Marc Girault

According to our database1, Marc Girault authored at least 29 papers between 1987 and 2010.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2010
Privacy-Preserving RFID Systems: Model and Constructions.
IACR Cryptol. ePrint Arch., 2010

2009
Identity-Based Identification and Signature Schemes using Error Correcting Codes.
Proceedings of the Identity-Based Cryptography, 2009

Improved identity-based identification using correcting codes
CoRR, 2009

2007
Lightweight code-based identification and signature.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Biometric Fuzzy Extractors Made Practical: A Proposal Based on FingerCodes.
Proceedings of the Advances in Biometrics, International Conference, 2007

2006
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order.
J. Cryptol., 2006

Entity authentication schemes using braid word reduction.
Discret. Appl. Math., 2006

Low-Cost Cryptography for Privacy in RFID Systems.
Proceedings of the Smart Card Research and Advanced Applications, 2006

2005
Server-Aided Verification: Theory and Practice.
Proceedings of the Advances in Cryptology, 2005

2004
Public Key Authentication with One (Online) Single Addition.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

2002
Implementing Group Signature Schemes with Smart Cards.
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002

2000
Cryptanalysis of Countermeasures Proposed for Repairing ISO 9796-1.
Proceedings of the Advances in Cryptology, 2000

Low-Size Coupons for Low-Cost IC Cards.
Proceedings of the Smart Card Research and Advanced Applications, 2000

1998
Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

1997
Selective Forgery of RSA Signatures Using Redundancy.
Proceedings of the Advances in Cryptology, 1997

1994
On the Length of Cryptographic Hash-Values Used in Identification Schemes.
Proceedings of the Advances in Cryptology, 1994

1992
FFT Hashing is not Collision-free.
Proceedings of the Advances in Cryptology, 1992

1991
Self-Certified Public Keys.
Proceedings of the Advances in Cryptology, 1991

1990
An Identity-based Identification Scheme Based on Discrete Logarithms Modulo a Composite Number.
Proceedings of the Advances in Cryptology, 1990

A survey of identification schemes.
Proceedings of the EUROCODE '90, 1990

Minimum-change binary block-codes which are well balanced.
Proceedings of the EUROCODE '90, 1990

An Identity-Based Scheme Providing Zero-Knowledge Authentication and Authenticated Key Exchange.
Proceedings of the ESORICS 90, 1990

A (non-practical) three-pass identification protocol using coding theory.
Proceedings of the Advances in Cryptology, 1990

1989
2n-Bit Hash-Functions Using n-Bit Symmetric Block Cipher Algorithms.
Proceedings of the Advances in Cryptology, 1989

1988
How to Break Okamoto's Cryptosystem by Reducing Lattice Bases.
Proceedings of the Advances in Cryptology, 1988

A Generalized Birthday Attack.
Proceedings of the Advances in Cryptology, 1988

Computation of Approximate L-th Roots Modulo <i>n</i> and Application to Cryptography.
Proceedings of the Advances in Cryptology, 1988

How to Guess <i>l</i>-th Roots Modulo n by Reducing Lattice Bases.
Proceedings of the Applied Algebra, 1988

1987
Hash-Functions Using Modulo-N Operations.
Proceedings of the Advances in Cryptology, 1987


  Loading...