default search action
Cédric Lauradoux
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [e2]Kai Rannenberg, Prokopios Drogkaris, Cédric Lauradoux:
Privacy Technologies and Policy - 11th Annual Privacy Forum, APF 2023, Lyon, France, June 1-2, 2023, Proceedings. Lecture Notes in Computer Science 13888, Springer 2024, ISBN 978-3-031-61088-2 [contents] - [e1]Meiko Jensen, Cédric Lauradoux, Kai Rannenberg:
Privacy Technologies and Policy - 12th Annual Privacy Forum, APF 2024, Karlstad, Sweden, September 4-5, 2024, Proceedings. Lecture Notes in Computer Science 14831, Springer 2024, ISBN 978-3-031-68023-6 [contents] - 2023
- [i15]Carole Adam, Cédric Lauradoux:
Un jeu a debattre pour sensibiliser a l'Intelligence Artificielle dans le contexte de la pandemie de COVID-19. CoRR abs/2304.12186 (2023) - 2022
- [c40]Cédric Lauradoux:
Can Authoritative Governments Abuse the Right to Access? APF 2022: 23-33 - [c39]Carole Adam, Cédric Lauradoux:
A Serious Game for Debating about the Use of Artificial Intelligence during the COVID-19 Pandemic. ISCRAM 2022: 554-563 - [c38]Supriya Adhatarao, Cédric Lauradoux:
Robust PDF Files Forensics Using Coding Style. SEC 2022: 179-195 - [i14]Cédric Lauradoux:
Can Authoritative Governments Abuse the Right to Access? CoRR abs/2203.02068 (2022) - 2021
- [c37]Supriya Adhatarao, Cédric Lauradoux:
Exploitation and Sanitization of Hidden Data in PDF Files: Do Security Agencies Sanitize Their PDF Files? IH&MMSec 2021: 35-44 - [c36]Supriya Adhatarao, Cédric Lauradoux:
How are PDF files published in the Scientific Community? WIFS 2021: 1-6 - [i13]Guilhem Lacombe, Kseniia Masalygina, Anass Tahiri, Carole Adam, Cédric Lauradoux:
Can You Accept LaTeX Files from Strangers? Ten Years Later. CoRR abs/2102.00856 (2021) - [i12]Supriya Adhatarao, Cédric Lauradoux, Cristiana Santos:
IP-based Subject Access Requests Denied. CoRR abs/2103.01019 (2021) - [i11]Supriya Adhatarao, Cédric Lauradoux:
Robust PDF Files Forensics Using Coding Style. CoRR abs/2103.02702 (2021) - [i10]Supriya Adhatarao, Cédric Lauradoux:
Exploitation and Sanitization of Hidden Data in PDF Files. CoRR abs/2103.02707 (2021) - 2020
- [i9]Claude Castelluccia, Nataliia Bielova, Antoine Boutet, Mathieu Cunche, Cédric Lauradoux, Daniel Le Métayer, Vincent Roca:
DESIRE: A Third Way for a European Exposure Notification System Leveraging the best of centralized and decentralized systems. CoRR abs/2008.01621 (2020)
2010 – 2019
- 2019
- [j5]Gildas Avoine, Muhammed Ali Bingöl, Ioana Boureanu, Srdjan Capkun, Gerhard P. Hancke, Süleyman Kardas, Chong Hee Kim, Cédric Lauradoux, Benjamin Martin, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen, Dave Singelée, Aslan Tchamkerten, Rolando Trujillo-Rasua, Serge Vaudenay:
Security of Distance-Bounding: A Survey. ACM Comput. Surv. 51(5): 94:1-94:33 (2019) - [c35]Coline Boniface, Imane Fouad, Nataliia Bielova, Cédric Lauradoux, Cristiana Santos:
Security Analysis of Subject Access Request Procedures - How to Authenticate Data Subjects Safely When They Request for Their Data. APF 2019: 182-209 - 2018
- [j4]Levent Demir, Amrit Kumar, Mathieu Cunche, Cédric Lauradoux:
The Pitfalls of Hashing for Privacy. IEEE Commun. Surv. Tutorials 20(1): 551-565 (2018) - 2017
- [c34]Margaux Canet, Amrit Kumar, Cédric Lauradoux, Mary-Andréa Rakotomanga, Reihaneh Safavi-Naini:
Decompression Quines and Anti-Viruses. CODASPY 2017: 23-34 - [c33]Amrit Kumar, Cédric Lauradoux, Pascal Lafourcade:
Duck Attack on Accountable Distributed Systems. MobiQuitous 2017: 303-312 - 2016
- [c32]Thomas Gerbet, Amrit Kumar, Cédric Lauradoux:
A Privacy Analysis of Google and Yandex Safe Browsing. DSN 2016: 347-358 - [c31]Jessye Dos Santos, Christine Hennebert, J. C. Fonbonne, Cédric Lauradoux:
Ephemeral: Lightweight pseudonyms for 6LoWPAN MAC addresses. PIMRC 2016: 1-6 - 2015
- [c30]Thomas Gerbet, Amrit Kumar, Cédric Lauradoux:
The Power of Evil Choices in Bloom Filters. DSN 2015: 101-112 - [c29]Gildas Avoine, Xavier Carpent, Cédric Lauradoux:
Interleaving Cryptanalytic Time-Memory Trade-Offs on Non-uniform Distributions. ESORICS (1) 2015: 165-184 - [c28]Amrit Kumar, Cédric Lauradoux:
A Survey of Alerting Websites: Risks and Solutions. SEC 2015: 126-141 - [c27]Vincent Primault, Sonia Ben Mokhtar, Cédric Lauradoux, Lionel Brunie:
Time Distortion Anonymization for the Publication of Mobility Data with High Utility. TrustCom/BigDataSE/ISPA (1) 2015: 539-546 - [c26]Jessye Dos Santos, Christine Hennebert, Cédric Lauradoux:
Preserving privacy in secured ZigBee wireless sensor networks. WF-IoT 2015: 715-720 - [i8]Vincent Primault, Sonia Ben Mokhtar, Cédric Lauradoux, Lionel Brunie:
Time Distortion Anonymization for the Publication of Mobility Data with High Utility. CoRR abs/1507.00443 (2015) - 2014
- [c25]Christine Hennebert, Hicham Hossayni, Cédric Lauradoux:
The entropy of wireless statistics. EuCNC 2014: 1-5 - [c24]Amrit Kumar, Pascal Lafourcade, Cédric Lauradoux:
Performances of cryptographic accumulators. LCN 2014: 366-369 - [c23]Levent Demir, Mathieu Cunche, Cédric Lauradoux:
Analysing the privacy policies of Wi-Fi trackers. WPA@MobiSys 2014: 39-44 - [c22]Amrit Kumar, Cédric Lauradoux:
Private Password Auditing - Short Paper. PASSWORDS 2014: 138-145 - [i7]Vincent Primault, Sonia Ben Mokhtar, Cédric Lauradoux, Lionel Brunie:
Differentially Private Location Privacy in Practice. CoRR abs/1410.7744 (2014) - 2013
- [c21]Mathieu Cunche, Cédric Lauradoux, Marine Minier, Roksana Boreli:
Private and resilient data aggregation. LCN 2013: 759-762 - [c20]Jun-Young Bae, Claude Castelluccia, Cédric Lauradoux, Franck Rousseau:
Distributed Key Certification Using Accumulators for Wireless Sensor Networks. MobiQuitous 2013: 500-511 - [c19]Christine Hennebert, Hicham Hossayni, Cédric Lauradoux:
Entropy harvesting from physical sensors. WISEC 2013: 149-154 - [i6]Mickaël Dardaillon, Cédric Lauradoux, Tanguy Risset:
Hardware Implementation of the GPS authentication. CoRR abs/1309.6468 (2013) - 2012
- [j3]Anya Apavatjrut, Wassim Znaidi, Antoine Fraboulet, Claire Goursaud, Katia Jaffrès-Runser, Cédric Lauradoux, Marine Minier:
Energy efficient authentication strategies for network coding. Concurr. Comput. Pract. Exp. 24(10): 1086-1107 (2012) - [c18]Mickaël Dardaillon, Cédric Lauradoux, Tanguy Risset:
Hardware implementation of the GPS authentication. ReConFig 2012: 1-6 - [c17]Ahmed Benfarah, Benoit Miscopein, Cédric Lauradoux, Jean-Marie Gorce:
Towards stronger jamming model: Application to TH-UWB radio. WCNC 2012: 2473-2477 - 2011
- [j2]Gildas Avoine, Muhammed Ali Bingöl, Süleyman Kardas, Cédric Lauradoux, Benjamin Martin:
A framework for analyzing RFID distance bounding protocols. J. Comput. Secur. 19(2): 289-317 (2011) - [c16]Yuanyuan Zhang, Wassim Znaidi, Cédric Lauradoux, Marine Minier:
Flooding attacks against network coding and countermeasures. NSS 2011: 305-309 - [c15]Anya Apavatjrut, Katia Jaffrès-Runser, Claire Goursaud, Cédric Lauradoux:
Overflow of fountain codes in multi-hop wireless sensor networks. PIMRC 2011: 995-999 - [c14]Gildas Avoine, Cédric Lauradoux, Benjamin Martin:
How secret-sharing can defeat terrorist fraud. WISEC 2011: 145-156 - [i5]Katia Jaffrès-Runser, Cédric Lauradoux:
Authentication planning for XOR network coding. CoRR abs/1103.1716 (2011) - 2010
- [c13]Ahmed Benfarah, Benoit Miscopein, Jean-Marie Gorce, Cédric Lauradoux, Bernard Roux:
Distance Bounding Protocols on TH-UWB Radios. GLOBECOM 2010: 1-6 - [c12]Anya Apavatjrut, Wassim Znaidi, Antoine Fraboulet, Claire Goursaud, Cédric Lauradoux, Marine Minier:
Energy Friendly Integrity for Network Coding in Wireless Sensor Networks. NSS 2010: 223-230
2000 – 2009
- 2009
- [c11]Cédric Lauradoux:
Extended windmill polynomials. ISIT 2009: 1120-1124 - [c10]François Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier, Benjamin Pousse:
A New Approach for FCSRs. Selected Areas in Cryptography 2009: 433-448 - [c9]Wassim Znaidi, Marine Minier, Cédric Lauradoux:
Aggregated Authentication (AMAC) Using Universal Hash Functions. SecureComm 2009: 248-264 - [c8]Gildas Avoine, Cédric Lauradoux, Tania Martin:
When Compromised Readers Meet RFID. WISA 2009: 36-50 - [i4]Andrea Röck, Cédric Lauradoux:
Parallel Generation of l-Sequences. Symmetric Cryptography 2009 - [i3]François Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier, Benjamin Pousse:
A new approach for FCSRs. IACR Cryptol. ePrint Arch. 2009: 167 (2009) - 2008
- [c7]Yedidya Hilewitz, Cédric Lauradoux, Ruby B. Lee:
Bit matrix multiplication in commodity processors. ASAP 2008: 7-12 - [c6]Cédric Lauradoux, Marion Videau:
Matriochka symmetric Boolean functions. ISIT 2008: 1631-1635 - [c5]Cédric Lauradoux, Andrea Röck:
Parallel Generation of l-Sequences. SETA 2008: 299-312 - [p3]Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas T. Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert:
Sosemanuk, a Fast Software-Oriented Stream Cipher. The eSTREAM Finalists 2008: 98-118 - [p2]Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas T. Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert:
Decimv2. The eSTREAM Finalists 2008: 140-151 - [p1]François Arnault, Thierry P. Berger, Cédric Lauradoux:
F-FCSR Stream Ciphers. The eSTREAM Finalists 2008: 170-178 - [i2]Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas T. Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert:
SOSEMANUK: a fast software-oriented stream cipher. CoRR abs/0810.1858 (2008) - 2007
- [c4]François Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier:
X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs. INDOCRYPT 2007: 341-350 - [c3]Cédric Lauradoux:
From Hardware to Software Synthesis of Linear Feedback Shift Registers. IPDPS 2007: 1-8 - [c2]Philippe Gaborit, Cédric Lauradoux, Nicolas Sendrier:
SYND: a Fast Code-Based Stream Cipher with a Security Reduction. ISIT 2007: 186-190 - [i1]François Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier:
X-FCSR: a new software oriented stream cipher based upon FCSRs. IACR Cryptol. ePrint Arch. 2007: 380 (2007) - 2005
- [j1]Guillaume Duc, Ronan Keryell, Cédric Lauradoux:
CryptoPage : Support matériel pour cryptoprocessus. Tech. Sci. Informatiques 24(6): 667-701 (2005) - [c1]Cédric Lauradoux:
Collision attacks on processors with cache and countermeasures. WEWoRC 2005: 76-85
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-08 20:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint