Martin Vuagnoux
Martin Vuagnoux
Researcher
Adresse e-mail validée de vuagnoux.com
Titre
Citée par
Citée par
Année
Compromising Electromagnetic Emanations of Wired and Wireless Keyboards.
M Vuagnoux, S Pasini
USENIX security symposium, 1-16, 2009
2962009
Password interception in a SSL/TLS channel
B Canvel, A Hiltgen, S Vaudenay, M Vuagnoux
Annual International Cryptology Conference, 583-599, 2003
2592003
Passive–only key recovery attacks on RC4
S Vaudenay, M Vuagnoux
International Workshop on Selected Areas in Cryptography, 344-359, 2007
822007
Discovery and exploitation of new biases in RC4
P Sepehrdad, S Vaudenay, M Vuagnoux
International Workshop on Selected Areas in Cryptography, 74-91, 2010
792010
An improved technique to discover compromising electromagnetic emanations
M Vuagnoux, S Pasini
2010 IEEE International Symposium on Electromagnetic Compatibility, 121-126, 2010
652010
Statistical attack on RC4
P Sepehrdad, S Vaudenay, M Vuagnoux
Annual International Conference on the Theory and Applications of …, 2011
592011
Autodafe: An act of software torture
M Vuagnoux
Proceedings of the 22th Chaos Communication Congress, 47-58, 2005
572005
About machine-readable travel documents
J Monnerat, S Vaudenay, M Vuagnoux
RFID Security 2007, 2007
562007
About machine-readable travel documents
S Vaudenay, M Vuagnoux
Journal of Physics: Conference Series 77 (1), 012006, 2007
282007
Smashing WEP in a passive attack
P Sepehrdad, P Sušil, S Vaudenay, M Vuagnoux
International Workshop on Fast Software Encryption, 155-178, 2013
262013
Tornado attack on RC4 with applications to WEP & WPA
P Sepehrdad, P Susil, S Vaudenay, M Vuagnoux
82015
Analysis of SwissCovid
S Vaudenay, M Vuagnoux
52020
Computer Aided Cryptanalysis from Ciphers to Side channels
M Vuagnoux
EPFL, 2010
22010
On the Effectiveness of Time Travel to Inject COVID-19 Alerts⋆
V Iovino, S Vaudenay, M Vuagnoux
Cryptology ePrint Archive, Report 2020/1393. https://eprint. iacr. org/2020/1393, 2020
12020
News key recovery attacks on RC4/WEP
M Vuagnoux
27th Chaos Communication Congress, 2010, 2010
12010
Contact Tracing by Giant Data Collectors: Opening Pandora's Box of Threats to Privacy, Sovereignty and National Security
A Boutet, C Castelluccia, M Cunche, A Dmitrienko, V Iovino, M Miettinen, ...
EPFL, Switzerland; Inria, France; JMU Würzburg, Germany; University of …, 2020
2020
情報機器に接続された線路が電磁情報漏洩に与える影響
林優一, 水木敬明, 曽根秀昭
[A] 基礎・材料・共通部門 電磁環境研究会, 2010
2010
An Introduction to Buffer Overflow Attacks
M Vuagnoux
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–18