Pr. Olivier Pereira

Address:ICTEAM/ELEN - Place du Levant 3, bte L5.03.02
Office:b.109
Voice:+32 (0) 10 47 91 63
Fax:+32 (0) 10 47 25 98
E-Mail:

Seminars given

April 25, 2007 - Foundations of Cryptography -- 1/4) Building secure systems: which foundations for cryptography?
by Pr. Jean-Jacques Quisquater , Pr. Olivier Pereira

May 02, 2007 - Foundations of Cryptography -- 2/4) More building blocks for cryptography
by Pr. Jean-Jacques Quisquater , Pr. Olivier Pereira

May 09, 2007 - Foundations of Cryptography -- 3/4) From blocks to buildings: composing cryptographic primitives
by Pr. Jean-Jacques Quisquater , Pr. Olivier Pereira

May 16, 2007 - Foundations of Cryptography -- 4/4) From buildings to cities: mechanizing cryptographic proofs
by Pr. Jean-Jacques Quisquater , Pr. Olivier Pereira

BibTeX - Pereira

Publications

Paolo Palmieri, and Olivier Pereira. Unconditionally Secure Oblivious Transfer from Real Network Behavior, 8th International Workshop on Security, IWSEC2013, Volume 8231 of Lecture Notes in Computer Science, pages 168--182, Springer, November 2013 PDF BibTeX

Édouard Cuvelier, Olivier Pereira, and Thomas Peters. Election Verifiability or Ballot Privacy : Do We Need to Choose?, In Crampton, Jason and Jajodia, Sushil and Mayes, Keith, editor(s), Computer Security – ESORICS 2013, Volume 8134 of Lecture Notes in Computer Science (LNCS), pages 481-498, Springer Berlin Heidelberg, September 2013 PDF BibTeX

François-Xavier Standaert, Olivier Pereira, and Yu Yu. Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions, Advances in Cryptology – CRYPTO 2013 , Lecture Notes in Computer Science, pages 335--352, August 2013, Full version from http://eprint.iacr.org/2013/370 PDF BibTeX

Susan Bell, Josh Benaloh, Mike Byrne, Dana DeBeauvoir, Bryce Eakin, Gail Fischer, Philip Kortum, Neal McBurnett, Julian Montoya, Michelle Parker, Olivier Pereira, Philip Stark, Dan Wallach, and Michael Winn. STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System, Volume 1, pages 18--37, Usenix, August 2013 PDF BibTeX

Abdelrahaman Aly, Édouard Cuvelier, Sophie Mawet, Olivier Pereira, and Mathieu Vanvyve. Securly Solving Simple Combinatorial Graph Problems, In Sadeghi, Ahmad-Reza, editor(s), Financial Cryptography and Data Security 2013, Volume 7859 of Lecture Notes in Computer Science (LNCS), pages 239-257, Springer Berlin Heidelberg, April 2013 PDF BibTeX

David Bernhard, Olivier Pereira, and Bogdan Warinschi. How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios, In X. Wang and K. Sako, editor(s), ASIACRYPT 2012, Volume 7658 of Lecture Notes in Computer Science, pages 626--643, Springer, December 2012 PDF BibTeX

David Bernhard, Veronique Cortier, Olivier Pereira, and Bogdan Warinschi. Measuring vote privacy, revisited, In Ting Yu and George Danezis and Virgil D. Gligor, editor(s), ACM Conference on Computer and Communications Security, pages 941-952, ACM, October 2012 PDF BibTeX

Paolo Palmieri, and Olivier Pereira. Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering, In Howon Kim, editor(s), 14th International Conference on Information Security and Cryptology (ICISC 2011), Volume 7259 of Lecture Notes in Computer Science (LNCS), pages 332–345, Springer, December 2011 PDF BibTeX

Laurie Haustenne, Quentin De Neyer, and Olivier Pereira. Elliptic Curve Cryptography in JavaScript, In G. Leander and F.-X. Standaert, editor(s), ECRYPT Workshop on Lightweight Cryptography, November 2011 PDF BibTeX

Paolo Palmieri, and Olivier Pereira. Secure Two-Party Computation Over a Z-Channel, In X. Boyen and X. Chen, editor(s), ProvSec 2011, Volume 6980 of Lecture Notes in Computer Science (LNCS), pages 3-15, Springer, October 2011 PDF BibTeX

David Bernhard, Veronique Cortier, Olivier Pereira, Ben Smyth, and Bogdan Warinschi. Adapting Helios for provable ballot privacy, In Vijay Atluri, Claudia Diaz, editor(s), Computer Security – ESORICS 2011, Lecture Notes in Computer Science, Springer, September 2011 PDF BibTeX

Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, and Yu Yu. Leftover Hash Lemma, Revisited, In Phillip Rogaway, editor(s), Advances in Cryptology - CRYPTO 2011, Volume 6841 of Lecture Notes in Computer Science (LNCS), pages 1-20, Springer-Verlag, August 2011 PDF BibTeX

Philippe Bulens, Damien Giry, and Olivier Pereira. Running Mixnet-Based Elections with Helios, In H. Shacham and V. Teague, editor(s), Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, Usenix, August 2011 BibTeX

Olivier Pereira. Leakage-resilient Stream Ciphers: an Overview, In Ralf Küsters, Michaël Rusinowitch, editor(s), 2011 Grande Region Security and Reliability Day, March 2011 PDF BibTeX

Sébastien Canard, Iwen Coisel, Giacomo de Meulenaer, and Olivier Pereira. Group Signatures are Suitable for Constrained Devices, ICISC 2010, Lecture Notes in Computer Science (LNCS), Springer, December 2010 PDF BibTeX

Sophie Mawet, Olivier Pereira, and Christophe Petit. Equitable cake cutting without mediator, In Svetla Nikova and Lejla Batina, editor(s), 5th Benelux Workshop on Information and System Security, November 2010 PDF BibTeX

François-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, and Elisabeth Oswald. Leakage Resilient Cryptography in Practice, In Towards Hardware Intrinsic Security: Foundation and Practice, pages 105-139, Springer, November 2010 BibTeX

Paolo Palmieri, and Olivier Pereira. Building Oblivious Transfer on Channel Delays, In X. Lai, M. Yung and D. Lin, editor(s), 6th China International Conference on Information Security and Cryptology (Inscrypt 2010), Volume 6584 of Lecture Notes in Computer Science (LNCS), pages 125-138, Springer, October 2010 PDF BibTeX

Yu Yu, François-Xavier Standaert, Olivier Pereira, and Moti Yung. Practical leakage-resilient pseudorandom generators, Proceedings of the 17th ACM conference on Computer and communications security, pages 141--151 , ACM, October 2010 PDF BibTeX

Stephanie Delaune, Steve Kremer, and Olivier Pereira. Simulation based security in the applied pi calculus, In R. Kannan and K. Kumar, editor(s), Foundations of Software Technology and Theoretical Computer Science - FSTTCS 2009, Leibniz International Proceedings in Informatics, December 2009 PDF BibTeX

Ben Adida, Olivier de Marneffe, Olivier Pereira, and Jean-Jacques Quisquater. Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios, In D. Jefferson, J.L. Hall, T. Moran, editor(s), Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, Usenix, August 2009 PDF BibTeX

Paolo Palmieri, and Olivier Pereira. Building Oblivious Transfer from communication delays, 30-th Symposium on Information Theory in the Benelux, May 2009 PDF BibTeX

Chong Hee Kim, Gildas Avoine, François Koeune, François-Xavier Standaert, and Olivier Pereira. The Swiss-Knife RFID Distance Bounding Protocol, The 11th International Conference on Information Security and Cryptology - ICISC 2008, Volume 5461 of Lecture Notes in Computer Science, pages 98-115, Springer-Verlag, December 2008 BibTeX

Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, and Joerg Schwenk. Universally Composable Security Analysis of TLS, 2nd International Conference on Provable Security (ProvSec 2008), Volume 5324 of LNCS, pages 313-327, Springer, October 2008 PDF BibTeX

Giacomo de Meulenaer, François Gosset, François-Xavier Standaert, and Olivier Pereira. On the Energy Cost of Communications and Cryptography in Wireless Sensor Networks, (extended version), IEEE International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications (SecPriWiMob'2008), pages 580 - 585, October 2008 PDF BibTeX

Ran Canetti, Ling Cheung, Dilsun Kaynar, Nancy Lynch, and Olivier Pereira. Modeling Computational Security in Long-Lived Systems, In van Breugel, Franck; Chechik, Marsha, editor(s), CONCUR 2008 - Concurrency Theory, Volume 5201 of LNCS, Springer, August 2008 PDF BibTeX

Ben Adida, and Olivier Pereira. Proceedings of WOTE 2008 -- IAVoSS Workshop On Trustworthy Elections , July 2008 BibTeX

Christophe Petit, François-Xavier Standaert, Olivier Pereira, Tal G. Malkin, and Moti Yung. A Block Cipher based Pseudo Random Number Generator Secure Against Side-Channel Key Recovery, In M. Abe and V. Gligor, editor(s), ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications security, pages 56--65, ACM, March 2008 PDF BibTeX

Olivier Pereira, Nancy Lynch, Moses Liskov, Dilsun Kaynar, Ling Cheung, Roberto Segala, and Ran Canetti. Analyzing Security Protocols Using Time-Bounded Task-PIOAs, In Discrete Event Dynamic Systems, Volume 18-1, pages 111-159, March 2008 PDF BibTeX

Olivier de Marneffe, Olivier Pereira, and Jean-Jacques Quisquater. Simulation-Based Analysis of E2E Voting Systems, In A. Alkassar and M. Volkamer, editor(s), Proceedings of the First Conference on E-Voting and Identity (VOTE-ID 2007), Volume 4896 of Lecture Notes in Computer Science, pages 137-149, Springer, November 2007 BibTeX

Ran Canetti, Ling Cheung, Dilsun Kaynar, Nancy Lynch, and Olivier Pereira. Compositional Security for Task-PIOAs, In A. Sabelfeld, editor(s), Proceedings of the 20th IEEE Computer Security Foundations Symposium, pages 125-139, IEEE Computer Society Press, July 2007 BibTeX

Tadashi Araragi, and Olivier Pereira. Automatic Verification of Simulatability in Security Protocols, In M. Backes and Y. Lakhnech, editor(s), Workshop on Formal and Computational Cryptography - FCC 2007, July 2007, To appear BibTeX

Ran Canetti, Ling Cheung, Nancy Lynch, and Olivier Pereira. On the Role of Scheduling in Simulation-Based Security, In R. Focardi, editor(s), Proceedings of the 7th International Workshop on Issues in the Theory of Security (WITS 2007), pages 22--37, March 2007 BibTeX

Ran Canetti, Ling Cheung, Dilsun Kaynar, Moses Liskov, Nancy Lynch, Olivier Pereira, and Roberto Segala. Time-bounded Task-PIOAs: A Framework for Analyzing Security Protocols, In S. Dolev, editor(s), 20th International Symposium on Distributed Computing (DISC 2006), Volume 4167 of LNCS, pages 238--253, Springer, September 2006, Invited paper BibTeX

Ran Canetti, Ling Cheung, Dilsun Kaynar, Moses Liskov, Nancy Lynch, Olivier Pereira, and Roberto Segala. Formal and computational analysis of cryptographic protocols based on task-PIOAs, In Tsutomu Sekiguchi, editor(s), 2006 Workshop on Cryptography and Related Mathematics, pages 151--158, August 2006 BibTeX

Ran Canetti, Ling Cheung, Dilsun Kaynar, Moses Liskov, Nancy Lynch, Olivier Pereira, and Roberto Segala. Task-Structured Probabilistic I/O Automata, Proceedings the 8th International Workshop on Discrete Event Systems (WODES'06), pages 207-214, IEEE, July 2006 BibTeX

Ran Canetti, Ling Cheung, Dilsun Kaynar, Moses Liskov, Nancy Lynch, Olivier Pereira, and Roberto Segala. Using Task-Structured Probabilistic I/O Automata to Analyze Cryptographic Protocols, In V. Cortier, S. Kremer, editor(s), Workshop on Formal and Computational Cryptography - FCC 2006, pages 34--39, July 2006 BibTeX

Olivier Pereira, and Jean-Jacques Quisquater. On the Impossibility of Building Secure Cliques-type Authenticated Group Key Agreement Protocols, In Journal of Computer Security, Volume 14-2, pages 197 - 246, May 2006 PDF BibTeX

Ran Canetti, Dilsun Kaynar, Ling Cheung, Moses Liskov, Nancy Lynch, Olivier Pereira, and Roberto Segala. Using Probabilistic I/O Automata to Improve the Analysis of Cryptographic Protocols., In ERCIM News-63, pages 40--41, October 2005 BibTeX

Olivier Pereira, and Jean-Jacques Quisquater. Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols, Proceedings of the 17-th IEEE Computer Security Foundations Workshop -- CSFW-17, pages 16-29, IEEE Computer Society Press, June 2004 PDF BibTeX

Olivier Pereira, and Jean-Jacques Quisquater. An attack against Barua et al. authenticated group key agreement protocol, October 2003 PDF BibTeX

Olivier Pereira, and Jean-Jacques Quisquater. Some attacks upon authenticated group key agreement protocols, In Journal of Computer Security, Volume 11-4, pages 555-580, September 2003 PDF BibTeX

Emmanuel Bresson, Olivier Chevassut, Olivier Pereira, David Pointcheval, and Jean-Jacques Quisquater. Two Formal Views of Authenticated Group Diffie-Hellman Key Exchange, DIMACS Workshop on Cryptographic Protocols in Complex Environments, May 2002 PDF BibTeX

Olivier Pereira, and Laurence Wolsey. On the Wagner-Whitin lot-sizing polyhedron, In Mathematics of Operations Research, Volume 26-3, pages 591-600, August 2001 PDF BibTeX

Olivier Pereira, and Jean-Jacques Quisquater. A Security Analysis of the Cliques Protocols Suites, Proceedings of the 14th IEEE Computer Security Foundations Workshop, pages 73-81, IEEE Computer Society Press, June 2001 PDF BibTeX

Olivier Pereira, and Jean-Jacques Quisquater. Security Analysis of the Cliques Protocols Suites: 1st Results, Proceedings of IFIP Sec'01, pages 151-166, Kluwer Publishers, June 2001 PDF BibTeX

Olivier Pereira, and Jean-Jacques Quisquater. On the Perfect Encryption Assumption, In P. Degano, editor(s), Proceedings of the Workshop on Issues in the Theory of Security (WITS 2000), pages 42-45, July 2000 PDF BibTeX

Copyright Notice

(click here to expand/retract)