Remote object authentication : confidence model, cryptosystem, and protocol", dans Data Mining, Intrusion Detection, Information Security and Assurance, and Data Network Security 10 pages Article en cours de publicationRemote object authentication against counterfeiting using elliptic curves", qui sera présenté à la conférence SPIE Defense, Security, and Sensing in Orlando, Florida Etats-Unis d'Amérique, 10 pages Article en préparation : "Isolating partial information of indistinguishable encryptions" (titre provisoire) pour les résultats de sécurité théorique Public-key encryption in a multi-user setting : security proofs and improvements, Belur V. Dasarathy, Proceedings of SPIE Advances in cryptology -EUROCRYPT 2000, pp.25-29, 2000. ,
Elliptic Curves in Cryptography, 1999. ,
DOI : 10.1017/CBO9781107360211
Advances in Elliptic Curve Cryptography, p.317, 2005. ,
DOI : 10.1017/CBO9780511546570
Guide to biometrics, 2003. ,
DOI : 10.1007/978-1-4757-4036-3
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication, Proceedings of ACISP '07, pp.96-106, 2007. ,
DOI : 10.1007/978-3-540-73458-1_8
An authentication protocol with encrypted biometric data, Progress in cryptology, AFRICACRYPT 2008, pp.109-124, 2008. ,
Extended private information retrieval and its application in biometrics authentication, Cryptology and Network Security, LNCS, vol.4856, pp.175-193, 2007. ,
The Decision Diffie-Hellman problem, Proceedings of the Third Algorithmic Number Theory Symposium, pp.48-63, 1998. ,
DOI : 10.1007/BFb0054851
Private Information Retrieval, Proceedings of the 36th annual IEEE Conference on Foundations of Computer Science, pp.41-50, 1995. ,
A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, vol.31, issue.4, pp.469-472, 1985. ,
DOI : 10.1109/TIT.1985.1057074
Multiscale extraction of uncompressive bitstrings from speckle patterns Morphocryptography : a new way for securing both information and storage media, Proc. Workshop on Information Optics Proc. SAR-SSI 2007, pp.12-15, 2007. ,
A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves, Mathematics of Computation, vol.62, pp.865-874, 1994. ,
Constructive and destructive facets of Weil descent on elliptic curves, Journal of Cryptology, vol.44, issue.1, pp.19-34, 2002. ,
DOI : 10.1007/s00145-001-0011-x
URL : https://hal.archives-ouvertes.fr/inria-00512763
Foundations of cryptography I : basic tools, 2001. ,
Foundations of cryptography II : basic applications, 2004. ,
Probabilistic encryption & how to play mental poker keeping secret all partial information, Proceedings of the fourteenth annual ACM symposium on Theory of computing , STOC '82, pp.365-377, 1982. ,
DOI : 10.1145/800070.802212
Discrete Logarithms in $GF ( P )$ Using the Number Field Sieve, SIAM Journal on Discrete Mathematics, vol.6, issue.1, pp.124-138, 1993. ,
DOI : 10.1137/0406010
Abstract, LMS Journal of Computation and Mathematics, vol.18, pp.167-192, 2004. ,
DOI : 10.1109/18.259647
Guide to elliptic curve cryptography, 2003. ,
Separating Decision Diffie?Hellman from Computational Diffie?Hellman in Cryptographic Groups, Journal of Cryptology, vol.16, issue.4, pp.239-247, 2003. ,
DOI : 10.1007/s00145-003-0052-4
Elliptic curve cryptosystems, Mathematics of Computation, vol.48, issue.177, pp.203-209, 1987. ,
DOI : 10.1090/S0025-5718-1987-0866109-5
Elliptic curve cryptography : the serpentine course of a paradigm shift Replication is not needed : single database , computationally-private information retrieval, Journal of Number Theory, pp.364-373, 1997. ,
Factoring Integers with Elliptic Curves, The Annals of Mathematics, vol.126, issue.3, pp.649-673, 1987. ,
DOI : 10.2307/1971363
The developement of the number field sieve, 1993. ,
An Oblivious Transfer Protocol with Log-Squared Communication, ISC 2005, pp.314-328, 2005. ,
DOI : 10.1007/11556992_23
Reducing elliptic curve logarithms to logarithms in a finite field, IEEE Transactions on Information Theory, vol.39, issue.5, pp.1639-1646, 1993. ,
DOI : 10.1109/18.259647
Use of Elliptic Curves in Cryptography, 1985. ,
DOI : 10.1007/3-540-39799-X_31
Physical One-Way Functions, Science, vol.297, issue.5589, pp.2026-2030, 2002. ,
DOI : 10.1126/science.1074376
Factoring with cubic integers, The development of the number field sieve, pp.4-10, 1993. ,
Theorems on factorization and primality testing, Proc. Cambridge Philos. Soc. 76, pp.521-528, 1974. ,
DOI : 10.2307/2003473
Complexity theory and cryptology : an introduction to cryptocomplexity, 2005. ,
Sequences of games : a tool for taming complexity in security proofs, manuscript, 2006. ,
The arithmetic of ellipitic curves, 1986. ,
The Discrete Logarithm Problem on Elliptic Curves of Trace One, Journal of Cryptology, vol.12, issue.3, pp.193-196, 1999. ,
DOI : 10.1007/s001459900052
Complexity and cryptography : an introduction, 2006. ,
DOI : 10.1017/CBO9780511755286
On the security of ElGamal based encryption, Proceedings of the First Annual Workshop on Practice and Theory in Public-Key Crypotography : Public Key Cryptography, pp.117-134, 1998. ,
DOI : 10.1007/BFb0054019