Kevin Thiry-Atighehchi

Orcid: 0000-0003-0042-8771

Affiliations:
  • LIMOS Université Clermont Auvergne, France


According to our database1, Kevin Thiry-Atighehchi authored at least 28 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Comprehensive Analysis on the Leakage of Fuzzy Matchers.
CoRR, 2023

Untargeted Near-collision Attacks in Biometric Recognition.
CoRR, 2023

2022
Near-collisions and their Impact on Biometric Security (long).
CoRR, 2022

Near-collisions and Their Impact on Biometric Security.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Authentication Attacks on Projection-based Cancelable Biometric Schemes.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

2020
A Cryptanalysis of Two Cancelable Biometric Schemes Based on Index-of-Max Hashing.
IEEE Trans. Inf. Forensics Secur., 2020

A precise non-asymptotic complexity analysis of parallel hash functions without tree topology constraints.
J. Parallel Distributed Comput., 2020

Proof of Behavior (Short Paper).
Proceedings of the 2nd International Conference on Blockchain Economics, 2020

2019
GREYC-Hashing: Combining biometrics and secret for enhancing the security of protected templates.
Future Gener. Comput. Syst., 2019

2018
Signature Renewal for Low Entropy Data.
Proceedings of the 17th IEEE International Conference On Trust, 2018

On the Incremental Digital Signatures.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3.
IACR Trans. Symmetric Cryptol., 2017

Optimization of Tree Modes for Parallel Hash Functions: A Case Study.
IEEE Trans. Computers, 2017

Arithmetic in finite fields based on the Chudnovsky-Chudnovsky multiplication algorithm.
Math. Comput., 2017

2016
On Plausible Tree Hash Modes for SHA-3.
IACR Cryptol. ePrint Arch., 2016

Some observations on the optimization of a parallel SHAKE function using Sakura.
CoRR, 2016

Optimal Tree Hash Modes: the Case of Trees Having their Leaves at All the Levels.
CoRR, 2016

Note on Optimal Trees for Parallel Hash Functions.
CoRR, 2016

2015
Optimization of Tree Modes for Parallel Hash Functions.
CoRR, 2015

On Chudnovsky-Based Arithmetic Algorithms in Finite Fields.
CoRR, 2015

New models for efficient authenticated dictionaries.
Comput. Secur., 2015

2014
Space-efficient, byte-wise incremental and perfectly private encryption schemes.
IACR Cryptol. ePrint Arch., 2014

On the Incremental Asymmetric Signatures.
CoRR, 2014

Authenticated Dictionary Based on Frequency.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

2013
Generic Parallel Cryptography for Hashing Schemes.
Proceedings of the IEEE 12th International Symposium on Parallel and Distributed Computing, 2013

Towards fully incremental cryptographic schemes.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2010
An Efficient Parallel Algorithm for Skein Hash Functions.
IACR Cryptol. ePrint Arch., 2010

A Cryptographic Keys Transfer Protocol for Secure Communicating Systems.
Proceedings of the 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2010


  Loading...