Olivier Pereira
According to our database1,
Olivier Pereira
authored at least 100 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
REACTIVE: Rethinking Effective Approaches Concerning Trustees in Verifiable Elections.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Electronic Voting - 9th International Joint Conference, 2024
Proceedings of the Applied Cryptography and Network Security, 2024
2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Electronic Voting - 7th International Joint Conference, 2022
2021
IACR Cryptol. ePrint Arch., 2021
2020
Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction.
IACR Trans. Symmetric Cryptol., 2020
Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher.
IACR Trans. Symmetric Cryptol., 2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
Proc. Priv. Enhancing Technol., 2020
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the Financial Cryptography and Data Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
IEEE Secur. Priv., 2019
Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge.
IACR Cryptol. ePrint Arch., 2019
Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019
Proceedings of the ACM Special Interest Group on Data Communication, 2019
Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract).
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Reducing the Cost of Authenticity with Leakages: a \mathsf CIML2 -Secure \mathsf AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019
2018
Dropping on the Edge: Flexibility and Traffic Confirmation in Onion Routing Protocols.
Proc. Priv. Enhancing Technol., 2018
Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
IACR Trans. Symmetric Cryptol., 2017
Proc. Priv. Enhancing Technol., 2017
Proceedings of the Electronic Voting - Second International Joint Conference, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017
2016
IACR Cryptol. ePrint Arch., 2016
How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Applied Cryptography and Network Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013
Proceedings of the Advances in Information and Computer Security, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011
Proceedings of the Provable Security - 5th International Conference, 2011
Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Proceedings of the Public Key Infrastructures, Services and Applications, 2011
2010
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009
2008
Universally Composable Security Analysis of TLS - Secure Sessions with Handshake and Record Layer Protocols.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Discret. Event Dyn. Syst., 2008
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the Information Security and Cryptology, 2008
A block cipher based pseudo random number generator secure against side-channel key recovery.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the E-Voting and Identity, First International Conference, 2007
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007
2006
On the impossibility of building secure Cliques-type authenticated group key agreement protocols.
J. Comput. Secur., 2006
Proceedings of the Distributed Computing, 20th International Symposium, 2006
2005
IACR Cryptol. ePrint Arch., 2005
2004
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004
2003
PhD thesis, 2003
J. Comput. Secur., 2003
2001
Security Analysis of the Cliques Protocols Suites: First Results.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001