Follow
Julien Bringer
Julien Bringer
Kallistech
Verified email at kallistech.com
Title
Cited by
Cited by
Year
HB^+^+: a lightweight authentication protocol secure against some attacks
J Bringer, H Chabanne, E Dottax
Second international workshop on security, privacy and trust in pervasive …, 2006
3432006
An application of the Goldwasser-Micali cryptosystem to biometric authentication
J Bringer, H Chabanne, M Izabachene, D Pointcheval, Q Tang, S Zimmer
Information Security and Privacy: 12th Australasian Conference, ACISP 2007 …, 2007
1762007
Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends
J Bringer, H Chabanne, A Patey
IEEE Signal Processing Magazine 30 (2), 42-52, 2013
1692013
Optimal iris fuzzy sketches
J Bringer, H Chabanne, G Cohen, B Kindarji, G Zémor
2007 First IEEE International Conference on Biometrics: Theory, Applications …, 2007
1572007
Theoretical and practical boundaries of binary secure sketches
J Bringer, H Chabanne, G Cohen, B Kindarji, G Zemor
IEEE Transactions on Information Forensics and Security 3 (4), 673-683, 2008
1522008
A framework for analyzing template security and privacy in biometric authentication systems
K Simoens, J Bringer, H Chabanne, S Seys
IEEE Transactions on Information forensics and security 7 (2), 833-841, 2012
1442012
Orthogonal direct sum masking: A smartcard friendly computation paradigm in a code, with builtin protection against side-channel and fault attacks
J Bringer, C Carlet, H Chabanne, S Guilley, H Maghrebi
IFIP International Workshop on Information Security Theory and Practice, 40-56, 2014
1342014
White box cryptography: Another attempt
J Bringer, H Chabanne, E Dottax
Cryptology ePrint Archive, 2006
1292006
An authentication protocol with encrypted biometric data
J Bringer, H Chabanne
Progress in Cryptology–AFRICACRYPT 2008: First International Conference on …, 2008
1232008
GSHADE: faster privacy-preserving distance computation and biometric identification
J Bringer, H Chabanne, M Favre, A Patey, T Schneider, M Zohner
Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014
1202014
The best of both worlds: Applying secure sketches to cancelable biometrics
J Bringer, H Chabanne, B Kindarji
Science of Computer Programming 74 (1-2), 43-51, 2008
1192008
Cryptanalysis of EC-RAC, a RFID identification protocol
J Bringer, H Chabanne, T Icart
Cryptology and Network Security: 7th International Conference, CANS 2008 …, 2008
1152008
High precision fault injections on the instruction cache of ARMv7-M architectures
L Riviere, Z Najm, P Rauzy, JL Danger, J Bringer, L Sauvage
2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015
1122015
Binary feature vector fingerprint representation from minutiae vicinities
J Bringer, V Despiegel
2010 Fourth IEEE International Conference on Biometrics: Theory …, 2010
1032010
Trusted-HB: A Low-Cost Version of HB Secure Against Man-in-the-Middle Attacks
J Bringer, H Chabanne
IEEE Transactions on Information Theory 54 (9), 4339-4342, 2008
952008
Error-tolerant searchable encryption
J Bringer, H Chabanne, B Kindarji
2009 IEEE International Conference on Communications, 1-6, 2009
782009
Shade: Secure hamming distance computation from oblivious transfer
J Bringer, H Chabanne, A Patey
International Conference on Financial Cryptography and Data Security, 164-176, 2013
762013
Identification with encrypted biometric data
J Bringer, H Chabanne, B Kindarji
Security and Communication Networks 4 (5), 548-562, 2011
722011
A formal study of the privacy concerns in biometric-based remote authentication schemes
Q Tang, J Bringer, H Chabanne, D Pointcheval
International Conference on Information Security Practice and Experience, 56-70, 2008
672008
Extended private information retrieval and its application in biometrics authentications
J Bringer, H Chabanne, D Pointcheval, Q Tang
International Conference on Cryptology and Network Security, 175-193, 2007
652007
The system can't perform the operation now. Try again later.
Articles 1–20