Thomas Icart

According to our database1, Thomas Icart authored at least 14 papers between 2005 and 2011.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping.
IACR Cryptol. ePrint Arch., 2011

2010
Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
How to Hash into Elliptic Curves.
IACR Cryptol. ePrint Arch., 2009

Password Based Key Exchange with Hidden Elliptic Curve Public Parameters.
IACR Cryptol. ePrint Arch., 2009

Efficient Indifferentiable Hashing into Ordinary Elliptic Curves.
IACR Cryptol. ePrint Arch., 2009

Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers.
IACR Cryptol. ePrint Arch., 2009

On Physical Obfuscation of Cryptographic Algorithms.
Proceedings of the Progress in Cryptology, 2009

Efficient zero-knowledge identification schemes which respect privacy.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Identification and Privacy: Zero-Knowledge is not Enough.
IACR Cryptol. ePrint Arch., 2008

HIP-tags, a new paradigm for the Internet Of Things.
Proceedings of the 1st IFIP Wireless Days, 2008

HIP Tags Privacy Architecture.
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008

Cryptanalysis of EC-RAC, a RFID Identification Protocol.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
Improved Privacy of the Tree-Based Hash protocols using Physically Unclonable Function.
IACR Cryptol. ePrint Arch., 2007

2005
Efficient Scalar Multiplication by Isogeny Decompositions.
IACR Cryptol. ePrint Arch., 2005


  Loading...