default search action
Roch Lescuyer
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i3]Guillaume Barbu, Laurent Grémy, Roch Lescuyer:
Revisiting PACD-based Attacks on RSA-CRT. IACR Cryptol. ePrint Arch. 2024: 1125 (2024)
2010 – 2019
- 2018
- [j1]Julien Bringer, Hervé Chabanne, Daniel Le Métayer, Roch Lescuyer:
Biometric Systems Private by Design: Reasoning about privacy properties of biometric system architectures. Trans. Data Priv. 11(2): 111-137 (2018) - [c18]Hervé Chabanne, Roch Lescuyer, Jonathan Milgram, Constance Morel, Emmanuel Prouff:
Recognition Over Encrypted Faces. MSPN 2018: 174-191 - 2017
- [i2]Julien Bringer, Hervé Chabanne, Daniel Le Métayer, Roch Lescuyer:
Biometric Systems Private by Design: Reasoning about privacy properties of biometric system architectures. CoRR abs/1702.08301 (2017) - 2016
- [c17]Julien Bringer, Hervé Chabanne, Roch Lescuyer:
Software-Only Two-Factor Authentication Secure Against Active Servers. AFRICACRYPT 2016: 285-303 - [c16]Hervé Chabanne, Julien Keuffer, Roch Lescuyer:
A Verifiable System for Automated Face Identification. BIOSIG 2016: 345-352 - [c15]Julien Bringer, Hervé Chabanne, Roch Lescuyer, Alain Patey:
Hierarchical Identities from Group Signatures and Pseudonymous Signatures. The New Codebreakers 2016: 457-469 - [c14]Julien Bringer, Hervé Chabanne, Daniel Le Métayer, Roch Lescuyer:
Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems. DBSec 2016: 313-327 - [c13]Ghassane Amchyaa, Julien Bringer, Roch Lescuyer:
Searchable Encryption for Biometric Identification Revisited. DPM/QASA@ESORICS 2016: 113-129 - [c12]Hervé Chabanne, Julien Keuffer, Roch Lescuyer:
Study of a Verifiable Biometric Matching. IH&MMSec 2016: 183-184 - [c11]Hervé Chabanne, Julien Keuffer, Roch Lescuyer:
Delegating Biometric Authentication with the Sumcheck Protocol. WISTP 2016: 236-244 - 2015
- [c10]Julien Bringer, Hervé Chabanne, Daniel Le Métayer, Roch Lescuyer:
Privacy by Design in Practice: Reasoning about Privacy Properties of Biometric System Architectures. FM 2015: 90-107 - [c9]Julien Bringer, Hervé Chabanne, Daniel Le Métayer, Roch Lescuyer:
Reasoning about Privacy Properties of Biometric Systems Architectures in the Presence of Information Leakage. ISC 2015: 493-510 - [c8]Julien Bringer, Hervé Chabanne, Firas Kraiem, Roch Lescuyer, Eduardo Soria-Vazquez:
Some applications of verifiable computation to biometric verification. WIFS 2015: 1-6 - 2014
- [c7]Nicolas Desmoulins, Roch Lescuyer, Olivier Sanders, Jacques Traoré:
Direct Anonymous Attestations with Dependent Basename Opening. CANS 2014: 206-221 - [c6]Julien Bringer, Hervé Chabanne, Roch Lescuyer, Alain Patey:
Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents. Financial Cryptography 2014: 255-272 - [i1]Julien Bringer, Hervé Chabanne, Roch Lescuyer, Alain Patey:
Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents. IACR Cryptol. ePrint Arch. 2014: 67 (2014) - 2013
- [c5]Sébastien Canard, Roch Lescuyer:
Protecting privacy by sanitizing personal data: a new approach to anonymous credentials. AsiaCCS 2013: 381-392 - [c4]Ghada Arfaoui, Sébastien Gambs, Patrick Lacharme, Jean-François Lalande, Roch Lescuyer, Jean Claude Paillès:
A Privacy-Preserving Contactless Transport Service for NFC Smartphones. MobiCASE 2013: 282-285 - 2012
- [c3]Sébastien Canard, Amandine Jambert, Roch Lescuyer:
Sanitizable Signatures with Several Signers and Sanitizers. AFRICACRYPT 2012: 35-52 - 2011
- [c2]Sébastien Canard, Roch Lescuyer, Jacques Traoré:
Multi-show Anonymous Credentials with Encrypted Attributes in the Standard Model. CANS 2011: 194-213 - [c1]Sébastien Canard, Roch Lescuyer:
Anonymous credentials from (indexed) aggregate signatures. Digital Identity Management 2011: 53-62
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint