Julien Bringer
Julien Bringer
Verified email at kallistech.com
Cited by
Cited by
HB^+^+: a lightweight authentication protocol secure against some attacks
J Bringer, H Chabanne, E Dottax
Second international workshop on security, privacy and trust in pervasive …, 2006
An application of the Goldwasser-Micali cryptosystem to biometric authentication
J Bringer, H Chabanne, M Izabachene, D Pointcheval, Q Tang, S Zimmer
Australasian Conference on Information Security and Privacy, 96-106, 2007
Optimal iris fuzzy sketches
J Bringer, H Chabanne, G Cohen, B Kindarji, G Zémor
2007 First IEEE International Conference on Biometrics: Theory, Applications …, 2007
Theoretical and practical boundaries of binary secure sketches
J Bringer, H Chabanne, G Cohen, B Kindarji, G Zemor
IEEE Transactions on Information Forensics and Security 3 (4), 673-683, 2008
Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends
J Bringer, H Chabanne, A Patey
IEEE Signal Processing Magazine 30 (2), 42-52, 2013
A framework for analyzing template security and privacy in biometric authentication systems
K Simoens, J Bringer, H Chabanne, S Seys
IEEE Transactions on Information forensics and security 7 (2), 833-841, 2012
An authentication protocol with encrypted biometric data
J Bringer, H Chabanne
International Conference on Cryptology in Africa, 109-124, 2008
The best of both worlds: Applying secure sketches to cancelable biometrics
J Bringer, H Chabanne, B Kindarji
Science of Computer Programming 74 (1-2), 43-51, 2008
Cryptanalysis of EC-RAC, a RFID identification protocol
J Bringer, H Chabanne, T Icart
International conference on cryptology and network security, 149-161, 2008
White Box Cryptography: Another Attempt.
J Bringer, H Chabanne, E Dottax
IACR Cryptol. ePrint Arch. 2006 (2006), 468, 2006
GSHADE: Faster privacy-preserving distance computation and biometric identification
J Bringer, H Chabanne, M Favre, A Patey, T Schneider, M Zohner
Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014
Binary feature vector fingerprint representation from minutiae vicinities
J Bringer, V Despiegel
2010 Fourth IEEE International Conference on Biometrics: Theory …, 2010
Orthogonal direct sum masking
J Bringer, C Carlet, H Chabanne, S Guilley, H Maghrebi
IFIP International Workshop on Information Security Theory and Practice, 40-56, 2014
Trusted-HB: A Low-Cost Version of HB Secure Against Man-in-the-Middle Attacks
J Bringer, H Chabanne
IEEE Transactions on Information Theory 54 (9), 4339-4342, 2008
High precision fault injections on the instruction cache of ARMv7-M architectures
L Riviere, Z Najm, P Rauzy, JL Danger, J Bringer, L Sauvage
2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015
Error-tolerant searchable encryption
J Bringer, H Chabanne, B Kindarji
2009 IEEE International Conference on Communications, 1-6, 2009
Extended private information retrieval and its application in biometrics authentications
J Bringer, H Chabanne, D Pointcheval, Q Tang
International Conference on Cryptology and Network Security, 175-193, 2007
A formal study of the privacy concerns in biometric-based remote authentication schemes
Q Tang, J Bringer, H Chabanne, D Pointcheval
International Conference on Information Security Practice and Experience, 56-70, 2008
Identification with encrypted biometric data
J Bringer, H Chabanne, B Kindarji
Security and Communication Networks 4 (5), 548-562, 2011
Shade: Secure hamming distance computation from oblivious transfer
J Bringer, H Chabanne, A Patey
International Conference on Financial Cryptography and Data Security, 164-176, 2013
The system can't perform the operation now. Try again later.
Articles 1–20