2009 |
26 | EE | Pierre-Louis Cayrel,
Philippe Gaborit,
David Galindo,
Marc Girault:
Improved identity-based identification using correcting codes
CoRR abs/0903.0069: (2009) |
2007 |
25 | EE | Valérie Viet Triem Tong,
Hervé Sibert,
Jérémy Lecoeur,
Marc Girault:
Biometric Fuzzy Extractors Made Practical: A Proposal Based on FingerCodes.
ICB 2007: 604-613 |
2006 |
24 | EE | Benoît Calmels,
Sébastien Canard,
Marc Girault,
Hervé Sibert:
Low-Cost Cryptography for Privacy in RFID Systems.
CARDIS 2006: 237-251 |
23 | EE | Hervé Sibert,
Patrick Dehornoy,
Marc Girault:
Entity authentication schemes using braid word reduction.
Discrete Applied Mathematics 154(2): 420-436 (2006) |
22 | EE | Marc Girault,
Guillaume Poupard,
Jacques Stern:
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order.
J. Cryptology 19(4): 463-487 (2006) |
2005 |
21 | EE | Marc Girault,
David Lefranc:
Server-Aided Verification: Theory and Practice.
ASIACRYPT 2005: 605-623 |
2004 |
20 | EE | Marc Girault,
David Lefranc:
Public Key Authentication with One (Online) Single Addition.
CHES 2004: 413-427 |
2002 |
19 | EE | Sébastien Canard,
Marc Girault:
Implementing Group Signature Schemes with Smart Cards.
CARDIS 2002: 1-10 |
2000 |
18 | | Marc Girault:
Low-Size Coupons for Low-Cost IC Cards.
CARDIS 2000: 39-50 |
17 | EE | Marc Girault,
Jean-François Misarsky:
Cryptanalysis of Countermeasures Proposed for Repairing ISO 9796-1.
EUROCRYPT 2000: 81-90 |
1998 |
16 | | Marc Girault:
Relaxing Tamper-Resistance Requirements for Smart Cards by Using (Auto-)Proxy Signatures.
CARDIS 1998: 157-166 |
1997 |
15 | EE | Marc Girault,
Jean-François Misarsky:
Selective Forgery of RSA Signatures Using Redundancy.
EUROCRYPT 1997: 495-507 |
1994 |
14 | EE | Marc Girault,
Jacques Stern:
On the Length of Cryptographic Hash-Values Used in Identification Schemes.
CRYPTO 1994: 202-215 |
1992 |
13 | EE | Thierry Baritaud,
Henri Gilbert,
Marc Girault:
FFT Hashing is not Collision-free.
EUROCRYPT 1992: 35-44 |
1991 |
12 | EE | Marc Girault:
Self-Certified Public Keys.
EUROCRYPT 1991: 490-497 |
1990 |
11 | | Marc Girault:
A (non-practical) three-pass identification protocol using coding theory.
AUSCRYPT 1990: 265-272 |
10 | | Marc Girault,
Jean Claude Pailles:
An Identity-Based Scheme Providing Zero-Knowledge Authentication and Authenticated Key Exchange.
ESORICS 1990: 173-184 |
9 | | Marc Girault:
A survey of identification schemes.
EUROCODE 1990: 168-179 |
8 | | J. Burger,
Hervé Chabanne,
Marc Girault:
Minimum-change binary block-codes which are well balanced.
EUROCODE 1990: 76-86 |
7 | EE | Marc Girault:
An Identity-based Identification Scheme Based on Discrete Logarithms Modulo a Composite Number.
EUROCRYPT 1990: 481-486 |
1989 |
6 | EE | Jean-Jacques Quisquater,
Marc Girault:
2n-Bit Hash-Functions Using n-Bit Symmetric Block Cipher Algorithms.
EUROCRYPT 1989: 102-109 |
1988 |
5 | | Philippe Toffin,
Marc Girault,
Brigitte Vallée:
How to Guess l-th Roots Modulo n by Reducing Lattice Bases.
AAECC 1988: 427-442 |
4 | EE | Marc Girault,
Philippe Toffin,
Brigitte Vallée:
Computation of Approximate L-th Roots Modulo n and Application to Cryptography.
CRYPTO 1988: 100-117 |
3 | EE | Marc Girault,
Robert Cohen,
Mireille Campana:
A Generalized Birthday Attack.
EUROCRYPT 1988: 129-156 |
2 | EE | Brigitte Vallée,
Marc Girault,
Philippe Toffin:
How to Break Okamoto's Cryptosystem by Reducing Lattice Bases.
EUROCRYPT 1988: 281-291 |
1987 |
1 | EE | Marc Girault:
Hash-Functions Using Modulo-N Operations.
EUROCRYPT 1987: 217-226 |