Julien Bringer

From MaRDI portal
Person:2517832



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Exponential sums and Boolean functions2024-09-18Paper
There is wisdom in harnessing the strengths of your enemy: customized encoding to thwart side-channel attacks
Fast Software Encryption
2018-05-09Paper
Code Reverse Engineering Problem for Identification Codes
IEEE Transactions on Information Theory
2017-07-12Paper
Software-only two-factor authentication secure against active servers
Progress in Cryptology – AFRICACRYPT 2016
2016-06-22Paper
Hierarchical identities from group signatures and pseudonymous signatures
The New Codebreakers
2016-05-02Paper
Cross-unlinkable hierarchical group signatures
Public Key Infrastructures, Services and Applications
2014-08-11Paper
Fuzzy Vault for Multiple Users
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
Password based key exchange protocols on elliptic curves which conceal the public parameters
Applied Cryptography and Network Security
2010-07-06Paper
On physical obfuscation of cryptographic algorithms
Progress in Cryptology - INDOCRYPT 2009
2009-12-17Paper
Private interrogation of devices via identification codes
Progress in Cryptology - INDOCRYPT 2009
2009-12-17Paper
Another Look at Extended Private Information Retrieval Protocols
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
Information Security and Privacy
2009-03-06Paper
Trusted-HB: A Low-Cost Version of HB$^+$ Secure Against Man-in-the-Middle Attacks
IEEE Transactions on Information Theory
2009-02-24Paper
Cryptanalysis of EC-RAC, a RFID Identification Protocol
Cryptology and Network Security
2009-01-09Paper
The best of both worlds: Applying secure sketches to cancelable biometrics
Science of Computer Programming
2009-01-09Paper
A fuzzy sketch with trapdoor
IEEE Transactions on Information Theory
2008-12-21Paper
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function
Lecture Notes in Computer Science
2008-11-20Paper
An Authentication Protocol with Encrypted Biometric Data
Progress in Cryptology – AFRICACRYPT 2008
2008-06-13Paper
Extended Private Information Retrieval and Its Application in Biometrics Authentications
Cryptology and Network Security
2008-04-15Paper


Research outcomes over time


This page was built for person: Julien Bringer