David M'Raïhi

According to our database1, David M'Raïhi authored at least 25 papers between 1993 and 2014.

Collaborative distances:
  • Dijkstra number2 of two.
  • Erdős number3 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2014
A noise bifurcation architecture for linear additive physical functions.
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014

2012
Performance metrics and empirical results of a PUF cryptographic key generation ASIC.
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012

2011
OCRA: OATH Challenge-Response Algorithm.
RFC, June, 2011

TOTP: Time-Based One-Time Password Algorithm.
RFC, May, 2011

Lightweight and Secure PUF Key Storage Using Limits of Machine Learning.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
Sharing Transaction Fraud Data.
RFC, August, 2010

2007
Designing a Trade-Off Between Usability and Security: A Metrics Based-Model.
Proceedings of the Human-Computer Interaction, 2007

2005
HOTP: An HMAC-Based One-Time Password Algorithm.
RFC, December, 2005

2004
Private Fingerprint Verification without Local Storage.
Proceedings of the Biometric Authentication, First International Conference, 2004

2001
E-commerce applications of smart cards.
Computer Networks, 2001

Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001

2000
Asymmetric Currency Rounding.
Proceedings of the Financial Cryptography, 2000

1999
Electronic Payments: Where Do We Go from Here?.
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999

1998
Computational Alternatives to Random Number Generators.
Proceedings of the Selected Areas in Cryptography '98, 1998

Mix-Based Electronic Payments.
Proceedings of the Selected Areas in Cryptography '98, 1998

Distributed Trustees and Revocability: A Framework for Internet Payment.
Proceedings of the Financial Cryptography, 1998

1997
XMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

1996
Cryptographic smart cards.
IEEE Micro, 1996

Batch Exponentiation: A Fast DLP-Based Signature Generation Strategy.
Proceedings of the CCS '96, 1996

Arithmetic co-processors for public-key cryptography: The state of the art.
Proceedings of the Second Smart Card Research and Advanced Application Conference, 1996

Cost-Effective Payment Schemes with Privacy Regulation.
Proceedings of the Advances in Cryptology, 1996

1995
Can Montgomery Parasites Be Avoided? A Design Methodology Based on Key and Cryptosystem Modifications.
Des. Codes Cryptogr., 1995

Are Crypto-Accelerators Really Inevitable? 20Bit Zero-Knowledge in Less than a Second on Simple 8-bit Microcontrollers
Proceedings of the Advances in Cryptology, 1995

1994
Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard.
Proceedings of the Advances in Cryptology, 1994

1993
Montgomery-Suitable Cryptosystems.
Proceedings of the Algebraic Coding, 1993


  Loading...