#### Filter Results:

- Full text PDF available (16)

#### Publication Year

2013

2017

- This year (3)
- Last 5 years (20)
- Last 10 years (20)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

- Houda Ferradi, Rémi Géraud, David Naccache, Assia Tria
- Journal of Cryptographic Engineering
- 2015

This paper describes the forensic analysis of what the authors believe to be the most sophisticated smart card fraud encountered to date. In 2010, Murdoch et al. (IEEE Symposium on Security and Privacy, pp 433–446, 2010) described a man-in-the-middle attack against EMV cards. Murdoch et al. (IEEE Symposium on Security and Privacy, pp 433–446, 2010)… (More)

- Thomas Bourgeat, Julien Bringer, +7 authors Antoine Voizard
- SEC
- 2014

Point constellation recognition is a commonproblemwithmany pattern matching applications. Whilst useful in many contexts, this work is mainly motivated by fingerprint matching. Fingerprints are traditionally modelled as constellations of oriented points called minutiae. The fingerprint verifier’s task consists in comparing two point constellations. The… (More)

- Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, David Pointcheval
- IACR Cryptology ePrint Archive
- 2016

In two-party computation, achieving both fairness and guaranteed output delivery is well known to be impossible. Despite this limitation, many approaches provide solutions of practical interest by weakening somewhat the fairness requirement. Such approaches fall roughly in three categories: “gradual release” schemes assume that the aggrieved party can… (More)

- Jean-Michel Cioranesco, Houda Ferradi, David Naccache
- IEEE Security & Privacy
- 2013

This paper show covert channels using the CPU load are possible between clients connected to a multicore remote server.

- Mehari Msgna, Houda Ferradi, Raja Naeem Akram, Konstantinos Markantonakis
- The New Codebreakers
- 2016

Smart phones have rapidly become hand-held mobile devices capable of sustaining multiple applications. Some of these applications allow access to services including healthcare, financial and online social networks and are becoming common in the smart phone environment. From a security and privacy point of view, this seismic shift is creating new challenges,… (More)

- Ehsan Aerabi, A. Elhadi Amirouche, Houda Ferradi, Rémi Géraud, David Naccache, Jean Vuillemin
- 2016 IEEE International Symposium on Hardware…
- 2015

Over the last twenty years, the research community has devised sophisticated methods for retrieving secret information from side-channel emanations, and for resisting such attacks. This paper introduces a new CPU architecture called the Conjoined Microprocessor (CμP). The CμP can randomly interleave the execution of two programs at very low… (More)

- Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Hang Zhou
- Cryptography and Communications
- 2015

This paper describes a new multiplication algorithm, particularly suited to lightweight microprocessors when one of the operands is known in advance. The method uses backtracking to find a multiplication-friendly encoding of the operand known in advance. A 68hc05 microprocessor implementation shows that the new algorithm indeed yields a twofold speed… (More)

- Simon Cogliani, Feng Bao, +5 authors Guilin Wang
- IACR Cryptology ePrint Archive
- 2016

We describe a lightweight algorithm performing whole-network authentication in a distributed way. This protocol is more efficient than one-to-one node authentication: it results in less communication, less computation, and overall lower energy consumption. The proposed algorithm is provably secure, and achieves zero-knowledge authentication of a network in… (More)

- Simon Cogliani, Houda Ferradi, Rémi Géraud, David Naccache
- ISPEC
- 2016

We introduce “thrifty” zero-knowledge protocols, or TZK. These protocols are constructed by introducing a bias in the challenge send by the prover. This bias is chosen so as to maximize the security versus effort trade-off. We illustrate the benefits of this approach on several well-known zero-knowledge protocols.

- Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Amaury de Wargny
- Journal of Cryptographic Engineering
- 2015

In a famous paper published in 1951 (Natl Bur Stand Appl Math Ser 12:36–38, 1951), von Neumann presented a simple procedure allowing to correct the bias of random sources. This procedure introduces latencies between the random outputs. On the other hand, algorithms such as stream ciphers, block ciphers, or even modular multipliers usually run in a number of… (More)