Communications publiées lors de congrès ou colloques nationaux et internationaux (34)
13.
Youssef, M. A., Goossens, J., & Markowitch, O. (2013). Authentification et intégrité des données dans les ordonnancements temps réel. Actes de l'École Temps Réel (8 ed., pp. 146-149) ETR(Août 2013: Toulouse, France).
14.
Markowitch, O., & Nakahara, J. (2013). Confusion and diffusion of large S-boxes. Western European Workshop on Research in Cryptology (pp. 73-79).
15.
Markowitch, O., & Nakahara, J. (2013). Distinguishing attacks on single-pass modes of operation. Western European Workshop on Research in Cryptology (pp. 85-91).
16.
Qachri, N., Lafitte, F., & Markowitch, O. (2013). Authenticated Key Agreement in Wireless Networks with Automated Key Management. In Proceedings of the 6th International Conference on Security of Information and Networks (pp. 62-69). (SIN '13). ACM. doi:10.1145/2523514.2523527
17.
Lafitte, F., Markowitch, O., & Van Heule, D. (2013). SAT Based Analysis of LTE Stream Cipher ZUC. In Proceedings of the 6th International Conference on Security of Information and Networks (pp. 110-116). (SIN '13). ACM. doi:10.1145/2523514.2523533
18.
Lerman, L., Markowitch, O., Nakahara Jr, J. J., et al. (2012). Key Management as a Service. In P. P. Samarati (Ed.), International Conference on Security and Cryptography (SECRYPT): International joint Conference on E-business and Telecommunications (ICETE) (pp. 276-281) Rome, Italy: SciTe Press Digital Library.
19.
Qachri, N., Lafitte, F., & Markowitch, O. (2011). A new generic protocol for authentication and key agreement in lightweight systems. Ecrypt Workshop on lightweight cryptography (pp. 192-210).
20.
Qachri, N., & Markowitch, O. (2011). Threat modelling of the security architectures of various wireless technologies. Symposium on Information Theory in the Benelux (pp. 146-153).
21.
Markowitch, O., Lerman, L., & Bontempi, G. (2011). Side channel attack: an approach based on machine learning. In Proceedings of 2nd International Workshop on Constructive Side-Channel Analysis and Security Design (pp. 29-41) Schindler and Huss.
22.
Dossogne, J., & Markowitch, O. (2010). Online banking and man in the browser attacks , survey of the belgian situation. Symposium on information theory in the Benelux (pp. 19-26).
23.
Dossogne, J., & Markowitch, O. (2010). E-voting: Individual verifiability of public boards made more achievable. Symposium on information theory in the Benelux (pp. 5-10).
24.
Cao, Z., & Markowitch, O. (2009). Security Analysis of One Quantum Digital Signature Scheme. In Sixth International Conference on Information Technology (ITNG '09) (pp. 1574-1576) IEEE.