Philipp Jovanovic
Philipp Jovanovic
École Polytechnique Fédérale de Lausanne
Verified email at jovanovic.io - Homepage
TitleCited byYear
Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing
E Kokoris-Kogias, P Jovanovic, N Gailly, I Khoffi, L Gasser, B Ford
USENIX Security'16, 2016
275*2016
OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding
E Kokoris-Kogias, P Jovanovic, L Gasser, N Gailly, E Syta, B Ford
39th IEEE Symposium on Security and Privacy – IEEE S&P 2018, 2018
157*2018
Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning
E Syta, I Tamas, D Visher, DI Wolinsky, P Jovanovic, L Gasser, N Gailly, ...
37th IEEE Symposium on Security and Privacy – IEEE S&P 2016, 2016
1042016
Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes
P Jovanovic, A Luykx, B Mennink
Advances in Cryptology – ASIACRYPT 2014, 85-104, 2014
712014
Scalable Bias-Resistant Distributed Randomness
E Syta, P Jovanovic, EK Kogias, N Gailly, L Gasser, I Khoffi, MJ Fischer, ...
38th IEEE Symposium on Security and Privacy – IEEE S&P 2017, 2017
602017
A Fault Attack on the LED Block Cipher
P Jovanovic, M Kreuzer, I Polian
Constructive Side-Channel Analysis and Secure Design – COSADE 2012, 120-134, 2012
592012
NORX: Parallel and Scalable AEAD
JP Aumasson, P Jovanovic, S Neves
European Symposium on Research in Computer Security – ESORICS 2014, 19-36, 2014
57*2014
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
R Granger, P Jovanovic, B Mennink, S Neves
Advances in Cryptology – EUROCRYPT 2016, 263-293, 2016
462016
Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware
R Kumar, P Jovanovic, WP Burleson, I Polian
Fault Diagnosis and Tolerance in Cryptography – FDTC 2014, 783, 2014
432014
CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds
K Nikitin, E Kokoris Kogias, P Jovanovic, L Gasser, N Gailly, I Khoffi, ...
Proceedings of the 26th Usenix Security Symposium, 2017
412017
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
H Böck, A Zauner, S Devlin, J Somorovsky, P Jovanovic
Workshop on Offensive Technologies – WOOT 2016, 2016
342016
Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol
P Jovanovic, S Neves
IACR Cryptology ePrint Archive 2015, 428, 2015
30*2015
Analysis of NORX: Investigating Differential and Rotational Properties
JP Aumasson, P Jovanovic, S Neves
Progress in Cryptology – LATINCRYPT 2014, 306-324, 2014
30*2014
An Algebraic Fault Attack on the LED Block Cipher
P Jovanovic, M Kreuzer, I Polian
IACR Cryptology ePrint Archive, 2012/400, 2012
262012
Algebraic Attacks Using SAT-Solvers
P Jovanovic, M Kreuzer
Groups–Complexity–Cryptology 2 (2), 247-259, 2010
252010
Proof-of-personhood: Redemocratizing permissionless cryptocurrencies
M Borge, E Kokoris-Kogias, P Jovanovic, L Gasser, N Gailly, B Ford
2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 23-26, 2017
232017
Calypso: Auditable Sharing of Private Data over Blockchains
E Kokoris-Kogias, EC Alp, SD Siby, N Gailly, L Gasser, P Jovanovic, ...
Cryptology ePrint Archive, Report 2018/209, 2018
21*2018
NORX8 and NORX16: Authenticated Encryption for Low-End Systems
JP Aumasson, P Jovanovic, S Neves
Trustworthy Manufacturing and Utilization of Secure Devices – TRUDEVICE 2015, 2015
162015
Managing Identities Using Blockchains and CoSi
E Kokoris-Kogias, L Gasser, I Khoffi, P Jovanovic, N Gailly, B Ford
152016
Precise Fault-Injections Using Voltage and Temperature Manipulation for Differential Cryptanalysis
R Kumar, P Jovanovic, I Polian
International On-Line Testing Symposium – IOLTS 2014, 43-48, 2014
102014
The system can't perform the operation now. Try again later.
Articles 1–20