedings of the Electronic Voting - 7th International Joint Conference, 2022

2021
Individual Verifiability and Revoting in the Estonian Internet Voting System.
IACR Cryptol. ePrint Arch., 2021

2020
Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction.
IACR Trans. Symmetric Cryptol., 2020

Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher.
IACR Trans. Symmetric Cryptol., 2020

TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Scaling Up Anonymous Communication with Efficient Nanopayment Channels.
Proc. Priv. Enhancing Technol., 2020

When is a test not a proof?
IACR Cryptol. ePrint Arch., 2020

Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle.
IACR Cryptol. ePrint Arch., 2020

How not to prove your election outcome.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Short Paper: An Update on Marked Mix-Nets: An Attack, a Fix and PQ Possibilities.
Proceedings of the Financial Cryptography and Data Security, 2020

CLAPS: Client-Location-Aware Path Selection in Tor.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Knights and Knaves Run Elections: Internet Voting and Undetectable Electoral Fraud.
IEEE Secur. Priv., 2019

Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge.
IACR Cryptol. ePrint Arch., 2019

Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher.
IACR Cryptol. ePrint Arch., 2019

Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions.
IACR Cryptol. ePrint Arch., 2019

TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications.
IACR Cryptol. ePrint Arch., 2019

Flexible Anonymous Network.
CoRR, 2019

SWAT: Seamless Web Authentication Technology.
Proceedings of the World Wide Web Conference, 2019

SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019

Pluginizing QUIC.
Proceedings of the ACM Special Interest Group on Data Communication, 2019

Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract).
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019

Universally Verifiable MPC and IRV Ballot Counting.
Proceedings of the Financial Cryptography and Data Security, 2019

End-to-End Verifiable Quadratic Voting with Everlasting Privacy.
Proceedings of the Financial Cryptography and Data Security, 2019

Reducing the Cost of Authenticity with Leakages: a \mathsf CIML2 -Secure \mathsf AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019

2018
Dropping on the Edge: Flexibility and Traffic Confirmation in Onion Routing Protocols.
Proc. Priv. Enhancing Technol., 2018

Task-structured probabilistic I/O automata.
J. Comput. Syst. Sci., 2018

Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions.
IACR Cryptol. ePrint Arch., 2018

Universally Verifiable MPC with Applications to IRV Ballot Counting.
IACR Cryptol. ePrint Arch., 2018

Reconsidering Generic Composition: the Tag-then-Encrypt case.
IACR Cryptol. ePrint Arch., 2018

SoK: Uncentralisable Ledgers and their Impact on Voting Systems.
CoRR, 2018

Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
On Leakage-Resilient Authenticated Encryption with Decryption Leakages.
IACR Trans. Symmetric Cryptol., 2017

Waterfilling: Balancing the Tor network with maximum diversity.
Proc. Priv. Enhancing Technol., 2017

Clash Attacks and the STAR-Vote System.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017

Securing multipath TCP: Design & implementation.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Formal Analysis of the FIDO 1.x Protocol.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

Marked Mix-Nets.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Leakage-Resilient and Misuse-Resistant Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2016

How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios.
IACR Cryptol. ePrint Arch., 2016

Adapting Helios for provable ballot privacy.
IACR Cryptol. ePrint Arch., 2016

Waterfiling: Balancing the Tor network with maximum diversity.
CoRR, 2016

Verifiable Multi-party Computation with Perfectly Private Audit Trail.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
A comprehensive analysis of game-based ballot privacy definitions.
IACR Cryptol. ePrint Arch., 2015

SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Verifiable Elections with Commitment Consistent Encryption - A Primer.
CoRR, 2014

2013
Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions.
IACR Cryptol. ePrint Arch., 2013

Election Verifiability or Ballot Privacy: Do We Need to Choose?
IACR Cryptol. ePrint Arch., 2013

STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System.
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013

Unconditionally Secure Oblivious Transfer from Real Network Behavior.
Proceedings of the Advances in Information and Computer Security, 2013

Securely Solving Simple Combinatorial Graph Problems.
Proceedings of the Financial Cryptography and Data Security, 2013

2012
On Necessary and Sufficient Conditions for Private Ballot Submission.
IACR Cryptol. ePrint Arch., 2012

STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System
CoRR, 2012

Measuring vote privacy, revisited.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Elliptic Curve Cryptography in JavaScript.
IACR Cryptol. ePrint Arch., 2011

Leftover Hash Lemma, Revisited.
IACR Cryptol. ePrint Arch., 2011

Running Mixnet-Based Elections with Helios.
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011

Secure Two-Party Computation over a Z-Channel.
Proceedings of the Provable Security - 5th International Conference, 2011

Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

Ballot Aggregation and Mixnet Based Open-Audit Elections - (Extended Abstract).
Proceedings of the Public Key Infrastructures, Services and Applications, 2011

2010
Leakage Resilient Cryptography in Practice.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

Group Signatures are Suitable for Constrained Devices.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

Building Oblivious Transfer on Channel Delays.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Practical leakage-resilient pseudorandom generators.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Leakage Resilient Cryptography in Practice.
IACR Cryptol. ePrint Arch., 2009

Simulation based security in the applied pi calculus.
IACR Cryptol. ePrint Arch., 2009

Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009

2008
Universally Composable Security Analysis of TLS - Secure Sessions with Handshake and Record Layer Protocols.
IACR Cryptol. ePrint Arch., 2008

Modeling Computational Security in Long-Lived Systems, Version 2.
IACR Cryptol. ePrint Arch., 2008

Analyzing Security Protocols Using Time-Bounded Task-PIOAs.
Discret. Event Dyn. Syst., 2008

On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

Universally Composable Security Analysis of TLS.
Proceedings of the Provable Security, Second International Conference, 2008

The Swiss-Knife RFID Distance Bounding Protocol.
Proceedings of the Information Security and Cryptology, 2008

A block cipher based pseudo random number generator secure against side-channel key recovery.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

Automatic Verification of Simulatability in Security Protocols.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
A Block Cipher based PRNG Secure Against Side-Channel Key Recovery.
IACR Cryptol. ePrint Arch., 2007

Verifying Statistical Zero Knowledge with Approximate Implementations.
IACR Cryptol. ePrint Arch., 2007

On the Role of Scheduling in Simulation-Based Security.
IACR Cryptol. ePrint Arch., 2007

Modeling Computational Security in Long-Lived Systems.
IACR Cryptol. ePrint Arch., 2007

Simulation-Based Analysis of E2E Voting Systems.
Proceedings of the E-Voting and Identity, First International Conference, 2007

Compositional Security for Task-PIOAs.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

2006
On the impossibility of building secure Cliques-type authenticated group key agreement protocols.
J. Comput. Secur., 2006

Time-Bounded Task-PIOAs: A Framework for Analyzing Security Protocols.
Proceedings of the Distributed Computing, 20th International Symposium, 2006

2005
Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol.
IACR Cryptol. ePrint Arch., 2005

2004
Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols.
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004

2003
Modelling and Security Analysis of Authenticated Group Key Agreement Protocols.
PhD thesis, 2003

Some Attacks Upon Authenticated Group Key Agreement Protocols.
J. Comput. Secur., 2003

2001
On the Wagner-Whitin Lot-Sizing Polyhedron.
Math. Oper. Res., 2001

Security Analysis of the Cliques Protocols Suites: First Results.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

A Security Analysis of the Cliques Protocols Suites.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001


  Loading...