On-chip and freestanding elastic carbon films for micro-supercapacitors P Huang, C Lethien, S Pinaud, K Brousse, R Laloo, V Turq, M Respaud, ... Science 351 (6274), 691-695, 2016 | 450 | 2016 |
HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks J Bringer, H Chabanne, E Dottax Second international workshop on security, privacy and trust in pervasive …, 2006 | 307 | 2006 |
An application of the Goldwasser-Micali cryptosystem to biometric authentication J Bringer, H Chabanne, M Izabachene, D Pointcheval, Q Tang, S Zimmer Australasian Conference on Information Security and Privacy, 96-106, 2007 | 158 | 2007 |
Optimal iris fuzzy sketches J Bringer, H Chabanne, G Cohen, B Kindarji, G Zémor 2007 First IEEE International Conference on Biometrics: Theory, Applications …, 2007 | 134 | 2007 |
Theoretical and practical boundaries of binary secure sketches J Bringer, H Chabanne, G Cohen, B Kindarji, G Zemor IEEE Transactions on Information Forensics and Security 3 (4), 673-683, 2008 | 131 | 2008 |
Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends J Bringer, H Chabanne, A Patey IEEE Signal Processing Magazine 30 (2), 42-52, 2013 | 114 | 2013 |
An authentication protocol with encrypted biometric data J Bringer, H Chabanne International Conference on Cryptology in Africa, 109-124, 2008 | 110 | 2008 |
The best of both worlds: Applying secure sketches to cancelable biometrics J Bringer, H Chabanne, B Kindarji Science of Computer Programming 74 (1-2), 43-51, 2008 | 103 | 2008 |
A framework for analyzing template security and privacy in biometric authentication systems K Simoens, J Bringer, H Chabanne, S Seys IEEE Transactions on Information forensics and security 7 (2), 833-841, 2012 | 101 | 2012 |
Cryptanalysis of EC-RAC, a RFID identification protocol J Bringer, H Chabanne, T Icart International conference on cryptology and network security, 149-161, 2008 | 99 | 2008 |
White Box Cryptography: Another Attempt. J Bringer, H Chabanne, E Dottax IACR Cryptol. ePrint Arch. 2006, 468, 2006 | 92 | 2006 |
Binary feature vector fingerprint representation from minutiae vicinities J Bringer, V Despiegel 2010 Fourth IEEE International Conference on Biometrics: Theory …, 2010 | 91 | 2010 |
Trusted-HB: A Low-Cost Version of HB Secure Against Man-in-the-Middle Attacks J Bringer, H Chabanne IEEE Transactions on Information Theory 54 (9), 4339-4342, 2008 | 90 | 2008 |
GSHADE: faster privacy-preserving distance computation and biometric identification J Bringer, H Chabanne, M Favre, A Patey, T Schneider, M Zohner Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014 | 89 | 2014 |
Orthogonal direct sum masking J Bringer, C Carlet, H Chabanne, S Guilley, H Maghrebi IFIP International Workshop on Information Security Theory and Practice, 40-56, 2014 | 76 | 2014 |
Slot antenna having independent antenna elements and associated circuitry MA Schamberger, SD Silk, SL Kuffner US Patent 6,583,765, 2003 | 72* | 2003 |
Error-tolerant searchable encryption J Bringer, H Chabanne, B Kindarji 2009 IEEE International Conference on Communications, 1-6, 2009 | 69 | 2009 |
Extended private information retrieval and its application in biometrics authentications J Bringer, H Chabanne, D Pointcheval, Q Tang International Conference on Cryptology and Network Security, 175-193, 2007 | 62 | 2007 |
A formal study of the privacy concerns in biometric-based remote authentication schemes Q Tang, J Bringer, H Chabanne, D Pointcheval International Conference on Information Security Practice and Experience, 56-70, 2008 | 60 | 2008 |
High precision fault injections on the instruction cache of ARMv7-M architectures L Riviere, Z Najm, P Rauzy, JL Danger, J Bringer, L Sauvage 2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015 | 59 | 2015 |