Hervé Chabanne

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Grey-box implementation of block ciphers preserving the confidentiality of their design2024-09-18Paper
Efficient proof composition for verifiable computation2022-08-25Paper
JEROBOAM
Fast Software Encryption
2018-05-09Paper
Code Reverse Engineering Problem for Identification Codes
IEEE Transactions on Information Theory
2017-07-12Paper
Software-only two-factor authentication secure against active servers
Progress in Cryptology – AFRICACRYPT 2016
2016-06-22Paper
Hierarchical identities from group signatures and pseudonymous signatures
The New Codebreakers
2016-05-02Paper
Towards secure two-party computation from the wire-tap channel
Information Security and Cryptology -- ICISC 2013
2015-10-16Paper
Cross-unlinkable hierarchical group signatures
Public Key Infrastructures, Services and Applications
2014-08-11Paper
Fuzzy Vault for Multiple Users
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
Password based key exchange protocols on elliptic curves which conceal the public parameters
Applied Cryptography and Network Security
2010-07-06Paper
On physical obfuscation of cryptographic algorithms
Progress in Cryptology - INDOCRYPT 2009
2009-12-17Paper
Private interrogation of devices via identification codes
Progress in Cryptology - INDOCRYPT 2009
2009-12-17Paper
Another Look at Extended Private Information Retrieval Protocols
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
Information Security and Privacy
2009-03-06Paper
Trusted-HB: A Low-Cost Version of HB$^+$ Secure Against Man-in-the-Middle Attacks
IEEE Transactions on Information Theory
2009-02-24Paper
Cryptanalysis of EC-RAC, a RFID Identification Protocol
Cryptology and Network Security
2009-01-09Paper
The best of both worlds: Applying secure sketches to cancelable biometrics
Science of Computer Programming
2009-01-09Paper
A fuzzy sketch with trapdoor
IEEE Transactions on Information Theory
2008-12-21Paper
Noisy Cryptographic Protocols for Low-Cost RFID Tags
IEEE Transactions on Information Theory
2008-12-21Paper
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function
Lecture Notes in Computer Science
2008-11-20Paper
An Authentication Protocol with Encrypted Biometric Data
Progress in Cryptology – AFRICACRYPT 2008
2008-06-13Paper
Public Traceability in Traitor Tracing Schemes
Lecture Notes in Computer Science
2008-05-06Paper
Extended Private Information Retrieval and Its Application in Biometrics Authentications
Cryptology and Network Security
2008-04-15Paper
On the powerline system
Applicable Algebra in Engineering, Communication and Computing
2003-04-28Paper
scientific article; zbMATH DE number 1107705 (Why is no real title available?)1998-06-07Paper
Factoring of \(x^ n -1\) and orthogonalization over finite fields of characteristic 2
Applicable Algebra in Engineering, Communication and Computing
1995-08-28Paper
The n-dimensional key equation and a decoding application
IEEE Transactions on Information Theory
1994-10-04Paper
scientific article; zbMATH DE number 493097 (Why is no real title available?)1994-02-02Paper
On the concatenated structures of a [49,18,12 binary abelian code]
Discrete Mathematics
1993-08-30Paper
Permutation decoding of abelian codes
IEEE Transactions on Information Theory
1993-02-04Paper


Research outcomes over time


This page was built for person: Hervé Chabanne