Olivier Pereira
Olivier Pereira
Verified email at uclouvain.be
Cited by
Cited by
On the energy cost of communication and cryptography in wireless sensor networks
G De Meulenaer, F Gosset, FX Standaert, O Pereira
2008 IEEE International Conference on Wireless and Mobile Computing …, 2008
Electing a university president using open-audit voting: Analysis of real-world use of Helios
B Adida, O De Marneffe, O Pereira, JJ Quisquater
EVT/WOTE 9 (10), 2009
The swiss-knife RFID distance bounding protocol
CH Kim, G Avoine, F Koeune, FX Standaert, O Pereira
International Conference on Information Security and Cryptology, 98-115, 2008
How not to prove yourself: Pitfalls of the fiat-shamir heuristic and applications to helios
D Bernhard, O Pereira, B Warinschi
International Conference on the Theory and Application of Cryptology and …, 2012
A security analysis of the Cliques protocols suites
O Pereira, JJ Quisquater
Proc. 14th IEEE Computer Security Foundations Workshop, 73-81, 2001
Leakage resilient cryptography in practice
FX Standaert, O Pereira, Y Yu, JJ Quisquater, M Yung, E Oswald
Towards Hardware-Intrinsic Security, 99-134, 2010
Leftover hash lemma, revisited
B Barak, Y Dodis, H Krawczyk, O Pereira, K Pietrzak, FX Standaert, Y Yu
Annual Cryptology Conference, 1-20, 2011
A block cipher based pseudo random number generator secure against side-channel key recovery
C Petit, FX Standaert, O Pereira, TG Malkin, M Yung
Proceedings of the 2008 ACM symposium on Information, computer and …, 2008
Practical leakage-resilient pseudorandom generators
Y Yu, FX Standaert, O Pereira, M Yung
Proceedings of the 17th ACM conference on Computer and communications …, 2010
SoK: A comprehensive analysis of game-based ballot privacy definitions
D Bernhard, V Cortier, D Galindo, O Pereira, B Warinschi
2015 IEEE Symposium on Security and Privacy, 499-516, 2015
Adapting Helios for provable ballot privacy
D Bernhard, V Cortier, O Pereira, B Smyth, B Warinschi
Computer Security–ESORICS 2011, 335-354, 2011
STAR-Vote: A secure, transparent, auditable, and reliable voting system
S Bell, J Benaloh, MD Byrne, D DeBeauvoir, B Eakin, P Kortum, ...
2013 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections …, 2013
Universally composable security analysis of TLS
S Gajek, M Manulis, O Pereira, AR Sadeghi, J Schwenk
International Conference on Provable Security, 313-327, 2008
Leakage-resilient symmetric cryptography under empirically verifiable assumptions
FX Standaert, O Pereira, Y Yu
Annual Cryptology Conference, 335-352, 2013
Time-bounded task-PIOAs: A framework for analyzing security protocols
R Canetti, L Cheung, D Kaynar, M Liskov, N Lynch, O Pereira, R Segala
International Symposium on Distributed Computing, 238-253, 2006
Some attacks upon authenticated group key agreement protocols
O Pereira, JJ Quisquater
Journal of Computer Security 11 (4), 555-580, 2003
Leakage-resilient authentication and encryption from symmetric cryptographic primitives
O Pereira, FX Standaert, S Vivek
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Task-structured probabilistic I/O automata
R Canetti, L Cheung, D Kaynar, M Liskov, N Lynch, O Pereira, R Segala
2006 8th International Workshop on Discrete Event Systems, 207-214, 2006
Running Mixnet-Based Elections with Helios.
P Bulens, D Giry, O Pereira
EVT/WOTE 11, 2011
Securely solving simple combinatorial graph problems
A Aly, E Cuvelier, S Mawet, O Pereira, M Van Vyve
International Conference on Financial Cryptography and Data Security, 239-257, 2013
The system can't perform the operation now. Try again later.
Articles 1–20