<?xml version="1.0"?>
<dblpperson name="Philippe Elbaz-Vincent" pid="16/1920" n="27">
<person key="homepages/16/1920" mdate="2024-09-24">
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<url>https://orcid.org/0000-0002-8629-3021</url>
</person>
<r><article key="journals/cic/AssaelE24" mdate="2024-10-06">
<author pid="356/3356">Guilh&#232;m Assael</author>
<author orcid="0000-0002-8629-3021" pid="16/1920">Philippe Elbaz-Vincent</author>
<title>Provably Secure and Area-Efficient Modular Addition over Boolean Shares.</title>
<pages>9</pages>
<year>2024</year>
<volume>1</volume>
<journal>IACR Commun. Cryptol.</journal>
<number>2</number>
<ee type="oa">https://doi.org/10.62056/aee0zoja5</ee>
<url>db/journals/cic/cic1.html#AssaelE24</url>
</article>
</r>
<r><inproceedings key="conf/coopis/BaudetAME23" mdate="2023-11-28">
<author orcid="0000-0001-6811-3886" pid="248/5594">Arthur Baudet</author>
<author orcid="0000-0002-0493-9096" pid="47/6427">Oum-El-Kheir Aktouf</author>
<author orcid="0000-0002-6729-5590" pid="96/2031">Annabelle Mercier</author>
<author orcid="0000-0002-8629-3021" pid="16/1920">Philippe Elbaz-Vincent</author>
<title>Decentralized and Autonomous Key Management for Open Multi-agent Systems of Embedded Agents.</title>
<pages>119-136</pages>
<year>2023</year>
<booktitle>CoopIS</booktitle>
<ee>https://doi.org/10.1007/978-3-031-46846-9_7</ee>
<crossref>conf/coopis/2023</crossref>
<url>db/conf/coopis/coopis2023.html#BaudetAME23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/host/AssaelER23" mdate="2023-09-11">
<author pid="356/3356">Guilh&#232;m Assael</author>
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<author pid="119/1136">Guillaume Reymond</author>
<title>Improving Single-Trace Attacks on the Number-Theoretic Transform for Cortex-M4.</title>
<pages>111-121</pages>
<year>2023</year>
<booktitle>HOST</booktitle>
<ee>https://doi.org/10.1109/HOST55118.2023.10133270</ee>
<crossref>conf/host/2023</crossref>
<url>db/conf/host/host2023.html#AssaelER23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icaart/BaudetAME23" mdate="2023-05-09">
<author pid="248/5594">Arthur Baudet</author>
<author pid="47/6427">Oum-El-Kheir Aktouf</author>
<author pid="96/2031">Annabelle Mercier</author>
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<title>MAKI: A Multi-Agent Public Key Infrastructure.</title>
<pages>177-184</pages>
<year>2023</year>
<booktitle>ICAART (3)</booktitle>
<ee>https://doi.org/10.5220/0011631800003393</ee>
<crossref>conf/icaart/2023-3</crossref>
<url>db/conf/icaart/icaart2023-3.html#BaudetAME23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cesar/BaudetAME22" mdate="2024-10-11">
<author pid="248/5594">Arthur Baudet</author>
<author pid="47/6427">Oum-El-Kheir Aktouf</author>
<author pid="96/2031">Annabelle Mercier</author>
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<title>Decentralized Public Key Infrastructure for Autonomous Embedded Systems.</title>
<pages>99-114</pages>
<year>2022</year>
<booktitle>C&#38;ESAR</booktitle>
<ee type="oa">https://ceur-ws.org/Vol-3329/paper-06.pdf</ee>
<crossref>conf/cesar/2022</crossref>
<url>db/conf/cesar/cesar2022.html#BaudetAME22</url>
</inproceedings>
</r>
<r><article key="journals/access/BaudetAME21" mdate="2021-12-15">
<author orcid="0000-0001-6811-3886" pid="248/5594">Arthur Baudet</author>
<author orcid="0000-0002-0493-9096" pid="47/6427">Oum-El-Kheir Aktouf</author>
<author pid="96/2031">Annabelle Mercier</author>
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<title>Systematic Mapping Study of Security in Multi-Embedded-Agent Systems.</title>
<pages>154902-154913</pages>
<year>2021</year>
<volume>9</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2021.3128287</ee>
<url>db/journals/access/access9.html#BaudetAME21</url>
</article>
</r>
<r><article key="journals/cca/Elbaz-VincentM21" mdate="2021-11-25">
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<author pid="244/8275">Etienne Marcatel</author>
<title>An extension of the fpLLL library to Hermitian lattices.</title>
<pages>54-58</pages>
<year>2021</year>
<volume>55</volume>
<journal>ACM Commun. Comput. Algebra</journal>
<number>2</number>
<ee>https://doi.org/10.1145/3493492.3493498</ee>
<url>db/journals/cca/cca55.html#Elbaz-VincentM21</url>
</article>
</r>
<r><inproceedings key="conf/arith/ColadonEH21" mdate="2021-11-23">
<author pid="166/1265">Titouan Coladon</author>
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<author pid="210/7704">Cyril Hugounenq</author>
<title>MPHELL: A fast and robust library with unified and versatile arithmetics for elliptic curves cryptography.</title>
<pages>78-85</pages>
<year>2021</year>
<booktitle>ARITH</booktitle>
<ee>https://doi.org/10.1109/ARITH51176.2021.00026</ee>
<crossref>conf/arith/2021</crossref>
<url>db/conf/arith/arith2021.html#ColadonEH21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/Elbaz-VincentT21" mdate="2024-08-28">
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<author pid="296/9171-2">Mohamed Traor&#233; 0002</author>
<title>Revisiting the Pervasiveness of Weak Keys in Network Devices.</title>
<pages>43-48</pages>
<year>2021</year>
<booktitle>SP (Workshops)</booktitle>
<ee>https://doi.org/10.1109/SPW53761.2021.00015</ee>
<crossref>conf/sp/2021w</crossref>
<url>db/conf/sp/sp2021w.html#Elbaz-VincentT21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/Tofighi-Shirazi19" mdate="2019-11-12">
<author pid="232/0854">Ramtine Tofighi-Shirazi</author>
<author pid="42/8611">Irina Mariuca Asavoae</author>
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<author pid="08/9812">Thanh-Ha Le</author>
<title>Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis.</title>
<pages>3-14</pages>
<year>2019</year>
<booktitle>SPRO@CCS</booktitle>
<ee>https://doi.org/10.1145/3338503.3357719</ee>
<crossref>conf/ccs/2019spro</crossref>
<url>db/conf/ccs/spro2019.html#Tofighi-Shirazi19</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1909-01640" mdate="2019-09-16">
<author pid="232/0854">Ramtine Tofighi-Shirazi</author>
<author pid="42/8611">Irina Asavoae</author>
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<author pid="08/9812">Thanh Ha Le</author>
<title>Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis.</title>
<year>2019</year>
<volume>abs/1909.01640</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1909.01640</ee>
<url>db/journals/corr/corr1909.html#abs-1909-01640</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1911-07523" mdate="2019-12-02">
<author pid="232/0854">Ramtine Tofighi-Shirazi</author>
<author pid="42/8611">Irina Mariuca Asavoae</author>
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<title>Fine-Grained Static Detection of Obfuscation Transforms Using Ensemble-Learning and Semantic Reasoning.</title>
<year>2019</year>
<volume>abs/1911.07523</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1911.07523</ee>
<url>db/journals/corr/corr1911.html#abs-1911-07523</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/Elbaz-VincentHR19" mdate="2020-05-11">
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<author pid="210/7704">Cyril Hugounenq</author>
<author pid="248/7738">S&#233;bastien Riou</author>
<title>SPAE a mode of operation for AES on low-cost hardware.</title>
<pages>1007</pages>
<year>2019</year>
<volume>2019</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2019/1007</ee>
<url>db/journals/iacr/iacr2019.html#Elbaz-VincentHR19</url>
</article>
</r>
<r><inproceedings key="conf/acsac/Tofighi-Shirazi18" mdate="2018-12-21">
<author pid="232/0854">Ramtine Tofighi-Shirazi</author>
<author pid="10/11487">Maria Christofi</author>
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<author pid="08/9812">Thanh Ha Le</author>
<title>DoSE: Deobfuscation based on Semantic Equivalence.</title>
<pages>1:1-1:12</pages>
<year>2018</year>
<booktitle>SSPREW@ACSAC</booktitle>
<ee>https://doi.org/10.1145/3289239.3289243</ee>
<crossref>conf/acsac/2018ssprew</crossref>
<url>db/conf/acsac/ssprew2018.html#Tofighi-Shirazi18</url>
</inproceedings>
</r>
<r><article key="journals/ijact/SarrE17" mdate="2020-08-07">
<author pid="58/8437">Augustin P. Sarr</author>
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<title>On the separation between the FHMQV and HMQV protocols.</title>
<pages>377-393</pages>
<year>2017</year>
<volume>3</volume>
<journal>Int. J. Appl. Cryptogr.</journal>
<number>4</number>
<ee>https://doi.org/10.1504/IJACT.2017.10010330</ee>
<url>db/journals/ijact/ijact3.html#SarrE17</url>
</article>
</r>
<r><inproceedings key="conf/africacrypt/SarrE16" mdate="2017-05-22">
<author pid="58/8437">Augustin P. Sarr</author>
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<title>On the Security of the (F)HMQV Protocol.</title>
<pages>207-224</pages>
<year>2016</year>
<booktitle>AFRICACRYPT</booktitle>
<ee>https://doi.org/10.1007/978-3-319-31517-1_11</ee>
<crossref>conf/africacrypt/2016</crossref>
<url>db/conf/africacrypt/africacrypt2016.html#SarrE16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/gsi/Elbaz-VincentG15" mdate="2020-10-25">
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<author orcid="0000-0001-7785-263X" pid="65/4700">Herbert Gangl</author>
<title>Finite Polylogarithms, Their Multiple Analogues and the Shannon Entropy.</title>
<pages>277-285</pages>
<year>2015</year>
<booktitle>GSI</booktitle>
<ee>https://doi.org/10.1007/978-3-319-25040-3_31</ee>
<crossref>conf/gsi/2015</crossref>
<url>db/conf/gsi/gsi2015.html#Elbaz-VincentG15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/reconfig/Jayet-GriffonCM15" mdate="2023-08-28">
<author pid="175/4437">C. Jayet-Griffon</author>
<author pid="188/8323">Marie-Angela Cornelie</author>
<author pid="02/6402">Paolo Maistri</author>
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<author pid="05/2696">R&#233;gis Leveugle</author>
<title>Polynomial multipliers for fully homomorphic encryption on FPGA.</title>
<pages>1-6</pages>
<year>2015</year>
<booktitle>ReConFig</booktitle>
<ee>https://doi.org/10.1109/ReConFig.2015.7393335</ee>
<crossref>conf/reconfig/2015</crossref>
<url>db/conf/reconfig/reconfig2015.html#Jayet-GriffonCM15</url>
</inproceedings>
</r>
<r><article key="journals/et/SoucarrosCCE13" mdate="2021-10-14">
<author pid="70/10572">Mathilde Soucarros</author>
<author orcid="0000-0001-6239-8825" pid="35/6084">Jessy Cl&#233;di&#232;re</author>
<author orcid="0000-0002-9117-5302" pid="07/5955">C&#233;cile Canovas-Dumas</author>
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<title>Fault Analysis and Evaluation of a True Random Number Generator Embedded in a Processor.</title>
<pages>367-381</pages>
<year>2013</year>
<volume>29</volume>
<journal>J. Electron. Test.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s10836-013-5356-1</ee>
<url>db/journals/et/et29.html#SoucarrosCCE13</url>
</article>
</r>
<r><inproceedings key="conf/africacrypt/SarrE12" mdate="2017-05-22">
<author pid="58/8437">Augustin P. Sarr</author>
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<title>A Complementary Analysis of the (s)YZ and DIKE Protocols.</title>
<pages>203-220</pages>
<year>2012</year>
<booktitle>AFRICACRYPT</booktitle>
<ee>https://doi.org/10.1007/978-3-642-31410-0_13</ee>
<crossref>conf/africacrypt/2012</crossref>
<url>db/conf/africacrypt/africacrypt2012.html#SarrE12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/host/SoucarrosCCER11" mdate="2023-03-24">
<author pid="70/10572">Mathilde Soucarros</author>
<author orcid="0000-0002-9117-5302" pid="07/5955">C&#233;cile Canovas-Dumas</author>
<author orcid="0000-0001-6239-8825" pid="35/6084">Jessy Cl&#233;di&#232;re</author>
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<author pid="72/3774">Denis R&#233;al</author>
<title>Influence of the temperature on true random number generators.</title>
<pages>24-27</pages>
<year>2011</year>
<booktitle>HOST</booktitle>
<ee>https://doi.org/10.1109/HST.2011.5954990</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/HST.2011.5954990</ee>
<crossref>conf/host/2011</crossref>
<url>db/conf/host/host2011.html#SoucarrosCCER11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/scn/SarrEB10" mdate="2020-06-15">
<author pid="58/8437">Augustin P. Sarr</author>
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<author orcid="0000-0002-6301-4464" pid="71/570">Jean-Claude Bajard</author>
<title>A New Security Model for Authenticated Key Agreement.</title>
<pages>219-234</pages>
<year>2010</year>
<booktitle>SCN</booktitle>
<ee>https://doi.org/10.1007/978-3-642-15317-4_15</ee>
<crossref>conf/scn/2010</crossref>
<url>db/conf/scn/scn2010.html#SarrEB10</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/SarrEB10" mdate="2020-05-11">
<author pid="58/8437">Augustin P. Sarr</author>
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<author pid="71/570">Jean-Claude Bajard</author>
<title>A New Security Model for Authenticated Key Agreement.</title>
<pages>237</pages>
<year>2010</year>
<volume>2010</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2010/237</ee>
<url>db/journals/iacr/iacr2010.html#SarrEB10</url>
</article>
</r>
<r><inproceedings key="conf/europki/SarrEB09" mdate="2020-06-15">
<author pid="58/8437">Augustin P. Sarr</author>
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<author orcid="0000-0002-6301-4464" pid="71/570">Jean-Claude Bajard</author>
<title>A Secure and Efficient Authenticated Diffie-Hellman Protocol.</title>
<pages>83-98</pages>
<year>2009</year>
<booktitle>EuroPKI</booktitle>
<ee>https://doi.org/10.1007/978-3-642-16441-5_6</ee>
<crossref>conf/europki/2009</crossref>
<url>db/conf/europki/europki2009.html#SarrEB09</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/SarrEB09" mdate="2020-05-11">
<author pid="58/8437">Augustin P. Sarr</author>
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<author pid="71/570">Jean-Claude Bajard</author>
<title>A Secure and Efficient Authenticated Diffie - Hellman Protocol.</title>
<pages>408</pages>
<year>2009</year>
<volume>2009</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2009/408</ee>
<url>db/journals/iacr/iacr2009.html#SarrEB09</url>
</article>
</r>
<r><inproceedings key="conf/issac/DumasEGU07" mdate="2018-11-06">
<author orcid="0000-0002-2591-172X" pid="78/264">Jean-Guillaume Dumas</author>
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<author pid="30/1961">Pascal Giorgi</author>
<author pid="91/6976">Anna Urbanska</author>
<title>Parallel computation of the rank of large sparse matrices from algebraic K-theory.</title>
<pages>43-52</pages>
<year>2007</year>
<crossref>conf/issac/2007pasco</crossref>
<booktitle>PASCO</booktitle>
<ee>https://doi.org/10.1145/1278177.1278186</ee>
<url>db/conf/issac/pasco2007.html#DumasEGU07</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-0704-2351" mdate="2022-04-09">
<author orcid="0000-0002-2591-172X" pid="78/264">Jean-Guillaume Dumas</author>
<author pid="16/1920">Philippe Elbaz-Vincent</author>
<author pid="30/1961">Pascal Giorgi</author>
<author pid="91/6976">Anna Urbanska</author>
<title>Parallel computation of the rank of large sparse matrices from algebraic K-theory</title>
<ee type="oa">http://arxiv.org/abs/0704.2351</ee>
<year>2007</year>
<journal>CoRR</journal>
<volume>abs/0704.2351</volume>
<url>db/journals/corr/corr0704.html#abs-0704-2351</url>
</article>
</r>
<coauthors n="28" nc="5">
<co c="2"><na f="a/Aktouf:Oum=El=Kheir" pid="47/6427">Oum-El-Kheir Aktouf</na></co>
<co c="0" n="2"><na f="a/Asavoae:Irina_Mariuca" pid="42/8611">Irina Mariuca Asavoae</na><na>Irina Asavoae</na></co>
<co c="3"><na f="a/Assael:Guilh=egrave=m" pid="356/3356">Guilh&#232;m Assael</na></co>
<co c="4"><na f="b/Bajard:Jean=Claude" pid="71/570">Jean-Claude Bajard</na></co>
<co c="2"><na f="b/Baudet:Arthur" pid="248/5594">Arthur Baudet</na></co>
<co c="0" n="2"><na f="c/Canovas:C=eacute=cile" pid="07/5955">C&#233;cile Canovas</na><na>C&#233;cile Canovas-Dumas</na></co>
<co c="0"><na f="c/Christofi:Maria" pid="10/11487">Maria Christofi</na></co>
<co c="0"><na f="c/Cl=eacute=di=egrave=re:Jessy" pid="35/6084">Jessy Cl&#233;di&#232;re</na></co>
<co c="1"><na f="c/Coladon:Titouan" pid="166/1265">Titouan Coladon</na></co>
<co c="0"><na f="c/Cornelie:Marie=Angela" pid="188/8323">Marie-Angela Cornelie</na></co>
<co c="0"><na f="d/Dumas:Jean=Guillaume" pid="78/264">Jean-Guillaume Dumas</na></co>
<co c="-1"><na f="g/Gangl:Herbert" pid="65/4700">Herbert Gangl</na></co>
<co c="0"><na f="g/Giorgi:Pascal" pid="30/1961">Pascal Giorgi</na></co>
<co c="1"><na f="h/Hugounenq:Cyril" pid="210/7704">Cyril Hugounenq</na></co>
<co c="0"><na f="j/Jayet=Griffon:C=" pid="175/4437">C. Jayet-Griffon</na></co>
<co c="0" n="2"><na f="l/Le:Thanh_Ha" pid="08/9812">Thanh Ha Le</na><na>Thanh-Ha Le</na></co>
<co c="0"><na f="l/Leveugle:R=eacute=gis" pid="05/2696">R&#233;gis Leveugle</na></co>
<co c="0"><na f="m/Maistri:Paolo" pid="02/6402">Paolo Maistri</na></co>
<co c="-1"><na f="m/Marcatel:Etienne" pid="244/8275">Etienne Marcatel</na></co>
<co c="2"><na f="m/Mercier:Annabelle" pid="96/2031">Annabelle Mercier</na></co>
<co c="0"><na f="r/R=eacute=al:Denis" pid="72/3774">Denis R&#233;al</na></co>
<co c="3"><na f="r/Reymond:Guillaume" pid="119/1136">Guillaume Reymond</na></co>
<co c="1"><na f="r/Riou:S=eacute=bastien" pid="248/7738">S&#233;bastien Riou</na></co>
<co c="4"><na f="s/Sarr:Augustin_P=" pid="58/8437">Augustin P. Sarr</na></co>
<co c="0"><na f="s/Soucarros:Mathilde" pid="70/10572">Mathilde Soucarros</na></co>
<co c="0"><na f="t/Tofighi=Shirazi:Ramtine" pid="232/0854">Ramtine Tofighi-Shirazi</na></co>
<co c="-1"><na f="t/Traor=eacute=_0002:Mohamed" pid="296/9171-2">Mohamed Traor&#233; 0002</na></co>
<co c="0"><na f="u/Urbanska:Anna" pid="91/6976">Anna Urbanska</na></co>
</coauthors>
</dblpperson>

