1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004
2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014
2015 | 2016 | 2017 | 2018 | 2019 | 2020 | Latest | Forthcoming
Publications dated 2008
February 2008
François Mace, François-Xavier Standaert, and Jean-Jacques Quisquater. FPGA Implementation(s) of a Scalable Encryption Algorithm, In IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Volume 16-2, pages 212-216, February 2008 BibTeX
Jean-Jacques Quisquater, Baudoin Collard, and François-Xavier Standaert. Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent, Fast Software Encryption 2008, Volume 5086 of Lecture Notes on Computer Science, pages 382-397, Springer, February 2008 PDF BibTeX
March 2008
Olivier Pereira, Nancy Lynch, Moses Liskov, Dilsun Kaynar, Ling Cheung, Roberto Segala, and Ran Canetti. Analyzing Security Protocols Using Time-Bounded Task-PIOAs, In Discrete Event Dynamic Systems, Volume 18-1, pages 111-159, March 2008 PDF BibTeX
Benoit Libert, and Damien Vergnaud. Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption, In R. Cramer , editor(s), 11th International Workshop on Practice and Theory in Public Key Cryptography (PKC 2008), Volume 4939 of Lecture Notes in Computer Science, pages 360-379, Springer, March 2008 BibTeX
Alexander W. Dent, Benoit Libert, and Kenneth G. Paterson. Certificateless Encryption Schemes Strongly Secure in the Standard Model, In R. Cramer, editor(s), 11th International Workshop on Practice and Theory in Public-Key Cryptography (PKC 2008), Volume 4939 of Lecture Notes in Computer Science, pages 344-359, Springer, March 2008 BibTeX
Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi, and Joerg Schwenk. Provably Secure Browser-Based User-Aware Mutual Authentication over TLS, In M. Abe and V. Gligor, editor(s), ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008), pages 300-311, ACM Press, March 2008 BibTeX
Emmanuel Bresson, and Mark Manulis. Securing Group Key Exchange against Strong Corruptions, In M. Abe and V. Gligor, editor(s), ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008), pages 249-260, ACM Press, March 2008 BibTeX
Christophe Petit, François-Xavier Standaert, Olivier Pereira, Tal G. Malkin, and Moti Yung. A Block Cipher based Pseudo Random Number Generator Secure Against Side-Channel Key Recovery, In M. Abe and V. Gligor, editor(s), ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications security, pages 56--65, ACM, March 2008 PDF BibTeX
April 2008
Frederik Armknecht, Alberto Escalante, Hans Loehr, Mark Manulis, and Ahmad-Reza Sadeghi. Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly, In L. Chen, Y. Mu, and W. Susilo, editor(s), 4th Information Security Practice and Experience Conference (ISPEC 2008), Volume 4991 of Lecture Notes in Computer Science, pages 29-44, Springer, April 2008 BibTeX
May 2008
François Gosset, François-Xavier Standaert, and Jean-Jacques Quisquater. FPGA Implementation of SQUASH, Twenty-ninth Symposium on Information Theory in the Benelux, May 2008 BibTeX
Giacomo de Meulenaer, François Gosset, François-Xavier Standaert, and Luc Vandendorpe. On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks, Twenty-ninth Symposium on Information Theory in the Benelux, May 2008 PDF BibTeX
June 2008
Philippe Bulens, François-Xavier Standaert, Jean-Jacques Quisquater, Pascal Pellegrin, and Gaël Rouvroy. Implementation of the AES-128 on Virtex-5 FPGAs, Progress in Cryptology - AfricaCrypt 2008, Volume 5023 of Lecture Notes in Computer Science, pages 16 - 26, Springer, June 2008 BibTeX
Chong Hee Kim, Philippe Bulens, Christophe Petit, and Jean-Jacques Quisquater. Fault Attacks on Public Key Elements: Application to DLP based Schemes, Fifth European PKI Workshop - EUROPKI 2008, Volume 5057 of Lecture Notes in Computer Science, pages 182 - 195, Springer, June 2008 PDF BibTeX
July 2008
Sebastian Gajek, Mark Manulis, and Joerg Schwenk. Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same-Origin Policy, In Y. Mu, W. Susilo, and J. Seberry, editor(s), 13th Australasian Conference on Information Security and Privacy (ACISP 2008), Volume 5107 of Lecture Notes in Computer Science, pages 6-20, Springer, July 2008 BibTeX
Sébastien Canard, and Iwen Coisel. Data Synchronization in Privacy-Preserving RFID Authentication Schemes, Workshop on RFID Security -- RFIDSec'08, July 2008 PDF BibTeX
Ben Adida, and Olivier Pereira. Proceedings of WOTE 2008 -- IAVoSS Workshop On Trustworthy Elections , July 2008 BibTeX
August 2008
Ran Canetti, Ling Cheung, Dilsun Kaynar, Nancy Lynch, and Olivier Pereira. Modeling Computational Security in Long-Lived Systems, In van Breugel, Franck; Chechik, Marsha, editor(s), CONCUR 2008 - Concurrency Theory, Volume 5201 of LNCS, Springer, August 2008 PDF BibTeX
Christophe Petit, Jean-Jacques Quisquater, and Nicolas Veyrat-Charvillon. Efficiency and Pseudo-randomness of a Variant of Zémor-Tillich Hash Function, In Joseph Micallef , editor(s), ICECS2008 - IEEE International Conference on Electronics, Circuits, and Systems, pages 906-909, IEEE, August 2008 PDF BibTeX
September 2008
Emmanuel Bresson, and Mark Manulis. Contributory Group Key Exchange in the Presence of Malicious Participants, In IET Information Security, Volume 2-3, pages 85-93, September 2008 BibTeX
Benoit Libert, and Damien Vergnaud. Tracing Malicious Proxies in Proxy Re-Encryption, In S. Galbraith and K. Paterson, editor(s), 2nd International Conference on Pairing-Based Cryptography (Pairing 2008), Volume 5209 of Lecture Notes in Computer Science, pages 332-353, Springer, September 2008, To Appear BibTeX
Chong Hee Kim, and Jean-Jacques Quisquater. New Differential Fault Analysis on AES Key Schedule: Two Faults are enough, Eighth Smart Card Research and Advanced Application IFIP Conference - CARDIS 2008, Volume 5189 of Lecture Notes in Computer Science, pages 48-60, Springer-Verlag, September 2008 BibTeX
Christophe Petit, Kristin Lauter, and Jean-Jacques Quisquater. Full Cryptanalysis of LPS and Morgenstern Hash Functions, In Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti, editor(s), SCN 2008 - Sixth Conference on Security and Cryptography for Networks, Volume 5229 of Lecture Notes in Computer Science, pages 263-277, Springer Verlag, September 2008 PDF BibTeX
Liqun Chen, Hans Loehr, Mark Manulis, and Ahmad-Reza Sadeghi. Property-Based Attestation without a Trusted Third Party, In T.-C. Wu et al., editor(s), 11th Information Security Conference (ISC 2008), Volume 5222 of Lecture Notes in Computer Science, pages 31-46, Springer-Verlag, September 2008 BibTeX
Jörn-Marc Schmidt, and Chong Hee Kim. A Probing Attack on AES, The 9th International Workshop on Information Security Applications - WISA 2008, Lecture Notes in Computer Science, Springer, September 2008, to appear BibTeX
October 2008
Sebastian Gajek, Tibor Jager, Mark Manulis, and Joerg Schwenk. A Browser-Based Kerberos Authentication Scheme, 13th European Symposium on Research in Computer Security (ESORICS 2008), Volume 5283 of LNCS, pages 115-129, Springer, October 2008 BibTeX
Dina Heidar Kamel, David Bol, and Denis Flandre. Impact of Layout Style and Parasitic Capacitances in Full Adder, SOI Conference, IEEE, October 2008 PDF BibTeX
Emmanuel Bresson, and Mark Manulis. Securing Group Key Exchange against Strong Corruptions and Key Registration Attacks, In International Journal of Applied Cryptography, Volume 1-2, pages 91-107, October 2008 BibTeX
Giacomo de Meulenaer, François Gosset, François-Xavier Standaert, and Olivier Pereira. On the Energy Cost of Communications and Cryptography in Wireless Sensor Networks, (extended version), IEEE International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications (SecPriWiMob'2008), pages 580 - 585, October 2008 PDF BibTeX
Chong Hee Kim, and Jean-Jacques Quisquater. Method for Detecting Vulnerability to Doubling Attacks, 10th International Conference on Information and Communications Security - ICICS 2008, Volume 5308 of Lecture Notes in Computer Science, pages 97-110, Springer-Verlag, October 2008 BibTeX
Romain Robert, Mark Manulis, Florence De Villenfagne, Damien Leroy, Julien Jost, François Koeune, Caroline Ker, Jean-Marc Dinant, Yves Poullet, Olivier Bonaventure, and Jean-Jacques Quisquater. WiFi Roaming: Legal Implications and Security Constraints, In International Journal of Law and Information Technology, Volume 16-3, pages 205-241, October 2008 BibTeX
Benoit Libert, and Damien Vergnaud. Multi-Use Unidirectional Proxy Re-Signatures, In P. Syverson and S. Jha, editor(s), 15th ACM Conference on Computer and Communications Security (ACM-CCS 2008), pages 511-520, ACM Press, October 2008, BibTeX
Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, and Joerg Schwenk. Universally Composable Security Analysis of TLS, 2nd International Conference on Provable Security (ProvSec 2008), Volume 5324 of LNCS, pages 313-327, Springer, October 2008 PDF BibTeX
December 2008
Chong Hee Kim, Gildas Avoine, François Koeune, François-Xavier Standaert, and Olivier Pereira. The Swiss-Knife RFID Distance Bounding Protocol, The 11th International Conference on Information Security and Cryptology - ICISC 2008, Volume 5461 of Lecture Notes in Computer Science, pages 98-115, Springer-Verlag, December 2008 BibTeX