A scalable and provably secure hash-based RFID protocol G Avoine, P Oechslin Third IEEE International Conference on Pervasive Computing and …, 2005 | 474 | 2005 |
Reducing time complexity in RFID systems G Avoine, E Dysli, P Oechslin Selected Areas in Cryptography: 12th International Workshop, SAC 2005 …, 2006 | 327 | 2006 |
RFID traceability: A multilayer problem G Avoine, P Oechslin Financial Cryptography and Data Security: 9th International Conference, FC …, 2005 | 318 | 2005 |
The swiss-knife RFID distance bounding protocol CH Kim, G Avoine, F Koeune, FX Standaert, O Pereira Information Security and Cryptology–ICISC 2008: 11th International …, 2009 | 235 | 2009 |
Adversarial model for radio frequency identification G Avoine Cryptology ePrint Archive, 2005 | 215 | 2005 |
A framework for analyzing RFID distance bounding protocols G Avoine, MA Bingöl, S Kardaş, C Lauradoux, B Martin Journal of Computer Security 19 (2), 289-317, 2011 | 155 | 2011 |
RFID distance bounding protocol with mixed challenges to prevent relay attacks CH Kim, G Avoine Cryptology and Network Security: 8th International Conference, CANS 2009 …, 2009 | 142 | 2009 |
An efficient distance bounding RFID authentication protocol: balancing false-acceptance rate and memory requirement G Avoine, A Tchamkerten Information Security: 12th International Conference, ISC 2009, Pisa, Italy …, 2009 | 135 | 2009 |
Browser fingerprinting: A survey P Laperdrix, N Bielova, B Baudry, G Avoine ACM Transactions on the Web (TWEB) 14 (2), 1-33, 2020 | 128 | 2020 |
Noisy tags: A pretty good key exchange protocol for RFID tags C Castelluccia, G Avoine Smart Card Research and Advanced Applications: 7th IFIP WG 8.8/11.2 …, 2006 | 121 | 2006 |
Cryptography in radio frequency identification and fair exchange protocols G Avoine Verlag nicht ermittelbar, 2005 | 118 | 2005 |
Privacy issues in RFID banknote protection schemes G Avoine Smart Card Research and Advanced Applications VI: IFIP 18th World Computer …, 2004 | 104 | 2004 |
Characterization and improvement of time-memory trade-off based on perfect tables G Avoine, P Junod, P Oechslin ACM Transactions on Information and System Security (TISSEC) 11 (4), 1-22, 2008 | 102 | 2008 |
Cryptographie-Théorie et pratique/2čme édition D Stinson, S Vaudenay, G Avoine, P Junod vuibert, 2003 | 102 | 2003 |
Adversary model for radio frequency identification G Avoine Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of …, 2005 | 94 | 2005 |
The Poulidor Distance-Bounding Protocol. R Trujillo-Rasua, B Martin, G Avoine RFIDSec 10, 239-257, 2010 | 75 | 2010 |
Time-memory trade-offs: False alarm detection using checkpoints G Avoine, P Junod, P Oechslin Progress in Cryptology-INDOCRYPT 2005: 6th International Conference on …, 2005 | 72 | 2005 |
Security and privacy in RFID systems G Avoine | 71* | 2006 |
Privacy-friendly authentication in RFID systems: on sublinear protocols based on symmetric-key cryptography G Avoine, MA Bingöl, X Carpent, SBO Yalcin IEEE Transactions on Mobile Computing 12 (10), 2037-2049, 2012 | 64 | 2012 |
Group-based private authentication G Avoine, L Buttyant, T Holczer, I Vajda 2007 IEEE International Symposium on a World of Wireless, Mobile and …, 2007 | 61 | 2007 |