What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Cristina Onete
Google Scholar
ORCID:
0009-0009-4638-0639
26
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/asiaccs
Post-Compromise Security with Application-Level Key-Controls - with a comprehensive study of the 5G AKMA protocol.
Ioana Boureanu
Cristina Onete
Stephan Wesemeyer
Léo Robert
Rhys Miller
Pascal Lafourcade
Fortunat Rajaona
2025
conf/esorics
Fine-Grained, Privacy-Augmenting LI-Compliance in the LAKE Standard.
Pascal Lafourcade
Elsa López Pérez
Charles Olivier-Anclin
Cristina Onete
Clément Papon
Malisa Vucinic
2023
conf/uss
How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment.
Olivier Blazy
Ioana Boureanu
Pascal Lafourcade
Cristina Onete
Léo Robert
2023
conf/esorics
Towards a Privacy-Preserving Attestation for Virtualized Networks.
Ghada Arfaoui
Thibaut Jacques
Marc Lacoste
Cristina Onete
Léo Robert
2022
conf/acns
A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking.
Ghada Arfaoui
Pierre-Alain Fouque
Thibaut Jacques
Pascal Lafourcade
Adina Nedelcu
Cristina Onete
Léo Robert
2021
conf/esorics
How to (Legally) Keep Secrets from Mobile Operators.
Ghada Arfaoui
Olivier Blazy
Xavier Bultel
Pierre-Alain Fouque
Thibaut Jacques
Adina Nedelcu
Cristina Onete
2020
conf/esorics
Designing Reverse Firewalls for the Real World.
Angèle Bossuat
Xavier Bultel
Pierre-Alain Fouque
Cristina Onete
Thyla van der Merwe
2019
journals/popets
The privacy of the TLS 1.3 protocol.
Ghada Arfaoui
Xavier Bultel
Pierre-Alain Fouque
Adina Nedelcu
Cristina Onete
2019
conf/eurosp
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting.
Olivier Blazy
Angèle Bossuat
Xavier Bultel
Pierre-Alain Fouque
Cristina Onete
Elena Pagnin
2018
conf/sp
A Formal Treatment of Accountable Proxying Over TLS.
Karthikeyan Bhargavan
Ioana Boureanu
Antoine Delignat-Lavaud
Pierre-Alain Fouque
Cristina Onete
2018
conf/asiacrypt
Pattern Matching on Encrypted Streams.
Nicolas Desmoulins
Pierre-Alain Fouque
Cristina Onete
Olivier Sanders
2017
conf/ccs
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol.
Gildas Avoine
Xavier Bultel
Sébastien Gambs
David Gérault
Pascal Lafourcade
Cristina Onete
Jean-Marc Robert
2017
conf/eurosp
Content delivery over TLS: a cryptographic analysis of keyless SSL.
Karthikeyan Bhargavan
Ioana Boureanu
Pierre-Alain Fouque
Cristina Onete
Benjamin Richard
2017
conf/wisec
Breaking and fixing the HB+DB protocol.
Ioana Boureanu
David Gérault
Pascal Lafourcade
Cristina Onete
2016
journals/popets
Achieving Better Privacy for the 3GPP AKA Protocol.
Pierre-Alain Fouque
Cristina Onete
Benjamin Richard
2016
conf/acns
A Cryptographic Analysis of UMTS/LTE AKA.
Stéphanie Alt
Pierre-Alain Fouque
Gilles Macario-Rat
Cristina Onete
Benjamin Richard
2016
conf/wisec
A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol.
Xavier Bultel
Sébastien Gambs
David Gérault
Pascal Lafourcade
Cristina Onete
Jean-Marc Robert
2014
journals/compsec
Location leakage in distance bounding: Why location privacy does not work.
Aikaterini Mitrokotsa
Cristina Onete
Serge Vaudenay
2014
conf/latincrypt
Private Asymmetric Fingerprinting: A Protocol with Optimal Traitor Tracing Using Tardos Codes.
Caroline Fontaine
Sébastien Gambs
Julien Lolive
Cristina Onete
2014
conf/ccs
Prover anonymous and deniable distance-bounding authentication.
Sébastien Gambs
Cristina Onete
Jean-Marc Robert
2013
conf/acns
Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance.
Marc Fischlin
Cristina Onete
2013
conf/esorics
A Cryptographic Analysis of OPACITY - (Extended Abstract).
Özgür Dagdelen
Marc Fischlin
Tommaso Gagliardoni
Giorgia Azzurra Marson
Arno Mittelbach
Cristina Onete
2013
conf/wisec
Subtle kinks in distance-bounding: an analysis of prominent protocols.
Marc Fischlin
Cristina Onete
2013
conf/wisec
Efficient, secure, private distance bounding without key updates.
Jens Hermans
Roel Peeters
Cristina Onete
2011
conf/acns
Relaxed Security Notions for Signatures of Knowledge.
Marc Fischlin
Cristina Onete
2010
conf/acns
Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
Christina Brzuska
Heike Busch
Özgür Dagdelen
Marc Fischlin
Martin Franz
Stefan Katzenbeisser
Mark Manulis
Cristina Onete
Andreas Peter
Bertram Poettering
Dominique Schröder
Coauthors
Adina Nedelcu
(3)
Aikaterini Mitrokotsa
(1)
Andreas Peter
(1)
Angèle Bossuat
(2)
Antoine Delignat-Lavaud
(1)
Arno Mittelbach
(1)
Benjamin Richard
(3)
Bertram Poettering
(1)
Caroline Fontaine
(1)
Charles Olivier-Anclin
(1)
Christina Brzuska
(1)
Clément Papon
(1)
Cristina Onete
(26)
David Gérault
(3)
Dominique Schröder
(1)
Elena Pagnin
(1)
Elsa López Pérez
(1)
Fortunat Rajaona
(1)
Ghada Arfaoui
(4)
Gildas Avoine
(1)
Gilles Macario-Rat
(1)
Giorgia Azzurra Marson
(1)
Heike Busch
(1)
Ioana Boureanu
(5)
Jean-Marc Robert
(3)
Jens Hermans
(1)
Julien Lolive
(1)
Karthikeyan Bhargavan
(2)
Léo Robert
(4)
Malisa Vucinic
(1)
Marc Fischlin
(5)
Marc Lacoste
(1)
Mark Manulis
(1)
Martin Franz
(1)
Nicolas Desmoulins
(1)
Olivier Blazy
(3)
Olivier Sanders
(1)
Özgür Dagdelen
(2)
Pascal Lafourcade
(7)
Pierre-Alain Fouque
(10)
Rhys Miller
(1)
Roel Peeters
(1)
Sébastien Gambs
(4)
Serge Vaudenay
(1)
Stefan Katzenbeisser
(1)
Stephan Wesemeyer
(1)
Stéphanie Alt
(1)
Thibaut Jacques
(3)
Thyla van der Merwe
(1)
Tommaso Gagliardoni
(1)
Xavier Bultel
(6)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to