Poh, Norman Bourlai, Thirimachos Kittler, Josef Allano, Lorene Alonso-Fernandez, Fernando Ambekar, Onkar Baker, John Dorizzi, Bernadette Fatukasi, Omolara Fierrez, Julian
...
Automatically verifying the identity of a person by means of biometrics (e.g., face and fingerprint) is an important application in our day-to-day activities such as accessing banking services and security control in airports. To increase the system reliability, several biometric devices are often used. Such a combined system is known as a multimod...
Heuser, Annelie Picek, Stjepan Guilley, Sylvain Mentens, Nele
Side-channel attacks represent a powerful category of attacks against cryptographic devices. Still, side-channel analysis for lightweight ciphers is much less investigated than for instance for AES. Although intuition may lead to the conclusion that lightweight ciphers are weaker in terms of side-channel resistance, that remains to be confirmed and...
Baillot, Patrick Barthe, Gilles Dal Lago, Ugo
We define a call-by-value variant of Gödel 's System T with references, and equip it with a linear dependent type and effect system, called d that can estimate the complexity of programs, as a function of the size of their inputs. We prove that the type system is intentionally sound, in the sense that it over-approximates the complexity of executin...
Olteanu, Alexandra-Mihaela Humbert, Mathias Huguenin, Kévin Hubaux, Jean-Pierre
Published in
Proceedings on Privacy Enhancing Technologies
Most popular location-based social networks, such as Facebook and Foursquare, let their (mobile) users post location and co-location (involving other users) information. Such posts bring social benefits to the users who post them but also to their friends who view them. Yet, they also represent a severe threat to the users’ privacy, as co-location ...
Coggia, Daniel Couvreur, Alain
We present a polynomial time attack of a rank metric code based encryption scheme due to Loidreau for some parameters.
Marteau, Pierre-François
This paper introduces a new similarity measure, the covering similarity, that we formally define for evaluating the similarity between a symbolic sequence and a set of symbolic sequences. A pair-wise similarity can also be directly derived from the covering similarity to compare two symbolic sequences. An efficient implementation to compute the cov...
Coggia, Daniel Couvreur, Alain
We present a polynomial time attack of a rank metric code based encryption scheme due to Loidreau for some parameters.
Coggia, Daniel Couvreur, Alain
We present a polynomial time attack of a rank metric code based encryption scheme due to Loidreau for some parameters.
Ninet, Tristan Legay, Axel Maillard, Romaric Traonouez, Louis-Marie Zendra, Olivier
In previous analyses IKEv2 has been shown to suffer from an authentication vulnerability that was considered not exploitable. By designing and implementing a novel slow Denial-of-Service attack, which we name the Deviation Attack, we show that the vulnerability is actually exploitable. We explain the attack's requirements, propose possible counterm...
Ninet, Tristan Legay, Axel Maillard, Romaric Traonouez, Louis-Marie Zendra, Olivier
In previous analyses IKEv2 has been shown to suffer from an authentication vulnerability that was considered not exploitable. By designing and implementing a novel slow Denial-of-Service attack, which we name the Deviation Attack, we show that the vulnerability is actually exploitable. We explain the attack's requirements, propose possible counterm...