Redactable signatures for tree-structured data: Definitions and constructions C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ... Applied Cryptography and Network Security: 8th International Conference …, 2010 | 146 | 2010 |
A formal approach to distance-bounding RFID protocols U Dürholz, M Fischlin, M Kasper, C Onete International Conference on Information Security, 47-62, 2011 | 83 | 2011 |
Achieving better privacy for the 3GPP AKA protocol PA Fouque, C Onete, B Richard Cryptology ePrint Archive, 2016 | 60 | 2016 |
Terrorism in distance bounding: modeling terrorist-fraud resistance M Fischlin, C Onete International conference on applied cryptography and network security, 414-431, 2013 | 58 | 2013 |
The privacy of the TLS 1.3 protocol G Arfaoui, X Bultel, PA Fouque, A Nedelcu, C Onete Cryptology ePrint Archive, 2019 | 51 | 2019 |
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol G Avoine, X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, ... Proceedings of the 2017 ACM on Asia conference on computer and …, 2017 | 47 | 2017 |
Efficient, secure, private distance bounding without key updates J Hermans, R Peeters, C Onete Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013 | 47 | 2013 |
A cryptographic analysis of umts/lte aka S Alt, PA Fouque, G Macario-Rat, C Onete, B Richard International Conference on Applied Cryptography and Network Security, 18-35, 2016 | 43 | 2016 |
Prover anonymous and deniable distance-bounding authentication S Gambs, C Onete, JM Robert Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 43 | 2014 |
Content delivery over TLS: a cryptographic analysis of keyless SSL K Bhargavan, I Boureanu, PA Fouque, C Onete, B Richard 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 1-16, 2017 | 40 | 2017 |
Pattern matching on encrypted streams N Desmoulins, PA Fouque, C Onete, O Sanders Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018 | 39 | 2018 |
A formal treatment of accountable proxying over TLS K Bhargavan, I Boureanu, A Delignat-Lavaud, PA Fouque, C Onete 2018 IEEE Symposium on Security and Privacy (SP), 799-816, 2018 | 33 | 2018 |
Subtle kinks in distance-bounding: an analysis of prominent protocols M Fischlin, C Onete Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013 | 33 | 2013 |
Mafia fraud attack against the rč distance-bounding protocol A Mitrokotsa, C Onete, S Vaudenay 2012 IEEE International Conference on RFID-Technologies and Applications …, 2012 | 32 | 2012 |
(De-) constructing TLS 1.3 M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi Progress in Cryptology--INDOCRYPT 2015: 16th International Conference on …, 2015 | 29 | 2015 |
(De-) Constructing TLS M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi Cryptology ePrint Archive, 2014 | 28 | 2014 |
A prover-anonymous and terrorist-fraud resistant distance-bounding protocol X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, JM Robert Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016 | 25 | 2016 |
Anonymity-preserving public-key encryption: A constructive approach M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi Privacy Enhancing Technologies: 13th International Symposium, PETS 2013 …, 2013 | 25 | 2013 |
A cryptographic analysis of OPACITY Ö Dagdelen, M Fischlin, T Gagliardoni, GA Marson, A Mittelbach, C Onete Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 22 | 2013 |
Location leakage in distance bounding: Why location privacy does not work A Mitrokotsa, C Onete, S Vaudenay Computers & Security 45, 199-209, 2014 | 20 | 2014 |