Xavier Carpent

Orcid: 0000-0003-1697-6940

According to our database1, Xavier Carpent authored at least 34 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Recommendation-Based Trust Evaluation Model for the Internet of Underwater Things.
Future Internet, September, 2024

Enabling Vehicle-to-Vehicle Trust in Rural Areas: An Evaluation of a Pre-Signature Scheme for Infrastructure-Limited Environments.
Future Internet, March, 2024

Towards a Mobility-Aware Trust Model for the Internet of Underwater Things.
Proceedings of the ICT Systems Security and Privacy Protection, 2024

Assessing the Cross-Disciplinary Accessibility of CyBOK.
Proceedings of the Information Security Education - Challenges in the Digital Age, 2024

Cybersecurity Incident Response Readiness in Organisations.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

Seek and Locate? Examining the Accessibility of Cybersecurity Features.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2024

Time-Memory Trade-Offs Sound the Death Knell for GPRS and GSM.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Element Distinctness and Bounded Input Size in Private Set Intersection and Related Protocols.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Rainbow Tables: How Far Can CPU Go?
Comput. J., December, 2023

Stairway To Rainbow.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2021
A privacy-friendly aggregation algorithm for demand side management of residential loads.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe, 2021

Precomputation for Rainbow Tables has Never Been so Fast.
Proceedings of the Computer Security - ESORICS 2021, 2021

Ultra-lightweight Authentication.
Proceedings of the Security of Ubiquitous Computing Systems, 2021

2019
Remote Attestation via Self-Measurement.
ACM Trans. Design Autom. Electr. Syst., 2019

2018
Remote attestation of IoT devices via SMARM: Shuffled measurements against roving malware.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018

ERASMUS: Efficient remote attestation via self-measurement for unattended settings.
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018

Reconciling remote attestation and safety-critical operation on simple IoT devices.
Proceedings of the 55th Annual Design Automation Conference, 2018

Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Probabilistic and Considerate Attestation of IoT Devices against Roving Malware.
IACR Cryptol. ePrint Arch., 2017

Private Set Projections & Variants.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

Lightweight Swarm Attestation: A Tale of Two LISA-s.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Heterogeneous Rainbow Table Widths Provide Faster Cryptanalyses.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

How to Handle Rainbow Tables with External Memory.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Pitfalls in Ultralightweight Authentication Protocol Designs.
IEEE Trans. Mob. Comput., 2016

Private Projections & Variants.
IACR Cryptol. ePrint Arch., 2016

2015
RFID authentication and time-memory trade-offs.
PhD thesis, 2015

Interleaving Cryptanalytic Time-Memory Trade-Offs on Non-uniform Distributions.
Proceedings of the Computer Security - ESORICS 2015, 2015

Analysis of Rainbow Tables with Fingerprints.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2013
Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography.
IEEE Trans. Mob. Comput., 2013

Deploying OSK on Low-Resource Mobile Devices.
Proceedings of the Radio Frequency Identification, 2013

Optimal Storage for Rainbow Tables.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

2012
Privacy-friendly synchronized ultralightweight authentication protocols in the storm.
J. Netw. Comput. Appl., 2012

2011
Yet Another Ultralightweight Authentication Protocol that is Broken.
IACR Cryptol. ePrint Arch., 2011

2010
Strong Authentication and Strong Integrity (SASI) Is Not That Strong.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010


  Loading...