Julien Bringer

According to our database1, Julien Bringer authored at least 99 papers between 2006 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Premium Access to Convolutional Neural Networks.
Proceedings of the Risks and Security of Internet and Systems, 2020

2019
On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks.
IACR Cryptol. ePrint Arch., 2019

2018
Biometric Systems Private by Design: Reasoning about privacy properties of biometric system architectures.
Trans. Data Priv., 2018

Message from the SDIM 2018 Workshop Organizers.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Security analysis and improvement of some biometric protected templates based on Bloom filters.
Image Vis. Comput., 2017

Towards a Privacy-Preserving Reliable European Identity Ecosystem.
Proceedings of the Privacy Technologies and Policy - 5th Annual Privacy Forum, 2017

2016
There is Wisdom in Harnessing the Strengths of your Enemy: Customized Encoding to Thwart Side-Channel Attacks - Extended Version -.
IACR Cryptol. ePrint Arch., 2016

Boosting GSHADE Capabilities: New Applications and Security in Malicious Setting.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

Searchable Encryption for Biometric Identification Revisited.
Proceedings of the Data Privacy Management and Security Assurance, 2016

Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Message from the NETSAP and SIMICE Workshop Organizers.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Side-Channel Analysis of the TUAK Algorithm Used for Authentication and Key Agreement in 3G/4G Networks.
Proceedings of the Smart Card Research and Advanced Applications, 2016

Hierarchical Identities from Group Signatures and Pseudonymous Signatures.
Proceedings of the New Codebreakers, 2016

Software-Only Two-Factor Authentication Secure Against Active Servers.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016

2015
High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures.
IACR Cryptol. ePrint Arch., 2015

Some applications of verifiable computation to biometric verification.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Reasoning about Privacy Properties of Biometric Systems Architectures in the Presence of Information Leakage.
Proceedings of the Information Security - 18th International Conference, 2015

A novel simulation approach for fault injection resistance evaluation on smart cards.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

Balancing is the Key - Performing Finger Vein Template Protection using Fuzzy Commitment.
Proceedings of the ICISSP 2015, 2015

Security analysis of Bloom filter-based iris biometric template protection.
Proceedings of the International Conference on Biometrics, 2015

Privacy by Design in Practice: Reasoning about Privacy Properties of Biometric System Architectures.
Proceedings of the FM 2015: Formal Methods, 2015

TREDISEC: Trust-Aware REliable and Distributed Information SEcurity in the Cloud.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

Message from the SIMICE 2015 Workshop Organizers.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
Power Noise Measurements of Cryptographic VLSI Circuits Regarding Side-Channel Information Leakage.
IEICE Trans. Electron., 2014

Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents.
IACR Cryptol. ePrint Arch., 2014

Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks.
IACR Cryptol. ePrint Arch., 2014

Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System.
IACR Cryptol. ePrint Arch., 2014

New Algorithmic Approaches to Point Constellation Recognition.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Side channel analysis on an embedded hardware fingerprint biometric comparator & low cost countermeasures.
Proceedings of the HASP 2014, 2014

GSHADE: faster privacy-preserving distance computation and biometric identification.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

Shuffling is not sufficient: Security analysis of cancelable iriscodes based on a secret permutation.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014

Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

Idea: Embedded Fault Injection Simulator on Smartcard.
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014

High-Level Simulation for Multiple Fault Injection Evaluation.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

Studying Leakages on an Embedded Biometric System Using Side Channel Analysis.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

Study of a Novel Software Constant Weight Implementation.
Proceedings of the Smart Card Research and Advanced Applications, 2014

Fuzzy vault and template-level fusion applied to a binary fingerprint representation.
Proceedings of the BIOSIG 2014, 2014

2013
Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends.
IEEE Signal Process. Mag., 2013

Collusion-Resistant Domain-Specific Pseudonymous Signatures.
IACR Cryptol. ePrint Arch., 2013

Define privacy-preserving setbase drawer size standard: A ∊-closeness perspective.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Secure and efficient approximate nearest neighbors search.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Practical identification with encrypted biometric data using oblivious RAM.
Proceedings of the International Conference on Biometrics, 2013

Towards standardizing trusted evidence of identity.
Proceedings of the DIM'13, 2013

Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Two Efficient Architectures for Handling Biometric Data While Taking Care of Their Privacy.
Proceedings of the Security and Privacy in Biometrics, 2013

2012
Code Reverse Engineering Problem for Identification Codes.
IEEE Trans. Inf. Theory, 2012

A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems.
IEEE Trans. Inf. Forensics Secur., 2012

Protecting AES against side-channel analysis using wire-tap codes.
J. Cryptogr. Eng., 2012

SHADE: Secure HAmming DistancE computation from oblivious transfer.
IACR Cryptol. ePrint Arch., 2012

Cross-Unlinkable Hierarchical Group Signatures.
IACR Cryptol. ePrint Arch., 2012

Embedding edit distance to enable private keyword search.
Hum. centric Comput. Inf. Sci., 2012

VLR Group Signatures - How to Achieve Both Backward Unlinkability and Efficient Revocation Checks.
Proceedings of the SECRYPT 2012, 2012

An Application of a Group Signature Scheme with Backward Unlinkability to Biometric Identity Management.
Proceedings of the SECRYPT 2012, 2012

Combining the setbase approach with negative databases.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Faster secure computation for biometric identification using filtering.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012

Fuzzy Vault for Multiple Users.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
Identification with encrypted biometric data.
Secur. Commun. Networks, 2011

Backward Unlinkability for a VLR Group Signature Scheme with Efficient Revocation Check.
IACR Cryptol. ePrint Arch., 2011

Analysis of Biometric Authentication Protocols in the Blackbox Model
CoRR, 2011

Embedding Edit Distance to Allow Private Keyword Search in Cloud Computing.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

Visual cryptography applied to fingerprint features as a solution for pre-alignment.
Proceedings of the BIOSIG 2011, 2011

2010
Negative databases for biometric data.
Proceedings of the Multimedia and Security Workshop, 2010

Identification codes in cryptographic protocols.
Proceedings of the 2010 IEEE Information Theory Workshop, 2010

Blackbox Security of Biometrics (Invited Paper).
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Binary feature vector fingerprint representation from minutiae vicinities.
Proceedings of the Fourth IEEE International Conference on Biometrics: Theory Applications and Systems, 2010

Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Password Based Key Exchange with Hidden Elliptic Curve Public Parameters.
IACR Cryptol. ePrint Arch., 2009

Protecting the NOEKEON Cipher Against SCARE Attacks in FPGAs by using Dynamic Implementations.
IACR Cryptol. ePrint Arch., 2009

Identification with Encrypted Biometric Data Made Feasible
CoRR, 2009

RFID key establishment against active adversaries.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

On Physical Obfuscation of Cryptographic Algorithms.
Proceedings of the Progress in Cryptology, 2009

Private Interrogation of Devices via Identification Codes.
Proceedings of the Progress in Cryptology, 2009

Biometric Identification over Encrypted Data Made Feasible.
Proceedings of the Information Systems Security, 5th International Conference, 2009

Error-Tolerant Searchable Encryption.
Proceedings of IEEE International Conference on Communications, 2009

Extending Match-On-Card to Local Biometric Identification.
Proceedings of the Biometric ID Management and Multimodal Communication, 2009

Efficient zero-knowledge identification schemes which respect privacy.
Proceedings of the 2009 ACM Symposium on Information, 2009

Another Look at Extended Private Information Retrieval Protocols.
Proceedings of the Progress in Cryptology, 2009

2008
Trusted-HB: A Low-Cost Version of HB <sup>+</sup> Secure Against Man-in-the-Middle Attacks.
IEEE Trans. Inf. Theory, 2008

Theoretical and Practical Boundaries of Binary Secure Sketches.
IEEE Trans. Inf. Forensics Secur., 2008

The best of both worlds: Applying secure sketches to cancelable biometrics.
Sci. Comput. Program., 2008

Identification and Privacy: Zero-Knowledge is not Enough.
IACR Cryptol. ePrint Arch., 2008

Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks.
IACR Cryptol. ePrint Arch., 2008

An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication.
Proceedings of the Advances in Information and Computer Security, 2008

A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes.
Proceedings of the Information Security Practice and Experience, 2008

Pseudo Identities Based on Fingerprint Characteristics.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Cryptanalysis of EC-RAC, a RFID Identification Protocol.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

An Authentication Protocol with Encrypted Biometric Data.
Proceedings of the Progress in Cryptology, 2008

2007
Non-linéarité des fonctions booléennes : applications de la théorie des fonctions booléennes et des codes en cryptographie. (Nonlinearity of boolean functions : ecryptographic applications of boolean functions and coding theory).
PhD thesis, 2007

Improved Privacy of the Tree-Based Hash protocols using Physically Unclonable Function.
IACR Cryptol. ePrint Arch., 2007

Optimal Iris Fuzzy Sketches
CoRR, 2007

Extended Private Information Retrieval and Its Application in Biometrics Authentications.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

An Application of the Naccache-Stern Knapsack Cryptosystem to Biometric Authentication.
Proceedings of the 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 2007

An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
A fuzzy sketch with trapdoor.
IEEE Trans. Inf. Theory, 2006

White Box Cryptography: Another Attempt.
IACR Cryptol. ePrint Arch., 2006

Perturbing and Protecting a Traceable Block Cipher.
IACR Cryptol. ePrint Arch., 2006

HB<sup>++</sup>: a Lightweight Authentication Protocol Secure against Some Attacks.
Proceedings of the Second International Workshop on Security, 2006

On the Wiretap Channel Induced by Noisy Tags.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006


  Loading...