default search action
Thomas Icart
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2012
- [c11]Jean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier:
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping. Cryptography and Security 2012: 207-232 - 2011
- [i8]Jean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier:
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping. IACR Cryptol. ePrint Arch. 2011: 58 (2011) - 2010
- [c10]Julien Bringer, Hervé Chabanne, Thomas Icart:
Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters. ACNS 2010: 291-308 - [c9]Eric Brier, Jean-Sébastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi:
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves. CRYPTO 2010: 237-254
2000 – 2009
- 2009
- [c8]Julien Bringer, Hervé Chabanne, Thomas Icart:
Efficient zero-knowledge identification schemes which respect privacy. AsiaCCS 2009: 195-205 - [c7]Thomas Icart:
How to Hash into Elliptic Curves. CRYPTO 2009: 303-316 - [c6]Julien Bringer, Hervé Chabanne, Thomas Icart:
On Physical Obfuscation of Cryptographic Algorithms. INDOCRYPT 2009: 88-103 - [i7]Emmanuel Bresson, Anne Canteaut, Benoît Chevallier-Mames, Christophe Clavier, Thomas Fuhr, Aline Gouget, Thomas Icart, Jean-François Misarsky, María Naya-Plasencia, Pascal Paillier, Thomas Pornin, Jean-René Reinhard, Céline Thuillet, Marion Videau:
Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers. IACR Cryptol. ePrint Arch. 2009: 199 (2009) - [i6]Thomas Icart:
How to Hash into Elliptic Curves. IACR Cryptol. ePrint Arch. 2009: 226 (2009) - [i5]Eric Brier, Jean-Sébastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi:
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves. IACR Cryptol. ePrint Arch. 2009: 340 (2009) - [i4]Julien Bringer, Hervé Chabanne, Thomas Icart:
Password Based Key Exchange with Hidden Elliptic Curve Public Parameters. IACR Cryptol. ePrint Arch. 2009: 468 (2009) - 2008
- [c5]Julien Bringer, Hervé Chabanne, Thomas Icart:
Cryptanalysis of EC-RAC, a RFID Identification Protocol. CANS 2008: 149-161 - [c4]Pascal Urien, Dorice Nyami, Simon Elrharbi, Hervé Chabanne, Thomas Icart, Cyrille Pepin, Mathieu Bouet, Daniel de Oliveira Cunha, Vincent Guyot, Guy Pujolle, Eric Gressier-Soudan, Jean-Ferdy Susini:
HIP Tags Privacy Architecture. ICSNC 2008: 179-184 - [c3]Julien Bringer, Hervé Chabanne, Thomas Icart:
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function. SCN 2008: 77-91 - [c2]Pascal Urien, Simon Elrharbi, Dorice Nyamy, Hervé Chabanne, Thomas Icart, Cyrille Pepin, Mathieu Bouet, Daniel de Oliveira Cunha, Vincent Guyot, Patrice Krzanik, Jean-Ferdinand Susini:
HIP-tags, a new paradigm for the Internet Of Things. Wireless Days 2008: 1-5 - [i3]Julien Bringer, Hervé Chabanne, Thomas Icart:
Identification and Privacy: Zero-Knowledge is not Enough. IACR Cryptol. ePrint Arch. 2008: 229 (2008) - 2007
- [i2]Julien Bringer, Hervé Chabanne, Thomas Icart:
Improved Privacy of the Tree-Based Hash protocols using Physically Unclonable Function. IACR Cryptol. ePrint Arch. 2007: 294 (2007) - 2006
- [c1]Christophe Doche, Thomas Icart, David R. Kohel:
Efficient Scalar Multiplication by Isogeny Decompositions. Public Key Cryptography 2006: 191-206 - 2005
- [i1]Christophe Doche, Thomas Icart, David R. Kohel:
Efficient Scalar Multiplication by Isogeny Decompositions. IACR Cryptol. ePrint Arch. 2005: 420 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint