Hervé Chabanne
Orcid: 0000-0002-5916-3387Affiliations:
- Télécom Paris, Paris, France
According to our database1,
Hervé Chabanne
authored at least 134 papers
between 1990 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
2023
Funshade: Function Secret Sharing for Two-Party Secure Thresholded Distance Evaluation.
Proc. Priv. Enhancing Technol., October, 2023
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
Proceedings of the 14th International Conference on Ambient Systems, 2023
2022
Funshade: Functional Secret Sharing for Two-Party Secure Thresholded Distance Evaluation.
IACR Cryptol. ePrint Arch., 2022
Colmade: Collaborative Masking in Auditable Decryption for BFV-based Homomorphic Encryption.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022
Proceedings of the IEEE Global Communications Conference, 2022
Themis: An On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IACR Cryptol. ePrint Arch., 2021
CAAI Trans. Intell. Technol., 2021
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2021
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Practical Privacy-Preserving Face Identification Based on Function-Hiding Functional Encryption.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural Networks.
Proceedings of the Applied Cryptography and Network Security, 2021
2020
Proceedings of the Risks and Security of Internet and Systems, 2020
Proceedings of the Risks and Security of Internet and Systems, 2020
2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
2018
Biometric Systems Private by Design: Reasoning about privacy properties of biometric system architectures.
Trans. Data Priv., 2018
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
Proceedings of the Mobile, Secure, and Programmable Networking, 2018
Proceedings of the Computer Security, 2018
Proceedings of the Risks and Security of Internet and Systems, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Transforming Face-to-Face Identity Proofing into Anonymous Digital Identity Using the Bitcoin Blockchain.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017
2016
Proceedings of the Information Security Theory and Practice, 2016
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems.
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Proceedings of the New Codebreakers, 2016
Proceedings of the 2016 International Conference of the Biometrics Special Interest Group, 2016
Proceedings of the 2016 International Conference of the Biometrics Special Interest Group, 2016
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016
2015
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
Reasoning about Privacy Properties of Biometric Systems Architectures in the Presence of Information Leakage.
Proceedings of the Information Security - 18th International Conference, 2015
A novel simulation approach for fault injection resistance evaluation on smart cards.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015
Balancing is the Key - Performing Finger Vein Template Protection using Fuzzy Commitment.
Proceedings of the ICISSP 2015, 2015
Privacy by Design in Practice: Reasoning about Privacy Properties of Biometric System Architectures.
Proceedings of the FM 2015: Formal Methods, 2015
2014
Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents.
IACR Cryptol. ePrint Arch., 2014
Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools.
Proceedings of the Information Security Practice and Experience, 2014
Side channel analysis on an embedded hardware fingerprint biometric comparator & low cost countermeasures.
Proceedings of the HASP 2014, 2014
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014
Shuffling is not sufficient: Security analysis of cancelable iriscodes based on a secret permutation.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014
Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014
2013
Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends.
IEEE Signal Process. Mag., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
Proceedings of the International Conference on Biometrics, 2013
Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
Two Efficient Architectures for Handling Biometric Data While Taking Care of Their Privacy.
Proceedings of the Security and Privacy in Biometrics, 2013
2012
IEEE Trans. Inf. Theory, 2012
A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems.
IEEE Trans. Inf. Forensics Secur., 2012
J. Cryptogr. Eng., 2012
IACR Cryptol. ePrint Arch., 2012
Hum. centric Comput. Inf. Sci., 2012
An Application of a Group Signature Scheme with Backward Unlinkability to Biometric Identity Management.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
Proceedings of the 5th IAPR International Conference on Biometrics, 2012
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
2011
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
Proceedings of the 2011 IEEE Information Theory Workshop, 2011
Proceedings of the BIOSIG 2011, 2011
2010
Proceedings of the ReConFig'10: 2010 International Conference on Reconfigurable Computing and FPGAs, 2010
Proceedings of the Multimedia and Security Workshop, 2010
Proceedings of the 2010 IEEE Information Theory Workshop, 2010
Proceedings of the IEEE International Symposium on Information Theory, 2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Protecting the NOEKEON Cipher Against SCARE Attacks in FPGAs by using Dynamic Implementations.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Proceedings of the Progress in Cryptology, 2009
Proceedings of the Progress in Cryptology, 2009
Proceedings of the Information Systems Security, 5th International Conference, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the Biometric ID Management and Multimodal Communication, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
Proceedings of the Progress in Cryptology, 2009
2008
Trusted-HB: A Low-Cost Version of HB <sup>+</sup> Secure Against Man-in-the-Middle Attacks.
IEEE Trans. Inf. Theory, 2008
IEEE Trans. Inf. Forensics Secur., 2008
Sci. Comput. Program., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the 1st IFIP Wireless Days, 2008
An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication.
Proceedings of the Advances in Information and Computer Security, 2008
A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes.
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
Proceedings of the Progress in Cryptology, 2008
2007
Improved Privacy of the Tree-Based Hash protocols using Physically Unclonable Function.
IACR Cryptol. ePrint Arch., 2007
Extended Private Information Retrieval and Its Application in Biometrics Authentications.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
An Application of the Naccache-Stern Knapsack Cryptosystem to Biometric Authentication.
Proceedings of the 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Proceedings of the Second International Workshop on Security, 2006
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006
2005
Proceedings of the 2005 International Conference on Field Programmable Logic and Applications (FPL), 2005
Proceedings of the Advances in Cryptology, 2005
2004
IACR Cryptol. ePrint Arch., 2004
Grey Box Implementation of Block Ciphers Preserving the Confidentiality of their Design.
IACR Cryptol. ePrint Arch., 2004
1999
1998
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998
1995
Factoring of<i>x</i><sup>n</sup>-1 and orthogonalization over finite fields of characteristic 2.
Appl. Algebra Eng. Commun. Comput., 1995
1994
IEEE Trans. Inf. Theory, 1994
1993
Discret. Math., 1993
1992
1990
Proceedings of the EUROCODE '90, 1990