Thomas Icart

According to our database1, Thomas Icart authored at least 14 papers between 2006 and 2012.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2010
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves.
Proceedings of the Advances in Cryptology, 2010

Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Password Based Key Exchange with Hidden Elliptic Curve Public Parameters.
IACR Cryptol. ePrint Arch., 2009

Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers.
IACR Cryptol. ePrint Arch., 2009

On Physical Obfuscation of Cryptographic Algorithms.
Proceedings of the Progress in Cryptology, 2009

How to Hash into Elliptic Curves.
Proceedings of the Advances in Cryptology, 2009

Efficient zero-knowledge identification schemes which respect privacy.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Identification and Privacy: Zero-Knowledge is not Enough.
IACR Cryptol. ePrint Arch., 2008

HIP-tags, a new paradigm for the Internet Of Things.
Proceedings of the 1st IFIP Wireless Days, 2008

Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

HIP Tags Privacy Architecture.
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008

Cryptanalysis of EC-RAC, a RFID Identification Protocol.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2006
Efficient Scalar Multiplication by Isogeny Decompositions.
Proceedings of the Public Key Cryptography, 2006


  Loading...