Philippe Elbaz-Vincent

Orcid: 0000-0002-8629-3021

According to our database1, Philippe Elbaz-Vincent authored at least 23 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Provably Secure and Area-Efficient Modular Addition over Boolean Shares.
IACR Commun. Cryptol., 2024

2023
MAKI: A Multi-Agent Public Key Infrastructure.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

Improving Single-Trace Attacks on the Number-Theoretic Transform for Cortex-M4.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023

Decentralized and Autonomous Key Management for Open Multi-agent Systems of Embedded Agents.
Proceedings of the Cooperative Information Systems - 29th International Conference, 2023

2022
Decentralized Public Key Infrastructure for Autonomous Embedded Systems.
Proceedings of the 29th Computer & Electronics Security Application Rendezvous co-located with the 7th European Cyber Week (ECW 2022), 2022

2021
An extension of the fpLLL library to Hermitian lattices.
ACM Commun. Comput. Algebra, 2021

Systematic Mapping Study of Security in Multi-Embedded-Agent Systems.
IEEE Access, 2021

Revisiting the Pervasiveness of Weak Keys in Network Devices.
Proceedings of the IEEE Security and Privacy Workshops, 2021

MPHELL: A fast and robust library with unified and versatile arithmetics for elliptic curves cryptography.
Proceedings of the 28th IEEE Symposium on Computer Arithmetic, 2021

2019
SPAE a mode of operation for AES on low-cost hardware.
IACR Cryptol. ePrint Arch., 2019

Fine-Grained Static Detection of Obfuscation Transforms Using Ensemble-Learning and Semantic Reasoning.
CoRR, 2019

Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis.
Proceedings of the 3rd ACM Workshop on Software Protection, 2019

2018
DoSE: Deobfuscation based on Semantic Equivalence.
Proceedings of the 8th Software Security, 2018

2017
On the separation between the FHMQV and HMQV protocols.
Int. J. Appl. Cryptogr., 2017

2016
On the Security of the (F)HMQV Protocol.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016

2015
Polynomial multipliers for fully homomorphic encryption on FPGA.
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2015

Finite Polylogarithms, Their Multiple Analogues and the Shannon Entropy.
Proceedings of the Geometric Science of Information - Second International Conference, 2015

2013
Fault Analysis and Evaluation of a True Random Number Generator Embedded in a Processor.
J. Electron. Test., 2013

2012
A Complementary Analysis of the (s)YZ and DIKE Protocols.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
Influence of the temperature on true random number generators.
Proceedings of the HOST 2011, 2011

2010
A New Security Model for Authenticated Key Agreement.
IACR Cryptol. ePrint Arch., 2010

2009
A Secure and Efficient Authenticated Diffie - Hellman Protocol.
IACR Cryptol. ePrint Arch., 2009

2007
Parallel computation of the rank of large sparse matrices from algebraic K-theory.
Proceedings of the Parallel Symbolic Computation, 2007


  Loading...