Thomas Icart
Thomas Icart
Affiliation inconnue
Aucune adresse e-mail validée
Titre
Citée par
Citée par
Année
RFID tags: Positioning principles and localization techniques
M Bouet, AL Dos Santos
2008 1st IFIP Wireless Days, 1-5, 2008
4542008
How to hash into elliptic curves
T Icart
Annual International Cryptology Conference, 303-316, 2009
1832009
Efficient indifferentiable hashing into ordinary elliptic curves
E Brier, JS Coron, T Icart, D Madore, H Randriam, M Tibouchi
Annual Cryptology Conference, 237-254, 2010
1282010
Cryptanalysis of EC-RAC, a RFID identification protocol
J Bringer, H Chabanne, T Icart
International conference on cryptology and network security, 149-161, 2008
1012008
Efficient scalar multiplication by isogeny decompositions
C Doche, T Icart, DR Kohel
International Workshop on Public Key Cryptography, 191-206, 2006
872006
Shabal, a submission to NIST’s cryptographic hash algorithm competition
E Bresson, A Canteaut, B Chevallier-Mames, C Clavier, T Fuhr, A Gouget, ...
Submission to NIST, 2008
572008
Improved privacy of the tree-based hash protocols using physically unclonable function
J Bringer, H Chabanne, T Icart
International Conference on Security and Cryptography for Networks, 77-91, 2008
342008
Method and apparatus for obfuscating program source codes
B Chevallier-Mames, M Ciet, T Icart, AJ Farrugia, B Kindarji
US Patent 8,661,549, 2014
302014
Supplemental access control (PACE v2): security analysis of PACE integrated mapping
JS Coron, A Gouget, T Icart, P Paillier
Cryptography and Security: From Theory to Applications, 207-232, 2012
212012
Efficient zero-knowledge identification schemes which respect privacy
J Bringer, H Chabanne, T Icart
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
212009
Method and apparatus for dynamic obfuscation of static data
B Chevallier-Mames, DF Reynaud, JG Mclachlan, J Lerouge, M Ciet, ...
US Patent 9,336,370, 2016
192016
Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers.
E Bresson, A Canteaut, B Chevallier-Mames, C Clavier, T Fuhr, A Gouget, ...
IACR Cryptol. ePrint Arch. 2009, 199, 2009
192009
On physical obfuscation of cryptographic algorithms
J Bringer, H Chabanne, T Icart
International Conference on Cryptology in India, 88-103, 2009
182009
HIP tags privacy architecture
P Urien, D Nyami, S Elrharbi, H Chabanne, T Icart, C Pépin, M Bouet, ...
2008 Third International Conference on Systems and Networks Communications …, 2008
152008
Protecting look up tables by mixing code and operations
AJ Farrugia, B Chevallier-Mames, B Kindarji, M Ciet, T Icart
US Patent 9,189,425, 2015
102015
Securing keys of a cipher using properties of the cipher process
AJ Farrugia, B Chevallier-Mames, M Ciet, T Icart
US Patent 8,718,280, 2014
102014
Cryptographic process execution protecting an input value against attacks
AJ Farrugia, B Chevallier-Mames, B Kindarji, M Ciet, T Icart
US Patent 8,605,894, 2013
102013
Multi-block cryptographic operation
B Kindarji, M Ciet, B Chevallier-Mames, T Icart, AJ Farrugia
US Patent 9,515,818, 2016
92016
Securing the implementation of a cryptographic process using key expansion
AJ Farrugia, B Chevallier-Mames, M Ciet, T Icart, B Kindarji
US Patent 8,966,279, 2015
82015
HIP-Tags architecture implementation for the Internet of Things
P Urien, S Elrharbi, D Nyamy, H Chabanne, T Icart, F Lecocq, C Pépin, ...
2009 First Asian Himalayas International Conference on Internet, 1-5, 2009
82009
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20