Lightweight swarm attestation: A tale of two lisa-s X Carpent, K ElDefrawy, N Rattanavipanon, G Tsudik Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 97 | 2017 |
Privacy-friendly authentication in RFID systems: on sublinear protocols based on symmetric-key cryptography G Avoine, MA Bingöl, X Carpent, SBO Yalcin IEEE Transactions on Mobile Computing 12 (10), 2037-2049, 2013 | 71 | 2013 |
ERASMUS: Efficient remote attestation via self-measurement for unattended settings X Carpent, G Tsudik, N Rattanavipanon 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2018 | 65 | 2018 |
Privacy-friendly synchronized ultralightweight authentication protocols in the storm G Avoine, X Carpent, B Martin Journal of Network and Computer Applications 35 (2), 826-843, 2012 | 57 | 2012 |
Remote attestation of IoT devices via SMARM: Shuffled measurements against roving malware X Carpent, N Rattanavipanon, G Tsudik 2018 IEEE international symposium on hardware oriented security and trust …, 2018 | 53 | 2018 |
Yet another ultralightweight authentication protocol that is broken G Avoine, X Carpent Radio Frequency Identification. Security and Privacy Issues: 8th …, 2013 | 50 | 2013 |
Strong authentication and strong integrity (SASI) is not that strong G Avoine, X Carpent, B Martin Radio Frequency Identification: Security and Privacy Issues: 6th …, 2010 | 50 | 2010 |
Pitfalls in ultralightweight authentication protocol designs G Avoine, X Carpent, J Hernandez-Castro IEEE Transactions on Mobile Computing 15 (9), 2317-2332, 2016 | 35 | 2016 |
Reconciling remote attestation and safety-critical operation on simple iot devices X Carpent, K Eldefrawy, N Rattanavipanon, AR Sadeghi, G Tsudik Proceedings of the 55th Annual Design Automation Conference, 1-6, 2018 | 29 | 2018 |
Temporal consistency of integrity-ensuring computations and applications to embedded systems security X Carpent, K Eldefrawy, N Rattanavipanon, G Tsudik Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 26 | 2018 |
Analysis of rainbow tables with fingerprints G Avoine, A Bourgeois, X Carpent Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015 | 17 | 2015 |
Optimal storage for rainbow tables G Avoine, X Carpent Information Security and Cryptology--ICISC 2013: 16th International …, 2014 | 16 | 2014 |
Heterogeneous rainbow table widths provide faster cryptanalyses G Avoine, X Carpent Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 11 | 2017 |
Remote attestation via self-measurement X Carpent, N Rattanavipanon, G Tsudik ACM Transactions on Design Automation of Electronic Systems (TODAES) 24 (1 …, 2018 | 10 | 2018 |
Private set projections & variants X Carpent, S Faber, T Sander, G Tsudik Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, 87-98, 2017 | 9 | 2017 |
Efficient privacy-preserving aggregation for demand side management of residential loads EJ Palacios-Garcia, X Carpent, JW Bos, G Deconinck Applied Energy 328, 120112, 2022 | 8 | 2022 |
How to handle rainbow tables with external memory G Avoine, X Carpent, B Kordy, F Tardif Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017 | 8 | 2017 |
Interleaving cryptanalytic time-memory trade-offs on non-uniform distributions G Avoine, X Carpent, C Lauradoux Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 8 | 2015 |
Precomputation for rainbow tables has never been so fast G Avoine, X Carpent, D Leblanc-Albarel Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021 | 7 | 2021 |
Deploying OSK on low-resource mobile devices G Avoine, MA Bingöl, X Carpent, S Kardaş Radio Frequency Identification: Security and Privacy Issues 9th …, 2013 | 7 | 2013 |