Filtrer vos résultats
- 75
- 63
- 1
- 80
- 32
- 7
- 5
- 3
- 3
- 2
- 2
- 2
- 2
- 1
- 6
- 1
- 138
- 2
- 1
- 2
- 6
- 28
- 38
- 31
- 16
- 14
- 3
- 1
- 134
- 5
- 139
- 25
- 14
- 14
- 13
- 10
- 9
- 9
- 8
- 7
- 6
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 29
- 21
- 14
- 13
- 12
- 10
- 9
- 8
- 7
- 7
- 7
- 7
- 7
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
139 résultats
Pitfalls in Ultralightweight Authentication Protocol DesignsIEEE Transactions on Mobile Computing, 2016, 15 (9), pp.2317--2332
Article dans une revue
hal-01492795v1
|
|||
Close to Uniform Prime Number Generation With Fewer Random Bits.IEEE Transactions on Information Theory, 2019, 65 (2), pp.1307-1317
Article dans une revue
hal-02470839v1
|
|||
MaskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults.ESORICS 2019 The European Symposium on Research in Computer Security, Sep 2019, Luxembourg, Luxembourg. pp.300-318
Communication dans un congrès
hal-02470965v1
|
|||
Interleaving Cryptanalytic Time-memory Trade-offs on Non-Uniform DistributionsEuropean Symposium on Research in Computer Security - ESORICS 2015, Sep 2015, Vienna, Austria
Communication dans un congrès
hal-01199151v1
|
|||
Optimal Storage for Rainbow TablesInformation Security and Cryptology, Nov 2013, Séoul, South Korea. ⟨10.1007/978-3-319-12160-4_9⟩
Communication dans un congrès
hal-01102935v1
|
|||
|
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding ProtocolAsia Conference on Information, Computer and Communications Security, Apr 2017, Abu Dhabi, United Arab Emirates. pp.800-814, ⟨10.1145/3052973.3053000⟩
Communication dans un congrès
hal-01588560v1
|
||
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks.CRYPTO 2016 36th Annual International Cryptology Conference,, Aug 2016, Santa Barbara, United States. pp.157-184
Communication dans un congrès
hal-02472180v1
|
|||
|
Typing messages for free in security protocolsACM Transactions on Computational Logic, 2020, 21 (1), ⟨10.1145/3343507⟩
Article dans une revue
hal-02268400v1
|
||
|
Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas FingerprintingDetection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings, pp.43-66, 2019, ⟨10.1007/978-3-030-22038-9_3⟩
Chapitre d'ouvrage
hal-02881632v1
|
||
PLAS 2018 - ACM SIGSAC Workshop on Programming Languages and Analysis for Securitythe 2018 ACM SIGSAC Conference, Oct 2018, Toronto, France. ⟨10.1145/3243734.3243879⟩
Communication dans un congrès
hal-01906653v1
|
|||
POPSTAR: so near and yet so farACM SIGLOG News, 2018
Article dans une revue
hal-01906652v1
|
|||
|
A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocolsJournal of Logical and Algebraic Methods in Programming, 2017, 87, pp.127 - 144. ⟨10.1016/j.jlamp.2016.10.005⟩
Article dans une revue
hal-01906634v1
|
||
|
POR for Security Protocol Equivalences: Beyond Action-DeterminismESORICS, pp.385-405, 2018, ⟨10.1007/978-3-319-99073-6_19⟩
Chapitre d'ouvrage
hal-02390219v1
|
||
|
How to (Legally) Keep Secrets from Mobile OperatorsComputer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part I, 2021, Online, Unknown Region. pp.23--43, ⟨10.1007/978-3-030-88418-5_2⟩
Communication dans un congrès
hal-03478246v1
|
||
|
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU FeaturesAsia Conference on Computer and Communications Security, AsiaCCS 2018, Jun 2018, Incheon, South Korea. ⟨10.1145/3196494.3196508⟩
Communication dans un congrès
hal-01872558v1
|
||
Attacking GlobalPlatform SCP02-compliant Smart Cards Using a Padding Oracle AttackIACR Transactions on Cryptographic Hardware and Embedded Systems, 2018
Article dans une revue
hal-02182927v1
|
|||
|
Practical Implementation of Ring-SIS/LWE Based Signature and IBEPQCrypto2018, Apr 2018, Fort Lauderdale, United States. pp.271 - 291, ⟨10.1007/978-3-319-79063-3_13⟩
Communication dans un congrès
hal-01878516v1
|
||
|
Symbolic analysis of terrorist fraud resistanceComputer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Sep 2019, Luxembourg, Luxembourg
Communication dans un congrès
hal-02171218v1
|
||
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated RatchetingCryptology ePrint Archive, 2019, 2019, pp.367
Article dans une revue
hal-02307143v1
|
|||
|
The privacy of the TLS 1.3 protocolProceedings on Privacy Enhancing Technologies, 2019, 2019, pp.190 - 210. ⟨10.2478/popets-2019-0065⟩
Article dans une revue
hal-02482253v1
|
||
|
Strong Non-Interference and Type-Directed Higher-Order MaskingCCS 2016 - 23rd ACM Conference on Computer and Communications Security, Oct 2016, Vienne, Austria. pp.116 - 129, ⟨10.1145/2976749.2978427⟩
Communication dans un congrès
hal-01410216v1
|
||
|
Combining sources of side-channel informationC&ESAR 2019, Nov 2019, Rennes, France
Communication dans un congrès
hal-02456646v1
|
||
|
Optimization of core components of block ciphersCryptography and Security [cs.CR]. Université de Rennes, 2019. English. ⟨NNT : 2019REN1S036⟩
Thèse
tel-02380098v1
|
||
|
A decidable class of security protocols for both reachability and equivalence properties[Research Report] Loria & Inria Grand Est; Irisa. 2020
Rapport
hal-02446170v1
|
||
|
Side-Channel Analysis of Post-Quantum CryptographySecDays 2019 - Security Days, Jan 2019, Rennes, France. pp.1
Poster de conférence
hal-02018859v1
|
||
|
Analysis of recent cryptographic primitivesCryptography and Security [cs.CR]. Université de Rennes, 2016. English. ⟨NNT : 2016REN1S066⟩
Thèse
tel-01449575v1
|
||
Memory carving can finally unveil your embedded personal dataProceedings of the 12th International Conference on Availability, Reliability and Security (ARES), Aug 2017, Reggio di calabria, Italy
Communication dans un congrès
hal-01615205v1
|
|||
|
Comparing distance bounding protocols: A critical mission supported by decision theoryComputer Communications, 2015, 67, pp.92-102. ⟨10.1016/j.comcom.2015.06.007⟩
Article dans une revue
hal-01202377v1
|
||
|
Attack Trees with Sequential Conjunction30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.339-353, ⟨10.1007/978-3-319-18467-8_23⟩
Communication dans un congrès
hal-01197256v1
|
||
|
Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis CompetitionSAC 2019 - Selected Areas in Cryptography, Aug 2019, Waterloo, Canada. pp.124-145, ⟨10.1007/978-3-030-38471-5_6⟩
Communication dans un congrès
hal-02388239v1
|