Serge Vaudenay

Results: 22



#Item
1Breaking The FF3 FormatPreserving Encryption Standard Over Small Domains F. Betül Durak Serge Vaudenay

Breaking The FF3 FormatPreserving Encryption Standard Over Small Domains F. Betül Durak Serge Vaudenay

Add to Reading List

Source URL: rwc.iacr.org

Language: English - Date: 2018-01-13 06:28:10
2Cryptanalysis of a Homomorphic Encryption Scheme Sonia Bogos⋆ , John Gaspoz and Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland {soniamihaela.bogos, john.gaspoz, serge.vaudenay}@epfl.ch

Cryptanalysis of a Homomorphic Encryption Scheme Sonia Bogos⋆ , John Gaspoz and Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland {soniamihaela.bogos, john.gaspoz, serge.vaudenay}@epfl.ch

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2016-08-11 10:52:27
    3On Privacy for RFID Serge Vaudenay ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE

    On Privacy for RFID Serge Vaudenay ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE

    Add to Reading List

    Source URL: security-lab.jaist.ac.jp

    - Date: 2015-11-22 02:25:28
      4Sound Proof of Proximity of Knowledge Serge Vaudenay ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE

      Sound Proof of Proximity of Knowledge Serge Vaudenay ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE

      Add to Reading List

      Source URL: security-lab.jaist.ac.jp

      Language: English - Date: 2015-11-22 02:25:24
      5TCHo: a hardware-oriented trapdoor cipher Jean-Philippe Aumasson Matthieu Finiasz, Willi Meier, Serge Vaudenay 1/1

      TCHo: a hardware-oriented trapdoor cipher Jean-Philippe Aumasson Matthieu Finiasz, Willi Meier, Serge Vaudenay 1/1

      Add to Reading List

      Source URL: 131002.net

      Language: English - Date: 2012-08-14 06:47:11
        6The Extended Access Control for Machine Readable Travel Documents∗ Rafik Chaabouni Serge Vaudenay

        The Extended Access Control for Machine Readable Travel Documents∗ Rafik Chaabouni Serge Vaudenay

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2010-02-25 03:13:51
          7Financial Cryptography and Data Security ’15 19th International Conference, January 26–30, 2015 InterContinental San Juan, Puerto Rico Paper Submission Deadline: September 15, 2014, 23:59 UTC (firm) Call for Papers F

          Financial Cryptography and Data Security ’15 19th International Conference, January 26–30, 2015 InterContinental San Juan, Puerto Rico Paper Submission Deadline: September 15, 2014, 23:59 UTC (firm) Call for Papers F

          Add to Reading List

          Source URL: fc15.ifca.ai

          Language: English - Date: 2014-06-25 10:02:50
          8- Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.

          - Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.

          Add to Reading List

          Source URL: security-lab.jaist.ac.jp

          Language: English - Date: 2015-11-09 21:16:55
          9Private and Secure Public-Key Distance Bounding Application to NFC Payment — Short Paper Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland http://lasec.epfl.ch

          Private and Secure Public-Key Distance Bounding Application to NFC Payment — Short Paper Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland http://lasec.epfl.ch

          Add to Reading List

          Source URL: fc15.ifca.ai

          Language: English - Date: 2015-01-11 00:32:58
          10- Call for papers The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: t.a

          - Call for papers The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: t.a

          Add to Reading List

          Source URL: security-lab.jaist.ac.jp

          Language: English - Date: 2015-08-13 01:39:17