default search action
Cristina Onete
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i25]Ghada Arfaoui, Thibaut Jacques, Cristina Onete:
Efficient and Privacy-Preserving Collective Remote Attestation for NFV. IACR Cryptol. ePrint Arch. 2024: 1232 (2024) - 2023
- [c28]Ghada Arfaoui, Thibaut Jacques, Marc Lacoste, Cristina Onete, Léo Robert:
Towards a Privacy-Preserving Attestation for Virtualized Networks. ESORICS (4) 2023: 351-370 - [c27]Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert:
How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment. USENIX Security Symposium 2023: 5917-5934 - [i24]Ghada Arfaoui, Thibaut Jacques, Marc Lacoste, Cristina Onete, Léo Robert:
Privacy-preserving Attestation for Virtualized Network Infrastructures. IACR Cryptol. ePrint Arch. 2023: 735 (2023) - 2022
- [c26]Ghada Arfaoui, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Adina Nedelcu, Cristina Onete, Léo Robert:
A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking. ACNS 2022: 399-418 - [c25]Xavier Bultel, Cristina Onete:
Pairing-free secure-channel establishment in mobile networks with fine-grained lawful interception. SAC 2022: 968-970 - [c24]Olivier Blazy, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Cristina Onete, Léo Robert:
MARSHAL: messaging with asynchronous ratchets and signatures for faster HeALing. SAC 2022: 1666-1673 - [i23]Olivier Blazy, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Cristina Onete, Léo Robert:
MARSHAL: Messaging with Asynchronous Ratchets and Signatures for faster HeALing. IACR Cryptol. ePrint Arch. 2022: 486 (2022) - [i22]Xavier Bultel, Cristina Onete:
Pairing-free secure-channel establishment in mobile networks with fine-grained lawful interception. IACR Cryptol. ePrint Arch. 2022: 1081 (2022) - [i21]Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert:
How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment. IACR Cryptol. ePrint Arch. 2022: 1090 (2022) - 2021
- [c23]Ghada Arfaoui, Olivier Blazy, Xavier Bultel, Pierre-Alain Fouque, Thibaut Jacques, Adina Nedelcu, Cristina Onete:
How to (Legally) Keep Secrets from Mobile Operators. ESORICS (1) 2021: 23-43 - [p1]Gildas Avoine, Ioana Boureanu, David Gérault, Gerhard P. Hancke, Pascal Lafourcade, Cristina Onete:
From Relay Attacks to Distance-Bounding Protocols. Security of Ubiquitous Computing Systems 2021: 113-130 - [i20]Ghada Arfaoui, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Adina Nedelcu, Cristina Onete, Léo Robert:
A Cryptographic View of Deep-Attestation, or how to do Provably-Secure Layer-Linking. IACR Cryptol. ePrint Arch. 2021: 1487 (2021) - 2020
- [c22]Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Thyla van der Merwe:
Designing Reverse Firewalls for the Real World. ESORICS (1) 2020: 193-213 - [i19]Ghada Arfaoui, Olivier Blazy, Xavier Bultel, Pierre-Alain Fouque, Adina Nedelcu, Cristina Onete:
Legally keeping secrets from mobile operators: Lawful Interception Key Exchange (LIKE). IACR Cryptol. ePrint Arch. 2020: 684 (2020) - [i18]Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Thyla van der Merwe:
Designing Reverse Firewalls for the Real World. IACR Cryptol. ePrint Arch. 2020: 854 (2020)
2010 – 2019
- 2019
- [j3]Ghada Arfaoui, Xavier Bultel, Pierre-Alain Fouque, Adina Nedelcu, Cristina Onete:
The privacy of the TLS 1.3 protocol. Proc. Priv. Enhancing Technol. 2019(4): 190-210 (2019) - [c21]Olivier Blazy, Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Elena Pagnin:
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting. EuroS&P 2019: 294-309 - [i17]Olivier Blazy, Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Elena Pagnin:
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting. IACR Cryptol. ePrint Arch. 2019: 367 (2019) - [i16]Ghada Arfaoui, Xavier Bultel, Pierre-Alain Fouque, Adina Nedelcu, Cristina Onete:
The privacy of the TLS 1.3 protocol. IACR Cryptol. ePrint Arch. 2019: 749 (2019) - 2018
- [c20]Nicolas Desmoulins, Pierre-Alain Fouque, Cristina Onete, Olivier Sanders:
Pattern Matching on Encrypted Streams. ASIACRYPT (1) 2018: 121-148 - [c19]Karthikeyan Bhargavan, Ioana Boureanu, Antoine Delignat-Lavaud, Pierre-Alain Fouque, Cristina Onete:
A Formal Treatment of Accountable Proxying Over TLS. IEEE Symposium on Security and Privacy 2018: 799-816 - 2017
- [c18]Gildas Avoine, Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, Jean-Marc Robert:
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol. AsiaCCS 2017: 800-814 - [c17]Karthikeyan Bhargavan, Ioana Boureanu, Pierre-Alain Fouque, Cristina Onete, Benjamin Richard:
Content delivery over TLS: a cryptographic analysis of keyless SSL. EuroS&P 2017: 1-6 - [c16]Ioana Boureanu, David Gérault, Pascal Lafourcade, Cristina Onete:
Breaking and fixing the HB+DB protocol. WISEC 2017: 241-246 - [i15]Olivier Sanders, Cristina Onete, Pierre-Alain Fouque:
Pattern Matching on Encrypted Streams: Applications to DPI and searches on genomic data. IACR Cryptol. ePrint Arch. 2017: 148 (2017) - [i14]Gildas Avoine, Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, Jean-Marc Robert:
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol. IACR Cryptol. ePrint Arch. 2017: 297 (2017) - [i13]Ioana Boureanu, David Gérault, Pascal Lafourcade, Cristina Onete:
Breaking and Fixing the HB+DB protocol. IACR Cryptol. ePrint Arch. 2017: 416 (2017) - [i12]Aikaterini Mitrokotsa, Cristina Onete, Elena Pagnin, Mahesh Perera:
Multi-Hop Distance Estimation: How Far are You? IACR Cryptol. ePrint Arch. 2017: 705 (2017) - 2016
- [j2]Pierre-Alain Fouque, Cristina Onete, Benjamin Richard:
Achieving Better Privacy for the 3GPP AKA Protocol. Proc. Priv. Enhancing Technol. 2016(4): 255-275 (2016) - [c15]Stéphanie Alt, Pierre-Alain Fouque, Gilles Macario-Rat, Cristina Onete, Benjamin Richard:
A Cryptographic Analysis of UMTS/LTE AKA. ACNS 2016: 18-35 - [c14]Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, Jean-Marc Robert:
A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol. WISEC 2016: 121-133 - [i11]Stéphanie Alt, Pierre-Alain Fouque, Gilles Macario-Rat, Benjamin Richard, Cristina Onete:
A Cryptographic Analysis of UMTS/LTE AKA. IACR Cryptol. ePrint Arch. 2016: 371 (2016) - [i10]Pierre-Alain Fouque, Cristina Onete, Benjamin Richard:
Achieving Better Privacy for the 3GPP AKA Protocol. IACR Cryptol. ePrint Arch. 2016: 480 (2016) - 2015
- [c13]Sébastien Gambs, Carlos Eduardo Rosar Kós Lassance, Cristina Onete:
The Not-so-Distant Future: Distance-Bounding Protocols on Smartphones. CARDIS 2015: 209-224 - [c12]Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi:
(De-)Constructing TLS 1.3. INDOCRYPT 2015: 85-102 - 2014
- [j1]Aikaterini Mitrokotsa, Cristina Onete, Serge Vaudenay:
Location leakage in distance bounding: Why location privacy does not work. Comput. Secur. 45: 199-209 (2014) - [c11]Sébastien Gambs, Cristina Onete, Jean-Marc Robert:
Prover anonymous and deniable distance-bounding authentication. AsiaCCS 2014: 501-506 - [c10]Caroline Fontaine, Sébastien Gambs, Julien Lolive, Cristina Onete:
Private Asymmetric Fingerprinting: A Protocol with Optimal Traitor Tracing Using Tardos Codes. LATINCRYPT 2014: 199-218 - [i9]Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi:
(De-)Constructing TLS. IACR Cryptol. ePrint Arch. 2014: 20 (2014) - [i8]Sébastien Gambs, Cristina Onete, Jean-Marc Robert:
Prover Anonymous and Deniable Distance-Bounding Authentication. IACR Cryptol. ePrint Arch. 2014: 114 (2014) - 2013
- [c9]Marc Fischlin, Cristina Onete:
Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance. ACNS 2013: 414-431 - [c8]Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete:
A Cryptographic Analysis of OPACITY - (Extended Abstract). ESORICS 2013: 345-362 - [c7]Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi:
Anonymity-Preserving Public-Key Encryption: A Constructive Approach. Privacy Enhancing Technologies 2013: 19-39 - [c6]Marc Fischlin, Cristina Onete:
Subtle kinks in distance-bounding: an analysis of prominent protocols. WISEC 2013: 195-206 - [c5]Jens Hermans, Roel Peeters, Cristina Onete:
Efficient, secure, private distance bounding without key updates. WISEC 2013: 207-218 - [i7]Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete:
A Cryptographic Analysis of OPACITY. IACR Cryptol. ePrint Arch. 2013: 234 (2013) - [i6]Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi:
Anonymity-preserving Public-Key Encryption: A Constructive Approach. IACR Cryptol. ePrint Arch. 2013: 238 (2013) - [i5]Aikaterini Mitrokotsa, Cristina Onete, Serge Vaudenay:
Location Leakage in Distance Bounding: Why Location Privacy does not Work. IACR Cryptol. ePrint Arch. 2013: 776 (2013) - 2012
- [c4]Aikaterini Mitrokotsa, Cristina Onete, Serge Vaudenay:
Mafia fraud attack against the RČ Distance-Bounding Protocol. RFID-TA 2012: 74-79 - [i4]Marc Fischlin, Cristina Onete:
Provably Secure Distance-Bounding: an Analysis of Prominent Protocols. IACR Cryptol. ePrint Arch. 2012: 128 (2012) - [i3]Cristina Onete:
Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy. IACR Cryptol. ePrint Arch. 2012: 165 (2012) - 2011
- [c3]Marc Fischlin, Cristina Onete:
Relaxed Security Notions for Signatures of Knowledge. ACNS 2011: 309-326 - [c2]Ulrich Dürholz, Marc Fischlin, Michael Kasper, Cristina Onete:
A Formal Approach to Distance-Bounding RFID Protocols. ISC 2011: 47-62 - [i2]Cristina Onete, Daniele Venturi:
Security & Indistinguishability in the Presence of Traffic Analysis. IACR Cryptol. ePrint Arch. 2011: 260 (2011) - [i1]Ulrich Dürholz, Marc Fischlin, Michael Kasper, Cristina Onete:
A Formal Approach to Distance-Bounding RFID Protocols. IACR Cryptol. ePrint Arch. 2011: 321 (2011) - 2010
- [c1]Christina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schröder:
Redactable Signatures for Tree-Structured Data: Definitions and Constructions. ACNS 2010: 87-104
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint