Hervé Chabanne

Affiliations:
  • Télécom Paris, Paris, France


According to our database1, Hervé Chabanne authored at least 132 papers between 1990 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Funshade: Function Secret Sharing for Two-Party Secure Thresholded Distance Evaluation.
Proc. Priv. Enhancing Technol., October, 2023

A Biometric Self Authentication Scheme.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Grote: Group Testing for Privacy-Preserving Face Identification.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

Dynamic Autoencoders Against Adversarial Attacks.
Proceedings of the 14th International Conference on Ambient Systems, 2023

2022
Funshade: Functional Secret Sharing for Two-Party Secure Thresholded Distance Evaluation.
IACR Cryptol. ePrint Arch., 2022

Colmade: Collaborative Masking in Auditable Decryption for BFV-based Homomorphic Encryption.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022

One Picture is Worth a Thousand Words: A New Wallet Recovery Process.
Proceedings of the IEEE Global Communications Conference, 2022

Themis: An On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Banners: Binarized Neural Networks with Replicated Secret Sharing.
IACR Cryptol. ePrint Arch., 2021

Side channel attacks for architecture extraction of neural networks.
CAAI Trans. Intell. Technol., 2021

Parasite: Mitigating Physical Side-Channel Attacks Against Neural Networks.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2021

A Protection against the Extraction of Neural Network Models.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Practical Privacy-Preserving Face Identification Based on Function-Hiding Functional Encryption.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural Networks.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
A Protection against the Extraction of Neural Network Models.
CoRR, 2020

Augmented Voting Reality.
Proceedings of the Risks and Security of Internet and Systems, 2020

Premium Access to Convolutional Neural Networks.
Proceedings of the Risks and Security of Internet and Systems, 2020

2019
Smart-card Deployment of an Electronic Voting Protocol.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Practical Solutions to Save Bitcoins Applied to an Identity System Proposal.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
Biometric Systems Private by Design: Reasoning about privacy properties of biometric system architectures.
Trans. Data Priv., 2018

Linear Repairing Codes and Side-Channel Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Recognition Over Encrypted Faces.
Proceedings of the Mobile, Secure, and Programmable Networking, 2018

Efficient Proof Composition for Verifiable Computation.
Proceedings of the Computer Security, 2018

Outsourcing Signatures of Confidential Documents.
Proceedings of the Risks and Security of Internet and Systems, 2018

2017
Privacy-Preserving Classification on Deep Neural Network.
IACR Cryptol. ePrint Arch., 2017

Embedded Proofs for Verifiable Neural Networks.
IACR Cryptol. ePrint Arch., 2017

Identity Managenent on the Bitcoin Blockchain.
ERCIM News, 2017

Transforming Face-to-Face Identity Proofing into Anonymous Digital Identity Using the Bitcoin Blockchain.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Verifiable Document Redacting.
Proceedings of the Computer Security - ESORICS 2017, 2017

A User-Centric System for Verified Identities on the Bitcoin Blockchain.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

2016
Delegating Biometric Authentication with the Sumcheck Protocol.
Proceedings of the Information Security Theory and Practice, 2016

Boosting GSHADE Capabilities: New Applications and Security in Malicious Setting.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Study of a Verifiable Biometric Matching.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Hierarchical Identities from Group Signatures and Pseudonymous Signatures.
Proceedings of the New Codebreakers, 2016

Partially Re-Usable Garbled Circuits for Iris Recognition.
Proceedings of the 2016 International Conference of the Biometrics Special Interest Group, 2016

A Verifiable System for Automated Face Identification.
Proceedings of the 2016 International Conference of the Biometrics Special Interest Group, 2016

Software-Only Two-Factor Authentication Secure Against Active Servers.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016

2015
Some applications of verifiable computation to biometric verification.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Reasoning about Privacy Properties of Biometric Systems Architectures in the Presence of Information Leakage.
Proceedings of the Information Security - 18th International Conference, 2015

A novel simulation approach for fault injection resistance evaluation on smart cards.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

Balancing is the Key - Performing Finger Vein Template Protection using Fuzzy Commitment.
Proceedings of the ICISSP 2015, 2015

Privacy by Design in Practice: Reasoning about Privacy Properties of Biometric System Architectures.
Proceedings of the FM 2015: Formal Methods, 2015

2014
Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents.
IACR Cryptol. ePrint Arch., 2014

Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks.
IACR Cryptol. ePrint Arch., 2014

Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System.
IACR Cryptol. ePrint Arch., 2014

New Algorithmic Approaches to Point Constellation Recognition.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools.
Proceedings of the Information Security Practice and Experience, 2014

Side channel analysis on an embedded hardware fingerprint biometric comparator & low cost countermeasures.
Proceedings of the HASP 2014, 2014

GSHADE: faster privacy-preserving distance computation and biometric identification.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

Shuffling is not sufficient: Security analysis of cancelable iriscodes based on a secret permutation.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014

Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

Idea: Embedded Fault Injection Simulator on Smartcard.
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014

Studying Leakages on an Embedded Biometric System Using Side Channel Analysis.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

2013
Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends.
IEEE Signal Process. Mag., 2013

Using Hamiltonian Totems as Passwords.
IACR Cryptol. ePrint Arch., 2013

Collusion-Resistant Domain-Specific Pseudonymous Signatures.
IACR Cryptol. ePrint Arch., 2013

Public-key Cryptography from Different Assumptions - A Multi-bit Version.
Proceedings of the SECRYPT 2013, 2013

Define privacy-preserving setbase drawer size standard: A ∊-closeness perspective.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Towards Secure Two-Party Computation from the Wire-Tap Channel.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

Practical identification with encrypted biometric data using oblivious RAM.
Proceedings of the International Conference on Biometrics, 2013

Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Two Efficient Architectures for Handling Biometric Data While Taking Care of Their Privacy.
Proceedings of the Security and Privacy in Biometrics, 2013

2012
Code Reverse Engineering Problem for Identification Codes.
IEEE Trans. Inf. Theory, 2012

A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems.
IEEE Trans. Inf. Forensics Secur., 2012

Protecting AES against side-channel analysis using wire-tap codes.
J. Cryptogr. Eng., 2012

SHADE: Secure HAmming DistancE computation from oblivious transfer.
IACR Cryptol. ePrint Arch., 2012

Cross-Unlinkable Hierarchical Group Signatures.
IACR Cryptol. ePrint Arch., 2012

Embedding edit distance to enable private keyword search.
Hum. centric Comput. Inf. Sci., 2012

An Application of a Group Signature Scheme with Backward Unlinkability to Biometric Identity Management.
Proceedings of the SECRYPT 2012, 2012

Combining the setbase approach with negative databases.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Secure network coding and non-malleable codes: Protection against linear tampering.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Faster secure computation for biometric identification using filtering.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012

Fuzzy Vault for Multiple Users.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
Identification with encrypted biometric data.
Secur. Commun. Networks, 2011

Securing E-passports with Elliptic Curves.
IEEE Secur. Priv., 2011

Analysis of Biometric Authentication Protocols in the Blackbox Model
CoRR, 2011

Vaudenay's Privacy Model in the Universal Composability Framework: A Case Study.
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011

Embedding Edit Distance to Allow Private Keyword Search in Cloud Computing.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

Non-malleable codes from the wire-tap channel.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

Visual cryptography applied to fingerprint features as a solution for pre-alignment.
Proceedings of the BIOSIG 2011, 2011

2010
Evaluation of White-Box and Grey-Box Noekeon Implementations in FPGA.
Proceedings of the ReConFig'10: 2010 International Conference on Reconfigurable Computing and FPGAs, 2010

Negative databases for biometric data.
Proceedings of the Multimedia and Security Workshop, 2010

Identification codes in cryptographic protocols.
Proceedings of the 2010 IEEE Information Theory Workshop, 2010

On the threshold of Maximum-Distance Separable codes.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Blackbox Security of Biometrics (Invited Paper).
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Password Based Key Exchange with Hidden Elliptic Curve Public Parameters.
IACR Cryptol. ePrint Arch., 2009

Protecting the NOEKEON Cipher Against SCARE Attacks in FPGAs by using Dynamic Implementations.
IACR Cryptol. ePrint Arch., 2009

Identification with Encrypted Biometric Data Made Feasible
CoRR, 2009

RFID key establishment against active adversaries.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

On Physical Obfuscation of Cryptographic Algorithms.
Proceedings of the Progress in Cryptology, 2009

Private Interrogation of Devices via Identification Codes.
Proceedings of the Progress in Cryptology, 2009

Biometric Identification over Encrypted Data Made Feasible.
Proceedings of the Information Systems Security, 5th International Conference, 2009

Error-Tolerant Searchable Encryption.
Proceedings of IEEE International Conference on Communications, 2009

Extending Match-On-Card to Local Biometric Identification.
Proceedings of the Biometric ID Management and Multimodal Communication, 2009

Efficient zero-knowledge identification schemes which respect privacy.
Proceedings of the 2009 ACM Symposium on Information, 2009

Another Look at Extended Private Information Retrieval Protocols.
Proceedings of the Progress in Cryptology, 2009

2008
Trusted-HB: A Low-Cost Version of HB <sup>+</sup> Secure Against Man-in-the-Middle Attacks.
IEEE Trans. Inf. Theory, 2008

Theoretical and Practical Boundaries of Binary Secure Sketches.
IEEE Trans. Inf. Forensics Secur., 2008

The best of both worlds: Applying secure sketches to cancelable biometrics.
Sci. Comput. Program., 2008

Identification and Privacy: Zero-Knowledge is not Enough.
IACR Cryptol. ePrint Arch., 2008

Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks.
IACR Cryptol. ePrint Arch., 2008

HIP-tags, a new paradigm for the Internet Of Things.
Proceedings of the 1st IFIP Wireless Days, 2008

An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication.
Proceedings of the Advances in Information and Computer Security, 2008

A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes.
Proceedings of the Information Security Practice and Experience, 2008

Pseudo Identities Based on Fingerprint Characteristics.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

HIP Tags Privacy Architecture.
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008

Cryptanalysis of EC-RAC, a RFID Identification Protocol.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

An Authentication Protocol with Encrypted Biometric Data.
Proceedings of the Progress in Cryptology, 2008

2007
Improved Privacy of the Tree-Based Hash protocols using Physically Unclonable Function.
IACR Cryptol. ePrint Arch., 2007

Optimal Iris Fuzzy Sketches
CoRR, 2007

Extended Private Information Retrieval and Its Application in Biometrics Authentications.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

An Application of the Naccache-Stern Knapsack Cryptosystem to Biometric Authentication.
Proceedings of the 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 2007

An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Noisy Cryptographic Protocols for Low-Cost RFID Tags.
IEEE Trans. Inf. Theory, 2006

A fuzzy sketch with trapdoor.
IEEE Trans. Inf. Theory, 2006

White Box Cryptography: Another Attempt.
IACR Cryptol. ePrint Arch., 2006

Perturbing and Protecting a Traceable Block Cipher.
IACR Cryptol. ePrint Arch., 2006

HB<sup>++</sup>: a Lightweight Authentication Protocol Secure against Some Attacks.
Proceedings of the Second International Workshop on Security, 2006

On the Wiretap Channel Induced by Noisy Tags.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006

2005
Generalizing Square Attack using Side-Channels of an AES Implementation on an FPGA.
Proceedings of the 2005 International Conference on Field Programmable Logic and Applications (FPL), 2005

Public Traceability in Traitor Tracing Schemes.
Proceedings of the Advances in Cryptology, 2005

2004
Electromagnetic Side Channels of an FPGA Implementation of AES.
IACR Cryptol. ePrint Arch., 2004

Grey Box Implementation of Block Ciphers Preserving the Confidentiality of their Design.
IACR Cryptol. ePrint Arch., 2004

1999
On the Powerline System.
Appl. Algebra Eng. Commun. Comput., 1999

1998
JEROBOAM.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

1995
Factoring of<i>x</i><sup>n</sup>-1 and orthogonalization over finite fields of characteristic 2.
Appl. Algebra Eng. Commun. Comput., 1995

1994
The n-dimensional key equation and a decoding application.
IEEE Trans. Inf. Theory, 1994

1993
On the concatenated structures of a [49, 18, 12] binary abelian code.
Discret. Math., 1993

1992
Permutation decoding of Abelian codes.
IEEE Trans. Inf. Theory, 1992

1990
Minimum-change binary block-codes which are well balanced.
Proceedings of the EUROCODE '90, 1990


  Loading...