# Cristina Onete

## Publications

Publications in cryptography:- X. Bultel, C. Onete:
**Pairing-free secure-channel establishment in mobile networks with fine-grained lawful interception**Accepted as short paper at SAC 2022. - O. Blazy, P.-A. Fouque, T. Jacques, P. Lafourcade, C. Onete, L. Robert:
**MARSHAL: Messaging with Asynchronous Ratchets and Signatures for faster HeALing**, Accepted at SAC 2022. - G. Arfaoui, P.-A. Fouque, T. Jacques, P. Lafourcade, A. Nedelcu, C. Onete, L. Robert:
**A cryptographic view of deep-attestation, or how to do provably-secure layer-linking**, Accepted at ACNS 2022 - G. Arfaoui, O. Blazy, X. Bultel, P.-A. Fouque, T. Jacques, A. Nedelcu, C. Onete:
**How to (legally) keep secrets from mobile operators**, Published at ESORICS 2021. Full paper - A. Bossuat, X. Bultel, P.-A. Fouque, C. Onete, T. van der Merwe:
**Designing Reverse Firewalls for the Real World**, Published at ESORICS 2020. Full paper - G. Arfaoui, X. Bultel, P.-A. Fouque, A. Nedelcu, C. Onete:
**The privacy of the TLS 1.3 protocol**, Published at PoPETS 2019 (4). Full paper - O. Blazy, A. Bossuat, X. Bultel, P.-A. Fouque, C. Onete, E. Pagnin:
**SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting**, Published at Euro S & P 2019. Full paper - N. Desmoulins, P.-A. Fouque, C. Onete, O. Sanders:
**Pattern Matching on Encrypted Streams**. Proceedings of Asiacrypt 2018. Full paper - K. Bhargavan, I. Boureanu, A. Delignat-Lavaud, P.A. Fouque, C. Onete:
**A formal treatment of accountable proxying over TLS**. Published at S & P 2018. Full paper - I. Boureanu, D. Gerault, P. Lafourcade, C. Onete:
**Breaking and fixing the HB+DB protocol**. Proceedings of WiSec 2017. ACM Full paper - G. Avoine, X. Bultel, D. Gerault, S. Gambs, P. Lafourcade, C. Onete, J.-M. Robert:
**A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol**. Proceedings of AsiaCCS 2017. Full paper - K. Bhargavan, I. Boureanu, P.-A. Fouque, C. Onete, and B. Richard:
**Content Delivery over TLS: A cryptographic analysis of Keyless SSL**. Proceedings of EURO S&P 2017.IEEE - S. Alt, P.-A. Fouque, G. Macario-Rat, C. Onete, and B. Richard:
**A Cryptographic Analysis of UMTS/LTE AKA Protocol**. Proceedings of ACNS 2016. Springer - X. Bultel, S. Gambs, D. Gerault, P. Lafourcade, C. Onete, and J.-M. Robert:
**A Prover-Anonymous and Terrorist-Fraud Resistant Distance Bounding Protocol**. Proceedings of WiSec 2016. ACMFull paper - P.-A. Fouque, C. Onete, and B. Richard:
**Achieving Better Privacy for the 3GPP AKA Protocol**. PoPETS 2016. De Gruyter - M. Kohlweiss, U. Maurer, C. Onete, B. Tackmann, and D. Venturi:
**TLS 1.3 — Ready or Not?**. TRON 1.0, 2016. - S. Gambs, M.-O. Killijian, C. Lauradoux, C. Onete, M. Roy, and M. Traoré:
**VSSDB: A Verifiable Secret-Sharing and Distance-Bounding Protocol**. Will appear in proceedings of BalkanCryptSec 2015. - A. Mitrokotsa, C. Onete, S. Vaudenay:
**Mafia Fraud Attack against the RC Distance-Bounding Protocol**. Conference on RFID-Technologies and Applications RFID-TA'12 IEEEFull paper - C. Fontaine, S. Gambs, J. Lolive, C. Onete:
**Private Asymmetric Fingerprinting: a Protocol with Optimal Traitor Tracing using Tardos Codes**, Accepted to LatinCrypt 2014. - S. Gambs, C. Onete, and J.M. Robert:
**Prover Anonymous and Deniable Distance-Bounding Authentication**. Proceedings of AsiaCCS 2014, pp. 501-506 ePrintACM - M. Kohlweiss, U. Maurer, C. Onete, B. Tackmann, D. Venturi:
**(De-)Constructing TLS**. Accepted at Indocrypt 2015. ePrint - Ö. Dagdelen, M. Fischlin, T. Gagliardoni, G. A. Marson, A. Mittelbach, and C. Onete:
**A Cryptographic Analysis of OPACITY**. Ext. abstract, ESORICS 2013, pp. 345-362 SpringerePrint (full version) - A. Mitrokotsa, C. Onete, and S. Vaudenay:
**Location Leakage in Distance Bounding: Why Location Privacy does not Work**. ePrint - M. Fischlin and C. Onete:
**Terrorism in Distance Bounding: Modeling Terrorist Fraud Resistance**. ACNS 2013, pp. 414-431. SpringerFull paper - M. Kohlweiss, U. Maurer, C. Onete, B. Tackmann, and D. Venturi:
**Anonymity-preserving Public-Key Encryption: A Constructive Perspective**. Ext. abstract, PETS 2013, pp. 19-39. SpringerePrint (full version) - M. Fischlin and C. Onete:
**Subtle Kinks in Distance-Bounding: an Analysis of Prominent Protocols**. WiSec 2013, pp. 195–206. ACMePrint - J. Hermans, R. Peeters, and C. Onete:
**Efficient, Secure, Private Distance Bounding without Key Updates**. WiSec 2013, pp. 207–218. ACMFull paper - C. Onete:
**Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy**. ePrint - M. Fischlin and C. Onete:
**RFID Distance-Bounding: What is Wrong and How to Fix it**. Accepted to 5th MPICC Interdisciplinary Conference on Current Issues in IT Security, 2012. Full paper - C. Onete and D. Venturi:
**Security & Indistinguishability in the Presence of Traffic Analysis**ePrint - U. Dürholz, M. Fischlin, M. Kasper, and C. Onete:
**A Formal Approach to Distance-Bounding RFID Protocols**. ISC 2011, pp. 47–64. SpringerePrint (full version) - M. Fischlin and C. Onete:
**Relaxed Security Notions for Signatures of Knowledge**. ACNS 2011, pp. 309–326. SpringerFull paper - C. Brzuska, H. Busch, Ö. Dagdelen, M. Fischlin, M. Franz, S. Katzenbeisser, M. Manulis, C. Onete, A. Peter, B. Poettering, and D. Schröder:
**Redactable Signatures for Tree-Structured Data: Definitions and Constructions**. ACNS 2010, pp. 87–104. SpringerFull paper

- C.N. Onete and C. Onete:
**Building Hamiltonian Networks Using the Cycles Laplacian of the Underlying Graph**. ISCAS 2015 (Accepted, will appear in proceedings). - C.N. Onete and C. Onete:
**Finding ground traces using the laplacian of the meshes of the associated graph**. SOCC 2013. IEEE - C.N. Onete and C. Onete:
**Finding spanning trees and Hamiltonian circuits in an un-oriented graph: an algebraic approach**. ECCTD 2011. IEEE - C. Onete and C.N. Onete:
**A novel condition for Hamiltonicity; constructing Hamiltonian Circuits**. EUROCON 2011. IEEE - C.N. Onete and C. Onete:
**Enumerating all the spanning trees in an un-oriented graph – a Novel approach**. SM2ACD 2010. IEEE - C.N. Onete and C. Onete:
**Indefinite Matrices of Linear Electric Circuits, their Pseudoinverses, and Applications in Related Fields**. IEEE

Copyright © 2012–2018 — Cristina Onete