default search action
Gildas Avoine
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Tristan Allard, Hira Asghar, Gildas Avoine, Christophe Bobineau, Pierre Cauchois, Elisa Fromont, Anna Monreale, Francesca Naretto, Roberto Pellungrini, Francesca Pratesi, Marie-Christine Rousset, Antonin Voyez:
Analyzing and explaining privacy risks on time series data: ongoing work and challenges. SIGKDD Explor. 26(1): 49-58 (2024) - [c48]Gildas Avoine, Xavier Carpent, Tristan Claverie, Christophe Devine, Diane Leblanc-Albarel:
Time-Memory Trade-Offs Sound the Death Knell for GPRS and GSM. CRYPTO (4) 2024: 206-240 - 2023
- [j20]Gildas Avoine, Xavier Carpent, Diane Leblanc-Albarel:
Rainbow Tables: How Far Can CPU Go? Comput. J. 66(12): 3029-3037 (2023) - [c47]Gildas Avoine, Xavier Carpent, Diane Leblanc-Albarel:
Stairway To Rainbow. AsiaCCS 2023: 286-299 - [c46]Tristan Claverie, Gildas Avoine, Stéphanie Delaune, José Lopes-Esteves:
Tamarin-Based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks. ESORICS (3) 2023: 100-119 - 2022
- [j19]Ghada Arfaoui, Gildas Avoine, Olivier Gimenez, Jacques Traoré:
ICRP: Internet-Friendly Cryptographic Relay-Detection Protocol. Cryptogr. 6(4): 52 (2022) - [c45]Antonin Voyez, Tristan Allard, Gildas Avoine, Pierre Cauchois, Élisa Fromont, Matthieu Simonin:
Membership Inference Attacks on Aggregated Time Series with Linear Programming. SECRYPT 2022: 193-204 - [i12]Antonin Voyez, Tristan Allard, Gildas Avoine, Pierre Cauchois, Élisa Fromont, Matthieu Simonin:
Unique in the Smart Grid -The Privacy Cost of Fine-Grained Electrical Consumption Data. CoRR abs/2211.07205 (2022) - 2021
- [c44]Ghada Arfaoui, Gildas Avoine, Olivier Gimenez, Jacques Traoré:
How Distance-Bounding Can Detect Internet Traffic Hijacking. CANS 2021: 355-371 - [c43]Gildas Avoine, Xavier Carpent, Diane Leblanc-Albarel:
Precomputation for Rainbow Tables has Never Been so Fast. ESORICS (2) 2021: 215-234 - [p1]Gildas Avoine, Ioana Boureanu, David Gérault, Gerhard P. Hancke, Pascal Lafourcade, Cristina Onete:
From Relay Attacks to Distance-Bounding Protocols. Security of Ubiquitous Computing Systems 2021: 113-130 - [e2]Gildas Avoine, Julio Hernandez-Castro:
Security of Ubiquitous Computing Systems. Springer International Publishing 2021, ISBN 978-3-030-10590-7 [contents] - 2020
- [j18]Pierre Laperdrix, Nataliia Bielova, Benoit Baudry, Gildas Avoine:
Browser Fingerprinting: A Survey. ACM Trans. Web 14(2): 8:1-8:33 (2020) - [c42]Gildas Avoine, Sébastien Canard, Loïc Ferreira:
Symmetric-Key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy. CT-RSA 2020: 199-224
2010 – 2019
- 2019
- [j17]Gildas Avoine, Muhammed Ali Bingöl, Ioana Boureanu, Srdjan Capkun, Gerhard P. Hancke, Süleyman Kardas, Chong Hee Kim, Cédric Lauradoux, Benjamin Martin, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen, Dave Singelée, Aslan Tchamkerten, Rolando Trujillo-Rasua, Serge Vaudenay:
Security of Distance-Bounding: A Survey. ACM Comput. Surv. 51(5): 94:1-94:33 (2019) - [c41]Pierre Laperdrix, Gildas Avoine, Benoit Baudry, Nick Nikiforakis:
Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas Fingerprinting. DIMVA 2019: 43-66 - [c40]Gildas Avoine, Sébastien Canard, Loïc Ferreira:
IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography. ESORICS (2) 2019: 463-483 - [i11]Pierre Laperdrix, Nataliia Bielova, Benoit Baudry, Gildas Avoine:
Browser Fingerprinting: A survey. CoRR abs/1905.01051 (2019) - [i10]Gildas Avoine, Sébastien Canard, Loïc Ferreira:
Symmetric-key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy. IACR Cryptol. ePrint Arch. 2019: 444 (2019) - [i9]Gildas Avoine, Sébastien Canard, Loïc Ferreira:
IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography. IACR Cryptol. ePrint Arch. 2019: 911 (2019) - 2018
- [j16]Gildas Avoine, Loïc Ferreira:
Attacking GlobalPlatform SCP02-compliant Smart Cards Using a Padding Oracle Attack. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2): 149-170 (2018) - [c39]Gildas Avoine, Loïc Ferreira:
Rescuing LoRaWAN 1.0. Financial Cryptography 2018: 253-271 - 2017
- [c38]Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger:
Memory carving can finally unveil your embedded personal data. ARES 2017: 18:1-18:9 - [c37]Gildas Avoine, Xavier Carpent, Barbara Kordy, Florent Tardif:
How to Handle Rainbow Tables with External Memory. ACISP (1) 2017: 306-323 - [c36]Gildas Avoine, Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, Jean-Marc Robert:
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol. AsiaCCS 2017: 800-814 - [c35]Gildas Avoine, Xavier Carpent:
Heterogeneous Rainbow Table Widths Provide Faster Cryptanalyses. AsiaCCS 2017: 815-822 - [c34]Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger:
Retrieving dates in smart card dumps is as hard as finding a needle in a haystack. WIFS 2017: 1-6 - [i8]Gildas Avoine, Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, Jean-Marc Robert:
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol. IACR Cryptol. ePrint Arch. 2017: 297 (2017) - 2016
- [j15]Gildas Avoine, Antonin Beaujeant, Julio C. Hernandez-Castro, Louis Demay, Philippe Teuwen:
A Survey of Security and Privacy Issues in ePassport Protocols. ACM Comput. Surv. 48(3): 47:1-47:37 (2016) - [j14]Gildas Avoine, Xavier Carpent, Julio C. Hernandez-Castro:
Pitfalls in Ultralightweight Authentication Protocol Designs. IEEE Trans. Mob. Comput. 15(9): 2317-2332 (2016) - [c33]Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger:
Memory Carving in Embedded Devices: Separate the Wheat from the Chaff. ACNS 2016: 592-608 - 2015
- [j13]Gildas Avoine, Sjouke Mauw, Rolando Trujillo-Rasua:
Comparing distance bounding protocols: A critical mission supported by decision theory. Comput. Commun. 67: 92-102 (2015) - [c32]Gildas Avoine, Adrien Bourgeois, Xavier Carpent:
Analysis of Rainbow Tables with Fingerprints. ACISP 2015: 356-374 - [c31]Gildas Avoine, Xavier Carpent, Cédric Lauradoux:
Interleaving Cryptanalytic Time-Memory Trade-Offs on Non-uniform Distributions. ESORICS (1) 2015: 165-184 - [i7]Gildas Avoine, Sjouke Mauw, Rolando Trujillo-Rasua:
Comparing Distance Bounding Protocols: a Critical Mission Supported by Decision Theory. CoRR abs/1503.04593 (2015) - 2014
- [j12]Gildas Avoine, Luca Calderoni, Jonathan Delvaux, Dario Maio, Paolo Palmieri:
Passengers information in public transport and privacy: Can anonymous tickets prevent tracking? Int. J. Inf. Manag. 34(5): 682-688 (2014) - [j11]Gildas Avoine, Iwen Coisel, Tania Martin:
Untraceability Model for RFID. IEEE Trans. Mob. Comput. 13(10): 2397-2405 (2014) - [j10]Rolando Trujillo-Rasua, Benjamin Martin, Gildas Avoine:
Distance Bounding Facing Both Mafia and Distance Frauds. IEEE Trans. Wirel. Commun. 13(10): 5690-5698 (2014) - [i6]Rolando Trujillo-Rasua, Benjamin Martin, Gildas Avoine:
Distance-bounding facing both mafia and distance frauds: Technical report. CoRR abs/1405.5704 (2014) - 2013
- [j9]Gregory Detal, Christoph Paasch, Simon van der Linden, Pascal Mérindol, Gildas Avoine, Olivier Bonaventure:
Revisiting flow-based load balancing: Stateless path selection in data center networks. Comput. Networks 57(5): 1204-1216 (2013) - [j8]Sergio Saponara, Agusti Solanas, Gildas Avoine, Bruno Neri:
Privacy and Security in Wireless Sensor Networks: Protocols, Algorithms, and Efficient Architectures. J. Comput. Networks Commun. 2013: 528750:1-528750:3 (2013) - [j7]Gildas Avoine, Chong Hee Kim:
Mutual Distance Bounding Protocols. IEEE Trans. Mob. Comput. 12(5): 830-839 (2013) - [j6]Gildas Avoine, Muhammed Ali Bingöl, Xavier Carpent, Siddika Berna Örs Yalçin:
Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography. IEEE Trans. Mob. Comput. 12(10): 2037-2049 (2013) - [c30]Gildas Avoine, Xavier Carpent:
Optimal Storage for Rainbow Tables. ICISC 2013: 144-157 - [c29]Gildas Avoine, Muhammed Ali Bingöl, Xavier Carpent, Süleyman Kardas:
Deploying OSK on Low-Resource Mobile Devices. RFIDSec 2013: 3-18 - [e1]Gildas Avoine, Orhun Kara:
Lightweight Cryptography for Security and Privacy - Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8162, Springer 2013, ISBN 978-3-642-40391-0 [contents] - 2012
- [j5]Gildas Avoine, Xavier Carpent, Benjamin Martin:
Privacy-friendly synchronized ultralightweight authentication protocols in the storm. J. Netw. Comput. Appl. 35(2): 826-843 (2012) - [c28]Gildas Avoine, Xavier Carpent:
Yet Another Ultralightweight Authentication Protocol That Is Broken. RFIDSec 2012: 20-30 - [c27]Gildas Avoine, Iwen Coisel, Tania Martin:
A privacy-restoring mechanism for offline RFID systems. WISEC 2012: 63-74 - 2011
- [j4]Gildas Avoine, Muhammed Ali Bingöl, Süleyman Kardas, Cédric Lauradoux, Benjamin Martin:
A framework for analyzing RFID distance bounding protocols. J. Comput. Secur. 19(2): 289-317 (2011) - [j3]Chong Hee Kim, Gildas Avoine:
RFID Distance Bounding Protocols with Mixed Challenges. IEEE Trans. Wirel. Commun. 10(5): 1618-1626 (2011) - [c26]Gildas Avoine:
Privacy Challenges in RFID. DPM/SETOP 2011: 1-8 - [c25]Gildas Avoine, Cédric Lauradoux, Benjamin Martin:
How secret-sharing can defeat terrorist fraud. WISEC 2011: 145-156 - [r2]Jean-Jacques Quisquater, Gildas Avoine:
Passport Security. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 913-916 - [r1]Gildas Avoine:
RFID Security. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1044-1045 - [i5]Gildas Avoine, Xavier Carpent:
Yet Another Ultralightweight Authentication Protocol that is Broken. IACR Cryptol. ePrint Arch. 2011: 691 (2011) - 2010
- [c24]Gildas Avoine, Xavier Carpent, Benjamin Martin:
Strong Authentication and Strong Integrity (SASI) Is Not That Strong. RFIDSec 2010: 50-64 - [c23]Gildas Avoine, Benjamin Martin, Tania Martin:
Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly. RFIDSec 2010: 103-122 - [c22]Gildas Avoine, Iwen Coisel, Tania Martin:
Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols. RFIDSec 2010: 138-157 - [c21]Orhun Kara, Süleyman Kardas, Muhammed Ali Bingöl, Gildas Avoine:
Optimal Security Limits of RFID Distance Bounding Protocols. RFIDSec 2010: 220-238 - [c20]Rolando Trujillo-Rasua, Benjamin Martin, Gildas Avoine:
The Poulidor Distance-Bounding Protocol. RFIDSec 2010: 239-257
2000 – 2009
- 2009
- [c19]Chong Hee Kim, Gildas Avoine:
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks. CANS 2009: 119-133 - [c18]Gildas Avoine, Christian Floerkemeier, Benjamin Martin:
RFID Distance Bounding Multistate Enhancement. INDOCRYPT 2009: 290-307 - [c17]Gildas Avoine, Aslan Tchamkerten:
An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement. ISC 2009: 250-261 - [c16]Gildas Avoine:
The Future Security Challenges in RFID. IWRT 2009: 3-6 - [c15]Gildas Avoine, Cédric Lauradoux, Tania Martin:
When Compromised Readers Meet RFID. WISA 2009: 36-50 - [i4]Chong Hee Kim, Gildas Avoine:
RFID distance bounding protocol with mixed challenges to prevent relay attacks. IACR Cryptol. ePrint Arch. 2009: 310 (2009) - 2008
- [j2]Gildas Avoine, Pascal Junod, Philippe Oechslin:
Characterization and Improvement of Time-Memory Trade-Off Based on Perfect Tables. ACM Trans. Inf. Syst. Secur. 11(4): 17:1-17:22 (2008) - [c14]Gildas Avoine, Kassem Kalach, Jean-Jacques Quisquater:
ePassport: Securing International Contacts with Contactless Chips. Financial Cryptography 2008: 141-155 - [c13]Chong Hee Kim, Gildas Avoine, François Koeune, François-Xavier Standaert, Olivier Pereira:
The Swiss-Knife RFID Distance Bounding Protocol. ICISC 2008: 98-115 - [i3]Gildas Avoine, Aslan Tchamkerten:
An Asymptotically Optimal RFID Authentication Protocol Against Relay Attacks. CoRR abs/0809.4183 (2008) - [i2]Gildas Avoine, Aslan Tchamkerten:
An asymptotically optimal RFID protocol against relay attacks. IACR Cryptol. ePrint Arch. 2008: 406 (2008) - 2007
- [b1]Gildas Avoine, Pascal Junod, Philippe Oechslin:
Computer system security - Basic Concepts and Solved Exercises. Computer and communication sciences, CRC Press 2007, ISBN 978-1-4200-4620-5, pp. I-XII, 1-260 - [j1]Gildas Avoine, Serge Vaudenay:
How to safely close a discussion. Inf. Process. Lett. 102(4): 138-142 (2007) - [c12]Gildas Avoine, Levente Buttyán, Tamás Holczer, István Vajda:
Group-Based Private Authentication. WOWMOM 2007: 1-6 - 2006
- [c11]Claude Castelluccia, Gildas Avoine:
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags. CARDIS 2006: 289-299 - 2005
- [c10]Gildas Avoine, Felix C. Gärtner, Rachid Guerraoui, Marko Vukolic:
Gracefully Degrading Fair Exchange with Security Modules. EDCC 2005: 55-71 - [c9]Gildas Avoine:
Fraud Within Asymmetric Multi-hop Cellular Networks. Financial Cryptography 2005: 1-15 - [c8]Gildas Avoine, Philippe Oechslin:
RFID Traceability: A Multilayer Problem. Financial Cryptography 2005: 125-140 - [c7]Gildas Avoine, Pascal Junod, Philippe Oechslin:
Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints. INDOCRYPT 2005: 183-196 - [c6]Gildas Avoine, Philippe Oechslin:
A Scalable and Provably Secure Hash-Based RFID Protocol. PerCom Workshops 2005: 110-114 - [c5]Gildas Avoine, Etienne Dysli, Philippe Oechslin:
Reducing Time Complexity in RFID Systems. Selected Areas in Cryptography 2005: 291-306 - [i1]Gildas Avoine:
Adversarial Model for Radio Frequency Identification. IACR Cryptol. ePrint Arch. 2005: 49 (2005) - 2004
- [c4]Gildas Avoine, Serge Vaudenay:
Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing. ACISP 2004: 74-85 - [c3]Gildas Avoine:
Privacy Issues in RFID Banknote Protection Schemes. CARDIS 2004: 33-48 - [c2]Gildas Avoine, Jean Monnerat, Thomas Peyrin:
Advances in Alternative Non-adjacent Form Representations. INDOCRYPT 2004: 260-274 - 2003
- [c1]Gildas Avoine, Serge Vaudenay:
Optimal Fair Exchange with Guardian Angels. WISA 2003: 188-202
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint