The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hervé Chabanne: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Julien Bringer, Hervé Chabanne, Emmanuelle Dottax
    Perturbing and Protecting a Traceable Block Cipher. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:109-119 [Conf]
  2. Julien Bringer, Hervé Chabanne
    On the Wiretap Channel Induced by Noisy Tags. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:113-120 [Conf]
  3. J. Burger, Hervé Chabanne, Marc Girault
    Minimum-change binary block-codes which are well balanced. [Citation Graph (0, 0)][DBLP]
    EUROCODE, 1990, pp:76-86 [Conf]
  4. Hervé Chabanne, Duong Hieu Phan, David Pointcheval
    Public Traceability in Traitor Tracing Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:542-558 [Conf]
  5. Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax, Hervé Pelletier
    Generalizing Square Attack using Side-Channels of an AES Implementation on an FPGA. [Citation Graph (0, 0)][DBLP]
    FPL, 2005, pp:433-437 [Conf]
  6. Hervé Chabanne, Emmanuel Michon
    JEROBOAM. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:49-59 [Conf]
  7. Paul Camion, Hervé Chabanne
    On the powerline system. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:381-385 [Conf]
  8. Julien Bringer, Hervé Chabanne, Emmanuelle Dottax
    HB++: a Lightweight Authentication Protocol Secure against Some Attacks. [Citation Graph (0, 0)][DBLP]
    SecPerU, 2006, pp:28-33 [Conf]
  9. Paul Camion, Hervé Chabanne
    On the Powerline System. [Citation Graph (0, 0)][DBLP]
    Appl. Algebra Eng. Commun. Comput., 1999, v:9, n:5, pp:405-432 [Journal]
  10. Hervé Chabanne
    Factoring of xn-1 Orthogonalization over Finite Fields of Characteristic 2. [Citation Graph (0, 0)][DBLP]
    Appl. Algebra Eng. Commun. Comput., 1995, v:6, n:, pp:57-63 [Journal]
  11. Julien Bringer, Hervé Chabanne, Quoc Dung Do
    A fuzzy sketch with trapdoor. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2006, v:52, n:5, pp:2266-2269 [Journal]
  12. Hervé Chabanne
    Permutation decoding of Abelian codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1992, v:38, n:6, pp:1826-0 [Journal]
  13. Hervé Chabanne, Graham H. Norton
    The n-dimensional key equation and a decoding application. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:1, pp:200-0 [Journal]
  14. Hervé Chabanne, Guillaume Fumaroli
    Noisy Cryptographic Protocols for Low-Cost RFID Tags. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2006, v:52, n:8, pp:3562-3566 [Journal]
  15. Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang, Sébastien Zimmer
    An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:96-106 [Conf]
  16. Julien Bringer, Hervé Chabanne, David Pointcheval, Qiang Tang
    Extended Private Information Retrieval and Its Application in Biometrics Authentications. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:175-193 [Conf]
  17. Julien Bringer, Hervé Chabanne, Gerad Cohen, Bruno Kindarji, Gilles Zémor
    Optimal Iris Fuzzy Sketches [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  18. Hervé Chabanne, Nicolas Sendrier
    On the concatenated structures of a [49, 18, 12] binary abelian code. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1993, v:112, n:1-3, pp:245-248 [Journal]

  19. Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters. [Citation Graph (, )][DBLP]


  20. Cryptanalysis of EC-RAC, a RFID Identification Protocol. [Citation Graph (, )][DBLP]


  21. Efficient zero-knowledge identification schemes which respect privacy. [Citation Graph (, )][DBLP]


  22. Extending Match-On-Card to Local Biometric Identification. [Citation Graph (, )][DBLP]


  23. Error-Tolerant Searchable Encryption. [Citation Graph (, )][DBLP]


  24. Biometric Identification over Encrypted Data Made Feasible. [Citation Graph (, )][DBLP]


  25. On Physical Obfuscation of Cryptographic Algorithms. [Citation Graph (, )][DBLP]


  26. Private Interrogation of Devices via Identification Codes. [Citation Graph (, )][DBLP]


  27. A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. [Citation Graph (, )][DBLP]


  28. An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication. [Citation Graph (, )][DBLP]


  29. Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function. [Citation Graph (, )][DBLP]


  30. An Authentication Protocol with Encrypted Biometric Data. [Citation Graph (, )][DBLP]


  31. Another Look at Extended Private Information Retrieval Protocols. [Citation Graph (, )][DBLP]


  32. Protecting the NOEKEON Cipher against SCARE Attacks in FPGAs by Using Dynamic Implementations. [Citation Graph (, )][DBLP]


  33. Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks [Citation Graph (, )][DBLP]


  34. Identification with Encrypted Biometric Data Made Feasible [Citation Graph (, )][DBLP]


  35. On the Threshold of Maximum-Distance Separable Codes [Citation Graph (, )][DBLP]


  36. RFID Key Establishment Against Active Adversaries [Citation Graph (, )][DBLP]


  37. Negative Databases for Biometric Data [Citation Graph (, )][DBLP]


Search in 0.065secs, Finished in 0.068secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002