Thomas Icart
From MaRDI portal
Person:2889763
List of research outcomes
This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!
| Publication | Date of Publication | Type |
|---|---|---|
| Supplemental access control (PACE v2): security analysis of PACE integrated mapping Cryptography and Security: From Theory to Applications | 2012-06-08 | Paper |
| Efficient indifferentiable hashing into ordinary elliptic curves Advances in Cryptology – CRYPTO 2010 | 2010-08-24 | Paper |
| Password based key exchange protocols on elliptic curves which conceal the public parameters Applied Cryptography and Network Security | 2010-07-06 | Paper |
| On physical obfuscation of cryptographic algorithms Progress in Cryptology - INDOCRYPT 2009 | 2009-12-17 | Paper |
| How to Hash into Elliptic Curves Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |
| Cryptanalysis of EC-RAC, a RFID Identification Protocol Cryptology and Network Security | 2009-01-09 | Paper |
| Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function Lecture Notes in Computer Science | 2008-11-20 | Paper |
| Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Research outcomes over time
This page was built for person: Thomas Icart