Recherche - INRIA - Institut National de Recherche en Informatique et en Automatique Accéder directement au contenu

Filtrer vos résultats

139 résultats

Pitfalls in Ultralightweight Authentication Protocol Designs

Gildas Avoine , Xavier Carpent , Julio Cesar Hernandez-Castro
IEEE Transactions on Mobile Computing, 2016, 15 (9), pp.2317--2332
Article dans une revue hal-01492795v1

Close to Uniform Prime Number Generation With Fewer Random Bits.

Pierre-Alain Fouque , Mehdi Tibouchi
IEEE Transactions on Information Theory, 2019, 65 (2), pp.1307-1317
Article dans une revue hal-02470839v1

MaskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults.

Gilles Barthe , Sonia Belaïd , Gaëtan Cassiers , Pierre-Alain Fouque , Benjamin Grégoire , et al.
ESORICS 2019 The European Symposium on Research in Computer Security, Sep 2019, Luxembourg, Luxembourg. pp.300-318
Communication dans un congrès hal-02470965v1

Interleaving Cryptanalytic Time-memory Trade-offs on Non-Uniform Distributions

Gildas Avoine , Xavier Carpent , Cédric Lauradoux
European Symposium on Research in Computer Security - ESORICS 2015, Sep 2015, Vienna, Austria
Communication dans un congrès hal-01199151v1

Optimal Storage for Rainbow Tables

Gildas Avoine , Xavier Carpent
Information Security and Cryptology, Nov 2013, Séoul, South Korea. ⟨10.1007/978-3-319-12160-4_9⟩
Communication dans un congrès hal-01102935v1
Image document

A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol

Gildas Avoine , Xavier Bultel , Sébastien Gambs , David Gerault , Pascal Lafourcade , et al.
Asia Conference on Information, Computer and Communications Security, Apr 2017, Abu Dhabi, United Arab Emirates. pp.800-814, ⟨10.1145/3052973.3053000⟩
Communication dans un congrès hal-01588560v1

Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks.

Patrick Derbez , Pierre-Alain Fouque
CRYPTO 2016 36th Annual International Cryptology Conference,, Aug 2016, Santa Barbara, United States. pp.157-184
Communication dans un congrès hal-02472180v1
Image document

Typing messages for free in security protocols

Rémy Chrétien , Véronique Cortier , Antoine Dallon , Stéphanie Delaune
ACM Transactions on Computational Logic, 2020, 21 (1), ⟨10.1145/3343507⟩
Article dans une revue hal-02268400v1
Image document

Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas Fingerprinting

Pierre Laperdrix , Gildas Avoine , Benoit Baudry , Nick Nikiforakis
Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings, pp.43-66, 2019, ⟨10.1007/978-3-030-22038-9_3⟩
Chapitre d'ouvrage hal-02881632v1

PLAS 2018 - ACM SIGSAC Workshop on Programming Languages and Analysis for Security

Mário S. Alvim , Stéphanie Delaune
the 2018 ACM SIGSAC Conference, Oct 2018, Toronto, France. ⟨10.1145/3243734.3243879⟩
Communication dans un congrès hal-01906653v1

POPSTAR: so near and yet so far

Stéphanie Delaune
ACM SIGLOG News, 2018
Article dans une revue hal-01906652v1

A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols

Stéphanie Delaune , Lucca Hirschi
Journal of Logical and Algebraic Methods in Programming, 2017, 87, pp.127 - 144. ⟨10.1016/j.jlamp.2016.10.005⟩
Article dans une revue hal-01906634v1
Image document

POR for Security Protocol Equivalences: Beyond Action-Determinism

David Baelde , Stéphanie Delaune , Lucca Hirschi
ESORICS, pp.385-405, 2018, ⟨10.1007/978-3-319-99073-6_19⟩
Chapitre d'ouvrage hal-02390219v1
Image document

How to (Legally) Keep Secrets from Mobile Operators

Ghada Arfaoui , Olivier Blazy , Xavier Bultel , Pierre-Alain Fouque , Thibaut Jacques , et al.
Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part I, 2021, Online, Unknown Region. pp.23--43, ⟨10.1007/978-3-030-88418-5_2⟩
Communication dans un congrès hal-03478246v1
Image document

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features

Michael Schwarz , Daniel Gruss , Moritz Lipp , Clémentine Maurice , Thomas Schuster , et al.
Asia Conference on Computer and Communications Security, AsiaCCS 2018, Jun 2018, Incheon, South Korea. ⟨10.1145/3196494.3196508⟩
Communication dans un congrès hal-01872558v1

Attacking GlobalPlatform SCP02-compliant Smart Cards Using a Padding Oracle Attack

Gildas Avoine , Loïc Ferreira
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018
Article dans une revue hal-02182927v1
Image document

Practical Implementation of Ring-SIS/LWE Based Signature and IBE

Pauline Bert , Pierre-Alain Fouque , Adeline Roux-Langlois , Mohamed Sabt
PQCrypto2018, Apr 2018, Fort Lauderdale, United States. pp.271 - 291, ⟨10.1007/978-3-319-79063-3_13⟩
Communication dans un congrès hal-01878516v1
Image document

Symbolic analysis of terrorist fraud resistance

Alexandre Debant , Stéphanie Delaune , Cyrille Wiedling
Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Sep 2019, Luxembourg, Luxembourg
Communication dans un congrès hal-02171218v1

SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting

Olivier Blazy , Angèle Bossuat , Xavier Bultel , Pierre-Alain Fouque , Cristina Onete , et al.
Cryptology ePrint Archive, 2019, 2019, pp.367
Article dans une revue hal-02307143v1
Image document

The privacy of the TLS 1.3 protocol

Ghada Arfaoui , Xavier Bultel , Pierre-Alain Fouque , Adina Nedelcu , Cristina Onete
Proceedings on Privacy Enhancing Technologies, 2019, 2019, pp.190 - 210. ⟨10.2478/popets-2019-0065⟩
Article dans une revue hal-02482253v1
Image document

Strong Non-Interference and Type-Directed Higher-Order Masking

Gilles Barthe , Sonia Belaïd , François Dupressoir , Pierre-Alain Fouque , Benjamin Grégoire , et al.
CCS 2016 - 23rd ACM Conference on Computer and Communications Security, Oct 2016, Vienne, Austria. pp.116 - 129, ⟨10.1145/2976749.2978427⟩
Communication dans un congrès hal-01410216v1
Image document

Combining sources of side-channel information

Christophe Genevey-Metat , Benoît Gérard , Annelie Heuser
C&ESAR 2019, Nov 2019, Rennes, France
Communication dans un congrès hal-02456646v1
Image document

Optimization of core components of block ciphers

Baptiste Lambin
Cryptography and Security [cs.CR]. Université de Rennes, 2019. English. ⟨NNT : 2019REN1S036⟩
Thèse tel-02380098v1
Image document

A decidable class of security protocols for both reachability and equivalence properties

Véronique Cortier , Stéphanie Delaune , Vaishnavi Sundararajan
[Research Report] Loria & Inria Grand Est; Irisa. 2020
Rapport hal-02446170v1
Image document

Side-Channel Analysis of Post-Quantum Cryptography

Tania Richmond , Annelie Heuser , Benoit Gérard
SecDays 2019 - Security Days, Jan 2019, Rennes, France. pp.1
Poster de conférence hal-02018859v1
Image document

Analysis of recent cryptographic primitives

Brice Minaud
Cryptography and Security [cs.CR]. Université de Rennes, 2016. English. ⟨NNT : 2016REN1S066⟩
Thèse tel-01449575v1

Memory carving can finally unveil your embedded personal data

Thomas Gougeon , Morgan Barbier , Patrick Lacharme , Gildas Avoine , Christophe Rosenberger
Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), Aug 2017, Reggio di calabria, Italy
Communication dans un congrès hal-01615205v1

Comparing distance bounding protocols: A critical mission supported by decision theory

Gildas Avoine , Mauw Sjouke , Trujillo-Rasua Rolando
Computer Communications, 2015, 67, pp.92-102. ⟨10.1016/j.comcom.2015.06.007⟩
Article dans une revue hal-01202377v1
Image document

Attack Trees with Sequential Conjunction

Barbara Kordy , Ravi Jhawar , Sjouke Mauw , Sasa Radomirovic , Roland Trujillo-Rasua
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.339-353, ⟨10.1007/978-3-319-18467-8_23⟩
Communication dans un congrès hal-01197256v1
Image document

Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis Competition

Patrick Derbez , Virginie Lallemand , Aleksei Udovenko
SAC 2019 - Selected Areas in Cryptography, Aug 2019, Waterloo, Canada. pp.124-145, ⟨10.1007/978-3-030-38471-5_6⟩
Communication dans un congrès hal-02388239v1