Cristina Onete
Publications
Publications in cryptography:- O. Blazy, I. Boureanu, P. Lafourcade, C. Onete, L. Robert: How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment Published at USENIX Security Symposium. Full paper
- G. Arfaoui, T. Jacques, M. Lacoste, C. Onete, L. Robert: Privacy-preserving Attestation for Virtualized Network Infrastructures Accepted at ESORICS 2023. Full paper
- X. Bultel, C. Onete: Pairing-free secure-channel establishment in mobile networks with fine-grained lawful interception Published (short) at SAC 2022. Full paper
- O. Blazy, P.-A. Fouque, T. Jacques, P. Lafourcade, C. Onete, L. Robert: MARSHAL: Messaging with Asynchronous Ratchets and Signatures for faster HeALing , Published at SAC 2022. Full paper
- G. Arfaoui, P.-A. Fouque, T. Jacques, P. Lafourcade, A. Nedelcu, C. Onete, L. Robert: A cryptographic view of deep-attestation, or how to do provably-secure layer-linking , Published at ACNS 2022.Full paper
- G. Arfaoui, O. Blazy, X. Bultel, P.-A. Fouque, T. Jacques, A. Nedelcu, C. Onete: How to (legally) keep secrets from mobile operators , Published at ESORICS 2021. Full paper
- A. Bossuat, X. Bultel, P.-A. Fouque, C. Onete, T. van der Merwe: Designing Reverse Firewalls for the Real World , Published at ESORICS 2020. Full paper
- G. Arfaoui, X. Bultel, P.-A. Fouque, A. Nedelcu, C. Onete: The privacy of the TLS 1.3 protocol , Published at PoPETS 2019 (4). Full paper
- O. Blazy, A. Bossuat, X. Bultel, P.-A. Fouque, C. Onete, E. Pagnin: SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting, Published at Euro S & P 2019. Full paper
- N. Desmoulins, P.-A. Fouque, C. Onete, O. Sanders: Pattern Matching on Encrypted Streams . Proceedings of Asiacrypt 2018. Full paper
- K. Bhargavan, I. Boureanu, A. Delignat-Lavaud, P.A. Fouque, C. Onete: A formal treatment of accountable proxying over TLS . Published at S & P 2018. Full paper
- I. Boureanu, D. Gerault, P. Lafourcade, C. Onete: Breaking and fixing the HB+DB protocol. Proceedings of WiSec 2017. ACM Full paper
- G. Avoine, X. Bultel, D. Gerault, S. Gambs, P. Lafourcade, C. Onete, J.-M. Robert: A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol. Proceedings of AsiaCCS 2017. Full paper
- K. Bhargavan, I. Boureanu, P.-A. Fouque, C. Onete, and B. Richard: Content Delivery over TLS: A cryptographic analysis of Keyless SSL. Proceedings of EURO S&P 2017.IEEE
- S. Alt, P.-A. Fouque, G. Macario-Rat, C. Onete, and B. Richard: A Cryptographic Analysis of UMTS/LTE AKA Protocol. Proceedings of ACNS 2016. Springer
- X. Bultel, S. Gambs, D. Gerault, P. Lafourcade, C. Onete, and J.-M. Robert: A Prover-Anonymous and Terrorist-Fraud Resistant Distance Bounding Protocol. Proceedings of WiSec 2016. ACMFull paper
- P.-A. Fouque, C. Onete, and B. Richard: Achieving Better Privacy for the 3GPP AKA Protocol. PoPETS 2016. De Gruyter
- M. Kohlweiss, U. Maurer, C. Onete, B. Tackmann, and D. Venturi: TLS 1.3 — Ready or Not?. TRON 1.0, 2016.
- S. Gambs, M.-O. Killijian, C. Lauradoux, C. Onete, M. Roy, and M. Traoré: VSSDB: A Verifiable Secret-Sharing and Distance-Bounding Protocol. Will appear in proceedings of BalkanCryptSec 2015.
- A. Mitrokotsa, C. Onete, S. Vaudenay: Mafia Fraud Attack against the RC Distance-Bounding Protocol. Conference on RFID-Technologies and Applications RFID-TA'12 IEEEFull paper
- C. Fontaine, S. Gambs, J. Lolive, C. Onete: Private Asymmetric Fingerprinting: a Protocol with Optimal Traitor Tracing using Tardos Codes, Accepted to LatinCrypt 2014.
- S. Gambs, C. Onete, and J.M. Robert: Prover Anonymous and Deniable Distance-Bounding Authentication. Proceedings of AsiaCCS 2014, pp. 501-506 ePrintACM
- M. Kohlweiss, U. Maurer, C. Onete, B. Tackmann, D. Venturi: (De-)Constructing TLS. Accepted at Indocrypt 2015. ePrint
- Ö. Dagdelen, M. Fischlin, T. Gagliardoni, G. A. Marson, A. Mittelbach, and C. Onete: A Cryptographic Analysis of OPACITY. Ext. abstract, ESORICS 2013, pp. 345-362 SpringerePrint (full version)
- A. Mitrokotsa, C. Onete, and S. Vaudenay: Location Leakage in Distance Bounding: Why Location Privacy does not Work. ePrint
- M. Fischlin and C. Onete: Terrorism in Distance Bounding: Modeling Terrorist Fraud Resistance. ACNS 2013, pp. 414-431. SpringerFull paper
- M. Kohlweiss, U. Maurer, C. Onete, B. Tackmann, and D. Venturi: Anonymity-preserving Public-Key Encryption: A Constructive Perspective. Ext. abstract, PETS 2013, pp. 19-39. SpringerePrint (full version)
- M. Fischlin and C. Onete: Subtle Kinks in Distance-Bounding: an Analysis of Prominent Protocols. WiSec 2013, pp. 195–206. ACMePrint
- J. Hermans, R. Peeters, and C. Onete: Efficient, Secure, Private Distance Bounding without Key Updates. WiSec 2013, pp. 207–218. ACMFull paper
- C. Onete: Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy. ePrint
- M. Fischlin and C. Onete: RFID Distance-Bounding: What is Wrong and How to Fix it. Accepted to 5th MPICC Interdisciplinary Conference on Current Issues in IT Security, 2012. Full paper
- C. Onete and D. Venturi: Security & Indistinguishability in the Presence of Traffic Analysis ePrint
- U. Dürholz, M. Fischlin, M. Kasper, and C. Onete: A Formal Approach to Distance-Bounding RFID Protocols. ISC 2011, pp. 47–64. SpringerePrint (full version)
- M. Fischlin and C. Onete: Relaxed Security Notions for Signatures of Knowledge. ACNS 2011, pp. 309–326. SpringerFull paper
- C. Brzuska, H. Busch, Ö. Dagdelen, M. Fischlin, M. Franz, S. Katzenbeisser, M. Manulis, C. Onete, A. Peter, B. Poettering, and D. Schröder: Redactable Signatures for Tree-Structured Data: Definitions and Constructions. ACNS 2010, pp. 87–104. SpringerFull paper
- C.N. Onete and C. Onete: Building Hamiltonian Networks Using the Cycles Laplacian of the Underlying Graph. ISCAS 2015 (Accepted, will appear in proceedings).
- C.N. Onete and C. Onete: Finding ground traces using the laplacian of the meshes of the associated graph. SOCC 2013. IEEE
- C.N. Onete and C. Onete: Finding spanning trees and Hamiltonian circuits in an un-oriented graph: an algebraic approach. ECCTD 2011. IEEE
- C. Onete and C.N. Onete: A novel condition for Hamiltonicity; constructing Hamiltonian Circuits. EUROCON 2011. IEEE
- C.N. Onete and C. Onete: Enumerating all the spanning trees in an un-oriented graph – a Novel approach. SM2ACD 2010. IEEE
- C.N. Onete and C. Onete: Indefinite Matrices of Linear Electric Circuits, their Pseudoinverses, and Applications in Related Fields. IEEE
Copyright © 2012–2018 — Cristina Onete