| HB^+^+: a lightweight authentication protocol secure against some attacks J Bringer, H Chabanne, E Dottax Second international workshop on security, privacy and trust in pervasive …, 2006 | 361 | 2006 |
| An application of the Goldwasser-Micali cryptosystem to biometric authentication J Bringer, H Chabanne, M Izabachene, D Pointcheval, Q Tang, S Zimmer Australasian Conference on Information Security and Privacy, 96-106, 2007 | 189 | 2007 |
| Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends J Bringer, H Chabanne, A Patey IEEE Signal Processing Magazine 30 (2), 42-52, 2013 | 185 | 2013 |
| Orthogonal direct sum masking: A smartcard friendly computation paradigm in a code, with builtin protection against side-channel and fault attacks J Bringer, C Carlet, H Chabanne, S Guilley, H Maghrebi IFIP International Workshop on Information Security Theory and Practice, 40-56, 2014 | 176 | 2014 |
| Optimal iris fuzzy sketches J Bringer, H Chabanne, G Cohen, B Kindarji, G Zémor 2007 First IEEE International Conference on Biometrics: Theory, Applications …, 2007 | 163 | 2007 |
| Theoretical and practical boundaries of binary secure sketches J Bringer, H Chabanne, G Cohen, B Kindarji, G Zemor IEEE Transactions on Information Forensics and Security 3 (4), 673-683, 2008 | 161 | 2008 |
| A framework for analyzing template security and privacy in biometric authentication systems K Simoens, J Bringer, H Chabanne, S Seys IEEE Transactions on Information forensics and security 7 (2), 833-841, 2012 | 160 | 2012 |
| White box cryptography: Another attempt J Bringer, H Chabanne, E Dottax Cryptology ePrint Archive, 2006 | 153 | 2006 |
| GSHADE: Faster privacy-preserving distance computation and biometric identification J Bringer, H Chabanne, M Favre, A Patey, T Schneider, M Zohner Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014 | 134 | 2014 |
| An authentication protocol with encrypted biometric data J Bringer, H Chabanne International Conference on Cryptology in Africa, 109-124, 2008 | 129 | 2008 |
| High precision fault injections on the instruction cache of ARMv7-M architectures L Riviere, Z Najm, P Rauzy, JL Danger, J Bringer, L Sauvage 2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015 | 128 | 2015 |
| The best of both worlds: Applying secure sketches to cancelable biometrics J Bringer, H Chabanne, B Kindarji Science of Computer Programming 74 (1-2), 43-51, 2008 | 125 | 2008 |
| Error-tolerant searchable encryption J Bringer, H Chabanne, B Kindarji 2009 IEEE International Conference on Communications, 1-6, 2009 | 122 | 2009 |
| Cryptanalysis of EC-RAC, a RFID identification protocol J Bringer, H Chabanne, T Icart International conference on cryptology and network security, 149-161, 2008 | 121 | 2008 |
| Binary feature vector fingerprint representation from minutiae vicinities J Bringer, V Despiegel 2010 Fourth IEEE International Conference on Biometrics: Theory …, 2010 | 106 | 2010 |
| Trusted-HB: A Low-Cost Version of HB Secure Against Man-in-the-Middle Attacks J Bringer, H Chabanne IEEE Transactions on Information Theory 54 (9), 4339-4342, 2008 | 103 | 2008 |
| Biometric identification over encrypted data made feasible M Adjedj, J Bringer, H Chabanne, B Kindarji International Conference on Information Systems Security, 86-100, 2009 | 96 | 2009 |
| Shade: Secure hamming distance computation from oblivious transfer J Bringer, H Chabanne, A Patey International Conference on Financial Cryptography and Data Security, 164-176, 2013 | 85 | 2013 |
| Identification with encrypted biometric data J Bringer, H Chabanne, B Kindarji Security and Communication Networks 4 (5), 548-562, 2011 | 71 | 2011 |
| Security analysis of bloom filter-based iris biometric template protection J Bringer, C Morel, C Rathgeb 2015 international conference on biometrics (ICB), 527-534, 2015 | 69 | 2015 |