| A scalable and provably secure hash-based RFID protocol G Avoine, P Oechslin Third IEEE International Conference on Pervasive Computing and …, 2005 | 479 | 2005 |
| Reducing time complexity in RFID systems G Avoine, E Dysli, P Oechslin International workshop on selected areas in cryptography, 291-306, 2005 | 340 | 2005 |
| RFID traceability: A multilayer problem G Avoine, P Oechslin International Conference on Financial Cryptography and Data Security, 125-140, 2005 | 334 | 2005 |
| Browser fingerprinting: A survey P Laperdrix, N Bielova, B Baudry, G Avoine ACM Transactions on the Web (TWEB) 14 (2), 1-33, 2020 | 306 | 2020 |
| The swiss-knife RFID distance bounding protocol CH Kim, G Avoine, F Koeune, FX Standaert, O Pereira International conference on information security and cryptology, 98-115, 2008 | 248 | 2008 |
| Adversarial model for radio frequency identification G Avoine Cryptology ePrint Archive, 2005 | 222 | 2005 |
| A framework for analyzing RFID distance bounding protocols G Avoine, MA Bingöl, S Kardaş, C Lauradoux, B Martin Journal of Computer Security 19 (2), 289-317, 2011 | 171* | 2011 |
| RFID distance bounding protocol with mixed challenges to prevent relay attacks CH Kim, G Avoine International conference on cryptology and network security, 119-133, 2009 | 154 | 2009 |
| An efficient distance bounding RFID authentication protocol: Balancing false-acceptance rate and memory requirement G Avoine, A Tchamkerten International conference on information security, 250-261, 2009 | 149 | 2009 |
| Noisy tags: A pretty good key exchange protocol for RFID tags C Castelluccia, G Avoine International Conference on Smart Card Research and Advanced Applications …, 2006 | 125 | 2006 |
| Cryptography in radio frequency identification and fair exchange protocols G Avoine Verlag nicht ermittelbar, 2005 | 121 | 2005 |
| Characterization and improvement of time-memory trade-off based on perfect tables G Avoine, P Junod, P Oechslin ACM Transactions on Information and System Security (TISSEC) 11 (4), 1-22, 2008 | 117 | 2008 |
| Security of distance-bounding: A survey G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ... ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018 | 115 | 2018 |
| Privacy issues in RFID banknote protection schemes G Avoine Smart Card Research and Advanced Applications VI: IFIP 18th World Computer …, 2004 | 110 | 2004 |
| Adversary model for radio frequency identification G Avoine Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of …, 2005 | 99 | 2005 |
| The Poulidor distance-bounding protocol R Trujillo-Rasua, B Martin, G Avoine International Workshop on Radio Frequency Identification: Security and …, 2010 | 85 | 2010 |
| Security and privacy in RFID systems G Avoine | 75* | 2006 |
| Time-memory trade-offs: False alarm detection using checkpoints G Avoine, P Junod, P Oechslin International Conference on Cryptology in India, 183-196, 2005 | 75 | 2005 |
| Privacy-friendly authentication in RFID systems: on sublinear protocols based on symmetric-key cryptography G Avoine, MA Bingöl, X Carpent, SBO Yalcin IEEE Transactions on Mobile Computing 12 (10), 2037-2049, 2012 | 71 | 2012 |
| Symmetric-key authenticated key exchange (SAKE) with perfect forward secrecy G Avoine, S Canard, L Ferreira Cryptographers’ Track at the RSA Conference, 199-224, 2020 | 68 | 2020 |