![]() |
|
Flavio D. Garcia, Eric R. Verheul and Bart Jacobs. Cell-based Privacy-friendly Roadpricing. In Computers & Mathematics with Applications, Vol. 65/5, pages 774-785, 2013. |
|
|
Flavio D. Garcia and
Peter van Rossum. Sound and Complete Computational Interpretation of Symbolic Hashes in the Standard Model. In Theoretical Computer Science, Vol. 394/1-2, pages 112-133, 2008. |
|
|
Gerhard de Koning Gans,
Roel Verdult and Flavio D. Garcia. A Toolbox for RFID Protocol Analysis. In 4th International EURASIP Workshop on RFID Technology (EURASIP RFID 2012). IEEE Computer Society, pages 27-34, 2012. |
|
|
Roel Verdult, Flavio D. Garcia and Josep Balasch. Gone in 360 Seconds: Hijacking with Hitag2. In 21st USENIX Security Symposium (USENIX Security 2012). USENIX Association, pages 237-252, 2012. |
|
|
Flavio D. Garcia,
Gerhard de Koning Gans,
Roel Verdult and Milosch Meriac. Dismantling iClass and iClass Elite. In S. Foresti and M. Yung , editors, 17th European Symposium on Research in Computer Security (ESORICS 2012). Lecture Notes in Computer Science, Vol. 7459, 2012. © Springer Verlag. |
|
|
Flavio D. Garcia, Eric R. Verheul and Bart Jacobs. Cell-based Roadpricing. In S. Petkova-Nikova, A. Pashalidis, G. Pernul, editors, 8th European PKI Workshop (EuroPKI 2011) Lecture Notes in Computer Science, Vol. 7163, pages 106-122, 2012. © Springer Heidelberg. |
|
|
Flavio D. Garcia,
Gerhard de Koning Gans and
Roel Verdult. Exposing iClass Key Diversification. (Best Paper Award) In 5th USENIX Workshop on Offensive Technologies (WOOT 2011) USENIX Association, pages 128-136. 2011. |
|
|
Flavio D. Garcia and Bart Jacobs. Privacy-friendly Energy-metering via Homomorphic Encryption. In J. Cuellar, J. Lopez, G. Barthe and A. Pretschner, editors, 6th Workshop on Security and Trust Management (STM 2010) Lecture Notes in Computer Science, Vol. 6710, pages 226-238, 2011. © Springer Verlag. |
|
|
Flavio D. Garcia,
Peter van Rossum,
Roel Verdult and Ronny Wichers Schreur.
Dismantling SecureMemory, CryptoMemory and CryptoRF. In 17th ACM Conference on Computer and Communications Security (CCS 2010). ACM Press, pages 250-259. 2010. © ACM. |
|
|
Gerhard de Koning Gans and Flavio D. Garcia. Towards a Practical Solution to the RFID Desynchronization Problem. In S.B. Ors Yalcin, editor, 6th Workshop on RFID Security (RFIDSec 2010). Lecture Notes in Computer Science, Vol. 6370, pages 203-219, 2010. © Springer Verlag. |
|
|
Flavio D. Garcia and Peter van Rossum. Modeling Privacy for Off-line RFID Systems. In D. Gollmann and J.-L. Lanet, editors, 9th Smart Card Research and Advanced Applications (CARDIS 2010). Lecture Notes in Computer Science, Vol. 6035, pages 194-208, 2010. © Springer Verlag. |
|
|
David Galindo and Flavio D. Garcia. A Schnorr-like Lightweight Identity Based Signature Scheme. In B. Preneel, editor, Progress in Cryptology (AFRICACRYPT 2009). Lecture Notes in Computer Science, Vol. 5580, pages 135-148, 2009. © Springer Verlag. |
related paper:
|
|
Flavio D. Garcia,
Peter van Rossum,
Roel Verdult and Ronny Wichers Schreur. Wirelessly Pickpocketing a Mifare Classic Card. (Outstanding Paper Award) In 30th IEEE Symposium on Security and Privacy (S&P 2009), pages 3-15. 2009. © IEEE. |
|
|
Flavio D. Garcia, Gerhard de Koning Gans, Ruben Muijrers, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur and Bart Jacobs. Dismantling MIFARE Classic. In S. Jajodia, and J. Lopez, editors, 13th European Symposium on Research in Computer Security (ESORICS 2008). Lecture Notes in Computer Science, Vol. 5283, pages 97-114, 2008. © Springer Verlag. |
|
| Gerhard de Koning Gans,
Jaap-Henk Hoepman and
Flavio D. Garcia. A Practical Attack on the MIFARE Classic. In G. Grimaud and F.-X. Standaert, editors, 8th Smart Card Research and Advanced Application Conference (CARDIS 2008). Lecture Notes in Computer Science, Vol. 5189, pages 267-282, 2008. © Springer Verlag. |
|
| David Galindo and Flavio D. Garcia. A Lightweight Identity Based Signature Scheme. In 3rd Benelux Workshop on Information and System Security (WISSEC 2008). Eindhoven, The Netherlands. 2008. |
|
| David Galindo, Flavio D. Garcia, and
Peter van Rossum.
Computational Soundness of Non-Malleable Commitments. In 4th Information Security Practice and Experience Conference (ISPEC 2008). Lecture Notes in Computer Science, Vol. 4991, pages 361-376. Sydney, Australia, 2008. © Springer Verlag. |
|
| Flavio D. Garcia and
Peter van Rossum. Sound Computational Interpretation of Symbolic Hashes in the Standard Model. In H. Yoshiura, K. Sakurai, K. Rannenberg, Y. Murayama, S. Kawamura, editors, Advances in Information and Computer Security. International Workshop on Security (IWSEC 2006). Lecture Notes in Computer Science, Vol. 4266, pages 33-47. Kyoto, Japan, October 23-24, 2006. © Springer Verlag. |
full version:
|
| Flavio D. Garcia and
Peter van Rossum. Sound and Complete Computational Interpretation of Formal Hashes (Extended Abstract). In Véronique Cortier and Steve Kremer, editors, Workshop of Formal and Computational Cryptography (FCC 2006). Venice, Italy, July 2006. |
|
| Flavio D. Garcia, Ichiro Hasuo,
Wolter Pieters, and
Peter van Rossum. Provable Anonymity. In Ralf Küsters and John Mitchell, editors, 3rd ACM Workshop on Formal Methods in Security Engineering (FMSE 2005). ACM Press, pages 63-72. Alexandria , VA, U.S.A., November 2005. |
|
| Flavio D. Garcia and Jaap-Henk Hoepman. Off-line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications. In J. Ioannidis, A. Keromytis, and M. Yung, editors, 3rd Applied Cryptography and Network Security (ACNS 2005), Lecture Notes in Computer Science, Vol. 3531, pages 364-377. New York, NY, USA, June 7-10 2005. © Springer Verlag. |
|
| Flavio D. Garcia and Jaap-Henk Hoepman. Off-line Karma: A Decentralized Currency for Static Peer-to-peer and Grid Networks. In S. Furnell, P. Dowland, G. Kormentazas, editors, 5th International Network Conference (INC 2005), pages 325-332, Samos, Greece, July 5-7 2005. |
|
| Flavio D. Garcia, Jaap-Henk Hoepman, and J. van Nieuwenhuizen. Spam Filter Analysis. In Y. Deswarte, F. Cuppens, S. Jajodia, and L. Wang, editors, Security and Protection in Information Processing Systems. IFIP TC11 19th International Information Security Conference (SEC2004), pages 395-410, Toulouse, France, August 2004. © Kluwer Academic Publishers. |
|
|
Roel Verdult, Flavio D. Garcia and Josep Balasch. Poster: Gone in 360 Seconds: Hijacking with Hitag2. |
|
|
Flavio D. Garcia,
Gerhard de Koning Gans and
Roel Verdult. Poster: Dismantling iClass and iClass Elite. Poster at 21st USENIX Security Symposium (USENIX Security 2012). |
|
|
Flavio D. Garcia and Bart Jacobs. The Fall of a Tiny Star. |
|
|
Flavio D. Garcia,
Gerhard de Koning Gans and
Roel Verdult. Tutorial: Proxmark, the Swiss Army Knife for RFID Security Research. Tutorial at 8th Workshop on RFID Security and Privacy (RFIDSec 2012). Technical Report, Radboud University Nijmegen, 2012. |
|
|
Ronny Wichers Schreur, Peter van Rossum, Flavio Garcia, Wouter Teepe, Jaap-Henk
Hoepman, Bart Jacobs, Gerhard de Koning Gans, Roel Verdult, Ruben Muijrers,
Ravindra Kali, and Vinesh Kali. Security Flaw in MIFARE Classic. Press release, Digital Security group, Radboud University Nijmegen. March 12, 2008. The Netherlands. |
|
|
Flavio D. Garcia,
Peter van Rossum and Ana Sokolova. Probabilistic anonymity and admissible schedulers. Arxiv preprint arXiv:0706.1019. 2007. |
|
|
Flavio D. Garcia and
Peter van Rossum. Completeness of Formal Hashes in the Standard Model. Technical Report, Radboud University Nijmegen. 2006. |
|
|
Flavio D. Garcia and Jaap-Henk Hoepman. Off-line Karma: Towards a Decentralized Currency for Peer-to-peer and Grid Applications (Extended Abstract). In Workshop on Secure Multiparty Computations (SMP), Amsterdam, The Netherlands, October 7-8 2004. |
|