| Redactable signatures for tree-structured data: Definitions and constructions C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ... International Conference on Applied Cryptography and Network Security, 87-104, 2010 | 156 | 2010 |
| A formal approach to distance-bounding RFID protocols U Dürholz, M Fischlin, M Kasper, C Onete International Conference on Information Security, 47-62, 2011 | 89 | 2011 |
| The privacy of the TLS 1.3 protocol G Arfaoui, X Bultel, PA Fouque, A Nedelcu, C Onete Cryptology ePrint Archive, 2019 | 71 | 2019 |
| Achieving better privacy for the 3GPP AKA protocol PA Fouque, C Onete, B Richard Cryptology ePrint Archive, 2016 | 68 | 2016 |
| Terrorism in distance bounding: modeling terrorist-fraud resistance M Fischlin, C Onete International conference on applied cryptography and network security, 414-431, 2013 | 62 | 2013 |
| A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol G Avoine, X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, ... Proceedings of the 2017 ACM on Asia conference on computer and …, 2017 | 54 | 2017 |
| A cryptographic analysis of umts/lte aka S Alt, PA Fouque, G Macario-Rat, C Onete, B Richard International Conference on Applied Cryptography and Network Security, 18-35, 2016 | 48 | 2016 |
| Efficient, secure, private distance bounding without key updates J Hermans, R Peeters, C Onete Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013 | 48 | 2013 |
| Prover anonymous and deniable distance-bounding authentication S Gambs, C Onete, JM Robert Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 46 | 2014 |
| Pattern matching on encrypted streams N Desmoulins, PA Fouque, C Onete, O Sanders International Conference on the Theory and Application of Cryptology and …, 2018 | 43 | 2018 |
| Content delivery over TLS: a cryptographic analysis of keyless SSL K Bhargavan, I Boureanu, PA Fouque, C Onete, B Richard 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 1-16, 2017 | 43 | 2017 |
| A formal treatment of accountable proxying over TLS K Bhargavan, I Boureanu, A Delignat-Lavaud, PA Fouque, C Onete 2018 IEEE Symposium on Security and Privacy (SP), 799-816, 2018 | 42 | 2018 |
| Mafia fraud attack against the rč distance-bounding protocol A Mitrokotsa, C Onete, S Vaudenay 2012 IEEE International Conference on RFID-Technologies and Applications …, 2012 | 36 | 2012 |
| (De-) constructing TLS 1.3 M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi International Conference on Cryptology in India, 85-102, 2015 | 30 | 2015 |
| A prover-anonymous and terrorist-fraud resistant distance-bounding protocol X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, JM Robert Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016 | 28 | 2016 |
| (De-) Constructing TLS M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi Cryptology ePrint Archive, 2014 | 28 | 2014 |
| Designing reverse firewalls for the real world A Bossuat, X Bultel, PA Fouque, C Onete, T van Der Merwe European Symposium on Research in Computer Security, 193-213, 2020 | 26 | 2020 |
| A cryptographic analysis of OPACITY Ö Dagdelen, M Fischlin, T Gagliardoni, GA Marson, A Mittelbach, C Onete European Symposium on Research in Computer Security, 345-362, 2013 | 26 | 2013 |
| Anonymity-preserving public-key encryption: A constructive approach M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi International Symposium on Privacy Enhancing Technologies Symposium, 19-39, 2013 | 26 | 2013 |
| Subtle kinks in distance-bounding: an analysis of prominent protocols M Fischlin, C Onete Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013 | 25 | 2013 |