Julien Bringer
Julien Bringer
Verified email at kallistech.com
Cited by
Cited by
On-chip and freestanding elastic carbon films for micro-supercapacitors
P Huang, C Lethien, S Pinaud, K Brousse, R Laloo, V Turq, M Respaud, ...
Science 351 (6274), 691-695, 2016
HB^+^+: a lightweight authentication protocol secure against some attacks
J Bringer, H Chabanne, E Dottax
Second international workshop on security, privacy and trust in pervasive …, 2006
An application of the Goldwasser-Micali cryptosystem to biometric authentication
J Bringer, H Chabanne, M Izabachene, D Pointcheval, Q Tang, S Zimmer
Australasian Conference on Information Security and Privacy, 96-106, 2007
Optimal iris fuzzy sketches
J Bringer, H Chabanne, G Cohen, B Kindarji, G Zémor
2007 First IEEE International Conference on Biometrics: Theory, Applications …, 2007
Theoretical and practical boundaries of binary secure sketches
J Bringer, H Chabanne, G Cohen, B Kindarji, G Zemor
IEEE Transactions on Information Forensics and Security 3 (4), 673-683, 2008
Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends
J Bringer, H Chabanne, A Patey
IEEE Signal Processing Magazine 30 (2), 42-52, 2013
An authentication protocol with encrypted biometric data
J Bringer, H Chabanne
International Conference on Cryptology in Africa, 109-124, 2008
The best of both worlds: Applying secure sketches to cancelable biometrics
J Bringer, H Chabanne, B Kindarji
Science of Computer Programming 74 (1-2), 43-51, 2008
A framework for analyzing template security and privacy in biometric authentication systems
K Simoens, J Bringer, H Chabanne, S Seys
IEEE Transactions on Information forensics and security 7 (2), 833-841, 2012
Cryptanalysis of EC-RAC, a RFID identification protocol
J Bringer, H Chabanne, T Icart
International conference on cryptology and network security, 149-161, 2008
Binary feature vector fingerprint representation from minutiae vicinities
J Bringer, V Despiegel
2010 Fourth IEEE International Conference on Biometrics: Theory …, 2010
White Box Cryptography: Another Attempt.
J Bringer, H Chabanne, E Dottax
IACR Cryptol. ePrint Arch. 2006, 468, 2006
Trusted-HB: A Low-Cost Version of HB Secure Against Man-in-the-Middle Attacks
J Bringer, H Chabanne
IEEE Transactions on Information Theory 54 (9), 4339-4342, 2008
GSHADE: Faster privacy-preserving distance computation and biometric identification
J Bringer, H Chabanne, M Favre, A Patey, T Schneider, M Zohner
Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014
Orthogonal direct sum masking
J Bringer, C Carlet, H Chabanne, S Guilley, H Maghrebi
IFIP International Workshop on Information Security Theory and Practice, 40-56, 2014
Slot antenna having independent antenna elements and associated circuitry
MA Schamberger, SD Silk, SL Kuffner
US Patent 6,583,765, 2003
Error-tolerant searchable encryption
J Bringer, H Chabanne, B Kindarji
2009 IEEE International Conference on Communications, 1-6, 2009
Extended private information retrieval and its application in biometrics authentications
J Bringer, H Chabanne, D Pointcheval, Q Tang
International Conference on Cryptology and Network Security, 175-193, 2007
A formal study of the privacy concerns in biometric-based remote authentication schemes
Q Tang, J Bringer, H Chabanne, D Pointcheval
International Conference on Information Security Practice and Experience, 56-70, 2008
High precision fault injections on the instruction cache of ARMv7-M architectures
L Riviere, Z Najm, P Rauzy, JL Danger, J Bringer, L Sauvage
2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20