HB^+^+: a lightweight authentication protocol secure against some attacks J Bringer, H Chabanne, E Dottax Second international workshop on security, privacy and trust in pervasive …, 2006 | 337 | 2006 |
Privacy-preserving classification on deep neural network H Chabanne, A De Wargny, J Milgram, C Morel, E Prouff Cryptology ePrint Archive, 2017 | 258 | 2017 |
An application of the Goldwasser-Micali cryptosystem to biometric authentication J Bringer, H Chabanne, M Izabachene, D Pointcheval, Q Tang, S Zimmer Australasian Conference on Information Security and Privacy, 96-106, 2007 | 165 | 2007 |
Optimal iris fuzzy sketches J Bringer, H Chabanne, G Cohen, B Kindarji, G Zémor 2007 First IEEE International Conference on Biometrics: Theory, Applications …, 2007 | 148 | 2007 |
Public traceability in traitor tracing schemes H Chabanne, DH Phan, D Pointcheval Annual International Conference on the Theory and Applications of …, 2005 | 148 | 2005 |
Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends J Bringer, H Chabanne, A Patey IEEE Signal Processing Magazine 30 (2), 42-52, 2013 | 144 | 2013 |
Theoretical and practical boundaries of binary secure sketches J Bringer, H Chabanne, G Cohen, B Kindarji, G Zemor IEEE Transactions on Information Forensics and Security 3 (4), 673-683, 2008 | 143 | 2008 |
A framework for analyzing template security and privacy in biometric authentication systems K Simoens, J Bringer, H Chabanne, S Seys IEEE Transactions on Information forensics and security 7 (2), 833-841, 2012 | 126 | 2012 |
An authentication protocol with encrypted biometric data J Bringer, H Chabanne International Conference on Cryptology in Africa, 109-124, 2008 | 117 | 2008 |
The best of both worlds: Applying secure sketches to cancelable biometrics J Bringer, H Chabanne, B Kindarji Science of Computer Programming 74 (1-2), 43-51, 2008 | 114 | 2008 |
Cryptanalysis of EC-RAC, a RFID identification protocol J Bringer, H Chabanne, T Icart International conference on cryptology and network security, 149-161, 2008 | 112 | 2008 |
White box cryptography: Another attempt J Bringer, H Chabanne, E Dottax Cryptology ePrint Archive, 2006 | 111 | 2006 |
GSHADE: Faster privacy-preserving distance computation and biometric identification J Bringer, H Chabanne, M Favre, A Patey, T Schneider, M Zohner Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014 | 104 | 2014 |
Orthogonal direct sum masking J Bringer, C Carlet, H Chabanne, S Guilley, H Maghrebi IFIP International Workshop on Information Security Theory and Practice, 40-56, 2014 | 101 | 2014 |
Trusted-HB: A Low-Cost Version of HB Secure Against Man-in-the-Middle Attacks J Bringer, H Chabanne IEEE Transactions on Information Theory 54 (9), 4339-4342, 2008 | 95 | 2008 |
Electromagnetic side channels of an FPGA implementation of AES V Carlier, H Chabanne, E Dottax, H Pelletier Cryptology ePrint Archive, 2004 | 79 | 2004 |
Error-tolerant searchable encryption J Bringer, H Chabanne, B Kindarji 2009 IEEE International Conference on Communications, 1-6, 2009 | 73 | 2009 |
Extended private information retrieval and its application in biometrics authentications J Bringer, H Chabanne, D Pointcheval, Q Tang International Conference on Cryptology and Network Security, 175-193, 2007 | 66 | 2007 |
Identification with encrypted biometric data J Bringer, H Chabanne, B Kindarji Security and Communication Networks 4 (5), 548-562, 2011 | 64 | 2011 |
A formal study of the privacy concerns in biometric-based remote authentication schemes Q Tang, J Bringer, H Chabanne, D Pointcheval International Conference on Information Security Practice and Experience, 56-70, 2008 | 64 | 2008 |