Hervé Chabanne

From MaRDI portal
(Redirected from Person:1210564)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Grey-box implementation of block ciphers preserving the confidentiality of their design2024-09-18Paper
Efficient proof composition for verifiable computation2022-08-25Paper
JEROBOAM
Fast Software Encryption
2018-05-09Paper
Code Reverse Engineering Problem for Identification Codes
IEEE Transactions on Information Theory
2017-07-12Paper
Software-only two-factor authentication secure against active servers
Progress in Cryptology – AFRICACRYPT 2016
2016-06-22Paper
Hierarchical identities from group signatures and pseudonymous signatures
The New Codebreakers
2016-05-02Paper
Towards secure two-party computation from the wire-tap channel
Information Security and Cryptology -- ICISC 2013
2015-10-16Paper
Cross-unlinkable hierarchical group signatures
Public Key Infrastructures, Services and Applications
2014-08-11Paper
Fuzzy Vault for Multiple Users
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
Password based key exchange protocols on elliptic curves which conceal the public parameters
Applied Cryptography and Network Security
2010-07-06Paper
On physical obfuscation of cryptographic algorithms
Progress in Cryptology - INDOCRYPT 2009
2009-12-17Paper
Private interrogation of devices via identification codes
Progress in Cryptology - INDOCRYPT 2009
2009-12-17Paper
Another Look at Extended Private Information Retrieval Protocols
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
Information Security and Privacy
2009-03-06Paper
Trusted-HB: A Low-Cost Version of HB$^+$ Secure Against Man-in-the-Middle Attacks
IEEE Transactions on Information Theory
2009-02-24Paper
Cryptanalysis of EC-RAC, a RFID Identification Protocol
Cryptology and Network Security
2009-01-09Paper
The best of both worlds: Applying secure sketches to cancelable biometrics
Science of Computer Programming
2009-01-09Paper
A fuzzy sketch with trapdoor
IEEE Transactions on Information Theory
2008-12-21Paper
Noisy Cryptographic Protocols for Low-Cost RFID Tags
IEEE Transactions on Information Theory
2008-12-21Paper
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function
Lecture Notes in Computer Science
2008-11-20Paper
An Authentication Protocol with Encrypted Biometric Data
Progress in Cryptology – AFRICACRYPT 2008
2008-06-13Paper
Public Traceability in Traitor Tracing Schemes
Lecture Notes in Computer Science
2008-05-06Paper
Extended Private Information Retrieval and Its Application in Biometrics Authentications
Cryptology and Network Security
2008-04-15Paper
On the powerline system
Applicable Algebra in Engineering, Communication and Computing
2003-04-28Paper
scientific article; zbMATH DE number 1107705 (Why is no real title available?)1998-06-07Paper
Factoring of \(x^ n -1\) and orthogonalization over finite fields of characteristic 2
Applicable Algebra in Engineering, Communication and Computing
1995-08-28Paper
The n-dimensional key equation and a decoding application
IEEE Transactions on Information Theory
1994-10-04Paper
scientific article; zbMATH DE number 493097 (Why is no real title available?)1994-02-02Paper
On the concatenated structures of a [49,18,12] binary abelian code
Discrete Mathematics
1993-08-30Paper
Permutation decoding of abelian codes
IEEE Transactions on Information Theory
1993-02-04Paper


Research outcomes over time


This page was built for person: Hervé Chabanne