HB^+^+: a lightweight authentication protocol secure against some attacks J Bringer, H Chabanne, E Dottax Second international workshop on security, privacy and trust in pervasive …, 2006 | 350 | 2006 |
An application of the Goldwasser-Micali cryptosystem to biometric authentication J Bringer, H Chabanne, M Izabachene, D Pointcheval, Q Tang, S Zimmer Information Security and Privacy: 12th Australasian Conference, ACISP 2007 …, 2007 | 180 | 2007 |
Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends J Bringer, H Chabanne, A Patey IEEE Signal Processing Magazine 30 (2), 42-52, 2013 | 173 | 2013 |
Optimal iris fuzzy sketches J Bringer, H Chabanne, G Cohen, B Kindarji, G Zémor 2007 First IEEE International Conference on Biometrics: Theory, Applications …, 2007 | 159 | 2007 |
Theoretical and practical boundaries of binary secure sketches J Bringer, H Chabanne, G Cohen, B Kindarji, G Zemor IEEE Transactions on Information Forensics and Security 3 (4), 673-683, 2008 | 153 | 2008 |
A framework for analyzing template security and privacy in biometric authentication systems K Simoens, J Bringer, H Chabanne, S Seys IEEE Transactions on Information forensics and security 7 (2), 833-841, 2012 | 149 | 2012 |
Orthogonal direct sum masking: A smartcard friendly computation paradigm in a code, with builtin protection against side-channel and fault attacks J Bringer, C Carlet, H Chabanne, S Guilley, H Maghrebi IFIP International Workshop on Information Security Theory and Practice, 40-56, 2014 | 142 | 2014 |
White box cryptography: Another attempt J Bringer, H Chabanne, E Dottax Cryptology ePrint Archive, 2006 | 137 | 2006 |
GSHADE: Faster privacy-preserving distance computation and biometric identification J Bringer, H Chabanne, M Favre, A Patey, T Schneider, M Zohner Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014 | 126 | 2014 |
An authentication protocol with encrypted biometric data J Bringer, H Chabanne Progress in Cryptology–AFRICACRYPT 2008: First International Conference on …, 2008 | 122 | 2008 |
The best of both worlds: Applying secure sketches to cancelable biometrics J Bringer, H Chabanne, B Kindarji Science of Computer Programming 74 (1-2), 43-51, 2008 | 120 | 2008 |
Cryptanalysis of EC-RAC, a RFID identification protocol J Bringer, H Chabanne, T Icart Cryptology and Network Security: 7th International Conference, CANS 2008 …, 2008 | 120 | 2008 |
High precision fault injections on the instruction cache of ARMv7-M architectures L Riviere, Z Najm, P Rauzy, JL Danger, J Bringer, L Sauvage 2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015 | 111 | 2015 |
Binary feature vector fingerprint representation from minutiae vicinities J Bringer, V Despiegel 2010 Fourth IEEE International Conference on Biometrics: Theory …, 2010 | 104 | 2010 |
Trusted-HB: A Low-Cost Version of HB Secure Against Man-in-the-Middle Attacks J Bringer, H Chabanne IEEE Transactions on Information Theory 54 (9), 4339-4342, 2008 | 95 | 2008 |
Shade: Secure hamming distance computation from oblivious transfer J Bringer, H Chabanne, A Patey International Conference on Financial Cryptography and Data Security, 164-176, 2013 | 79 | 2013 |
Error-tolerant searchable encryption J Bringer, H Chabanne, B Kindarji 2009 IEEE International Conference on Communications, 1-6, 2009 | 79 | 2009 |
Identification with encrypted biometric data J Bringer, H Chabanne, B Kindarji Security and Communication Networks 4 (5), 548-562, 2011 | 71 | 2011 |
A formal study of the privacy concerns in biometric-based remote authentication schemes Q Tang, J Bringer, H Chabanne, D Pointcheval International Conference on Information Security Practice and Experience, 56-70, 2008 | 68 | 2008 |
Extended private information retrieval and its application in biometrics authentications J Bringer, H Chabanne, D Pointcheval, Q Tang International Conference on Cryptology and Network Security, 175-193, 2007 | 67 | 2007 |