Follow
Olivier Pereira
Olivier Pereira
Verified email at uclouvain.be
Title
Cited by
Cited by
Year
On the energy cost of communication and cryptography in wireless sensor networks
G De Meulenaer, F Gosset, FX Standaert, O Pereira
2008 IEEE International Conference on Wireless and Mobile Computing …, 2008
4012008
Electing a university president using open-audit voting: Analysis of real-world use of Helios
B Adida, O De Marneffe, O Pereira, JJ Quisquater
EVT/WOTE 9 (10), 2009
3322009
How not to prove yourself: Pitfalls of the fiat-shamir heuristic and applications to helios
D Bernhard, O Pereira, B Warinschi
Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012
3032012
The swiss-knife RFID distance bounding protocol
CH Kim, G Avoine, F Koeune, FX Standaert, O Pereira
Information Security and Cryptology–ICISC 2008: 11th International …, 2009
2412009
SoK: A comprehensive analysis of game-based ballot privacy definitions
D Bernhard, V Cortier, D Galindo, O Pereira, B Warinschi
2015 IEEE Symposium on Security and Privacy, 499-516, 2015
1732015
Leftover hash lemma, revisited
B Barak, Y Dodis, H Krawczyk, O Pereira, K Pietrzak, FX Standaert, Y Yu
Annual Cryptology Conference, 1-20, 2011
1642011
{STAR-Vote}: A secure, transparent, auditable, and reliable voting system
S Bell, J Benaloh, MD Byrne, D DeBeauvoir, B Eakin, P Kortum, ...
2013 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections …, 2013
1462013
Leakage resilient cryptography in practice
FX Standaert, O Pereira, Y Yu, JJ Quisquater, M Yung, E Oswald
Towards Hardware-Intrinsic Security: Foundations and Practice, 99-134, 2010
1442010
A security analysis of the Cliques protocols suites
O Pereira, JJ Quisquater
Proc. 14th IEEE Computer Security Foundations Workshop, 73-81, 2001
1412001
Adapting Helios for provable ballot privacy
D Bernhard, V Cortier, O Pereira, B Smyth, B Warinschi
Computer Security–ESORICS 2011, 335-354, 2011
1192011
Practical leakage-resilient pseudorandom generators
Y Yu, FX Standaert, O Pereira, M Yung
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1152010
Pluginizing quic
Q De Coninck, F Michel, M Piraux, F Rochet, T Given-Wilson, A Legay, ...
Proceedings of the ACM Special Interest Group on Data Communication, 59-74, 2019
1052019
A block cipher based pseudo random number generator secure against side-channel key recovery
C Petit, FX Standaert, O Pereira, TG Malkin, M Yung
Proceedings of the 2008 ACM symposium on Information, computer and …, 2008
1042008
Leakage-resilient authentication and encryption from symmetric cryptographic primitives
O Pereira, FX Standaert, S Vivek
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
992015
Universally composable security analysis of TLS
S Gajek, M Manulis, O Pereira, AR Sadeghi, J Schwenk
Provable Security: Second International Conference, ProvSec 2008, Shanghai …, 2008
912008
Mode-level vs. implementation-level physical security in symmetric cryptography: a practical guide through the leakage-resistance jungle
D Bellizia, O Bronchain, G Cassiers, V Grosso, C Guo, C Momin, ...
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
852020
Election verifiability or ballot privacy: Do we need to choose?
E Cuvelier, O Pereira, T Peters
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
842013
Securely solving simple combinatorial graph problems
A Aly, E Cuvelier, S Mawet, O Pereira, M Van Vyve
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
822013
Spook: Sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher
D Bellizia, F Berti, O Bronchain, G Cassiers, S Duval, C Guo, G Leander, ...
IACR Transactions on Symmetric Cryptology 2020 (S1), 295--349, 2020
812020
Leakage-resilient symmetric cryptography under empirically verifiable assumptions
FX Standaert, O Pereira, Y Yu
Annual Cryptology Conference, 335-352, 2013
812013
The system can't perform the operation now. Try again later.
Articles 1–20