|
Search the dblp DataBase
Hervé Chabanne:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Julien Bringer, Hervé Chabanne, Emmanuelle Dottax
Perturbing and Protecting a Traceable Block Cipher. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2006, pp:109-119 [Conf]
- Julien Bringer, Hervé Chabanne
On the Wiretap Channel Induced by Noisy Tags. [Citation Graph (0, 0)][DBLP] ESAS, 2006, pp:113-120 [Conf]
- J. Burger, Hervé Chabanne, Marc Girault
Minimum-change binary block-codes which are well balanced. [Citation Graph (0, 0)][DBLP] EUROCODE, 1990, pp:76-86 [Conf]
- Hervé Chabanne, Duong Hieu Phan, David Pointcheval
Public Traceability in Traitor Tracing Schemes. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2005, pp:542-558 [Conf]
- Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax, Hervé Pelletier
Generalizing Square Attack using Side-Channels of an AES Implementation on an FPGA. [Citation Graph (0, 0)][DBLP] FPL, 2005, pp:433-437 [Conf]
- Hervé Chabanne, Emmanuel Michon
JEROBOAM. [Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1998, pp:49-59 [Conf]
- Paul Camion, Hervé Chabanne
On the powerline system. [Citation Graph (0, 0)][DBLP] ICICS, 1997, pp:381-385 [Conf]
- Julien Bringer, Hervé Chabanne, Emmanuelle Dottax
HB++: a Lightweight Authentication Protocol Secure against Some Attacks. [Citation Graph (0, 0)][DBLP] SecPerU, 2006, pp:28-33 [Conf]
- Paul Camion, Hervé Chabanne
On the Powerline System. [Citation Graph (0, 0)][DBLP] Appl. Algebra Eng. Commun. Comput., 1999, v:9, n:5, pp:405-432 [Journal]
- Hervé Chabanne
Factoring of xn-1 Orthogonalization over Finite Fields of Characteristic 2. [Citation Graph (0, 0)][DBLP] Appl. Algebra Eng. Commun. Comput., 1995, v:6, n:, pp:57-63 [Journal]
- Julien Bringer, Hervé Chabanne, Quoc Dung Do
A fuzzy sketch with trapdoor. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2006, v:52, n:5, pp:2266-2269 [Journal]
- Hervé Chabanne
Permutation decoding of Abelian codes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1992, v:38, n:6, pp:1826-0 [Journal]
- Hervé Chabanne, Graham H. Norton
The n-dimensional key equation and a decoding application. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:200-0 [Journal]
- Hervé Chabanne, Guillaume Fumaroli
Noisy Cryptographic Protocols for Low-Cost RFID Tags. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2006, v:52, n:8, pp:3562-3566 [Journal]
- Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang, Sébastien Zimmer
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication. [Citation Graph (0, 0)][DBLP] ACISP, 2007, pp:96-106 [Conf]
- Julien Bringer, Hervé Chabanne, David Pointcheval, Qiang Tang
Extended Private Information Retrieval and Its Application in Biometrics Authentications. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:175-193 [Conf]
- Julien Bringer, Hervé Chabanne, Gerad Cohen, Bruno Kindarji, Gilles Zémor
Optimal Iris Fuzzy Sketches [Citation Graph (0, 0)][DBLP] CoRR, 2007, v:0, n:, pp:- [Journal]
- Hervé Chabanne, Nicolas Sendrier
On the concatenated structures of a [49, 18, 12] binary abelian code. [Citation Graph (0, 0)][DBLP] Discrete Mathematics, 1993, v:112, n:1-3, pp:245-248 [Journal]
Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters. [Citation Graph (, )][DBLP]
Cryptanalysis of EC-RAC, a RFID Identification Protocol. [Citation Graph (, )][DBLP]
Efficient zero-knowledge identification schemes which respect privacy. [Citation Graph (, )][DBLP]
Extending Match-On-Card to Local Biometric Identification. [Citation Graph (, )][DBLP]
Error-Tolerant Searchable Encryption. [Citation Graph (, )][DBLP]
Biometric Identification over Encrypted Data Made Feasible. [Citation Graph (, )][DBLP]
On Physical Obfuscation of Cryptographic Algorithms. [Citation Graph (, )][DBLP]
Private Interrogation of Devices via Identification Codes. [Citation Graph (, )][DBLP]
A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. [Citation Graph (, )][DBLP]
An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication. [Citation Graph (, )][DBLP]
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function. [Citation Graph (, )][DBLP]
An Authentication Protocol with Encrypted Biometric Data. [Citation Graph (, )][DBLP]
Another Look at Extended Private Information Retrieval Protocols. [Citation Graph (, )][DBLP]
Protecting the NOEKEON Cipher against SCARE Attacks in FPGAs by Using Dynamic Implementations. [Citation Graph (, )][DBLP]
Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks [Citation Graph (, )][DBLP]
Identification with Encrypted Biometric Data Made Feasible [Citation Graph (, )][DBLP]
On the Threshold of Maximum-Distance Separable Codes [Citation Graph (, )][DBLP]
RFID Key Establishment Against Active Adversaries [Citation Graph (, )][DBLP]
Negative Databases for Biometric Data [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.305secs
|