EPFL - I&C - ISC - LASEC
Station 14 - INF 240
Tel. +41 21 693 6698
Fax. +41 21 693 7689
Rafik Chaabouni received his Bachelor's degree in Communication Systems from the Swiss Federal Institute of Technology in Lausanne (EPFL) in 2005.
During his Bachelor, he went for an exchange year at Carnegie Mellon University in Pittsburgh, Pennsylvania (CMU) in 2004-2005.
He received his Master's degree in Communication Systems from the Swiss Federal Institute of Technology in Lausanne (EPFL) in 2007.
The specialisation of his Master was Information and Communication Security, with a Minor in Management of Technology & Entrepreneurship.
He completed his Master Thesis at IBM Zürich Research Lab in 2007.
He started his Ph.D. in the Security and Cryptography Laboratory (LASEC) of EPFL. He is now an andjunct member of the LASEC under the supervision of Prof. Serge Vaudenay and an international Ph.D. student of the University of Tartu under the co-supervision of Prof. Helger Lipmaa.
Solving Terminal Revocation in EAC by Augmenting Terminal Authentication
In Arslan BrÃ¶mme and Christoph Busch, editors, BIOSIG 2013 - Proceedings of the 12th International Conference of Biometrics Special Interest Group, pages 273-280, Darmstadt, Germany, September 4-6, 2013, 2013.
A Non-interactive Range Proof with Constant Communication
In Angelos D. Keromytis, editor, Financial Cryptography and Data Security, volume 7397, pages 179-199, Bonaire, February 27â€“March 2, 2012, 2012.
Additive Combinatorics and Discrete Logarithm Based Range Protocols
In Information Security and Privacy Information Security and Privacy, Proceedings of the 15th Australasian Conference, ACISP 2010, volume 6168, pages 336-351, Sydney, Australia, July 5-7, 2010, 2010.
The Extended Access Control for Machine Readable Travel Documents
In Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, pages 93-103, Darmstadt, Germany, September 17-18, 2009, 2009.
Efficient Protocols for Set Membership and Range Proofs
In Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, pages 234-252, Melbourne, Australia, December 7-11, 2008, 2008.
Set membership proofs in data processing systems
Methods for efficient certificate revocation list compression
e-ID in e-Gov