Reconciling Two Views of Cryptography, Theoretical Computer Science: Exploring New Frontiers of Theoretical Informatics, pp.3-22, 2000. ,
DOI : 10.1007/3-540-44929-9_1
Attacks on Cryptoprocessor Transaction Sets, Proceedings of the 3rd International Workshop on Cryptographic Hardware and Embedded Systems (CHES'01), pp.220-234, 2001. ,
DOI : 10.1007/3-540-44709-1_19
Attacking and fixing PKCS#11 security tokens, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.260-269, 2010. ,
DOI : 10.1145/1866307.1866337
A Secure Cryptographic Token Interface, 2009 22nd IEEE Computer Security Foundations Symposium, pp.141-153, 2009. ,
DOI : 10.1109/CSF.2009.7
The design and analysis of cryptographic APIs for security devices, 2003. ,
On the Security of PKCS #11, Proceedings of CHES 2003, pp.411-425, 2003. ,
DOI : 10.1007/978-3-540-45238-6_32
A Generic Security API for Symmetric Key Management on Cryptographic Devices, Computer Security -ES- ORICS 2009, pp.605-620, 2009. ,
DOI : 10.1109/CSFW.2001.930145
URL : https://hal.archives-ouvertes.fr/hal-00881072
Revoke and let live, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12 ,
DOI : 10.1145/2382196.2382293
URL : https://hal.archives-ouvertes.fr/hal-00732902
On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-207, 1983. ,
DOI : 10.1109/TIT.1983.1056650
Security for Key Management Interfaces, 2011 IEEE 24th Computer Security Foundations Symposium, pp.266-280, 2011. ,
DOI : 10.1109/CSF.2011.25
URL : https://hal.archives-ouvertes.fr/inria-00636734