Julien Bringer
According to our database1,
Julien Bringer
authored at least 99 papers
between 2006 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
2006
2008
2010
2012
2014
2016
2018
2020
0
5
10
15
1
1
1
1
1
1
4
2
6
3
3
5
2
3
1
1
1
8
8
10
5
5
2
5
8
5
3
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
Proceedings of the Risks and Security of Internet and Systems, 2020
2019
On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks.
IACR Cryptol. ePrint Arch., 2019
2018
Biometric Systems Private by Design: Reasoning about privacy properties of biometric system architectures.
Trans. Data Priv., 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
2017
Security analysis and improvement of some biometric protected templates based on Bloom filters.
Image Vis. Comput., 2017
Proceedings of the Privacy Technologies and Policy - 5th Annual Privacy Forum, 2017
2016
There is Wisdom in Harnessing the Strengths of your Enemy: Customized Encoding to Thwart Side-Channel Attacks - Extended Version -.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016
Proceedings of the Data Privacy Management and Security Assurance, 2016
Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems.
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Side-Channel Analysis of the TUAK Algorithm Used for Authentication and Key Agreement in 3G/4G Networks.
Proceedings of the Smart Card Research and Advanced Applications, 2016
Proceedings of the New Codebreakers, 2016
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
Reasoning about Privacy Properties of Biometric Systems Architectures in the Presence of Information Leakage.
Proceedings of the Information Security - 18th International Conference, 2015
A novel simulation approach for fault injection resistance evaluation on smart cards.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015
Balancing is the Key - Performing Finger Vein Template Protection using Fuzzy Commitment.
Proceedings of the ICISSP 2015, 2015
Proceedings of the International Conference on Biometrics, 2015
Privacy by Design in Practice: Reasoning about Privacy Properties of Biometric System Architectures.
Proceedings of the FM 2015: Formal Methods, 2015
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
2014
Power Noise Measurements of Cryptographic VLSI Circuits Regarding Side-Channel Information Leakage.
IEICE Trans. Electron., 2014
Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents.
IACR Cryptol. ePrint Arch., 2014
Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Side channel analysis on an embedded hardware fingerprint biometric comparator & low cost countermeasures.
Proceedings of the HASP 2014, 2014
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014
Shuffling is not sufficient: Security analysis of cancelable iriscodes based on a secret permutation.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014
Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014
Proceedings of the Smart Card Research and Advanced Applications, 2014
Fuzzy vault and template-level fusion applied to a binary fingerprint representation.
Proceedings of the BIOSIG 2014, 2014
2013
Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends.
IEEE Signal Process. Mag., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013
Proceedings of the International Conference on Biometrics, 2013
Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
Two Efficient Architectures for Handling Biometric Data While Taking Care of Their Privacy.
Proceedings of the Security and Privacy in Biometrics, 2013
2012
IEEE Trans. Inf. Theory, 2012
A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems.
IEEE Trans. Inf. Forensics Secur., 2012
J. Cryptogr. Eng., 2012
IACR Cryptol. ePrint Arch., 2012
Hum. centric Comput. Inf. Sci., 2012
VLR Group Signatures - How to Achieve Both Backward Unlinkability and Efficient Revocation Checks.
Proceedings of the SECRYPT 2012, 2012
An Application of a Group Signature Scheme with Backward Unlinkability to Biometric Identity Management.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012
Proceedings of the 5th IAPR International Conference on Biometrics, 2012
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
2011
Backward Unlinkability for a VLR Group Signature Scheme with Efficient Revocation Check.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
Proceedings of the BIOSIG 2011, 2011
2010
Proceedings of the Multimedia and Security Workshop, 2010
Proceedings of the 2010 IEEE Information Theory Workshop, 2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
Proceedings of the Fourth IEEE International Conference on Biometrics: Theory Applications and Systems, 2010
Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Protecting the NOEKEON Cipher Against SCARE Attacks in FPGAs by using Dynamic Implementations.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Proceedings of the Progress in Cryptology, 2009
Proceedings of the Progress in Cryptology, 2009
Proceedings of the Information Systems Security, 5th International Conference, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the Biometric ID Management and Multimodal Communication, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
Proceedings of the Progress in Cryptology, 2009
2008
Trusted-HB: A Low-Cost Version of HB <sup>+</sup> Secure Against Man-in-the-Middle Attacks.
IEEE Trans. Inf. Theory, 2008
IEEE Trans. Inf. Forensics Secur., 2008
Sci. Comput. Program., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication.
Proceedings of the Advances in Information and Computer Security, 2008
A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes.
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
Proceedings of the Progress in Cryptology, 2008
2007
Non-linéarité des fonctions booléennes : applications de la théorie des fonctions booléennes et des codes en cryptographie. (Nonlinearity of boolean functions : ecryptographic applications of boolean functions and coding theory).
PhD thesis, 2007
Improved Privacy of the Tree-Based Hash protocols using Physically Unclonable Function.
IACR Cryptol. ePrint Arch., 2007
Extended Private Information Retrieval and Its Application in Biometrics Authentications.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
An Application of the Naccache-Stern Knapsack Cryptosystem to Biometric Authentication.
Proceedings of the 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Proceedings of the Second International Workshop on Security, 2006
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006