1995 | 1996 | 1997 | 1998 | 1999 | 2000 | 2001 | 2002 | 2003 | 2004
2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014
2015 | 2016 | 2017 | 2018 | 2019 | 2020 | Latest | Forthcoming
Publications dated 2011
January 2011
Christophe Petit, and Jean-Jacques Quisquater. Cayley hash functions, Henk C. A. van Tilborg and Sushil Jajodia ed., In Encyclopedia of cryptography and security - 2nd edition, Springer, January 2011 BibTeX
February 2011
Francesco Regazzoni, Wang Yi, and François-Xavier Standaert. FPGA Implementations of the AES Masked Against Power Analysis Attacks, In Proceedings of 2nd International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE), February 2011 BibTeX
March 2011
Nuttapong Attrapadung, and Benoit Libert. Homomorphic Network Coding Signatures in the Standard Model, In R. Gennaro, editor(s), Public Key Cryptography 2011 (PKC 2011), Volume 6571 of Lecture Notes in Computer Science (LNCS), pages 17-34, Springer, March 2011, BibTeX
Nuttapong Attrapadung, Benoit Libert, and Elie de Panafieu. Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts, In R. Gennaro, editor(s), Public Key Cryptography 2011 (PKC 2011), Volume 6571 of Lecture Notes in Computer Science (LNCS), pages 90-108, Springer, March 2011, BibTeX
Benoit Libert, and Damien Vergnaud. Unidirectional Chosen-Ciphertext Secure Proxy Re- Encryption, In IEEE Transactions on Information Theory, Volume 57-3, pages 1786-1802, March 2011 BibTeX
Benoit Libert, and Moti Yung. Efficient Traceable Signatures in the Standard Model, In Theoretical Computer Science, Volume 412-12-14, pages 1220-1242, March 2011 BibTeX
Marcel Medwed, and Stefan Mangard. Arithmetic Logic Units with High Error Detection Rates to Counteract Fault Attacks, DATE 2011, pages in press, March 2011 PDF BibTeX
Olivier Pereira. Leakage-resilient Stream Ciphers: an Overview, In Ralf Küsters, Michaël Rusinowitch, editor(s), 2011 Grande Region Security and Reliability Day, March 2011 PDF BibTeX
April 2011
Cédric Hocquet, Dina Heidar Kamel, Francesco Regazzoni, Jean-Didier Legat, Denis Flandre, David Bol, and François-Xavier Standaert. Harvesting the potential of nano-CMOS for lightweight cryptography: An ultra-low-voltage 65 nm AES coprocessor for passive RFID tags, In Journal of Cryptographic Engineering, April 2011 BibTeX
June 2011
Ali Galip Bayrak, Francesco Regazzoni, Philip Brisk, François-Xavier Standaert, and Paolo Ienne. A First Step Towards Automatic Application of Power Analysis Countermeasures, In Proceedings of 48th Design Automation Conference (DAC), June 2011 BibTeX
Alessandro Cevrero, Francesco Regazzoni, Michael Schwander, Stephane Badel, Paolo Ienne, and Yusuf Leblebici. Power-Gated MOS Current Mode Logic (PG-MCML): A Power-Aware DPA-Resistant Standard Cell Library, In Proceedings of 48th Design Automation Conference (DAC), June 2011 BibTeX
Alessandro Barenghi, Cédric Hocquet, David Bol, François-Xavier Standaert, Francesco Regazzoni, and Israel Koren. Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-Threshold Devices through an Example of a 65nm AES Implementation, 7th Workshop on RFID Security and Privacy (RFIDSec) 2011, June 2011 BibTeX
July 2011
Benoit Libert, and Moti Yung. Adaptively Secure Non-Interactive Threshold Cryptosystems, In J. Sgall, L. Aceto & M. Henzinger, editor(s), 38th International Colloquium on Automata, Languages and Programming (ICALP 2011) - Track C, Volume 6756 of Lecture Notes in Computer Science (LNCS), pages 588-600, Springer, July 2011, BibTeX
Stéphanie Kerckhof, Baudoin Collard, and François-Xavier Standaert. FPGA Implementation of a Statistical Saturation Attack against PRESENT, In Nitaj, Abderrahmane and Pointcheval, David, editor(s), Progress in Cryptology – AFRICACRYPT 2011, Volume 6737 of Lecture Notes in Computer Science, pages 100-116, Springer, July 2011 PDF BibTeX
August 2011
Philippe Bulens, Damien Giry, and Olivier Pereira. Running Mixnet-Based Elections with Helios, In H. Shacham and V. Teague, editor(s), Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, Usenix, August 2011 BibTeX
Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, and Yu Yu. Leftover Hash Lemma, Revisited, In Phillip Rogaway, editor(s), Advances in Cryptology - CRYPTO 2011, Volume 6841 of Lecture Notes in Computer Science (LNCS), pages 1-20, Springer-Verlag, August 2011 PDF BibTeX
September 2011
David Bernhard, Veronique Cortier, Olivier Pereira, Ben Smyth, and Bogdan Warinschi. Adapting Helios for provable ballot privacy, In Vijay Atluri, Claudia Diaz, editor(s), Computer Security – ESORICS 2011, Lecture Notes in Computer Science, Springer, September 2011 PDF BibTeX
Stéphanie Kerckhof, François Durvaux, Nicolas Veyrat-Charvillon, Francesco Regazzoni, Guerric Meurice de Dormale, and François-Xavier Standaert. Low Cost FPGA Implementations of the SHA-3 Finalists, 10th Smart Card Research and Advanced Application Conference (CARDIS) 2011, September 2011 BibTeX
Marcel Medwed, Christophe Petit, Francesco Regazzoni, Mathieu Renauld, and François-Xavier Standaert. Fresh Re-Keying II: Securing Multiple Parties against Side-Channel and Fault Attacks, 10th Smart Card Research and Advanced Application Conference (CARDIS) 2011, September 2011 BibTeX
October 2011
Paolo Palmieri, and Olivier Pereira. Secure Two-Party Computation Over a Z-Channel, In X. Boyen and X. Chen, editor(s), ProvSec 2011, Volume 6980 of Lecture Notes in Computer Science (LNCS), pages 3-15, Springer, October 2011 PDF BibTeX
November 2011
Céline Blondeau, and Benoit Gérard. Differential Cryptanalysis of PUFFIN and PUFFIN2, November 2011 PDF BibTeX
Laurie Haustenne, Quentin De Neyer, and Olivier Pereira. Elliptic Curve Cryptography in JavaScript, In G. Leander and F.-X. Standaert, editor(s), ECRYPT Workshop on Lightweight Cryptography, November 2011 PDF BibTeX
December 2011
Paolo Palmieri, and Olivier Pereira. Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering, In Howon Kim, editor(s), 14th International Conference on Information Security and Cryptology (ICISC 2011), Volume 7259 of Lecture Notes in Computer Science (LNCS), pages 332–345, Springer, December 2011 PDF BibTeX
Marc Fischlin, Benoit Libert, and Mark Manulis. Non-Interactive and Re-Usable Universally Composable String Commitments with Adaptive Security, In D.-H. Lee & X. Wang, editor(s), Asiacrypt 2011, Volume 7073 of Lecture Notes in Computer Science, pages 468-485, Spinger, December 2011, BibTeX
Brett Hemenway, Benoit Libert, Rafail Ostrovsky, and Damien Vergnaud. Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security, In D.-H. Lee & X. Wang, editor(s), Asiacrypt 2011, Volume 7073 of Lecture Notes in Computer Science, pages 70-88, Spinger, December 2011, BibTeX
Malika Izabachène, Benoit Libert, and Damien Vergnaud. Block-wise P-signatures and Non-Interactive Anonymous Credentials with Efficient Attributes, In L. Chen, editor(s), 13th IMA International Conference on Cryptography and Coding (IMACC 2011), Volume 7089 of Lecture Notes on Computer Science, pages 431-450, Springer, December 2011, BibTeX