Privacy-preserving classification on deep neural network H Chabanne, A De Wargny, J Milgram, C Morel, E Prouff Cryptology ePrint Archive, 2017 | 399 | 2017 |
HB^+^+: a lightweight authentication protocol secure against some attacks J Bringer, H Chabanne, E Dottax Second international workshop on security, privacy and trust in pervasive …, 2006 | 351 | 2006 |
An application of the Goldwasser-Micali cryptosystem to biometric authentication J Bringer, H Chabanne, M Izabachene, D Pointcheval, Q Tang, S Zimmer Information Security and Privacy: 12th Australasian Conference, ACISP 2007 …, 2007 | 181 | 2007 |
Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends J Bringer, H Chabanne, A Patey IEEE Signal Processing Magazine 30 (2), 42-52, 2013 | 174 | 2013 |
Optimal iris fuzzy sketches J Bringer, H Chabanne, G Cohen, B Kindarji, G Zémor 2007 First IEEE International Conference on Biometrics: Theory, Applications …, 2007 | 159 | 2007 |
Public traceability in traitor tracing schemes H Chabanne, DH Phan, D Pointcheval Annual International Conference on the Theory and Applications of …, 2005 | 155 | 2005 |
Theoretical and practical boundaries of binary secure sketches J Bringer, H Chabanne, G Cohen, B Kindarji, G Zemor IEEE Transactions on Information Forensics and Security 3 (4), 673-683, 2008 | 153 | 2008 |
A framework for analyzing template security and privacy in biometric authentication systems K Simoens, J Bringer, H Chabanne, S Seys IEEE Transactions on Information forensics and security 7 (2), 833-841, 2012 | 150 | 2012 |
Orthogonal direct sum masking: A smartcard friendly computation paradigm in a code, with builtin protection against side-channel and fault attacks J Bringer, C Carlet, H Chabanne, S Guilley, H Maghrebi IFIP International Workshop on Information Security Theory and Practice, 40-56, 2014 | 143 | 2014 |
White box cryptography: Another attempt J Bringer, H Chabanne, E Dottax Cryptology ePrint Archive, 2006 | 137 | 2006 |
GSHADE: Faster privacy-preserving distance computation and biometric identification J Bringer, H Chabanne, M Favre, A Patey, T Schneider, M Zohner Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014 | 126 | 2014 |
An authentication protocol with encrypted biometric data J Bringer, H Chabanne Progress in Cryptology–AFRICACRYPT 2008: First International Conference on …, 2008 | 122 | 2008 |
The best of both worlds: Applying secure sketches to cancelable biometrics J Bringer, H Chabanne, B Kindarji Science of Computer Programming 74 (1-2), 43-51, 2008 | 120 | 2008 |
Cryptanalysis of EC-RAC, a RFID identification protocol J Bringer, H Chabanne, T Icart Cryptology and Network Security: 7th International Conference, CANS 2008 …, 2008 | 120 | 2008 |
Trusted-HB: A Low-Cost Version of HB Secure Against Man-in-the-Middle Attacks J Bringer, H Chabanne IEEE Transactions on Information Theory 54 (9), 4339-4342, 2008 | 97 | 2008 |
Electromagnetic side channels of an FPGA implementation of AES V Carlier, H Chabanne, E Dottax, H Pelletier Cryptology Eprint Archive, 2004 | 80 | 2004 |
Shade: Secure hamming distance computation from oblivious transfer J Bringer, H Chabanne, A Patey International Conference on Financial Cryptography and Data Security, 164-176, 2013 | 79 | 2013 |
Error-tolerant searchable encryption J Bringer, H Chabanne, B Kindarji 2009 IEEE International Conference on Communications, 1-6, 2009 | 79 | 2009 |
Identification with encrypted biometric data J Bringer, H Chabanne, B Kindarji Security and Communication Networks 4 (5), 548-562, 2011 | 71 | 2011 |
A user-centric system for verified identities on the bitcoin blockchain D Augot, H Chabanne, T Chenevier, W George, L Lambert Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2017 | 70 | 2017 |