Filtrer vos résultats
- 7
- 5
- 5
- 2
- 2
- 1
- 1
- 1
- 1
- 9
- 7
- 1
- 2
- 2
- 2
- 1
- 3
- 1
- 10
- 2
- 7
- 5
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 12
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
12 résultats
|
|
triés par
|
|
Utilisation des Couplages en Cryptographie asymétrique pour la Micro-électroniqueMathématiques [math]. Université de Rennes 1; Université de Monastir (Tunisie), 2016. Français. ⟨NNT : ⟩
Thèse
tel-01469981v1
|
||
|
A Cryptanalysis of Two Cancelable Biometric Schemes Based on Index-of-Max HashingIEEE Transactions on Information Forensics and Security, 2020, 15, pp.2869-2880. ⟨10.1109/TIFS.2020.2977533⟩
Article dans une revue
hal-02937205v1
|
||
|
Memory-saving computation of the pairing final exponentiation on BN curvesjournal of Groups, Complexity, Cryptology, 2016, 8 (1), pp.75-90. ⟨10.1515/gcc-2016-0006⟩
Article dans une revue
hal-01317398v1
|
||
Improving the computation of the optimal ate pairing for a high security levelJournal of Applied Mathematics and Computing, 2019, 59 (1-2), pp.21-36. ⟨10.1007/s12190-018-1167-y⟩
Article dans une revue
hal-01804649v1
|
|||
|
New Versions of Miller-loop Secured against Side-Channel AttacksArithmetic of Finite Fields, 13638, Springer International Publishing, pp.269-287, 2023, Lecture Notes in Computer Science, ⟨10.1007/978-3-031-22944-2_17⟩
Chapitre d'ouvrage
hal-03934165v1
|
||
|
A taxonomy of pairings, their security, their complexity2020
Pré-publication, Document de travail
hal-02129868v2
|
||
|
Semaine d'Etude Maths-Entreprises 8 : Caractérisation de courbes elliptiques selon leurs capacités cryptographiques[Rapport de recherche] MAPMO, Université d'Orléans. 2014
Rapport
hal-01141077v1
|
||
Adequate Elliptic Curves for Computing the Product of n PairingsDuquesne, Sylvain; Petroka-Nikova, Svetla. Arithmetic of Finite Fields WAIFI: International Workshop on the Arithmetic of Finite Fields 6th International Workshop, Ghent, Belgium, July 13-15, 2016, 10064, Springer, pp.36-53, 2016, Lecture Notes in Computer Science, 978-3-319-55227-9. ⟨10.1007/978-3-319-55227-9_3⟩
Chapitre d'ouvrage
hal-01548925v1
|
|||
|
Enhancing the Security of Transformation Based Biometric Template Protection SchemesCyberWorlds, Oct 2018, Singapour, Singapore
Communication dans un congrès
hal-01862157v1
|
||
|
GREYCHashing: Combining Biometrics and Secret for Enhancing the Security of Protected TemplatesFuture Generation Computer Systems, 2019, ⟨10.1016/j.future.2019.07.022⟩
Article dans une revue
hal-02179563v1
|
||
High speed and efficient area optimal ate pairing processor implementation over BN and BLS12 curves on FPGAMicroprocessors and Microsystems: Embedded Hardware Design , 2018, 61, pp.227-241. ⟨10.1016/j.micpro.2018.06.001⟩
Article dans une revue
hal-01968174v1
|
|||
|
Efficient Optimal Ate Pairing at 128-bit Security LevelIndoCrypt 2017 - 18th International Conference on Cryptology, Dec 2017, Chennai, India. pp.186-205
Communication dans un congrès
hal-01620848v1
|