Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Julien Bringer
@inproceedings{DBLP:conf/crisis/BringerCG20, author = {Julien Bringer and Herv{\'{e}} Chabanne and Linda Guiga}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jean Leneutre and Nora Cuppens and Reda Yaich}, title = {Premium Access to Convolutional Neural Networks}, booktitle = {Risks and Security of Internet and Systems - 15th International Conference, CRiSIS 2020, Paris, France, November 4-6, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12528}, pages = {219--234}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68887-5\_13}, doi = {10.1007/978-3-030-68887-5\_13}, timestamp = {Tue, 16 Feb 2021 15:53:52 +0100}, biburl = {https://dblp.org/rec/conf/crisis/BringerCG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-11100, author = {Julien Bringer and Herv{\'{e}} Chabanne and Linda Guiga}, title = {Premium Access to Convolutional Neural Networks}, journal = {CoRR}, volume = {abs/2005.11100}, year = {2020}, url = {https://arxiv.org/abs/2005.11100}, eprinttype = {arXiv}, eprint = {2005.11100}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-11100.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/DabosvilleMLLB19, author = {Guillaume Dabosville and Houssem Maghrebi and Alexis Lhuillery and Thanh{-}Ha Le and Julien Bringer}, title = {On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks}, booktitle = {22nd Euromicro Conference on Digital System Design, {DSD} 2019, Kallithea, Greece, August 28-30, 2019}, pages = {214--221}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSD.2019.00040}, doi = {10.1109/DSD.2019.00040}, timestamp = {Wed, 23 Oct 2019 17:11:33 +0200}, biburl = {https://dblp.org/rec/conf/dsd/DabosvilleMLLB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DabosvilleMLBL19, author = {Guillaume Dabosville and Houssem Maghrebi and Alexis Lhuillery and Julien Bringer and Thanh{-}Ha Le}, title = {On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {4}, year = {2019}, url = {https://eprint.iacr.org/2019/004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DabosvilleMLBL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdp/BringerCML18, author = {Julien Bringer and Herv{\'{e}} Chabanne and Daniel Le M{\'{e}}tayer and Roch Lescuyer}, title = {Biometric Systems Private by Design: Reasoning about privacy properties of biometric system architectures}, journal = {Trans. Data Priv.}, volume = {11}, number = {2}, pages = {111--137}, year = {2018}, url = {http://www.tdp.cat/issues16/tdp.a274a17.pdf}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdp/BringerCML18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/YangBG18, author = {Bian Yang and Julien Bringer and Hideaki Goto}, editor = {Sorel Reisman and Sheikh Iqbal Ahamed and Claudio Demartini and Thomas M. Conte and Ling Liu and William R. Claycomb and Motonori Nakamura and Edmundo Tovar and Stelvio Cimato and Chung{-}Horng Lung and Hiroki Takakura and Ji{-}Jiang Yang and Toyokazu Akiyama and Zhiyong Zhang and Kamrul Hasan}, title = {Message from the {SDIM} 2018 Workshop Organizers}, booktitle = {2018 {IEEE} 42nd Annual Computer Software and Applications Conference, {COMPSAC} 2018, Tokyo, Japan, 23-27 July 2018, Volume 2}, pages = {558}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/COMPSAC.2018.10294}, doi = {10.1109/COMPSAC.2018.10294}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/YangBG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ivc/BringerMR17, author = {Julien Bringer and Constance Morel and Christian Rathgeb}, title = {Security analysis and improvement of some biometric protected templates based on Bloom filters}, journal = {Image Vis. Comput.}, volume = {58}, pages = {239--253}, year = {2017}, url = {https://doi.org/10.1016/j.imavis.2016.08.002}, doi = {10.1016/J.IMAVIS.2016.08.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ivc/BringerMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apf/BernabeSNBD17, author = {Jorge Bernal Bernab{\'{e}} and Antonio F. Skarmeta and Nicol{\'{a}}s Notario and Julien Bringer and Martin David}, editor = {Erich Schweighofer and Herbert Leitold and Andreas Mitrakas and Kai Rannenberg}, title = {Towards a Privacy-Preserving Reliable European Identity Ecosystem}, booktitle = {Privacy Technologies and Policy - 5th Annual Privacy Forum, {APF} 2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10518}, pages = {19--33}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67280-9\_2}, doi = {10.1007/978-3-319-67280-9\_2}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apf/BernabeSNBD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BringerCML17, author = {Julien Bringer and Herv{\'{e}} Chabanne and Daniel Le M{\'{e}}tayer and Roch Lescuyer}, title = {Biometric Systems Private by Design: Reasoning about privacy properties of biometric system architectures}, journal = {CoRR}, volume = {abs/1702.08301}, year = {2017}, url = {http://arxiv.org/abs/1702.08301}, eprinttype = {arXiv}, eprint = {1702.08301}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BringerCML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/BringerCL16, author = {Julien Bringer and Herv{\'{e}} Chabanne and Roch Lescuyer}, editor = {David Pointcheval and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Software-Only Two-Factor Authentication Secure Against Active Servers}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2016 - 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9646}, pages = {285--303}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-31517-1\_15}, doi = {10.1007/978-3-319-31517-1\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/BringerCL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/BringerCLP16, author = {Julien Bringer and Herv{\'{e}} Chabanne and Roch Lescuyer and Alain Patey}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {Hierarchical Identities from Group Signatures and Pseudonymous Signatures}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {457--469}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_28}, doi = {10.1007/978-3-662-49301-4\_28}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/BringerCLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/MaghrebiB16, author = {Houssem Maghrebi and Julien Bringer}, editor = {Kerstin Lemke{-}Rust and Michael Tunstall}, title = {Side-Channel Analysis of the {TUAK} Algorithm Used for Authentication and Key Agreement in 3G/4G Networks}, booktitle = {Smart Card Research and Advanced Applications - 15th International Conference, {CARDIS} 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10146}, pages = {39--56}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54669-8\_3}, doi = {10.1007/978-3-319-54669-8\_3}, timestamp = {Fri, 27 Mar 2020 08:58:07 +0100}, biburl = {https://dblp.org/rec/conf/cardis/MaghrebiB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/IidaMYYB16, author = {Katsuyoshi Iida and Yutaka Miyake and Chung Huang Yang and Bian Yang and Julien Bringer}, title = {Message from the {NETSAP} and {SIMICE} Workshop Organizers}, booktitle = {40th {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} Workshops 2016, Atlanta, GA, USA, June 10-14, 2016}, pages = {552}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/COMPSAC.2016.286}, doi = {10.1109/COMPSAC.2016.286}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/IidaMYYB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BringerCML16, author = {Julien Bringer and Herv{\'{e}} Chabanne and Daniel Le M{\'{e}}tayer and Roch Lescuyer}, editor = {Silvio Ranise and Vipin Swarup}, title = {Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems}, booktitle = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP} {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9766}, pages = {313--327}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-41483-6\_22}, doi = {10.1007/978-3-319-41483-6\_22}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BringerCML16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AmchyaaBL16, author = {Ghassane Amchyaa and Julien Bringer and Roch Lescuyer}, editor = {Giovanni Livraga and Vicen{\c{c}} Torra and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Searchable Encryption for Biometric Identification Revisited}, booktitle = {Data Privacy Management and Security Assurance - 11th International Workshop, {DPM} 2016 and 5th International Workshop, {QASA} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9963}, pages = {113--129}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47072-6\_8}, doi = {10.1007/978-3-319-47072-6\_8}, timestamp = {Tue, 07 May 2024 20:10:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AmchyaaBL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MaghrebiSB16, author = {Houssem Maghrebi and Victor Servant and Julien Bringer}, editor = {Thomas Peyrin}, title = {There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {223--243}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_12}, doi = {10.1007/978-3-662-52993-5\_12}, timestamp = {Fri, 27 Mar 2020 08:58:25 +0100}, biburl = {https://dblp.org/rec/conf/fse/MaghrebiSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BringerOMC16, author = {Julien Bringer and Othmane El Omri and Constance Morel and Herv{\'{e}} Chabanne}, editor = {X. Sean Wang and Lujo Bauer and Florian Kerschbaum}, title = {Boosting {GSHADE} Capabilities: New Applications and Security in Malicious Setting}, booktitle = {Proceedings of the 21st {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2016, Shanghai, China, June 5-8, 2016}, pages = {203--214}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2914642.2914658}, doi = {10.1145/2914642.2914658}, timestamp = {Tue, 06 Nov 2018 16:57:59 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BringerOMC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaghrebiSB16, author = {Houssem Maghrebi and Victor Servant and Julien Bringer}, title = {There is Wisdom in Harnessing the Strengths of your Enemy: Customized Encoding to Thwart Side-Channel Attacks - Extended Version -}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {183}, year = {2016}, url = {http://eprint.iacr.org/2016/183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaghrebiSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/YangB15, author = {Bian Yang and Julien Bringer}, editor = {Sheikh Iqbal Ahamed and Carl K. Chang and William C. Chu and Ivica Crnkovic and Pao{-}Ann Hsiung and Gang Huang and Jingwei Yang}, title = {Message from the {SIMICE} 2015 Workshop Organizers}, booktitle = {39th Annual Computer Software and Applications Conference, {COMPSAC} Workshops 2015, Taichung, Taiwan, July 1-5, 2015}, pages = {296}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/COMPSAC.2015.307}, doi = {10.1109/COMPSAC.2015.307}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/YangB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edemocracy/BringerGKKLORSV15, author = {Julien Bringer and Beatriz Gallego{-}Nicasio and Ghassan Karame and Mathias Kohler and Panos Louridas and Melek {\"{O}}nen and Hubert Ritzdorf and Alessandro Sorniotti and David Vallejo}, editor = {Sokratis K. Katsikas and Alexander B. Sideridis}, title = {{TREDISEC:} Trust-Aware REliable and Distributed Information SEcurity in the Cloud}, booktitle = {E-Democracy - Citizen Rights in the World of the New Computing Paradigms - 6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015, Proceedings}, series = {Communications in Computer and Information Science}, volume = {570}, pages = {193--197}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27164-4\_14}, doi = {10.1007/978-3-319-27164-4\_14}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edemocracy/BringerGKKLORSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/BringerCML15, author = {Julien Bringer and Herv{\'{e}} Chabanne and Daniel Le M{\'{e}}tayer and Roch Lescuyer}, editor = {Nikolaj S. Bj{\o}rner and Frank S. de Boer}, title = {Privacy by Design in Practice: Reasoning about Privacy Properties of Biometric System Architectures}, booktitle = {{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9109}, pages = {90--107}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19249-9\_7}, doi = {10.1007/978-3-319-19249-9\_7}, timestamp = {Thu, 14 Apr 2022 20:26:16 +0200}, biburl = {https://dblp.org/rec/conf/fm/BringerCML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/RiviereNRDBS15, author = {Lionel Rivi{\`{e}}re and Zakaria Najm and Pablo Rauzy and Jean{-}Luc Danger and Julien Bringer and Laurent Sauvage}, title = {High precision fault injections on the instruction cache of ARMv7-M architectures}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {62--67}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140238}, doi = {10.1109/HST.2015.7140238}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/RiviereNRDBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/BringerMR15, author = {Julien Bringer and Constance Morel and Christian Rathgeb}, title = {Security analysis of Bloom filter-based iris biometric template protection}, booktitle = {International Conference on Biometrics, {ICB} 2015, Phuket, Thailand, 19-22 May, 2015}, pages = {527--534}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICB.2015.7139069}, doi = {10.1109/ICB.2015.7139069}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/icb/BringerMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FavrePBC15, author = {M{\'{e}}lanie Favre and Sylvaine Picard and Julien Bringer and Herv{\'{e}} Chabanne}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Balancing is the Key - Performing Finger Vein Template Protection using Fuzzy Commitment}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {304--311}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005241403040311}, doi = {10.5220/0005241403040311}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FavrePBC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/RiviereBLC15, author = {Lionel Rivi{\`{e}}re and Julien Bringer and Thanh{-}Ha Le and Herv{\'{e}} Chabanne}, title = {A novel simulation approach for fault injection resistance evaluation on smart cards}, booktitle = {Eighth {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2015 Workshops, Graz, Austria, April 13-17, 2015}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICSTW.2015.7107460}, doi = {10.1109/ICSTW.2015.7107460}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/RiviereBLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BringerCML15, author = {Julien Bringer and Herv{\'{e}} Chabanne and Daniel Le M{\'{e}}tayer and Roch Lescuyer}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Reasoning about Privacy Properties of Biometric Systems Architectures in the Presence of Information Leakage}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {493--510}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_27}, doi = {10.1007/978-3-319-23318-5\_27}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/BringerCML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/BringerCKLS15, author = {Julien Bringer and Herv{\'{e}} Chabanne and Firas Kraiem and Roch Lescuyer and Eduardo Soria{-}Vazquez}, title = {Some applications of verifiable computation to biometric verification}, booktitle = {2015 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2015, Roma, Italy, November 16-19, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/WIFS.2015.7368568}, doi = {10.1109/WIFS.2015.7368568}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/BringerCKLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RiviereNRDBS15, author = {Lionel Rivi{\`{e}}re and Zakaria Najm and Pablo Rauzy and Jean{-}Luc Danger and Julien Bringer and Laurent Sauvage}, title = {High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures}, journal = {CoRR}, volume = {abs/1510.01537}, year = {2015}, url = {http://arxiv.org/abs/1510.01537}, eprinttype = {arXiv}, eprint = {1510.01537}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RiviereNRDBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RiviereNRDBS15, author = {Lionel Rivi{\`{e}}re and Zakaria Najm and Pablo Rauzy and Jean{-}Luc Danger and Julien Bringer and Laurent Sauvage}, title = {High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {147}, year = {2015}, url = {http://eprint.iacr.org/2015/147}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RiviereNRDBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/FujimotoMNHHAHKSLBBBD14, author = {Daisuke Fujimoto and Noriyuki Miura and Makoto Nagata and Yu{-}ichi Hayashi and Naofumi Homma and Takafumi Aoki and Yohei Hori and Toshihiro Katashita and Kazuo Sakiyama and Thanh{-}Ha Le and Julien Bringer and Pirouz Bazargan{-}Sabet and Shivam Bhasin and Jean{-}Luc Danger}, title = {Power Noise Measurements of Cryptographic {VLSI} Circuits Regarding Side-Channel Information Leakage}, journal = {{IEICE} Trans. Electron.}, volume = {97-C}, number = {4}, pages = {272--279}, year = {2014}, url = {https://doi.org/10.1587/transele.E97.C.272}, doi = {10.1587/TRANSELE.E97.C.272}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/FujimotoMNHHAHKSLBBBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biosig/BringerFPS14, author = {Julien Bringer and M{\'{e}}lanie Favre and Chlo{\'{e}} Pelle and Hughes de Saxc{\'{e}}}, editor = {Arslan Br{\"{o}}mme and Christoph Busch}, title = {Fuzzy vault and template-level fusion applied to a binary fingerprint representation}, booktitle = {{BIOSIG} 2014 - Proceedings of the 13th International Conference of the Biometrics Special Interest Group, 10.-12. September 2014, Darmstadt, Germany}, series = {{LNI}}, volume = {{P-230}}, pages = {235--242}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/2666}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/biosig/BringerFPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/ServantDMB14, author = {Victor Servant and Nicolas Debande and Houssem Maghrebi and Julien Bringer}, editor = {Marc Joye and Amir Moradi}, title = {Study of a Novel Software Constant Weight Implementation}, booktitle = {Smart Card Research and Advanced Applications - 13th International Conference, {CARDIS} 2014, Paris, France, November 5-7, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8968}, pages = {35--48}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16763-3\_3}, doi = {10.1007/978-3-319-16763-3\_3}, timestamp = {Thu, 14 Oct 2021 10:29:55 +0200}, biburl = {https://dblp.org/rec/conf/cardis/ServantDMB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/BerthierBBCCDFG14, author = {Ma{\"{e}}l Berthier and Yves Bocktaels and Julien Bringer and Herv{\'{e}} Chabanne and Taoufik Chouta and Jean{-}Luc Danger and M{\'{e}}lanie Favre and Tarik Graba}, editor = {Emmanuel Prouff}, title = {Studying Leakages on an Embedded Biometric System Using Side Channel Analysis}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8622}, pages = {281--298}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10175-0\_19}, doi = {10.1007/978-3-319-10175-0\_19}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/BerthierBBCCDFG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/PuysRBL14, author = {Maxime Puys and Lionel Rivi{\`{e}}re and Julien Bringer and Thanh{-}Ha Le}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {High-Level Simulation for Multiple Fault Injection Evaluation}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {293--308}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_19}, doi = {10.1007/978-3-319-17016-9\_19}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/PuysRBL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/BerthierBCLRS14, author = {Ma{\"{e}}l Berthier and Julien Bringer and Herv{\'{e}} Chabanne and Thanh{-}Ha Le and Lionel Rivi{\`{e}}re and Victor Servant}, editor = {Jan J{\"{u}}rjens and Frank Piessens and Nataliia Bielova}, title = {Idea: Embedded Fault Injection Simulator on Smartcard}, booktitle = {Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8364}, pages = {222--229}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04897-0\_15}, doi = {10.1007/978-3-319-04897-0\_15}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/essos/BerthierBCLRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BringerCLP14, author = {Julien Bringer and Herv{\'{e}} Chabanne and Roch Lescuyer and Alain Patey}, editor = {Nicolas Christin and Reihaneh Safavi{-}Naini}, title = {Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for {ID} Documents}, booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8437}, pages = {255--272}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45472-5\_16}, doi = {10.1007/978-3-662-45472-5\_16}, timestamp = {Tue, 21 Mar 2023 20:59:40 +0100}, biburl = {https://dblp.org/rec/conf/fc/BringerCLP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/RivierePLBCP14, author = {Lionel Rivi{\`{e}}re and Marie{-}Laure Potet and Thanh{-}Ha Le and Julien Bringer and Herv{\'{e}} Chabanne and Maxime Puys}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood and Philip W. L. Fong}, title = {Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks}, booktitle = {Foundations and Practice of Security - 7th International Symposium, {FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8930}, pages = {92--111}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17040-4\_7}, doi = {10.1007/978-3-319-17040-4\_7}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/fps/RivierePLBCP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/BringerCM14, author = {Julien Bringer and Herv{\'{e}} Chabanne and Constance Morel}, title = {Shuffling is not sufficient: Security analysis of cancelable iriscodes based on a secret permutation}, booktitle = {{IEEE} International Joint Conference on Biometrics, Clearwater, {IJCB} 2014, FL, USA, September 29 - October 2, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/BTAS.2014.6996280}, doi = {10.1109/BTAS.2014.6996280}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/icb/BringerCM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BringerCFP0Z14, author = {Julien Bringer and Herv{\'{e}} Chabanne and M{\'{e}}lanie Favre and Alain Patey and Thomas Schneider and Michael Zohner}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {{GSHADE:} faster privacy-preserving distance computation and biometric identification}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {187--198}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600922}, doi = {10.1145/2600918.2600922}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/BringerCFP0Z14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/ChoutaGDBBBFC14, author = {Taoufik Chouta and Tarik Graba and Jean{-}Luc Danger and Julien Bringer and Ma{\"{e}}l Berthier and Yves Bocktaels and M{\'{e}}lanie Favre and Herv{\'{e}} Chabanne}, editor = {Ruby B. Lee and Weidong Shi}, title = {Side channel analysis on an embedded hardware fingerprint biometric comparator {\&} low cost countermeasures}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {6:1--6:6}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611771}, doi = {10.1145/2611765.2611771}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/ChoutaGDBBBFC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BourgeatBCCCFHMNV14, author = {Thomas Bourgeat and Julien Bringer and Herv{\'{e}} Chabanne and Robin Champenois and J{\'{e}}r{\'{e}}mie Cl{\'{e}}ment and Houda Ferradi and Marc Heinrich and Paul Melotti and David Naccache and Antoine Voizard}, editor = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Anas Abou El Kalam and Thierry Sans}, title = {New Algorithmic Approaches to Point Constellation Recognition}, booktitle = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11 International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {428}, pages = {80--90}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55415-5\_7}, doi = {10.1007/978-3-642-55415-5\_7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BourgeatBCCCFHMNV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BringerCCGM14, author = {Julien Bringer and Claude Carlet and Herv{\'{e}} Chabanne and Sylvain Guilley and Houssem Maghrebi}, editor = {David Naccache and Damien Sauveron}, title = {Orthogonal Direct Sum Masking - {A} Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {40--56}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_4}, doi = {10.1007/978-3-662-43826-8\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BringerCCGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BourgeatBCCCFHMNV14, author = {Thomas Bourgeat and Julien Bringer and Herv{\'{e}} Chabanne and Robin Champenois and J{\'{e}}r{\'{e}}mie Cl{\'{e}}ment and Houda Ferradi and Marc Heinrich and Paul Melotti and David Naccache and Antoine Voizard}, title = {New Algorithmic Approaches to Point Constellation Recognition}, journal = {CoRR}, volume = {abs/1405.1402}, year = {2014}, url = {http://arxiv.org/abs/1405.1402}, eprinttype = {arXiv}, eprint = {1405.1402}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BourgeatBCCCFHMNV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BerthierBBCCDFG14, author = {Ma{\"{e}}l Berthier and Yves Bocktaels and Julien Bringer and Herv{\'{e}} Chabanne and Taoufik Chouta and Jean{-}Luc Danger and M{\'{e}}lanie Favre and Tarik Graba}, title = {Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2014}, url = {http://eprint.iacr.org/2014/026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BerthierBBCCDFG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BringerCLP14, author = {Julien Bringer and Herv{\'{e}} Chabanne and Roch Lescuyer and Alain Patey}, title = {Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for {ID} Documents}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {67}, year = {2014}, url = {http://eprint.iacr.org/2014/067}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BringerCLP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BringerCCGM14a, author = {Julien Bringer and Claude Carlet and Herv{\'{e}} Chabanne and Sylvain Guilley and Houssem Maghrebi}, title = {Orthogonal Direct Sum Masking: {A} Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {665}, year = {2014}, url = {http://eprint.iacr.org/2014/665}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BringerCCGM14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spm/BringerCP13, author = {Julien Bringer and Herv{\'{e}} Chabanne and Alain Patey}, title = {Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends}, journal = {{IEEE} Signal Process. Mag.}, volume = {30}, number = {2}, pages = {42--52}, year = {2013}, url = {https://doi.org/10.1109/MSP.2012.2230218}, doi = {10.1109/MSP.2012.2230218}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spm/BringerCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/JustusCCBCC13, author = {Benjamin Justus and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Julien Bringer and Herv{\'{e}} Chabanne and Olivier Cipiere}, editor = {Lingyu Wang and Basit Shafiq}, title = {Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {274--281}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_19}, doi = {10.1007/978-3-642-39256-6\_19}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/JustusCCBCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dim/YangBBKBSSRWA13, author = {Bian Yang and Christoph Busch and Julien Bringer and Els Kindt and Willem Ronald Belser and Uwe Seidel and Edward Springmann and Uwe Rabeler and Andreas Wolf and Magnar Aukrust}, editor = {Thomas Gro{\ss} and Marit Hansen}, title = {Towards standardizing trusted evidence of identity}, booktitle = {DIM'13, Proceedings of the 2013 {ACM} Workshop on Digital Identity Management, Berlin, Germany, November 8, 2013}, pages = {63--72}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517881.2517890}, doi = {10.1145/2517881.2517890}, timestamp = {Wed, 06 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dim/YangBBKBSSRWA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BringerCP13, author = {Julien Bringer and Herv{\'{e}} Chabanne and Alain Patey}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {{SHADE:} Secure HAmming DistancE Computation from Oblivious Transfer}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {164--176}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_11}, doi = {10.1007/978-3-642-41320-9\_11}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/BringerCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/BringerCP13, author = {Julien Bringer and Herv{\'{e}} Chabanne and Alain Patey}, editor = {Julian Fi{\'{e}}rrez and Ajay Kumar and Mayank Vatsa and Raymond N. J. Veldhuis and Javier Ortega{-}Garcia}, title = {Practical identification with encrypted biometric data using oblivious {RAM}}, booktitle = {International Conference on Biometrics, {ICB} 2013, 4-7 June, 2013, Madrid, Spain}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICB.2013.6612970}, doi = {10.1109/ICB.2013.6612970}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/icb/BringerCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/MathonFAB13, author = {Benjamin Mathon and Teddy Furon and Laurent Amsaleg and Julien Bringer}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Secure and efficient approximate nearest neighbors search}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {175--180}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482539}, doi = {10.1145/2482513.2482539}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/MathonFAB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/BringerCP13, author = {Julien Bringer and Herv{\'{e}} Chabanne and Alain Patey}, editor = {Javier L{\'{o}}pez and Xinyi Huang and Ravi S. Sandhu}, title = {Collusion-Resistant Domain-Specific Pseudonymous Signatures}, booktitle = {Network and System Security - 7th International Conference, {NSS} 2013, Madrid, Spain, June 3-4, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7873}, pages = {649--655}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38631-2\_52}, doi = {10.1007/978-3-642-38631-2\_52}, timestamp = {Tue, 09 Feb 2021 08:50:29 +0100}, biburl = {https://dblp.org/rec/conf/nss/BringerCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/JustusCCBCC13, author = {Benjamin Justus and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Julien Bringer and Herv{\'{e}} Chabanne and Olivier Cipiere}, editor = {Jordi Castell{\`{a}}{-}Roca and Josep Domingo{-}Ferrer and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Ali A. Ghorbani and Christian Damsgaard Jensen and Jes{\'{u}}s A. Manj{\'{o}}n and Iosif{-}Viorel Onut and Natalia Stakhanova and Vicen{\c{c}} Torra and Jie Zhang}, title = {Define privacy-preserving setbase drawer size standard: {A} {\unicode{8714}}-closeness perspective}, booktitle = {Eleventh Annual International Conference on Privacy, Security and Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013}, pages = {362--365}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/PST.2013.6596090}, doi = {10.1109/PST.2013.6596090}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/JustusCCBCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/BringerC13, author = {Julien Bringer and Herv{\'{e}} Chabanne}, editor = {Patrizio Campisi}, title = {Two Efficient Architectures for Handling Biometric Data While Taking Care of Their Privacy}, booktitle = {Security and Privacy in Biometrics}, pages = {275--295}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4471-5230-9\_11}, doi = {10.1007/978-1-4471-5230-9\_11}, timestamp = {Tue, 16 May 2017 14:01:33 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/BringerC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BringerCP13, author = {Julien Bringer and Herv{\'{e}} Chabanne and Alain Patey}, title = {Collusion-Resistant Domain-Specific Pseudonymous Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {182}, year = {2013}, url = {http://eprint.iacr.org/2013/182}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BringerCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hcis/BringerC12, author = {Julien Bringer and Herv{\'{e}} Chabanne}, title = {Embedding edit distance to enable private keyword search}, journal = {Hum. centric Comput. Inf. Sci.}, volume = {2}, pages = {2}, year = {2012}, url = {https://doi.org/10.1186/2192-1962-2-2}, doi = {10.1186/2192-1962-2-2}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/hcis/BringerC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BringerCL12, author = {Julien Bringer and Herv{\'{e}} Chabanne and Thanh{-}Ha Le}, title = {Protecting {AES} against side-channel analysis using wire-tap codes}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {2}, pages = {129--141}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0034-2}, doi = {10.1007/S13389-012-0034-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BringerCL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SimoensBCS12, author = {Koen Simoens and Julien Bringer and Herv{\'{e}} Chabanne and Stefaan Seys}, title = {A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {7}, number = {2}, pages = {833--841}, year = {2012}, url = {https://doi.org/10.1109/TIFS.2012.2184092}, doi = {10.1109/TIFS.2012.2184092}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SimoensBCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BringerC12, author = {Julien Bringer and Herv{\'{e}} Chabanne}, title = {Code Reverse Engineering Problem for Identification Codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {4}, pages = {2406--2412}, year = {2012}, url = {https://doi.org/10.1109/TIT.2011.2177808}, doi = {10.1109/TIT.2011.2177808}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/BringerC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/BringerCF12, author = {Julien Bringer and Herv{\'{e}} Chabanne and M{\'{e}}lanie Favre}, editor = {Aikaterini Mitrokotsa and Serge Vaudenay}, title = {Fuzzy Vault for Multiple Users}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7374}, pages = {67--81}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31410-0\_5}, doi = {10.1007/978-3-642-31410-0\_5}, timestamp = {Sun, 02 Jun 2019 21:14:37 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/BringerCF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/BringerCP12, author = {Julien Bringer and Herv{\'{e}} Chabanne and Alain Patey}, editor = {Sabrina De Capitani di Vimercati and Chris J. Mitchell}, title = {Cross-Unlinkable Hierarchical Group Signatures}, booktitle = {Public Key Infrastructures, Services and Applications - 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7868}, pages = {161--177}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-40012-4\_11}, doi = {10.1007/978-3-642-40012-4\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/BringerCP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/BringerFCP12, author = {Julien Bringer and M{\'{e}}lanie Favre and Herv{\'{e}} Chabanne and Alain Patey}, editor = {Anil K. Jain and Arun Ross and Salil Prabhakar and Jaihie Kim}, title = {Faster secure computation for biometric identification using filtering}, booktitle = {5th {IAPR} International Conference on Biometrics, {ICB} 2012, New Delhi, India, March 29 - April 1, 2012}, pages = {257--264}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICB.2012.6199817}, doi = {10.1109/ICB.2012.6199817}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icb/BringerFCP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/BringerCC12, author = {Julien Bringer and Herv{\'{e}} Chabanne and Olivier Cipiere}, editor = {Nora Cuppens{-}Boulahia and Philip Fong and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Stephen Marsh and Jan{-}Philipp Stegh{\"{o}}fer}, title = {Combining the setbase approach with negative databases}, booktitle = {Tenth Annual International Conference on Privacy, Security and Trust, {PST} 2012, Paris, France, July 16-18, 2012}, pages = {233--234}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/PST.2012.6297948}, doi = {10.1109/PST.2012.6297948}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/BringerCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BringerP12, author = {Julien Bringer and Alain Patey}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {{VLR} Group Signatures - How to Achieve Both Backward Unlinkability and Efficient Revocation Checks}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {215--220}, publisher = {SciTePress}, year = {2012}, timestamp = {Tue, 07 Nov 2017 12:02:58 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/BringerP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BringerCP12, author = {Julien Bringer and Herv{\'{e}} Chabanne and Alain Patey}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {An Application of a Group Signature Scheme with Backward Unlinkability to Biometric Identity Management}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {421--425}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/BringerCP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BringerCP12, author = {Julien Bringer and Herv{\'{e}} Chabanne and Alain Patey}, title = {Cross-Unlinkable Hierarchical Group Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {407}, year = {2012}, url = {http://eprint.iacr.org/2012/407}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BringerCP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BringerCP12a, author = {Julien Bringer and Herv{\'{e}} Chabanne and Alain Patey}, title = {{SHADE:} Secure HAmming DistancE computation from oblivious transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {586}, year = {2012}, url = {http://eprint.iacr.org/2012/586}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BringerCP12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BringerCK11, author = {Julien Bringer and Herv{\'{e}} Chabanne and Bruno Kindarji}, title = {Identification with encrypted biometric data}, journal = {Secur. Commun. Networks}, volume = {4}, number = {5}, pages = {548--562}, year = {2011}, url = {https://doi.org/10.1002/sec.206}, doi = {10.1002/SEC.206}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BringerCK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biosig/BringerC11, author = {Julien Bringer and Herv{\'{e}} Chabanne}, editor = {Arslan Br{\"{o}}mme and Christoph Busch}, title = {Visual cryptography applied to fingerprint features as a solution for pre-alignment}, booktitle = {{BIOSIG} 2011 - Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 08.-09. September 2011 in Darmstadt, Germany}, series = {{LNI}}, volume = {{P-191}}, pages = {243--250}, publisher = {{GI}}, year = {2011}, url = {https://dl.gi.de/handle/20.500.12116/18547}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/biosig/BringerC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sta/BringerC11, author = {Julien Bringer and Herv{\'{e}} Chabanne}, editor = {James J. Park and Javier L{\'{o}}pez and Sang{-}Soo Yeo and Taeshik Shon and David Taniar}, title = {Embedding Edit Distance to Allow Private Keyword Search in Cloud Computing}, booktitle = {Secure and Trust Computing, Data Management and Applications - 8th {FTRA} International Conference, {STA} 2011, Loutraki, Greece, June 28-30, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {186}, pages = {105--113}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22339-6\_13}, doi = {10.1007/978-3-642-22339-6\_13}, timestamp = {Mon, 08 Apr 2019 12:52:12 +0200}, biburl = {https://dblp.org/rec/conf/sta/BringerC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1101-2569, author = {Koen Simoens and Julien Bringer and Herv{\'{e}} Chabanne and Stefaan Seys}, title = {Analysis of Biometric Authentication Protocols in the Blackbox Model}, journal = {CoRR}, volume = {abs/1101.2569}, year = {2011}, url = {http://arxiv.org/abs/1101.2569}, eprinttype = {arXiv}, eprint = {1101.2569}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1101-2569.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1105-1601, author = {Julien Bringer and Herv{\'{e}} Chabanne}, title = {Code Reverse Engineering problem for Identification Codes}, journal = {CoRR}, volume = {abs/1105.1601}, year = {2011}, url = {http://arxiv.org/abs/1105.1601}, eprinttype = {arXiv}, eprint = {1105.1601}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1105-1601.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BringerP11, author = {Julien Bringer and Alain Patey}, title = {Backward Unlinkability for a {VLR} Group Signature Scheme with Efficient Revocation Check}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {376}, year = {2011}, url = {http://eprint.iacr.org/2011/376}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BringerP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BringerCI10, author = {Julien Bringer and Herv{\'{e}} Chabanne and Thomas Icart}, editor = {Jianying Zhou and Moti Yung}, title = {Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {291--308}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_18}, doi = {10.1007/978-3-642-13708-2\_18}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BringerCI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/btas/BringerD10, author = {Julien Bringer and Vincent Despiegel}, title = {Binary feature vector fingerprint representation from minutiae vicinities}, booktitle = {Fourth {IEEE} International Conference on Biometrics: Theory Applications and Systems, {BTAS} 2010, Washington, DC, USA, 27-29 September, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/BTAS.2010.5634488}, doi = {10.1109/BTAS.2010.5634488}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/btas/BringerD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/BringerCS10, author = {Julien Bringer and Herv{\'{e}} Chabanne and Koen Simoens}, editor = {Isao Echizen and Jeng{-}Shyang Pan and Dieter W. Fellner and Alexander Nouak and Arjan Kuijper and Lakhmi C. Jain}, title = {Blackbox Security of Biometrics (Invited Paper)}, booktitle = {Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings}, pages = {337--340}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IIHMSP.2010.89}, doi = {10.1109/IIHMSP.2010.89}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/BringerCS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/BringerCCK10, author = {Julien Bringer and Herv{\'{e}} Chabanne and G{\'{e}}rard D. Cohen and Bruno Kindarji}, editor = {Marcus Greferath and Joachim Rosenthal and Alexander Barg and Gilles Z{\'{e}}mor}, title = {Identification codes in cryptographic protocols}, booktitle = {2010 {IEEE} Information Theory Workshop, {ITW} 2010, Dublin, Ireland, August 30 - September 3, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/CIG.2010.5592911}, doi = {10.1109/CIG.2010.5592911}, timestamp = {Mon, 09 Aug 2021 14:54:02 +0200}, biburl = {https://dblp.org/rec/conf/itw/BringerCCK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/BringerC10, author = {Julien Bringer and Herv{\'{e}} Chabanne}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Negative databases for biometric data}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {55--62}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854242}, doi = {10.1145/1854229.1854242}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/BringerC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1001-4992, author = {Julien Bringer and Herv{\'{e}} Chabanne and G{\'{e}}rard D. Cohen and Bruno Kindarji}, title = {{RFID} Key Establishment Against Active Adversaries}, journal = {CoRR}, volume = {abs/1001.4992}, year = {2010}, url = {http://arxiv.org/abs/1001.4992}, eprinttype = {arXiv}, eprint = {1001.4992}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1001-4992.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1005-1194, author = {Julien Bringer and Herv{\'{e}} Chabanne}, title = {Negative Databases for Biometric Data}, journal = {CoRR}, volume = {abs/1005.1194}, year = {2010}, url = {http://arxiv.org/abs/1005.1194}, eprinttype = {arXiv}, eprint = {1005.1194}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1005-1194.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/BringerC09, author = {Julien Bringer and Herv{\'{e}} Chabanne}, editor = {Bart Preneel}, title = {Another Look at Extended Private Information Retrieval Protocols}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5580}, pages = {305--322}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02384-2\_19}, doi = {10.1007/978-3-642-02384-2\_19}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/BringerC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BringerCI09, author = {Julien Bringer and Herv{\'{e}} Chabanne and Thomas Icart}, editor = {Wanqing Li and Willy Susilo and Udaya Kiran Tupakula and Reihaneh Safavi{-}Naini and Vijay Varadharajan}, title = {Efficient zero-knowledge identification schemes which respect privacy}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2009, Sydney, Australia, March 10-12, 2009}, pages = {195--205}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1533057.1533086}, doi = {10.1145/1533057.1533086}, timestamp = {Fri, 18 Mar 2022 11:47:58 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BringerCI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cost/BringerCKK09, author = {Julien Bringer and Herv{\'{e}} Chabanne and Tom A. M. Kevenaar and Bruno Kindarji}, editor = {Julian Fi{\'{e}}rrez{-}Aguilar and Javier Ortega{-}Garcia and Anna Esposito and Andrzej Drygajlo and Marcos Fa{\'{u}}ndez{-}Zanuy}, title = {Extending Match-On-Card to Local Biometric Identification}, booktitle = {Biometric {ID} Management and Multimodal Communication, Joint {COST} 2101 and 2102 International Conference, BioID{\_}MultiComm 2009, Madrid, Spain, September 16-18, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5707}, pages = {178--186}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04391-8\_23}, doi = {10.1007/978-3-642-04391-8\_23}, timestamp = {Sat, 09 Apr 2022 12:41:06 +0200}, biburl = {https://dblp.org/rec/conf/cost/BringerCKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/BringerCK09, author = {Julien Bringer and Herv{\'{e}} Chabanne and Bruno Kindarji}, title = {Error-Tolerant Searchable Encryption}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICC.2009.5199004}, doi = {10.1109/ICC.2009.5199004}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/BringerCK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/AdjedjBCK09, author = {Michael Adjedj and Julien Bringer and Herv{\'{e}} Chabanne and Bruno Kindarji}, editor = {Atul Prakash and Indranil Gupta}, title = {Biometric Identification over Encrypted Data Made Feasible}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {86--100}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_8}, doi = {10.1007/978-3-642-10772-6\_8}, timestamp = {Wed, 12 May 2021 16:44:21 +0200}, biburl = {https://dblp.org/rec/conf/iciss/AdjedjBCK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BringerCI09, author = {Julien Bringer and Herv{\'{e}} Chabanne and Thomas Icart}, editor = {Bimal K. Roy and Nicolas Sendrier}, title = {On Physical Obfuscation of Cryptographic Algorithms}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5922}, pages = {88--103}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10628-6\_6}, doi = {10.1007/978-3-642-10628-6\_6}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BringerCI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BringerCCK09, author = {Julien Bringer and Herv{\'{e}} Chabanne and G{\'{e}}rard D. Cohen and Bruno Kindarji}, editor = {Bimal K. Roy and Nicolas Sendrier}, title = {Private Interrogation of Devices via Identification Codes}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5922}, pages = {272--289}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10628-6\_19}, doi = {10.1007/978-3-642-10628-6\_19}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BringerCCK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/BringerCD09, author = {Julien Bringer and Herv{\'{e}} Chabanne and Jean{-}Luc Danger}, editor = {Viktor K. Prasanna and Lionel Torres and Ren{\'{e}} Cumplido}, title = {Protecting the {NOEKEON} Cipher against {SCARE} Attacks in FPGAs by Using Dynamic Implementations}, booktitle = {ReConFig'09: 2009 International Conference on Reconfigurable Computing and FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December 2009, Proceedings}, pages = {183--188}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ReConFig.2009.19}, doi = {10.1109/RECONFIG.2009.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/reconfig/BringerCD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/BringerCCK09, author = {Julien Bringer and Herv{\'{e}} Chabanne and G{\'{e}}rard D. Cohen and Bruno Kindarji}, title = {{RFID} key establishment against active adversaries}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {186--190}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386458}, doi = {10.1109/WIFS.2009.5386458}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wifs/BringerCCK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0901-1062, author = {Julien Bringer and Herv{\'{e}} Chabanne and Bruno Kindarji}, title = {Identification with Encrypted Biometric Data Made Feasible}, journal = {CoRR}, volume = {abs/0901.1062}, year = {2009}, url = {http://arxiv.org/abs/0901.1062}, eprinttype = {arXiv}, eprint = {0901.1062}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0901-1062.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BringerCD09, author = {Julien Bringer and Herv{\'{e}} Chabanne and Jean{-}Luc Danger}, title = {Protecting the {NOEKEON} Cipher Against {SCARE} Attacks in FPGAs by using Dynamic Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {239}, year = {2009}, url = {http://eprint.iacr.org/2009/239}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BringerCD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BringerCI09, author = {Julien Bringer and Herv{\'{e}} Chabanne and Thomas Icart}, title = {Password Based Key Exchange with Hidden Elliptic Curve Public Parameters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {468}, year = {2009}, url = {http://eprint.iacr.org/2009/468}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BringerCI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/BringerCK08, author = {Julien Bringer and Herv{\'{e}} Chabanne and Bruno Kindarji}, title = {The best of both worlds: Applying secure sketches to cancelable biometrics}, journal = {Sci. Comput. Program.}, volume = {74}, number = {1-2}, pages = {43--51}, year = {2008}, url = {https://doi.org/10.1016/j.scico.2008.09.016}, doi = {10.1016/J.SCICO.2008.09.016}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/BringerCK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BringerCCKZ08, author = {Julien Bringer and Herv{\'{e}} Chabanne and G{\'{e}}rard D. Cohen and Bruno Kindarji and Gilles Z{\'{e}}mor}, title = {Theoretical and Practical Boundaries of Binary Secure Sketches}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {4}, pages = {673--683}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.2002937}, doi = {10.1109/TIFS.2008.2002937}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BringerCCKZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BringerC08, author = {Julien Bringer and Herv{\'{e}} Chabanne}, title = {Trusted-HB: {A} Low-Cost Version of {HB} \({}^{\mbox{+}}\) Secure Against Man-in-the-Middle Attacks}, journal = {{IEEE} Trans. Inf. Theory}, volume = {54}, number = {9}, pages = {4339--4342}, year = {2008}, url = {https://doi.org/10.1109/TIT.2008.928290}, doi = {10.1109/TIT.2008.928290}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/BringerC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/BringerC08, author = {Julien Bringer and Herv{\'{e}} Chabanne}, editor = {Serge Vaudenay}, title = {An Authentication Protocol with Encrypted Biometric Data}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5023}, pages = {109--124}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68164-9\_8}, doi = {10.1007/978-3-540-68164-9\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/BringerC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/BringerCI08, author = {Julien Bringer and Herv{\'{e}} Chabanne and Thomas Icart}, editor = {Matthew K. Franklin and Lucas Chi Kwong Hui and Duncan S. Wong}, title = {Cryptanalysis of EC-RAC, a {RFID} Identification Protocol}, booktitle = {Cryptology and Network Security, 7th International Conference, {CANS} 2008, Hong-Kong, China, December 2-4, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5339}, pages = {149--161}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89641-8\_11}, doi = {10.1007/978-3-540-89641-8\_11}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/BringerCI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/DelvauxCBKLMBAVVKSBBGYSRCS08, author = {Nicolas Delvaux and Herv{\'{e}} Chabanne and Julien Bringer and Bruno Kindarji and Patrik Lindeberg and Johannes Midgren and Jeroen Breebaart and Ton H. Akkermans and Michiel van der Veen and Raymond N. J. Veldhuis and Els Kindt and Koen Simoens and Christoph Busch and Patrick Bours and Davrondzhon Gafurov and Bian Yang and Julien Stern and Carsten Rust and Bruno Cucinelli and Dimitrios Skepastianos}, editor = {Jeng{-}Shyang Pan and Xiamu Niu and Hsiang{-}Cheh Huang and Lakhmi C. Jain}, title = {Pseudo Identities Based on Fingerprint Characteristics}, booktitle = {4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17 August 2008, Proceedings}, pages = {1063--1068}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IIH-MSP.2008.327}, doi = {10.1109/IIH-MSP.2008.327}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/DelvauxCBKLMBAVVKSBBGYSRCS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/TangBCP08, author = {Qiang Tang and Julien Bringer and Herv{\'{e}} Chabanne and David Pointcheval}, editor = {Liqun Chen and Yi Mu and Willy Susilo}, title = {A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes}, booktitle = {Information Security Practice and Experience, 4th International Conference, {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4991}, pages = {56--70}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79104-1\_5}, doi = {10.1007/978-3-540-79104-1\_5}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/TangBCP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BringerCPZ08, author = {Julien Bringer and Herv{\'{e}} Chabanne and David Pointcheval and S{\'{e}}bastien Zimmer}, editor = {Kanta Matsuura and Eiichiro Fujisaki}, title = {An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication}, booktitle = {Advances in Information and Computer Security, Third International Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5312}, pages = {219--230}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89598-5\_15}, doi = {10.1007/978-3-540-89598-5\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BringerCPZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BringerCI08, author = {Julien Bringer and Herv{\'{e}} Chabanne and Thomas Icart}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {77--91}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_6}, doi = {10.1007/978-3-540-85855-3\_6}, timestamp = {Tue, 25 Feb 2020 11:33:46 +0100}, biburl = {https://dblp.org/rec/conf/scn/BringerCI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0802-0603, author = {Julien Bringer and Herv{\'{e}} Chabanne}, title = {Trusted-HB: a low-cost version of {HB+} secure against Man-in-The-Middle attacks}, journal = {CoRR}, volume = {abs/0802.0603}, year = {2008}, url = {http://arxiv.org/abs/0802.0603}, eprinttype = {arXiv}, eprint = {0802.0603}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0802-0603.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BringerC08, author = {Julien Bringer and Herv{\'{e}} Chabanne}, title = {Trusted-HB: a low-cost version of {HB+} secure against Man-in-The-Middle attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {42}, year = {2008}, url = {http://eprint.iacr.org/2008/042}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BringerC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BringerCI08, author = {Julien Bringer and Herv{\'{e}} Chabanne and Thomas Icart}, title = {Identification and Privacy: Zero-Knowledge is not Enough}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {229}, year = {2008}, url = {http://eprint.iacr.org/2008/229}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BringerCI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Bringer07, author = {Julien Bringer}, title = {Non-lin{\'{e}}arit{\'{e}} des fonctions bool{\'{e}}ennes : applications de la th{\'{e}}orie des fonctions bool{\'{e}}ennes et des codes en cryptographie. (Nonlinearity of boolean functions : ecryptographic applications of boolean functions and coding theory)}, school = {University of the South, Toulon-Var, France}, year = {2007}, url = {https://tel.archives-ouvertes.fr/tel-00258334}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Bringer07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BringerCIPTZ07, author = {Julien Bringer and Herv{\'{e}} Chabanne and Malika Izabach{\`{e}}ne and David Pointcheval and Qiang Tang and S{\'{e}}bastien Zimmer}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {96--106}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_8}, doi = {10.1007/978-3-540-73458-1\_8}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BringerCIPTZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/autoid/BringerC07, author = {Julien Bringer and Herv{\'{e}} Chabanne}, title = {An Application of the Naccache-Stern Knapsack Cryptosystem to Biometric Authentication}, booktitle = {2007 {IEEE} Workshop on Automatic Identification Advanced Technologies, AutoID 2007, Alghero, Italy, June 7-8, 2007}, pages = {180--185}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/AUTOID.2007.380616}, doi = {10.1109/AUTOID.2007.380616}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/autoid/BringerC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/BringerCPT07, author = {Julien Bringer and Herv{\'{e}} Chabanne and David Pointcheval and Qiang Tang}, editor = {Feng Bao and San Ling and Tatsuaki Okamoto and Huaxiong Wang and Chaoping Xing}, title = {Extended Private Information Retrieval and Its Application in Biometrics Authentications}, booktitle = {Cryptology and Network Security, 6th International Conference, {CANS} 2007, Singapore, December 8-10, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4856}, pages = {175--193}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76969-9\_12}, doi = {10.1007/978-3-540-76969-9\_12}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/BringerCPT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0705-3740, author = {Julien Bringer and Herv{\'{e}} Chabanne and G{\'{e}}rard D. Cohen and Bruno Kindarji and Gilles Z{\'{e}}mor}, title = {Optimal Iris Fuzzy Sketches}, journal = {CoRR}, volume = {abs/0705.3740}, year = {2007}, url = {http://arxiv.org/abs/0705.3740}, eprinttype = {arXiv}, eprint = {0705.3740}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0705-3740.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BringerCI07, author = {Julien Bringer and Herv{\'{e}} Chabanne and Thomas Icart}, title = {Improved Privacy of the Tree-Based Hash protocols using Physically Unclonable Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {294}, year = {2007}, url = {http://eprint.iacr.org/2007/294}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BringerCI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BringerCD06, author = {Julien Bringer and Herv{\'{e}} Chabanne and Quoc Dung Do}, title = {A fuzzy sketch with trapdoor}, journal = {{IEEE} Trans. Inf. Theory}, volume = {52}, number = {5}, pages = {2266--2269}, year = {2006}, url = {https://doi.org/10.1109/TIT.2006.872861}, doi = {10.1109/TIT.2006.872861}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/BringerCD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/BringerCD06, author = {Julien Bringer and Herv{\'{e}} Chabanne and Emmanuelle Dottax}, editor = {Herbert Leitold and Evangelos P. Markatos}, title = {Perturbing and Protecting a Traceable Block Cipher}, booktitle = {Communications and Multimedia Security, 10th {IFIP} {TC-6} {TC-11} International Conference, {CMS} 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4237}, pages = {109--119}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11909033\_10}, doi = {10.1007/11909033\_10}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/cms/BringerCD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/BringerC06, author = {Julien Bringer and Herv{\'{e}} Chabanne}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {On the Wiretap Channel Induced by Noisy Tags}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {113--120}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_11}, doi = {10.1007/11964254\_11}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/esas/BringerC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secperu/BringerCD06, author = {Julien Bringer and Herv{\'{e}} Chabanne and Emmanuelle Dottax}, title = {HB\({}^{\mbox{++}}\): a Lightweight Authentication Protocol Secure against Some Attacks}, booktitle = {Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France}, pages = {28--33}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SECPERU.2006.10}, doi = {10.1109/SECPERU.2006.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secperu/BringerCD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BringerCD06, author = {Julien Bringer and Herv{\'{e}} Chabanne and Emmanuelle Dottax}, title = {Perturbing and Protecting a Traceable Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {64}, year = {2006}, url = {http://eprint.iacr.org/2006/064}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BringerCD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BringerCD06a, author = {Julien Bringer and Herv{\'{e}} Chabanne and Emmanuelle Dottax}, title = {White Box Cryptography: Another Attempt}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {468}, year = {2006}, url = {http://eprint.iacr.org/2006/468}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BringerCD06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BringerCD05, author = {Julien Bringer and Herv{\'{e}} Chabanne and Quoc Dung Do}, title = {A Fuzzy Sketch with Trapdoor}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {331}, year = {2005}, url = {http://eprint.iacr.org/2005/331}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BringerCD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.