[go: up one dir, main page]

Follow
Julien Bringer
Julien Bringer
Kallistech
Verified email at kallistech.com
Title
Cited by
Cited by
Year
HB^+^+: a lightweight authentication protocol secure against some attacks
J Bringer, H Chabanne, E Dottax
Second international workshop on security, privacy and trust in pervasive …, 2006
3612006
An application of the Goldwasser-Micali cryptosystem to biometric authentication
J Bringer, H Chabanne, M Izabachene, D Pointcheval, Q Tang, S Zimmer
Australasian Conference on Information Security and Privacy, 96-106, 2007
1892007
Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends
J Bringer, H Chabanne, A Patey
IEEE Signal Processing Magazine 30 (2), 42-52, 2013
1852013
Orthogonal direct sum masking: A smartcard friendly computation paradigm in a code, with builtin protection against side-channel and fault attacks
J Bringer, C Carlet, H Chabanne, S Guilley, H Maghrebi
IFIP International Workshop on Information Security Theory and Practice, 40-56, 2014
1762014
Optimal iris fuzzy sketches
J Bringer, H Chabanne, G Cohen, B Kindarji, G Zémor
2007 First IEEE International Conference on Biometrics: Theory, Applications …, 2007
1632007
Theoretical and practical boundaries of binary secure sketches
J Bringer, H Chabanne, G Cohen, B Kindarji, G Zemor
IEEE Transactions on Information Forensics and Security 3 (4), 673-683, 2008
1612008
A framework for analyzing template security and privacy in biometric authentication systems
K Simoens, J Bringer, H Chabanne, S Seys
IEEE Transactions on Information forensics and security 7 (2), 833-841, 2012
1602012
White box cryptography: Another attempt
J Bringer, H Chabanne, E Dottax
Cryptology ePrint Archive, 2006
1532006
GSHADE: Faster privacy-preserving distance computation and biometric identification
J Bringer, H Chabanne, M Favre, A Patey, T Schneider, M Zohner
Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014
1342014
An authentication protocol with encrypted biometric data
J Bringer, H Chabanne
International Conference on Cryptology in Africa, 109-124, 2008
1292008
High precision fault injections on the instruction cache of ARMv7-M architectures
L Riviere, Z Najm, P Rauzy, JL Danger, J Bringer, L Sauvage
2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015
1282015
The best of both worlds: Applying secure sketches to cancelable biometrics
J Bringer, H Chabanne, B Kindarji
Science of Computer Programming 74 (1-2), 43-51, 2008
1252008
Error-tolerant searchable encryption
J Bringer, H Chabanne, B Kindarji
2009 IEEE International Conference on Communications, 1-6, 2009
1222009
Cryptanalysis of EC-RAC, a RFID identification protocol
J Bringer, H Chabanne, T Icart
International conference on cryptology and network security, 149-161, 2008
1212008
Binary feature vector fingerprint representation from minutiae vicinities
J Bringer, V Despiegel
2010 Fourth IEEE International Conference on Biometrics: Theory …, 2010
1062010
Trusted-HB: A Low-Cost Version of HB Secure Against Man-in-the-Middle Attacks
J Bringer, H Chabanne
IEEE Transactions on Information Theory 54 (9), 4339-4342, 2008
1032008
Biometric identification over encrypted data made feasible
M Adjedj, J Bringer, H Chabanne, B Kindarji
International Conference on Information Systems Security, 86-100, 2009
962009
Shade: Secure hamming distance computation from oblivious transfer
J Bringer, H Chabanne, A Patey
International Conference on Financial Cryptography and Data Security, 164-176, 2013
852013
Identification with encrypted biometric data
J Bringer, H Chabanne, B Kindarji
Security and Communication Networks 4 (5), 548-562, 2011
712011
Security analysis of bloom filter-based iris biometric template protection
J Bringer, C Morel, C Rathgeb
2015 international conference on biometrics (ICB), 527-534, 2015
692015
The system can't perform the operation now. Try again later.
Articles 1–20