BibTeX records: Julien Bringer

download as .bib file

@inproceedings{DBLP:conf/crisis/BringerCG20,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Linda Guiga},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Jean Leneutre and
                  Nora Cuppens and
                  Reda Yaich},
  title        = {Premium Access to Convolutional Neural Networks},
  booktitle    = {Risks and Security of Internet and Systems - 15th International Conference,
                  CRiSIS 2020, Paris, France, November 4-6, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12528},
  pages        = {219--234},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68887-5\_13},
  doi          = {10.1007/978-3-030-68887-5\_13},
  timestamp    = {Tue, 16 Feb 2021 15:53:52 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/BringerCG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-11100,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Linda Guiga},
  title        = {Premium Access to Convolutional Neural Networks},
  journal      = {CoRR},
  volume       = {abs/2005.11100},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.11100},
  eprinttype    = {arXiv},
  eprint       = {2005.11100},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-11100.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/DabosvilleMLLB19,
  author       = {Guillaume Dabosville and
                  Houssem Maghrebi and
                  Alexis Lhuillery and
                  Thanh{-}Ha Le and
                  Julien Bringer},
  title        = {On the Bright Side of Darkness: Side-Channel Based Authentication
                  Protocol Against Relay Attacks},
  booktitle    = {22nd Euromicro Conference on Digital System Design, {DSD} 2019, Kallithea,
                  Greece, August 28-30, 2019},
  pages        = {214--221},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSD.2019.00040},
  doi          = {10.1109/DSD.2019.00040},
  timestamp    = {Wed, 23 Oct 2019 17:11:33 +0200},
  biburl       = {https://dblp.org/rec/conf/dsd/DabosvilleMLLB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DabosvilleMLBL19,
  author       = {Guillaume Dabosville and
                  Houssem Maghrebi and
                  Alexis Lhuillery and
                  Julien Bringer and
                  Thanh{-}Ha Le},
  title        = {On the Bright Side of Darkness: Side-Channel Based Authentication
                  Protocol Against Relay Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DabosvilleMLBL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/BringerCML18,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Daniel Le M{\'{e}}tayer and
                  Roch Lescuyer},
  title        = {Biometric Systems Private by Design: Reasoning about privacy properties
                  of biometric system architectures},
  journal      = {Trans. Data Priv.},
  volume       = {11},
  number       = {2},
  pages        = {111--137},
  year         = {2018},
  url          = {http://www.tdp.cat/issues16/tdp.a274a17.pdf},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdp/BringerCML18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/YangBG18,
  author       = {Bian Yang and
                  Julien Bringer and
                  Hideaki Goto},
  editor       = {Sorel Reisman and
                  Sheikh Iqbal Ahamed and
                  Claudio Demartini and
                  Thomas M. Conte and
                  Ling Liu and
                  William R. Claycomb and
                  Motonori Nakamura and
                  Edmundo Tovar and
                  Stelvio Cimato and
                  Chung{-}Horng Lung and
                  Hiroki Takakura and
                  Ji{-}Jiang Yang and
                  Toyokazu Akiyama and
                  Zhiyong Zhang and
                  Kamrul Hasan},
  title        = {Message from the {SDIM} 2018 Workshop Organizers},
  booktitle    = {2018 {IEEE} 42nd Annual Computer Software and Applications Conference,
                  {COMPSAC} 2018, Tokyo, Japan, 23-27 July 2018, Volume 2},
  pages        = {558},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/COMPSAC.2018.10294},
  doi          = {10.1109/COMPSAC.2018.10294},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/YangBG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ivc/BringerMR17,
  author       = {Julien Bringer and
                  Constance Morel and
                  Christian Rathgeb},
  title        = {Security analysis and improvement of some biometric protected templates
                  based on Bloom filters},
  journal      = {Image Vis. Comput.},
  volume       = {58},
  pages        = {239--253},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.imavis.2016.08.002},
  doi          = {10.1016/J.IMAVIS.2016.08.002},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ivc/BringerMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apf/BernabeSNBD17,
  author       = {Jorge Bernal Bernab{\'{e}} and
                  Antonio F. Skarmeta and
                  Nicol{\'{a}}s Notario and
                  Julien Bringer and
                  Martin David},
  editor       = {Erich Schweighofer and
                  Herbert Leitold and
                  Andreas Mitrakas and
                  Kai Rannenberg},
  title        = {Towards a Privacy-Preserving Reliable European Identity Ecosystem},
  booktitle    = {Privacy Technologies and Policy - 5th Annual Privacy Forum, {APF}
                  2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10518},
  pages        = {19--33},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-67280-9\_2},
  doi          = {10.1007/978-3-319-67280-9\_2},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apf/BernabeSNBD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BringerCML17,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Daniel Le M{\'{e}}tayer and
                  Roch Lescuyer},
  title        = {Biometric Systems Private by Design: Reasoning about privacy properties
                  of biometric system architectures},
  journal      = {CoRR},
  volume       = {abs/1702.08301},
  year         = {2017},
  url          = {http://arxiv.org/abs/1702.08301},
  eprinttype    = {arXiv},
  eprint       = {1702.08301},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BringerCML17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BringerCL16,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Roch Lescuyer},
  editor       = {David Pointcheval and
                  Abderrahmane Nitaj and
                  Tajjeeddine Rachidi},
  title        = {Software-Only Two-Factor Authentication Secure Against Active Servers},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2016 - 8th International Conference
                  on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9646},
  pages        = {285--303},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-31517-1\_15},
  doi          = {10.1007/978-3-319-31517-1\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/BringerCL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/BringerCLP16,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Roch Lescuyer and
                  Alain Patey},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {Hierarchical Identities from Group Signatures and Pseudonymous Signatures},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {457--469},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_28},
  doi          = {10.1007/978-3-662-49301-4\_28},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/BringerCLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/MaghrebiB16,
  author       = {Houssem Maghrebi and
                  Julien Bringer},
  editor       = {Kerstin Lemke{-}Rust and
                  Michael Tunstall},
  title        = {Side-Channel Analysis of the {TUAK} Algorithm Used for Authentication
                  and Key Agreement in 3G/4G Networks},
  booktitle    = {Smart Card Research and Advanced Applications - 15th International
                  Conference, {CARDIS} 2016, Cannes, France, November 7-9, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10146},
  pages        = {39--56},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54669-8\_3},
  doi          = {10.1007/978-3-319-54669-8\_3},
  timestamp    = {Fri, 27 Mar 2020 08:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/MaghrebiB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/IidaMYYB16,
  author       = {Katsuyoshi Iida and
                  Yutaka Miyake and
                  Chung Huang Yang and
                  Bian Yang and
                  Julien Bringer},
  title        = {Message from the {NETSAP} and {SIMICE} Workshop Organizers},
  booktitle    = {40th {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} Workshops 2016, Atlanta, GA, USA, June 10-14, 2016},
  pages        = {552},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/COMPSAC.2016.286},
  doi          = {10.1109/COMPSAC.2016.286},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/IidaMYYB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BringerCML16,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Daniel Le M{\'{e}}tayer and
                  Roch Lescuyer},
  editor       = {Silvio Ranise and
                  Vipin Swarup},
  title        = {Reasoning About Privacy Properties of Architectures Supporting Group
                  Authentication and Application to Biometric Systems},
  booktitle    = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9766},
  pages        = {313--327},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-41483-6\_22},
  doi          = {10.1007/978-3-319-41483-6\_22},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BringerCML16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AmchyaaBL16,
  author       = {Ghassane Amchyaa and
                  Julien Bringer and
                  Roch Lescuyer},
  editor       = {Giovanni Livraga and
                  Vicen{\c{c}} Torra and
                  Alessandro Aldini and
                  Fabio Martinelli and
                  Neeraj Suri},
  title        = {Searchable Encryption for Biometric Identification Revisited},
  booktitle    = {Data Privacy Management and Security Assurance - 11th International
                  Workshop, {DPM} 2016 and 5th International Workshop, {QASA} 2016,
                  Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9963},
  pages        = {113--129},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47072-6\_8},
  doi          = {10.1007/978-3-319-47072-6\_8},
  timestamp    = {Tue, 07 May 2024 20:10:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AmchyaaBL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MaghrebiSB16,
  author       = {Houssem Maghrebi and
                  Victor Servant and
                  Julien Bringer},
  editor       = {Thomas Peyrin},
  title        = {There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized
                  Encoding to Thwart Side-Channel Attacks},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {223--243},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_12},
  doi          = {10.1007/978-3-662-52993-5\_12},
  timestamp    = {Fri, 27 Mar 2020 08:58:25 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/MaghrebiSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/BringerOMC16,
  author       = {Julien Bringer and
                  Othmane El Omri and
                  Constance Morel and
                  Herv{\'{e}} Chabanne},
  editor       = {X. Sean Wang and
                  Lujo Bauer and
                  Florian Kerschbaum},
  title        = {Boosting {GSHADE} Capabilities: New Applications and Security in Malicious
                  Setting},
  booktitle    = {Proceedings of the 21st {ACM} on Symposium on Access Control Models
                  and Technologies, {SACMAT} 2016, Shanghai, China, June 5-8, 2016},
  pages        = {203--214},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2914642.2914658},
  doi          = {10.1145/2914642.2914658},
  timestamp    = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/BringerOMC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaghrebiSB16,
  author       = {Houssem Maghrebi and
                  Victor Servant and
                  Julien Bringer},
  title        = {There is Wisdom in Harnessing the Strengths of your Enemy: Customized
                  Encoding to Thwart Side-Channel Attacks - Extended Version -},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {183},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaghrebiSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/YangB15,
  author       = {Bian Yang and
                  Julien Bringer},
  editor       = {Sheikh Iqbal Ahamed and
                  Carl K. Chang and
                  William C. Chu and
                  Ivica Crnkovic and
                  Pao{-}Ann Hsiung and
                  Gang Huang and
                  Jingwei Yang},
  title        = {Message from the {SIMICE} 2015 Workshop Organizers},
  booktitle    = {39th Annual Computer Software and Applications Conference, {COMPSAC}
                  Workshops 2015, Taichung, Taiwan, July 1-5, 2015},
  pages        = {296},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/COMPSAC.2015.307},
  doi          = {10.1109/COMPSAC.2015.307},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/YangB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edemocracy/BringerGKKLORSV15,
  author       = {Julien Bringer and
                  Beatriz Gallego{-}Nicasio and
                  Ghassan Karame and
                  Mathias Kohler and
                  Panos Louridas and
                  Melek {\"{O}}nen and
                  Hubert Ritzdorf and
                  Alessandro Sorniotti and
                  David Vallejo},
  editor       = {Sokratis K. Katsikas and
                  Alexander B. Sideridis},
  title        = {{TREDISEC:} Trust-Aware REliable and Distributed Information SEcurity
                  in the Cloud},
  booktitle    = {E-Democracy - Citizen Rights in the World of the New Computing Paradigms
                  - 6th International Conference, E-Democracy 2015, Athens, Greece,
                  December 10-11, 2015, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {570},
  pages        = {193--197},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27164-4\_14},
  doi          = {10.1007/978-3-319-27164-4\_14},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edemocracy/BringerGKKLORSV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/BringerCML15,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Daniel Le M{\'{e}}tayer and
                  Roch Lescuyer},
  editor       = {Nikolaj S. Bj{\o}rner and
                  Frank S. de Boer},
  title        = {Privacy by Design in Practice: Reasoning about Privacy Properties
                  of Biometric System Architectures},
  booktitle    = {{FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway,
                  June 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9109},
  pages        = {90--107},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19249-9\_7},
  doi          = {10.1007/978-3-319-19249-9\_7},
  timestamp    = {Thu, 14 Apr 2022 20:26:16 +0200},
  biburl       = {https://dblp.org/rec/conf/fm/BringerCML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/RiviereNRDBS15,
  author       = {Lionel Rivi{\`{e}}re and
                  Zakaria Najm and
                  Pablo Rauzy and
                  Jean{-}Luc Danger and
                  Julien Bringer and
                  Laurent Sauvage},
  title        = {High precision fault injections on the instruction cache of ARMv7-M
                  architectures},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {62--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140238},
  doi          = {10.1109/HST.2015.7140238},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/RiviereNRDBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/BringerMR15,
  author       = {Julien Bringer and
                  Constance Morel and
                  Christian Rathgeb},
  title        = {Security analysis of Bloom filter-based iris biometric template protection},
  booktitle    = {International Conference on Biometrics, {ICB} 2015, Phuket, Thailand,
                  19-22 May, 2015},
  pages        = {527--534},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICB.2015.7139069},
  doi          = {10.1109/ICB.2015.7139069},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/icb/BringerMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FavrePBC15,
  author       = {M{\'{e}}lanie Favre and
                  Sylvaine Picard and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Balancing is the Key - Performing Finger Vein Template Protection
                  using Fuzzy Commitment},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {304--311},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005241403040311},
  doi          = {10.5220/0005241403040311},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/FavrePBC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/RiviereBLC15,
  author       = {Lionel Rivi{\`{e}}re and
                  Julien Bringer and
                  Thanh{-}Ha Le and
                  Herv{\'{e}} Chabanne},
  title        = {A novel simulation approach for fault injection resistance evaluation
                  on smart cards},
  booktitle    = {Eighth {IEEE} International Conference on Software Testing, Verification
                  and Validation, {ICST} 2015 Workshops, Graz, Austria, April 13-17,
                  2015},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICSTW.2015.7107460},
  doi          = {10.1109/ICSTW.2015.7107460},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icst/RiviereBLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BringerCML15,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Daniel Le M{\'{e}}tayer and
                  Roch Lescuyer},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Reasoning about Privacy Properties of Biometric Systems Architectures
                  in the Presence of Information Leakage},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {493--510},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_27},
  doi          = {10.1007/978-3-319-23318-5\_27},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BringerCML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BringerCKLS15,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Firas Kraiem and
                  Roch Lescuyer and
                  Eduardo Soria{-}Vazquez},
  title        = {Some applications of verifiable computation to biometric verification},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368568},
  doi          = {10.1109/WIFS.2015.7368568},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BringerCKLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RiviereNRDBS15,
  author       = {Lionel Rivi{\`{e}}re and
                  Zakaria Najm and
                  Pablo Rauzy and
                  Jean{-}Luc Danger and
                  Julien Bringer and
                  Laurent Sauvage},
  title        = {High Precision Fault Injections on the Instruction Cache of ARMv7-M
                  Architectures},
  journal      = {CoRR},
  volume       = {abs/1510.01537},
  year         = {2015},
  url          = {http://arxiv.org/abs/1510.01537},
  eprinttype    = {arXiv},
  eprint       = {1510.01537},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RiviereNRDBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RiviereNRDBS15,
  author       = {Lionel Rivi{\`{e}}re and
                  Zakaria Najm and
                  Pablo Rauzy and
                  Jean{-}Luc Danger and
                  Julien Bringer and
                  Laurent Sauvage},
  title        = {High Precision Fault Injections on the Instruction Cache of ARMv7-M
                  Architectures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/147},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RiviereNRDBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FujimotoMNHHAHKSLBBBD14,
  author       = {Daisuke Fujimoto and
                  Noriyuki Miura and
                  Makoto Nagata and
                  Yu{-}ichi Hayashi and
                  Naofumi Homma and
                  Takafumi Aoki and
                  Yohei Hori and
                  Toshihiro Katashita and
                  Kazuo Sakiyama and
                  Thanh{-}Ha Le and
                  Julien Bringer and
                  Pirouz Bazargan{-}Sabet and
                  Shivam Bhasin and
                  Jean{-}Luc Danger},
  title        = {Power Noise Measurements of Cryptographic {VLSI} Circuits Regarding
                  Side-Channel Information Leakage},
  journal      = {{IEICE} Trans. Electron.},
  volume       = {97-C},
  number       = {4},
  pages        = {272--279},
  year         = {2014},
  url          = {https://doi.org/10.1587/transele.E97.C.272},
  doi          = {10.1587/TRANSELE.E97.C.272},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/FujimotoMNHHAHKSLBBBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biosig/BringerFPS14,
  author       = {Julien Bringer and
                  M{\'{e}}lanie Favre and
                  Chlo{\'{e}} Pelle and
                  Hughes de Saxc{\'{e}}},
  editor       = {Arslan Br{\"{o}}mme and
                  Christoph Busch},
  title        = {Fuzzy vault and template-level fusion applied to a binary fingerprint
                  representation},
  booktitle    = {{BIOSIG} 2014 - Proceedings of the 13th International Conference of
                  the Biometrics Special Interest Group, 10.-12. September 2014, Darmstadt,
                  Germany},
  series       = {{LNI}},
  volume       = {{P-230}},
  pages        = {235--242},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/2666},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/biosig/BringerFPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/ServantDMB14,
  author       = {Victor Servant and
                  Nicolas Debande and
                  Houssem Maghrebi and
                  Julien Bringer},
  editor       = {Marc Joye and
                  Amir Moradi},
  title        = {Study of a Novel Software Constant Weight Implementation},
  booktitle    = {Smart Card Research and Advanced Applications - 13th International
                  Conference, {CARDIS} 2014, Paris, France, November 5-7, 2014. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8968},
  pages        = {35--48},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16763-3\_3},
  doi          = {10.1007/978-3-319-16763-3\_3},
  timestamp    = {Thu, 14 Oct 2021 10:29:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/ServantDMB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/BerthierBBCCDFG14,
  author       = {Ma{\"{e}}l Berthier and
                  Yves Bocktaels and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Taoufik Chouta and
                  Jean{-}Luc Danger and
                  M{\'{e}}lanie Favre and
                  Tarik Graba},
  editor       = {Emmanuel Prouff},
  title        = {Studying Leakages on an Embedded Biometric System Using Side Channel
                  Analysis},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 5th International
                  Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8622},
  pages        = {281--298},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10175-0\_19},
  doi          = {10.1007/978-3-319-10175-0\_19},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/BerthierBBCCDFG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/PuysRBL14,
  author       = {Maxime Puys and
                  Lionel Rivi{\`{e}}re and
                  Julien Bringer and
                  Thanh{-}Ha Le},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Jordi Herrera{-}Joancomart{\'{\i}} and
                  Emil Lupu and
                  Joachim Posegga and
                  Alessandro Aldini and
                  Fabio Martinelli and
                  Neeraj Suri},
  title        = {High-Level Simulation for Multiple Fault Injection Evaluation},
  booktitle    = {Data Privacy Management, Autonomous Spontaneous Security, and Security
                  Assurance - 9th International Workshop, {DPM} 2014, 7th International
                  Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014,
                  Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8872},
  pages        = {293--308},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-17016-9\_19},
  doi          = {10.1007/978-3-319-17016-9\_19},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/PuysRBL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/BerthierBCLRS14,
  author       = {Ma{\"{e}}l Berthier and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Thanh{-}Ha Le and
                  Lionel Rivi{\`{e}}re and
                  Victor Servant},
  editor       = {Jan J{\"{u}}rjens and
                  Frank Piessens and
                  Nataliia Bielova},
  title        = {Idea: Embedded Fault Injection Simulator on Smartcard},
  booktitle    = {Engineering Secure Software and Systems - 6th International Symposium,
                  ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8364},
  pages        = {222--229},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04897-0\_15},
  doi          = {10.1007/978-3-319-04897-0\_15},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/BerthierBCLRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BringerCLP14,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Roch Lescuyer and
                  Alain Patey},
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous
                  Signatures for {ID} Documents},
  booktitle    = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {255--272},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45472-5\_16},
  doi          = {10.1007/978-3-662-45472-5\_16},
  timestamp    = {Tue, 21 Mar 2023 20:59:40 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/BringerCLP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/RivierePLBCP14,
  author       = {Lionel Rivi{\`{e}}re and
                  Marie{-}Laure Potet and
                  Thanh{-}Ha Le and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Maxime Puys},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nur Zincir{-}Heywood and
                  Philip W. L. Fong},
  title        = {Combining High-Level and Low-Level Approaches to Evaluate Software
                  Implementations Robustness Against Multiple Fault Injection Attacks},
  booktitle    = {Foundations and Practice of Security - 7th International Symposium,
                  {FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8930},
  pages        = {92--111},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-17040-4\_7},
  doi          = {10.1007/978-3-319-17040-4\_7},
  timestamp    = {Fri, 08 Dec 2023 07:53:07 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/RivierePLBCP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/BringerCM14,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Constance Morel},
  title        = {Shuffling is not sufficient: Security analysis of cancelable iriscodes
                  based on a secret permutation},
  booktitle    = {{IEEE} International Joint Conference on Biometrics, Clearwater, {IJCB}
                  2014, FL, USA, September 29 - October 2, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/BTAS.2014.6996280},
  doi          = {10.1109/BTAS.2014.6996280},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/icb/BringerCM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BringerCFP0Z14,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  M{\'{e}}lanie Favre and
                  Alain Patey and
                  Thomas Schneider and
                  Michael Zohner},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {{GSHADE:} faster privacy-preserving distance computation and biometric
                  identification},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {187--198},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600922},
  doi          = {10.1145/2600918.2600922},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/BringerCFP0Z14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ChoutaGDBBBFC14,
  author       = {Taoufik Chouta and
                  Tarik Graba and
                  Jean{-}Luc Danger and
                  Julien Bringer and
                  Ma{\"{e}}l Berthier and
                  Yves Bocktaels and
                  M{\'{e}}lanie Favre and
                  Herv{\'{e}} Chabanne},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Side channel analysis on an embedded hardware fingerprint biometric
                  comparator {\&} low cost countermeasures},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {6:1--6:6},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611771},
  doi          = {10.1145/2611765.2611771},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/ChoutaGDBBBFC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BourgeatBCCCFHMNV14,
  author       = {Thomas Bourgeat and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Robin Champenois and
                  J{\'{e}}r{\'{e}}mie Cl{\'{e}}ment and
                  Houda Ferradi and
                  Marc Heinrich and
                  Paul Melotti and
                  David Naccache and
                  Antoine Voizard},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {New Algorithmic Approaches to Point Constellation Recognition},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {80--90},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_7},
  doi          = {10.1007/978-3-642-55415-5\_7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BourgeatBCCCFHMNV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BringerCCGM14,
  author       = {Julien Bringer and
                  Claude Carlet and
                  Herv{\'{e}} Chabanne and
                  Sylvain Guilley and
                  Houssem Maghrebi},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {Orthogonal Direct Sum Masking - {A} Smartcard Friendly Computation
                  Paradigm in a Code, with Builtin Protection against Side-Channel and
                  Fault Attacks},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {40--56},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_4},
  doi          = {10.1007/978-3-662-43826-8\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BringerCCGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BourgeatBCCCFHMNV14,
  author       = {Thomas Bourgeat and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Robin Champenois and
                  J{\'{e}}r{\'{e}}mie Cl{\'{e}}ment and
                  Houda Ferradi and
                  Marc Heinrich and
                  Paul Melotti and
                  David Naccache and
                  Antoine Voizard},
  title        = {New Algorithmic Approaches to Point Constellation Recognition},
  journal      = {CoRR},
  volume       = {abs/1405.1402},
  year         = {2014},
  url          = {http://arxiv.org/abs/1405.1402},
  eprinttype    = {arXiv},
  eprint       = {1405.1402},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BourgeatBCCCFHMNV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BerthierBBCCDFG14,
  author       = {Ma{\"{e}}l Berthier and
                  Yves Bocktaels and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Taoufik Chouta and
                  Jean{-}Luc Danger and
                  M{\'{e}}lanie Favre and
                  Tarik Graba},
  title        = {Studying Potential Side Channel Leakages on an Embedded Biometric
                  Comparison System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BerthierBBCCDFG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerCLP14,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Roch Lescuyer and
                  Alain Patey},
  title        = {Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous
                  Signatures for {ID} Documents},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {67},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/067},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerCLP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerCCGM14a,
  author       = {Julien Bringer and
                  Claude Carlet and
                  Herv{\'{e}} Chabanne and
                  Sylvain Guilley and
                  Houssem Maghrebi},
  title        = {Orthogonal Direct Sum Masking: {A} Smartcard Friendly Computation
                  Paradigm in a Code, with Builtin Protection against Side-Channel and
                  Fault Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {665},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/665},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerCCGM14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spm/BringerCP13,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Alain Patey},
  title        = {Privacy-Preserving Biometric Identification Using Secure Multiparty
                  Computation: An Overview and Recent Trends},
  journal      = {{IEEE} Signal Process. Mag.},
  volume       = {30},
  number       = {2},
  pages        = {42--52},
  year         = {2013},
  url          = {https://doi.org/10.1109/MSP.2012.2230218},
  doi          = {10.1109/MSP.2012.2230218},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spm/BringerCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/JustusCCBCC13,
  author       = {Benjamin Justus and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Olivier Cipiere},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer
                  Size Standard for the Setbase},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {274--281},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_19},
  doi          = {10.1007/978-3-642-39256-6\_19},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/JustusCCBCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/YangBBKBSSRWA13,
  author       = {Bian Yang and
                  Christoph Busch and
                  Julien Bringer and
                  Els Kindt and
                  Willem Ronald Belser and
                  Uwe Seidel and
                  Edward Springmann and
                  Uwe Rabeler and
                  Andreas Wolf and
                  Magnar Aukrust},
  editor       = {Thomas Gro{\ss} and
                  Marit Hansen},
  title        = {Towards standardizing trusted evidence of identity},
  booktitle    = {DIM'13, Proceedings of the 2013 {ACM} Workshop on Digital Identity
                  Management, Berlin, Germany, November 8, 2013},
  pages        = {63--72},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517881.2517890},
  doi          = {10.1145/2517881.2517890},
  timestamp    = {Wed, 06 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dim/YangBBKBSSRWA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BringerCP13,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Alain Patey},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {{SHADE:} Secure HAmming DistancE Computation from Oblivious Transfer},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {164--176},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_11},
  doi          = {10.1007/978-3-642-41320-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BringerCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/BringerCP13,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Alain Patey},
  editor       = {Julian Fi{\'{e}}rrez and
                  Ajay Kumar and
                  Mayank Vatsa and
                  Raymond N. J. Veldhuis and
                  Javier Ortega{-}Garcia},
  title        = {Practical identification with encrypted biometric data using oblivious
                  {RAM}},
  booktitle    = {International Conference on Biometrics, {ICB} 2013, 4-7 June, 2013,
                  Madrid, Spain},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICB.2013.6612970},
  doi          = {10.1109/ICB.2013.6612970},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/icb/BringerCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/MathonFAB13,
  author       = {Benjamin Mathon and
                  Teddy Furon and
                  Laurent Amsaleg and
                  Julien Bringer},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Secure and efficient approximate nearest neighbors search},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {175--180},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482539},
  doi          = {10.1145/2482513.2482539},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/MathonFAB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/BringerCP13,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Alain Patey},
  editor       = {Javier L{\'{o}}pez and
                  Xinyi Huang and
                  Ravi S. Sandhu},
  title        = {Collusion-Resistant Domain-Specific Pseudonymous Signatures},
  booktitle    = {Network and System Security - 7th International Conference, {NSS}
                  2013, Madrid, Spain, June 3-4, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7873},
  pages        = {649--655},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38631-2\_52},
  doi          = {10.1007/978-3-642-38631-2\_52},
  timestamp    = {Tue, 09 Feb 2021 08:50:29 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/BringerCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/JustusCCBCC13,
  author       = {Benjamin Justus and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Olivier Cipiere},
  editor       = {Jordi Castell{\`{a}}{-}Roca and
                  Josep Domingo{-}Ferrer and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Ali A. Ghorbani and
                  Christian Damsgaard Jensen and
                  Jes{\'{u}}s A. Manj{\'{o}}n and
                  Iosif{-}Viorel Onut and
                  Natalia Stakhanova and
                  Vicen{\c{c}} Torra and
                  Jie Zhang},
  title        = {Define privacy-preserving setbase drawer size standard: {A} {\unicode{8714}}-closeness
                  perspective},
  booktitle    = {Eleventh Annual International Conference on Privacy, Security and
                  Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain,
                  July 10-12, 2013},
  pages        = {362--365},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/PST.2013.6596090},
  doi          = {10.1109/PST.2013.6596090},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/JustusCCBCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/BringerC13,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne},
  editor       = {Patrizio Campisi},
  title        = {Two Efficient Architectures for Handling Biometric Data While Taking
                  Care of Their Privacy},
  booktitle    = {Security and Privacy in Biometrics},
  pages        = {275--295},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4471-5230-9\_11},
  doi          = {10.1007/978-1-4471-5230-9\_11},
  timestamp    = {Tue, 16 May 2017 14:01:33 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/BringerC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerCP13,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Alain Patey},
  title        = {Collusion-Resistant Domain-Specific Pseudonymous Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {182},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/182},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hcis/BringerC12,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne},
  title        = {Embedding edit distance to enable private keyword search},
  journal      = {Hum. centric Comput. Inf. Sci.},
  volume       = {2},
  pages        = {2},
  year         = {2012},
  url          = {https://doi.org/10.1186/2192-1962-2-2},
  doi          = {10.1186/2192-1962-2-2},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/hcis/BringerC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BringerCL12,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Thanh{-}Ha Le},
  title        = {Protecting {AES} against side-channel analysis using wire-tap codes},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {2},
  pages        = {129--141},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0034-2},
  doi          = {10.1007/S13389-012-0034-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BringerCL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SimoensBCS12,
  author       = {Koen Simoens and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Stefaan Seys},
  title        = {A Framework for Analyzing Template Security and Privacy in Biometric
                  Authentication Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {7},
  number       = {2},
  pages        = {833--841},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIFS.2012.2184092},
  doi          = {10.1109/TIFS.2012.2184092},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SimoensBCS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BringerC12,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne},
  title        = {Code Reverse Engineering Problem for Identification Codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {4},
  pages        = {2406--2412},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2011.2177808},
  doi          = {10.1109/TIT.2011.2177808},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/BringerC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BringerCF12,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  M{\'{e}}lanie Favre},
  editor       = {Aikaterini Mitrokotsa and
                  Serge Vaudenay},
  title        = {Fuzzy Vault for Multiple Users},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
                  on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7374},
  pages        = {67--81},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31410-0\_5},
  doi          = {10.1007/978-3-642-31410-0\_5},
  timestamp    = {Sun, 02 Jun 2019 21:14:37 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/BringerCF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/BringerCP12,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Alain Patey},
  editor       = {Sabrina De Capitani di Vimercati and
                  Chris J. Mitchell},
  title        = {Cross-Unlinkable Hierarchical Group Signatures},
  booktitle    = {Public Key Infrastructures, Services and Applications - 9th European
                  Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7868},
  pages        = {161--177},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40012-4\_11},
  doi          = {10.1007/978-3-642-40012-4\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/BringerCP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/BringerFCP12,
  author       = {Julien Bringer and
                  M{\'{e}}lanie Favre and
                  Herv{\'{e}} Chabanne and
                  Alain Patey},
  editor       = {Anil K. Jain and
                  Arun Ross and
                  Salil Prabhakar and
                  Jaihie Kim},
  title        = {Faster secure computation for biometric identification using filtering},
  booktitle    = {5th {IAPR} International Conference on Biometrics, {ICB} 2012, New
                  Delhi, India, March 29 - April 1, 2012},
  pages        = {257--264},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICB.2012.6199817},
  doi          = {10.1109/ICB.2012.6199817},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icb/BringerFCP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/BringerCC12,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Olivier Cipiere},
  editor       = {Nora Cuppens{-}Boulahia and
                  Philip Fong and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Stephen Marsh and
                  Jan{-}Philipp Stegh{\"{o}}fer},
  title        = {Combining the setbase approach with negative databases},
  booktitle    = {Tenth Annual International Conference on Privacy, Security and Trust,
                  {PST} 2012, Paris, France, July 16-18, 2012},
  pages        = {233--234},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/PST.2012.6297948},
  doi          = {10.1109/PST.2012.6297948},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/BringerCC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BringerP12,
  author       = {Julien Bringer and
                  Alain Patey},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {{VLR} Group Signatures - How to Achieve Both Backward Unlinkability
                  and Efficient Revocation Checks},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {215--220},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/BringerP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BringerCP12,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Alain Patey},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {An Application of a Group Signature Scheme with Backward Unlinkability
                  to Biometric Identity Management},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {421--425},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/BringerCP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerCP12,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Alain Patey},
  title        = {Cross-Unlinkable Hierarchical Group Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {407},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/407},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerCP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerCP12a,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Alain Patey},
  title        = {{SHADE:} Secure HAmming DistancE computation from oblivious transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {586},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/586},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerCP12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BringerCK11,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Bruno Kindarji},
  title        = {Identification with encrypted biometric data},
  journal      = {Secur. Commun. Networks},
  volume       = {4},
  number       = {5},
  pages        = {548--562},
  year         = {2011},
  url          = {https://doi.org/10.1002/sec.206},
  doi          = {10.1002/SEC.206},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BringerCK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biosig/BringerC11,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne},
  editor       = {Arslan Br{\"{o}}mme and
                  Christoph Busch},
  title        = {Visual cryptography applied to fingerprint features as a solution
                  for pre-alignment},
  booktitle    = {{BIOSIG} 2011 - Proceedings of the Special Interest Group on Biometrics
                  and Electronic Signatures, 08.-09. September 2011 in Darmstadt, Germany},
  series       = {{LNI}},
  volume       = {{P-191}},
  pages        = {243--250},
  publisher    = {{GI}},
  year         = {2011},
  url          = {https://dl.gi.de/handle/20.500.12116/18547},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/biosig/BringerC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sta/BringerC11,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne},
  editor       = {James J. Park and
                  Javier L{\'{o}}pez and
                  Sang{-}Soo Yeo and
                  Taeshik Shon and
                  David Taniar},
  title        = {Embedding Edit Distance to Allow Private Keyword Search in Cloud Computing},
  booktitle    = {Secure and Trust Computing, Data Management and Applications - 8th
                  {FTRA} International Conference, {STA} 2011, Loutraki, Greece, June
                  28-30, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {186},
  pages        = {105--113},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22339-6\_13},
  doi          = {10.1007/978-3-642-22339-6\_13},
  timestamp    = {Mon, 08 Apr 2019 12:52:12 +0200},
  biburl       = {https://dblp.org/rec/conf/sta/BringerC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1101-2569,
  author       = {Koen Simoens and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Stefaan Seys},
  title        = {Analysis of Biometric Authentication Protocols in the Blackbox Model},
  journal      = {CoRR},
  volume       = {abs/1101.2569},
  year         = {2011},
  url          = {http://arxiv.org/abs/1101.2569},
  eprinttype    = {arXiv},
  eprint       = {1101.2569},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1101-2569.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1105-1601,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne},
  title        = {Code Reverse Engineering problem for Identification Codes},
  journal      = {CoRR},
  volume       = {abs/1105.1601},
  year         = {2011},
  url          = {http://arxiv.org/abs/1105.1601},
  eprinttype    = {arXiv},
  eprint       = {1105.1601},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1105-1601.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerP11,
  author       = {Julien Bringer and
                  Alain Patey},
  title        = {Backward Unlinkability for a {VLR} Group Signature Scheme with Efficient
                  Revocation Check},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {376},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/376},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BringerCI10,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Thomas Icart},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Password Based Key Exchange Protocols on Elliptic Curves Which Conceal
                  the Public Parameters},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {291--308},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_18},
  doi          = {10.1007/978-3-642-13708-2\_18},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BringerCI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/btas/BringerD10,
  author       = {Julien Bringer and
                  Vincent Despiegel},
  title        = {Binary feature vector fingerprint representation from minutiae vicinities},
  booktitle    = {Fourth {IEEE} International Conference on Biometrics: Theory Applications
                  and Systems, {BTAS} 2010, Washington, DC, USA, 27-29 September, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/BTAS.2010.5634488},
  doi          = {10.1109/BTAS.2010.5634488},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/btas/BringerD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/BringerCS10,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Koen Simoens},
  editor       = {Isao Echizen and
                  Jeng{-}Shyang Pan and
                  Dieter W. Fellner and
                  Alexander Nouak and
                  Arjan Kuijper and
                  Lakhmi C. Jain},
  title        = {Blackbox Security of Biometrics (Invited Paper)},
  booktitle    = {Sixth International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2010), Darmstadt, Germany,
                  15-17 October, 2010, Proceedings},
  pages        = {337--340},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IIHMSP.2010.89},
  doi          = {10.1109/IIHMSP.2010.89},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/BringerCS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/BringerCCK10,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  G{\'{e}}rard D. Cohen and
                  Bruno Kindarji},
  editor       = {Marcus Greferath and
                  Joachim Rosenthal and
                  Alexander Barg and
                  Gilles Z{\'{e}}mor},
  title        = {Identification codes in cryptographic protocols},
  booktitle    = {2010 {IEEE} Information Theory Workshop, {ITW} 2010, Dublin, Ireland,
                  August 30 - September 3, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIG.2010.5592911},
  doi          = {10.1109/CIG.2010.5592911},
  timestamp    = {Mon, 09 Aug 2021 14:54:02 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/BringerCCK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/BringerC10,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Negative databases for biometric data},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {55--62},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854242},
  doi          = {10.1145/1854229.1854242},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/BringerC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1001-4992,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  G{\'{e}}rard D. Cohen and
                  Bruno Kindarji},
  title        = {{RFID} Key Establishment Against Active Adversaries},
  journal      = {CoRR},
  volume       = {abs/1001.4992},
  year         = {2010},
  url          = {http://arxiv.org/abs/1001.4992},
  eprinttype    = {arXiv},
  eprint       = {1001.4992},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1001-4992.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1005-1194,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne},
  title        = {Negative Databases for Biometric Data},
  journal      = {CoRR},
  volume       = {abs/1005.1194},
  year         = {2010},
  url          = {http://arxiv.org/abs/1005.1194},
  eprinttype    = {arXiv},
  eprint       = {1005.1194},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1005-1194.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BringerC09,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne},
  editor       = {Bart Preneel},
  title        = {Another Look at Extended Private Information Retrieval Protocols},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International
                  Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5580},
  pages        = {305--322},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02384-2\_19},
  doi          = {10.1007/978-3-642-02384-2\_19},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/BringerC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BringerCI09,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Thomas Icart},
  editor       = {Wanqing Li and
                  Willy Susilo and
                  Udaya Kiran Tupakula and
                  Reihaneh Safavi{-}Naini and
                  Vijay Varadharajan},
  title        = {Efficient zero-knowledge identification schemes which respect privacy},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2009, Sydney, Australia, March
                  10-12, 2009},
  pages        = {195--205},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1533057.1533086},
  doi          = {10.1145/1533057.1533086},
  timestamp    = {Fri, 18 Mar 2022 11:47:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BringerCI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cost/BringerCKK09,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Tom A. M. Kevenaar and
                  Bruno Kindarji},
  editor       = {Julian Fi{\'{e}}rrez{-}Aguilar and
                  Javier Ortega{-}Garcia and
                  Anna Esposito and
                  Andrzej Drygajlo and
                  Marcos Fa{\'{u}}ndez{-}Zanuy},
  title        = {Extending Match-On-Card to Local Biometric Identification},
  booktitle    = {Biometric {ID} Management and Multimodal Communication, Joint {COST}
                  2101 and 2102 International Conference, BioID{\_}MultiComm 2009, Madrid,
                  Spain, September 16-18, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5707},
  pages        = {178--186},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04391-8\_23},
  doi          = {10.1007/978-3-642-04391-8\_23},
  timestamp    = {Sat, 09 Apr 2022 12:41:06 +0200},
  biburl       = {https://dblp.org/rec/conf/cost/BringerCKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/BringerCK09,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Bruno Kindarji},
  title        = {Error-Tolerant Searchable Encryption},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2009, Dresden, Germany, 14-18 June 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICC.2009.5199004},
  doi          = {10.1109/ICC.2009.5199004},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/BringerCK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/AdjedjBCK09,
  author       = {Michael Adjedj and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Bruno Kindarji},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {Biometric Identification over Encrypted Data Made Feasible},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {86--100},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_8},
  doi          = {10.1007/978-3-642-10772-6\_8},
  timestamp    = {Wed, 12 May 2021 16:44:21 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/AdjedjBCK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BringerCI09,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Thomas Icart},
  editor       = {Bimal K. Roy and
                  Nicolas Sendrier},
  title        = {On Physical Obfuscation of Cryptographic Algorithms},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
                  on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5922},
  pages        = {88--103},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10628-6\_6},
  doi          = {10.1007/978-3-642-10628-6\_6},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BringerCI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BringerCCK09,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  G{\'{e}}rard D. Cohen and
                  Bruno Kindarji},
  editor       = {Bimal K. Roy and
                  Nicolas Sendrier},
  title        = {Private Interrogation of Devices via Identification Codes},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
                  on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5922},
  pages        = {272--289},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10628-6\_19},
  doi          = {10.1007/978-3-642-10628-6\_19},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BringerCCK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/BringerCD09,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Jean{-}Luc Danger},
  editor       = {Viktor K. Prasanna and
                  Lionel Torres and
                  Ren{\'{e}} Cumplido},
  title        = {Protecting the {NOEKEON} Cipher against {SCARE} Attacks in FPGAs by
                  Using Dynamic Implementations},
  booktitle    = {ReConFig'09: 2009 International Conference on Reconfigurable Computing
                  and FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December 2009, Proceedings},
  pages        = {183--188},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ReConFig.2009.19},
  doi          = {10.1109/RECONFIG.2009.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/reconfig/BringerCD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BringerCCK09,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  G{\'{e}}rard D. Cohen and
                  Bruno Kindarji},
  title        = {{RFID} key establishment against active adversaries},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {186--190},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386458},
  doi          = {10.1109/WIFS.2009.5386458},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/BringerCCK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0901-1062,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Bruno Kindarji},
  title        = {Identification with Encrypted Biometric Data Made Feasible},
  journal      = {CoRR},
  volume       = {abs/0901.1062},
  year         = {2009},
  url          = {http://arxiv.org/abs/0901.1062},
  eprinttype    = {arXiv},
  eprint       = {0901.1062},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0901-1062.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerCD09,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Jean{-}Luc Danger},
  title        = {Protecting the {NOEKEON} Cipher Against {SCARE} Attacks in FPGAs by
                  using Dynamic Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {239},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/239},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerCD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerCI09,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Thomas Icart},
  title        = {Password Based Key Exchange with Hidden Elliptic Curve Public Parameters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {468},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/468},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerCI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/BringerCK08,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Bruno Kindarji},
  title        = {The best of both worlds: Applying secure sketches to cancelable biometrics},
  journal      = {Sci. Comput. Program.},
  volume       = {74},
  number       = {1-2},
  pages        = {43--51},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.scico.2008.09.016},
  doi          = {10.1016/J.SCICO.2008.09.016},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/BringerCK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BringerCCKZ08,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  G{\'{e}}rard D. Cohen and
                  Bruno Kindarji and
                  Gilles Z{\'{e}}mor},
  title        = {Theoretical and Practical Boundaries of Binary Secure Sketches},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {3},
  number       = {4},
  pages        = {673--683},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIFS.2008.2002937},
  doi          = {10.1109/TIFS.2008.2002937},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BringerCCKZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BringerC08,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne},
  title        = {Trusted-HB: {A} Low-Cost Version of {HB} \({}^{\mbox{+}}\) Secure
                  Against Man-in-the-Middle Attacks},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {54},
  number       = {9},
  pages        = {4339--4342},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIT.2008.928290},
  doi          = {10.1109/TIT.2008.928290},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/BringerC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BringerC08,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne},
  editor       = {Serge Vaudenay},
  title        = {An Authentication Protocol with Encrypted Biometric Data},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference
                  on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5023},
  pages        = {109--124},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68164-9\_8},
  doi          = {10.1007/978-3-540-68164-9\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/BringerC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/BringerCI08,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Thomas Icart},
  editor       = {Matthew K. Franklin and
                  Lucas Chi Kwong Hui and
                  Duncan S. Wong},
  title        = {Cryptanalysis of EC-RAC, a {RFID} Identification Protocol},
  booktitle    = {Cryptology and Network Security, 7th International Conference, {CANS}
                  2008, Hong-Kong, China, December 2-4, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5339},
  pages        = {149--161},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89641-8\_11},
  doi          = {10.1007/978-3-540-89641-8\_11},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/BringerCI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/DelvauxCBKLMBAVVKSBBGYSRCS08,
  author       = {Nicolas Delvaux and
                  Herv{\'{e}} Chabanne and
                  Julien Bringer and
                  Bruno Kindarji and
                  Patrik Lindeberg and
                  Johannes Midgren and
                  Jeroen Breebaart and
                  Ton H. Akkermans and
                  Michiel van der Veen and
                  Raymond N. J. Veldhuis and
                  Els Kindt and
                  Koen Simoens and
                  Christoph Busch and
                  Patrick Bours and
                  Davrondzhon Gafurov and
                  Bian Yang and
                  Julien Stern and
                  Carsten Rust and
                  Bruno Cucinelli and
                  Dimitrios Skepastianos},
  editor       = {Jeng{-}Shyang Pan and
                  Xiamu Niu and
                  Hsiang{-}Cheh Huang and
                  Lakhmi C. Jain},
  title        = {Pseudo Identities Based on Fingerprint Characteristics},
  booktitle    = {4th International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
                  August 2008, Proceedings},
  pages        = {1063--1068},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IIH-MSP.2008.327},
  doi          = {10.1109/IIH-MSP.2008.327},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/DelvauxCBKLMBAVVKSBBGYSRCS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/TangBCP08,
  author       = {Qiang Tang and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  David Pointcheval},
  editor       = {Liqun Chen and
                  Yi Mu and
                  Willy Susilo},
  title        = {A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication
                  Schemes},
  booktitle    = {Information Security Practice and Experience, 4th International Conference,
                  {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4991},
  pages        = {56--70},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79104-1\_5},
  doi          = {10.1007/978-3-540-79104-1\_5},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/TangBCP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BringerCPZ08,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  David Pointcheval and
                  S{\'{e}}bastien Zimmer},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {An Application of the Boneh and Shacham Group Signature Scheme to
                  Biometric Authentication},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {219--230},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_15},
  doi          = {10.1007/978-3-540-89598-5\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BringerCPZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BringerCI08,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Thomas Icart},
  editor       = {Rafail Ostrovsky and
                  Roberto De Prisco and
                  Ivan Visconti},
  title        = {Improved Privacy of the Tree-Based Hash Protocols Using Physically
                  Unclonable Function},
  booktitle    = {Security and Cryptography for Networks, 6th International Conference,
                  {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5229},
  pages        = {77--91},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85855-3\_6},
  doi          = {10.1007/978-3-540-85855-3\_6},
  timestamp    = {Tue, 25 Feb 2020 11:33:46 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/BringerCI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0802-0603,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne},
  title        = {Trusted-HB: a low-cost version of {HB+} secure against Man-in-The-Middle
                  attacks},
  journal      = {CoRR},
  volume       = {abs/0802.0603},
  year         = {2008},
  url          = {http://arxiv.org/abs/0802.0603},
  eprinttype    = {arXiv},
  eprint       = {0802.0603},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0802-0603.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerC08,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne},
  title        = {Trusted-HB: a low-cost version of {HB+} secure against Man-in-The-Middle
                  attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {42},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/042},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerCI08,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Thomas Icart},
  title        = {Identification and Privacy: Zero-Knowledge is not Enough},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {229},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/229},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerCI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Bringer07,
  author       = {Julien Bringer},
  title        = {Non-lin{\'{e}}arit{\'{e}} des fonctions bool{\'{e}}ennes
                  : applications de la th{\'{e}}orie des fonctions bool{\'{e}}ennes
                  et des codes en cryptographie. (Nonlinearity of boolean functions
                  : ecryptographic applications of boolean functions and coding theory)},
  school       = {University of the South, Toulon-Var, France},
  year         = {2007},
  url          = {https://tel.archives-ouvertes.fr/tel-00258334},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Bringer07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BringerCIPTZ07,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Malika Izabach{\`{e}}ne and
                  David Pointcheval and
                  Qiang Tang and
                  S{\'{e}}bastien Zimmer},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {An Application of the Goldwasser-Micali Cryptosystem to Biometric
                  Authentication},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {96--106},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_8},
  doi          = {10.1007/978-3-540-73458-1\_8},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BringerCIPTZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/autoid/BringerC07,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne},
  title        = {An Application of the Naccache-Stern Knapsack Cryptosystem to Biometric
                  Authentication},
  booktitle    = {2007 {IEEE} Workshop on Automatic Identification Advanced Technologies,
                  AutoID 2007, Alghero, Italy, June 7-8, 2007},
  pages        = {180--185},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/AUTOID.2007.380616},
  doi          = {10.1109/AUTOID.2007.380616},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/autoid/BringerC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/BringerCPT07,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  David Pointcheval and
                  Qiang Tang},
  editor       = {Feng Bao and
                  San Ling and
                  Tatsuaki Okamoto and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {Extended Private Information Retrieval and Its Application in Biometrics
                  Authentications},
  booktitle    = {Cryptology and Network Security, 6th International Conference, {CANS}
                  2007, Singapore, December 8-10, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4856},
  pages        = {175--193},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76969-9\_12},
  doi          = {10.1007/978-3-540-76969-9\_12},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/BringerCPT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0705-3740,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  G{\'{e}}rard D. Cohen and
                  Bruno Kindarji and
                  Gilles Z{\'{e}}mor},
  title        = {Optimal Iris Fuzzy Sketches},
  journal      = {CoRR},
  volume       = {abs/0705.3740},
  year         = {2007},
  url          = {http://arxiv.org/abs/0705.3740},
  eprinttype    = {arXiv},
  eprint       = {0705.3740},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0705-3740.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerCI07,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Thomas Icart},
  title        = {Improved Privacy of the Tree-Based Hash protocols using Physically
                  Unclonable Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {294},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/294},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerCI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BringerCD06,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Quoc Dung Do},
  title        = {A fuzzy sketch with trapdoor},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {52},
  number       = {5},
  pages        = {2266--2269},
  year         = {2006},
  url          = {https://doi.org/10.1109/TIT.2006.872861},
  doi          = {10.1109/TIT.2006.872861},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/BringerCD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/BringerCD06,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Emmanuelle Dottax},
  editor       = {Herbert Leitold and
                  Evangelos P. Markatos},
  title        = {Perturbing and Protecting a Traceable Block Cipher},
  booktitle    = {Communications and Multimedia Security, 10th {IFIP} {TC-6} {TC-11}
                  International Conference, {CMS} 2006, Heraklion, Crete, Greece, October
                  19-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4237},
  pages        = {109--119},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11909033\_10},
  doi          = {10.1007/11909033\_10},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/BringerCD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/BringerC06,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {On the Wiretap Channel Induced by Noisy Tags},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {113--120},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_11},
  doi          = {10.1007/11964254\_11},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/BringerC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secperu/BringerCD06,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Emmanuelle Dottax},
  title        = {HB\({}^{\mbox{++}}\): a Lightweight Authentication Protocol Secure
                  against Some Attacks},
  booktitle    = {Second International Workshop on Security, Privacy and Trust in Pervasive
                  and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France},
  pages        = {28--33},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SECPERU.2006.10},
  doi          = {10.1109/SECPERU.2006.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secperu/BringerCD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerCD06,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Emmanuelle Dottax},
  title        = {Perturbing and Protecting a Traceable Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {64},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/064},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerCD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerCD06a,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Emmanuelle Dottax},
  title        = {White Box Cryptography: Another Attempt},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {468},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/468},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerCD06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerCD05,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Quoc Dung Do},
  title        = {A Fuzzy Sketch with Trapdoor},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {331},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/331},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerCD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics