Thomas Icart

From MaRDI portal
Person:2889763



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Supplemental access control (PACE v2): security analysis of PACE integrated mapping
Cryptography and Security: From Theory to Applications
2012-06-08Paper
Efficient indifferentiable hashing into ordinary elliptic curves
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Password based key exchange protocols on elliptic curves which conceal the public parameters
Applied Cryptography and Network Security
2010-07-06Paper
On physical obfuscation of cryptographic algorithms
Progress in Cryptology - INDOCRYPT 2009
2009-12-17Paper
How to Hash into Elliptic Curves
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Cryptanalysis of EC-RAC, a RFID Identification Protocol
Cryptology and Network Security
2009-01-09Paper
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function
Lecture Notes in Computer Science
2008-11-20Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper


Research outcomes over time


This page was built for person: Thomas Icart