How to hash into elliptic curves T Icart Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009 | 214 | 2009 |
Efficient indifferentiable hashing into ordinary elliptic curves E Brier, JS Coron, T Icart, D Madore, H Randriam, M Tibouchi Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010 | 153 | 2010 |
Cryptanalysis of EC-RAC, a RFID identification protocol J Bringer, H Chabanne, T Icart Cryptology and Network Security: 7th International Conference, CANS 2008 …, 2008 | 113 | 2008 |
Efficient scalar multiplication by isogeny decompositions C Doche, T Icart, DR Kohel Public Key Cryptography 3958, 191-206, 2006 | 88 | 2006 |
Shabal, a submission to NIST’s cryptographic hash algorithm competition E Bresson, A Canteaut, B Chevallier-Mames, C Clavier, T Fuhr, A Gouget, ... Submission to NIST, 2008 | 59 | 2008 |
Improved privacy of the tree-based hash protocols using physically unclonable function J Bringer, H Chabanne, T Icart SCN 8, 77-91, 2008 | 42 | 2008 |
Method and apparatus for obfuscating program source codes B Chevallier-Mames, M Ciet, T Icart, AJ Farrugia, B Kindarji US Patent 8,661,549, 2014 | 38 | 2014 |
Method and apparatus for dynamic obfuscation of static data B Chevallier-Mames, DF Reynaud, JG Mclachlan, J Lerouge, M Ciet, ... US Patent 9,336,370, 2016 | 22 | 2016 |
Supplemental access control (PACE v2): security analysis of PACE integrated mapping JS Coron, A Gouget, T Icart, P Paillier Cryptography and Security: From Theory to Applications: Essays Dedicated to …, 2012 | 21 | 2012 |
Efficient zero-knowledge identification schemes which respect privacy J Bringer, H Chabanne, T Icart Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 21 | 2009 |
On physical obfuscation of cryptographic algorithms J Bringer, H Chabanne, T Icart Progress in Cryptology-INDOCRYPT 2009: 10th International Conference on …, 2009 | 21 | 2009 |
Indifferentiability with Distinguishers: Why Shabal\Does Not Require Ideal Ciphers E Bresson, A Canteaut, B Chevallier-Mames, C Clavier, T Fuhr, A Gouget, ... Cryptology ePrint Archive, 2009 | 20 | 2009 |
HIP tags privacy architecture P Urien, D Nyami, S Elrharbi, H Chabanne, T Icart, C Pépin, M Bouet, ... 2008 Third International Conference on Systems and Networks Communications …, 2008 | 15 | 2008 |
Securing the implementation of a cryptographic process using key expansion AJ Farrugia, B Chevallier-Mames, M Ciet, T Icart, B Kindarji US Patent 8,966,279, 2015 | 12 | 2015 |
Protecting look up tables by mixing code and operations AJ Farrugia, B Chevallier-Mames, B Kindarji, M Ciet, T Icart US Patent 9,189,425, 2015 | 11 | 2015 |
Cryptographic process execution protecting an input value against attacks AJ Farrugia, B Chevallier-Mames, B Kindarji, M Ciet, T Icart US Patent 8,605,894, 2013 | 11 | 2013 |
Multi-block cryptographic operation B Kindarji, M Ciet, B Chevallier-Mames, T Icart, AJ Farrugia US Patent 9,515,818, 2016 | 10 | 2016 |
Precomputing internal AES states in counter mode to protect keys used in AES computations B Chevallier-Mames, M Ciet, T Icart, B Kindarji, AJ Farrugia US Patent 9,264,222, 2016 | 10 | 2016 |
Methods and apparatus for correlation protected processing of data operations B Chevallier-Mames, M Ciet, T Icart, B Kindarji, AJ Farrugia US Patent 8,918,768, 2014 | 10 | 2014 |
Computing key-schedules of the AES for use in white boxes B Chevallier-Mames, B Kindarji, T Icart, AJ Farrugia, M Ciet US Patent 9,774,443, 2017 | 9 | 2017 |