On the energy cost of communication and cryptography in wireless sensor networks G De Meulenaer, F Gosset, FX Standaert, O Pereira 2008 IEEE International Conference on Wireless and Mobile Computing …, 2008 | 336 | 2008 |
Electing a university president using open-audit voting: Analysis of real-world use of Helios B Adida, O De Marneffe, O Pereira, JJ Quisquater EVT/WOTE 9 (10), 2009 | 279 | 2009 |
The swiss-knife RFID distance bounding protocol CH Kim, G Avoine, F Koeune, FX Standaert, O Pereira International Conference on Information Security and Cryptology, 98-115, 2008 | 219 | 2008 |
How not to prove yourself: Pitfalls of the fiat-shamir heuristic and applications to helios D Bernhard, O Pereira, B Warinschi International Conference on the Theory and Application of Cryptology and …, 2012 | 195 | 2012 |
A security analysis of the Cliques protocols suites O Pereira, JJ Quisquater Proc. 14th IEEE Computer Security Foundations Workshop, 73-81, 2001 | 133 | 2001 |
Leakage resilient cryptography in practice FX Standaert, O Pereira, Y Yu, JJ Quisquater, M Yung, E Oswald Towards Hardware-Intrinsic Security, 99-134, 2010 | 121 | 2010 |
Leftover hash lemma, revisited B Barak, Y Dodis, H Krawczyk, O Pereira, K Pietrzak, FX Standaert, Y Yu Annual Cryptology Conference, 1-20, 2011 | 116 | 2011 |
A block cipher based pseudo random number generator secure against side-channel key recovery C Petit, FX Standaert, O Pereira, TG Malkin, M Yung Proceedings of the 2008 ACM symposium on Information, computer and …, 2008 | 102 | 2008 |
Practical leakage-resilient pseudorandom generators Y Yu, FX Standaert, O Pereira, M Yung Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 100 | 2010 |
SoK: A comprehensive analysis of game-based ballot privacy definitions D Bernhard, V Cortier, D Galindo, O Pereira, B Warinschi 2015 IEEE Symposium on Security and Privacy, 499-516, 2015 | 99 | 2015 |
Adapting Helios for provable ballot privacy D Bernhard, V Cortier, O Pereira, B Smyth, B Warinschi Computer Security–ESORICS 2011, 335-354, 2011 | 92 | 2011 |
STAR-Vote: A secure, transparent, auditable, and reliable voting system S Bell, J Benaloh, MD Byrne, D DeBeauvoir, B Eakin, P Kortum, ... 2013 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections …, 2013 | 81 | 2013 |
Universally composable security analysis of TLS S Gajek, M Manulis, O Pereira, AR Sadeghi, J Schwenk International Conference on Provable Security, 313-327, 2008 | 76 | 2008 |
Leakage-resilient symmetric cryptography under empirically verifiable assumptions FX Standaert, O Pereira, Y Yu Annual Cryptology Conference, 335-352, 2013 | 69 | 2013 |
Time-bounded task-PIOAs: A framework for analyzing security protocols R Canetti, L Cheung, D Kaynar, M Liskov, N Lynch, O Pereira, R Segala International Symposium on Distributed Computing, 238-253, 2006 | 66 | 2006 |
Leakage-resilient authentication and encryption from symmetric cryptographic primitives O Pereira, FX Standaert, S Vivek Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 62 | 2015 |
A strong link between marine microbial community composition and function challenges the idea of functional redundancy PE Galand, O Pereira, C Hochart, JC Auguet, D Debroas The ISME journal 12 (10), 2470-2478, 2018 | 59 | 2018 |
Task-structured probabilistic I/O automata R Canetti, L Cheung, D Kaynar, M Liskov, N Lynch, O Pereira, R Segala 2006 8th International Workshop on Discrete Event Systems, 207-214, 2006 | 58 | 2006 |
Some attacks upon authenticated group key agreement protocols O Pereira, JJ Quisquater Journal of Computer Security 11 (4), 555-580, 2003 | 56 | 2003 |
Running Mixnet-Based Elections with Helios. P Bulens, D Giry, O Pereira EVT/WOTE 11, 2011 | 54 | 2011 |