| A new security model for authenticated key agreement AP Sarr, P Elbaz-Vincent, JC Bajard International Conference on Security and Cryptography for Networks, 219-234, 2010 | 95 | 2010 |
| A secure and efficient authenticated Diffie–Hellman protocol AP Sarr, P Elbaz-Vincent, JC Bajard European Public Key Infrastructure Workshop, 83-98, 2009 | 77 | 2009 |
| On poly (ana) logs I P Elbaz-Vincent, H Gangl Compositio Mathematica 130 (2), 161-214, 2002 | 73 | 2002 |
| Perfect forms, K-theory and the cohomology of modular groups P Elbaz-Vincent, H Gangl, C Soulé Advances in Mathematics 245, 587-624, 2013 | 64 | 2013 |
| Milnor K-theory of rings, higher Chow groups and applications P Elbaz-Vincent, S Müller-Stach Inventiones mathematicae 148 (1), 177-206, 2002 | 56 | 2002 |
| Quelques calculs de la cohomologie de et de la K-théorie de P Elbaz-Vincent, H Gangl, C Soulé Comptes rendus. Mathématique 335 (4), 321-324, 2002 | 53 | 2002 |
| Defeating opaque predicates statically through machine learning and binary analysis R Tofighi-Shirazi, IM Asavoae, P Elbaz-Vincent, TH Le Proceedings of the 3rd ACM Workshop on Software Protection, 3-14, 2019 | 40 | 2019 |
| Influence of the temperature on true random number generators M Soucarros, C Canovas-Dumas, J Clédière, P Elbaz-Vincent, D Réal 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, 24-27, 2011 | 33 | 2011 |
| The indecomposable K3 of rings and homology of SL2 P Elbaz-Vincent Journal of Pure and Applied Algebra 132 (1), 27-71, 1998 | 24 | 1998 |
| Dose: Deobfuscation based on semantic equivalence R Tofighi-Shirazi, M Christofi, P Elbaz-Vincent, TH Le Proceedings of the 8th Software Security, Protection, and Reverse …, 2018 | 23 | 2018 |
| Fine-grained static detection of obfuscation transforms using ensemble-learning and semantic reasoning R Tofighi-Shirazi, IM Asăvoae, P Elbaz-Vincent Proceedings of the 9th Workshop on Software Security, Protection, and …, 2019 | 21 | 2019 |
| Fault analysis and evaluation of a true random number generator embedded in a processor M Soucarros, J Clédière, C Dumas, P Elbaz-Vincent Journal of Electronic Testing 29 (3), 367-381, 2013 | 19 | 2013 |
| Parallel computation of the rank of large sparse matrices from algebraic K-theory JG Dumas, P Elbaz-Vincent, P Giorgi, A Urbanska Proceedings of the 2007 international workshop on Parallel symbolic …, 2007 | 18 | 2007 |
| On the security of the (F) HMQV protocol AP Sarr, P Elbaz–Vincent International Conference on Cryptology in Africa, 207-224, 2016 | 13 | 2016 |
| Finite polylogarithms, their multiple analogues and the Shannon entropy P Elbaz-Vincent, H Gangl International Conference on Geometric Science of Information, 277-285, 2015 | 13 | 2015 |
| VORONOI COMPLEXES IN HIGHER DIMENSIONS, COHOMOLOGY OF FOR AND THE TRIVIALITY OF MD Sikiric, P Elbaz-Vincent, A Kupers, J Martinet | 11 | 2019 |
| MPHELL: A fast and robust library with unified and versatile arithmetics for elliptic curves cryptography T Coladon, P Elbaz-Vincent, C Hugounenq 2021 IEEE 28th Symposium on Computer Arithmetic (ARITH), 78-85, 2021 | 10 | 2021 |
| A CAS as an assistant to reasoned instrumentation P Elbaz-Vincent The didactical challenge of symbolic calculators: turning a computational …, 2005 | 8 | 2005 |
| Homology of linear groups with coefficients in the adjoint action and K-theory P Elbaz-Vincent K-Theory 16 (1), 35-50, 1999 | 8 | 1999 |
| K3 indécomposable des anneaux et homologie de SL2 P Elbaz-Vincent These de doctorat, Nice, 1995 | 8 | 1995 |