What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Gildas Avoine
Google Scholar
29
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/joc
Decrypting Without Keys: The Case of the GlobalPlatform SCP02 Protocol.
Gildas Avoine
Loïc Ferreira
2024
conf/crypto
Time-Memory Trade-Offs Sound the Death Knell for GPRS and GSM.
Gildas Avoine
Xavier Carpent
Tristan Claverie
Christophe Devine
Diane Leblanc-Albarel
2023
conf/esorics
Tamarin-Based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks.
Tristan Claverie
Gildas Avoine
Stéphanie Delaune
José Lopes-Esteves
2023
conf/asiaccs
Stairway To Rainbow.
Gildas Avoine
Xavier Carpent
Diane Leblanc-Albarel
2021
conf/esorics
Precomputation for Rainbow Tables has Never Been so Fast.
Gildas Avoine
Xavier Carpent
Diane Leblanc-Albarel
2021
conf/cans
How Distance-Bounding Can Detect Internet Traffic Hijacking.
Ghada Arfaoui
Gildas Avoine
Olivier Gimenez
Jacques Traoré
2020
conf/ctrsa
Symmetric-Key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy.
Gildas Avoine
Sébastien Canard
Loïc Ferreira
2019
conf/esorics
IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography.
Gildas Avoine
Sébastien Canard
Loïc Ferreira
2018
journals/tches
Attacking GlobalPlatform SCP02-compliant Smart Cards Using a Padding Oracle Attack.
Gildas Avoine
Loïc Ferreira
2018
conf/fc
Rescuing LoRaWAN 1.0.
Gildas Avoine
Loïc Ferreira
2017
conf/ccs
Heterogeneous Rainbow Table Widths Provide Faster Cryptanalyses.
Gildas Avoine
Xavier Carpent
2017
conf/ccs
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol.
Gildas Avoine
Xavier Bultel
Sébastien Gambs
David Gérault
Pascal Lafourcade
Cristina Onete
Jean-Marc Robert
2017
conf/acisp
How to Handle Rainbow Tables with External Memory.
Gildas Avoine
Xavier Carpent
Barbara Kordy
Florent Tardif
2016
conf/acns
Memory Carving in Embedded Devices: Separate the Wheat from the Chaff.
Thomas Gougeon
Morgan Barbier
Patrick Lacharme
Gildas Avoine
Christophe Rosenberger
2015
conf/acisp
Analysis of Rainbow Tables with Fingerprints.
Gildas Avoine
Adrien Bourgeois
Xavier Carpent
2015
conf/esorics
Interleaving Cryptanalytic Time-Memory Trade-Offs on Non-uniform Distributions.
Gildas Avoine
Xavier Carpent
Cédric Lauradoux
2013
conf/icisc
Optimal Storage for Rainbow Tables.
Gildas Avoine
Xavier Carpent
2012
conf/wisec
A privacy-restoring mechanism for offline RFID systems.
Gildas Avoine
Iwen Coisel
Tania Martin
2011
conf/esorics
Privacy Challenges in RFID.
Gildas Avoine
2011
conf/wisec
How secret-sharing can defeat terrorist fraud.
Gildas Avoine
Cédric Lauradoux
Benjamin Martin
2009
conf/wisa
When Compromised Readers Meet RFID.
Gildas Avoine
Cédric Lauradoux
Tania Martin
2009
conf/cans
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks.
Chong Hee Kim
Gildas Avoine
2008
conf/fc
ePassport: Securing International Contacts with Contactless Chips.
Gildas Avoine
Kassem Kalach
Jean-Jacques Quisquater
2008
conf/icisc
The Swiss-Knife RFID Distance Bounding Protocol.
Chong Hee Kim
Gildas Avoine
François Koeune
François-Xavier Standaert
Olivier Pereira
2005
conf/fc
Fraud Within Asymmetric Multi-hop Cellular Networks.
Gildas Avoine
2005
conf/fc
RFID Traceability: A Multilayer Problem.
Gildas Avoine
Philippe Oechslin
2005
conf/sacrypt
Reducing Time Complexity in RFID Systems.
Gildas Avoine
Etienne Dysli
Philippe Oechslin
2004
conf/acisp
Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing.
Gildas Avoine
Serge Vaudenay
2003
conf/wisa
Optimal Fair Exchange with Guardian Angels.
Gildas Avoine
Serge Vaudenay
Coauthors
Adrien Bourgeois
(1)
Barbara Kordy
(1)
Benjamin Martin
(1)
Cédric Lauradoux
(3)
Chong Hee Kim
(2)
Christophe Devine
(1)
Christophe Rosenberger
(1)
Cristina Onete
(1)
David Gérault
(1)
Diane Leblanc-Albarel
(3)
Etienne Dysli
(1)
Florent Tardif
(1)
François Koeune
(1)
François-Xavier Standaert
(1)
Ghada Arfaoui
(1)
Gildas Avoine
(29)
Iwen Coisel
(1)
Jacques Traoré
(1)
Jean-Jacques Quisquater
(1)
Jean-Marc Robert
(1)
José Lopes-Esteves
(1)
Kassem Kalach
(1)
Loïc Ferreira
(5)
Morgan Barbier
(1)
Olivier Gimenez
(1)
Olivier Pereira
(1)
Pascal Lafourcade
(1)
Patrick Lacharme
(1)
Philippe Oechslin
(2)
Sébastien Canard
(2)
Sébastien Gambs
(1)
Serge Vaudenay
(2)
Stéphanie Delaune
(1)
Tania Martin
(2)
Thomas Gougeon
(1)
Tristan Claverie
(2)
Xavier Bultel
(1)
Xavier Carpent
(8)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to