Publications
Publications
As the project implementation progresses, peer-reviewed journal and conference papers and other publications stemming from and acknowledging REWIRE, are being made available here. Stay tuned for our updates!
Journal Papers
[1] Anthony Feijoo-Añazco, Dan Garcia-Carrillo, Jesus Sanchez-Gomez, Rafael Marı́n-Perez. Innovative Security and Compression for Constrained IoT Networks, Elsevier Internet of Things, https://doi.org/10.1016/j.iot.2023.100899
[2] Corentin Verhamme, Gaëtan Cassiers, François-Xavier Standaert. Analyzing the Leakage Resistance of the NIST’s Lightweight Crypto Competition’s Finalists, CARDIS 2022, LNCS 13820, https://dial.uclouvain.be/pr/boreal/object/boreal:270927
[3] Gaëtan Cassiers, François-Xavier Standaert, Corentin Verhamme. Low-Latency Masked Gadgets Robust against Physical Defaults with Application to Ascon, CHES 2024, https://doi.org/10.46586/tches.v2024.i3.603-633
[4] Thorben Moos, Sayandeep Saha, François-Xavier Standaert. Prime Masking vs. Faults – Exponential Security Amplification against Selected Classes of Attacks, CHES 2024, https://eprint.iacr.org/2024/147.pdf
[5] Charles Momin, François-Xavier Standaert, Corentin Verhamme, Primitive-Level vs. Implementation-Level DPA Security: a Certified Case Study, CHES 2025. Accepted
Conference Papers
[1] Corentin Verhamme, Gaëtan Cassiers, and François-Xavier Standaert. 2023. Analyzing the Leakage Resistance of the NIST’s Lightweight Crypto Competition’s Finalists. In Smart Card Research and Advanced Applications: 21st International Conference, CARDIS 2022, Birmingham, UK, November 7–9, 2022, Revised Selected Papers. Springer-Verlag, Berlin, Heidelberg, 290–308. https://doi.org/10.1007/978-3-031-25319-5_15
Download from DIAL@UCLouvain
[2] Felipe Lisboa Malaquias, Georgios Giantamidis, Stylianos Basagiannis, Simone Fulvio Rollini, Isaac Admundson. Towards a methodology to design provably secure cyber-physical systems, The 27th Ada-Europe International Conference on Reliable Software Technologies (Ada-Europe 2023), Lisboa, Portugal. Accepted.
[3] Malaquias, F.L., Asavoae, M., Brandner, F. (2023). From the Standards to Silicon: Formally Proved Memory Controllers. In: Rozier, K.Y., Chaudhuri, S. (eds) NASA Formal Methods. NFM 2023. Lecture Notes in Computer Science, vol 13903. Springer, Cham. https://doi.org/10.1007/978-3-031-33170-1_18
[4] Felipe Lisboa Malaquias, Mihail Asavoae, Florian Brandner. Formally Proved Memory Controllers: From the Standards to Silicon, Nasa Formal Methods 2023 (LNCS : FM Subline Proceedings Volume), 2023. https://doi.org/10.1007/978-3-031-33170-1_18
[5] Constantin Catalin Dragan, François Dupressoir, Kristian Gjøsteen, Thomas Haines, Peter B. Rønne, Morten Rotvold Solberg, Machine-Checked Proofs of Accountability: How to sElect who is to Blame, ESORICS 2023. https://doi.org/10.1007/978-3-031-51479-1_24
[6] Jakob Feldtkeller, Tim Güneysu, Thorben Moos, Jan Richter-Brockmann, Sayandeep Saha, Pascal Sasdrich, Francois-Xavier Standaert, Combined Private Circuits – Combined Security Refurbished, ACM-CCS 2023. https://doi.org/10.1145/3576915.3623129
[7] Heini Bergsson Debes, Edlira Dushku, Thanassis Giannetsos, Ali Marandi, ZEKRA: Zero-Knowledge Control-Flow Attestation. In proceedings of the ACM Asia CCS 2023. https://doi.org/10.1145/3579856.3582833
[8] Heini Bergsson Debes, Thanassis Giannetsos, RETRACT: Expressive Designated Verifier Anonymous Credentials. In the proceedings of Proceedings of the 18th International Conference on Availability, Reliability and Security (ARES 2023). https://doi.org/10.1145/3600160.3600191
[9] Benjamin Larsen, Nada El Kassem, Thanassis Giannetsos, Ioanins Krontiris, Stefanos Vasileiadis, Liqun Chen, Achieving Higher Level of Assurance in Privacy-Preserving Identity Wallets. In: The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 10.5281/zenodo.8215221
[10] Sayandeep Saha, Prasanna Ravi, Dirmanto Jap, Shivam Bhasin, Non-Profiled Side-Channel Assisted Fault Attack: A Case Study on DOMREP, DATE 2023. 10.23919/DATE56975.2023.10137176
[11] Huanhuan Chen, Yao Jiang Galteland, Kaitai Liang, CCA-1 Secure Updatable Encryption with Adaptive Security, Asiacrypt 2023. https://link.springer.com/chapter/10.1007/978-981-99-8733-7_12
[12] Kaitai Liang, Query Recovery from Easy to Hard: Jigsaw Attack against SSE, The USENIX SECURITY 2024. Accepted
[13] Jodie Knapp, Elizabeth A. Quaglia, Dynamic Multi-Server Updatable Encryption, ISC2023. https://link.springer.com/chapter/10.1007/978-3-031-49187-0_24
[14] Kaitai Liang, Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages, ESORICS 2024. Accepted.
[15] Kaitai Liang, d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases, Usenix SECURITY 2024. Accepted
[16] Annika Wilde, Tim Niklas Gruel, Claudio Soriente, Ghassan Karame, The Forking Way: When TEEs Meet Consensus, Network and Distributed System Security (NDSS) 2025. Accepted
[17] Callum London, Daniel Gardham, Constantin Catalin Dragan, Dynamic Group Signatures with Verifier-Local Revocation, CSF 2025. https://eprint.iacr.org/2025/1145
[18] Navid Abapour, Amir Goharshady, Constantin-Catalin Dragan, Mahdi Mahdavi, Blockchain-based Economic Voting with Posterior Security from Lattices, IWSEC 2025. https://eprint.iacr.org/2025/1725
[19] Nikolaos Fotos, Stefanos Vasileiadis, Thanassis Giannetsos, Trust or Bust: Reinforcing Trust-Aware Path Establishment with Implicit Attestation Capabilities, 2025 IEEE CSR. https://ieeexplore.ieee.org/abstract/document/11130147
[20] Evgenia-Niovi Sassalou, Stefnos Vasileiadis, Stylianos Kazazis, Georgia Protogerou, Nikos Varvitsiotis, Dimitrios Karras, Thanassis Giannetsos, Simos Tsintzos, A PUF-based Root-of-Trust for resource-constrained IoT devices, 2025 IEEE CSR. https://ieeexplore.ieee.org/abstract/document/11130114
[21] Nada El Kassem, Wouter Hellemans, Ioannis Siachos, Edlira Dushku, Stefanos Vasileiadis, Dimitrios S. Karas, Liqun Chen, Constantinos Patsakis, Thanassis Giannetsos, PRIVÉ: Towards Privacy-Preserving Swarm Attestation, 22nd International Conference on Security and Cryptography (SECRYPT). https://vbn.aau.dk/en/publications/priv%C3%A9-towards-privacy-preserving-swarm-attestation
[22] Stefanos Vasileiadis, Thanassis Giannetsos, Matthis Schunter, Bruno Crispo, TALOS: Reinforcing Secure Live Migration through Verifiable State Management, Euro S&P 2026. Accepted
Sign up for REWIRE
Newsletter