Communications publiées lors de congrès ou colloques nationaux et internationaux (34)
25.
Markowitch, O., & Dossogne, J. (2009). A Tripartite Strong Designated Verifier Scheme Based on Threshold RSA Signatures. In World Congress in Computer Science, Computer Engineering, and Applied Computing, International Conference on Security and Management: Vol. 1 (pp. 314-317) Las Vegas, USA: CSREA Press.
26.
Qachri, N., & Markowitch, O. (2009). A new generic 3-step protocol for authentication and key agreement in embedded systems. International Workshop in Information Security, Theory and Practice (September 2009: Brussels, Belgium)
27.
Akimana, R., Markowitch, O., & Roggeman, Y. (2007). Grid’s confidential outsourcing of string matching. In Sixth International Conference on Software Engineering, Parallel and Distributed Systems (pp. 63-68) Corfou, Greece: Wseas Press.
28.
Cailloux, O., Gonzalez-Deleito Collel, N.-C., & Markowitch, O. (2006). Fairness in certified electronic mail. Proceedings of the 2006 International Conference on Networks and Communication Systems (pp. 298-303).
29.
Akimana, R., & Markowitch, O. (2006). Data and code integrity in grid environments. In Third International Symposium on Grid Computing (pp. 677-682) Lisbon, Portugal: Wseas Press.
30.
Markowitch, O., & Dall'Olio, E. (2004). Voting with designated verifier signature-like protocol. In IADIS International Conference WWW/Internet (pp. 295-301) Iadis Press.
31.
Markowitch, O., Saeednia, S., & Kremer, S. (2003). Efficient designated verifier signature schemes. Symposium on information theory in the Benelux (pp. 187-194).
32.
Saeednia, S., Markowitch, O., & Roggeman, Y. (2003). Identity-based optimistic fair exchange with transparent signature recovery. In 9th International Conference on Distributed Multimedia Systems (pp. 718-721) Miami, USA: Knowledge systems institute.
33.
Kremer, S., & Markowitch, O. (2000). Optimistic non-repudiable information exchange. Symposium on information theory in the Benelux (pp. 139-146).
34.
Markowitch, O., & Roggeman, Y. (1999). Probabilistic Non-Repudiation without Trusted Third Party. Second Conference on Security in Communication Networks (pp. 1-12).
Rapports de recherche, comptes rendus, lettres à l'éditeur, working papers (2)
1.
Lafitte, F., Lerman, L., Markowitch, O., & Van Heule, D. (2016). SAT-based cryptanalysis of ACORN. In SAT-based cryptanalysis of ACORN.
2.
Santana de Freitas, D., Markowitch, O., & Nakahara, J. (2015). Linear cryptanalysis of pseudorandom functions.