Benoit Chevallier-Mames
Benoit Chevallier-Mames
Zama
Verifierad e-postadress på zama.ai - Startsida
Titel
Citeras av
Citeras av
År
Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
B Chevallier-Mames, M Ciet, M Joye
IEEE Transactions on computers 53 (6), 760-768, 2004
3152004
Secure delegation of elliptic-curve pairing
B Chevallier-Mames, JS Coron, N McCullagh, D Naccache, M Scott
International Conference on Smart Card Research and Advanced Applications, 24-35, 2010
1262010
An efficient CDH-based signature scheme with a tight security reduction
B Chevallier-Mames
Annual International Cryptology Conference, 511-526, 2005
662005
Shabal, a submission to NIST’s cryptographic hash algorithm competition
E Bresson, A Canteaut, B Chevallier-Mames, C Clavier, T Fuhr, A Gouget, ...
Submission to NIST, 2008
562008
On some incompatible properties of voting schemes
B Chevallier-Mames, PA Fouque, D Pointcheval, J Stern, J Traoré
Towards Trustworthy Elections, 191-199, 2010
552010
Why one should also secure RSA public key elements
E Brier, B Chevallier-Mames, M Ciet, C Clavier
International Workshop on Cryptographic Hardware and Embedded Systems, 324-338, 2006
522006
On some incompatible properties of voting schemes
B Chevallier-Mames, PA Fouque, D Pointcheval, J Traoré
In IAVoSS Workshop On Trustworthy Elections, WOTE’06, 2006
432006
Encoding-free ElGamal encryption without random oracles
B Chevallier-Mames, P Paillier, D Pointcheval
International Workshop on Public Key Cryptography, 91-104, 2006
422006
A practical and tightly secure signature scheme without hash function
B Chevallier-Mames, M Joye
Cryptographers’ Track at the RSA Conference, 339-356, 2007
382007
Efficient identity-based encryption with tight security reduction
N Attrapadung, J Furukawa, T Gomi, G Hanaoka, H Imai, R Zhang
International Conference on Cryptology and Network Security, 19-36, 2006
362006
Method and apparatus for obfuscating program source codes
B Chevallier-Mames, M Ciet, T Icart, AJ Farrugia, B Kindarji
US Patent 8,661,549, 2014
282014
Hash function using a quasi-group operation
B Chevallier-Mames, M Ciet, AJ Farrugia
US Patent App. 12/690,740, 2011
272011
Self-randomized exponentiation algorithms
B Chevallier-Mames
Cryptographers’ Track at the RSA Conference, 236-249, 2004
212004
Faster double-size modular multiplication from Euclidean multipliers
B Chevallier-Mames, M Joye, P Paillier
International Workshop on Cryptographic Hardware and Embedded Systems, 214-227, 2003
202003
Method and apparatus for dynamic obfuscation of static data
B Chevallier-Mames, DF Reynaud, JG Mclachlan, J Lerouge, M Ciet, ...
US Patent 9,336,370, 2016
192016
Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers.
E Bresson, A Canteaut, B Chevallier-Mames, C Clavier, T Fuhr, A Gouget, ...
IACR Cryptol. ePrint Arch. 2009, 199, 2009
192009
Linear bandwidth naccache-stern encryption
B Chevallier-Mames, D Naccache, J Stern
International Conference on Security and Cryptography for Networks, 327-339, 2008
192008
Optimal asymmetric encryption and signature paddings
B Chevallier-Mames, DH Phan, D Pointcheval
International Conference on Applied Cryptography and Network Security, 254-268, 2005
192005
Hash function using a piling-up process
AJ Farrugia, M Ciet, B Chevallier-Mames
US Patent 8,184,804, 2012
172012
Obfuscating transformations on data array content and addresses
AJ Farrugia, M Ciet, B Chevallier-Mames
US Patent 8,667,301, 2014
162014
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20