Patrick Lacharme

Learn More
The Linux pseudorandom number generator (PRNG) is a PRNG with entropy inputs which is widely used in many security related applications and protocols. This PRNG is written as an open source code which is subject to regular changes. It was last analyzed in the work of Gutterman et al. in 2006 [GPR06] but since then no new analysis has been made available,(More)
A post-processing function is used to reduce or eliminate statistical weaknesses of physical random number generators. The output bias of a n-bit input m-bit output function is examined, when the input bits are biased. For this purpose, the definition of (n, m, t)-corrector is introduced; many characterizations and properties of a corrector are presented.(More)
Biometric recognition is more and more employed in authentication and access control of various applications. Biometric data are strongly linked with the user and do not allow revocability nor diversity, without an adapted post-processing. Cancelable biometrics, including the very popular algorithm BioHashing, is used to cope with the underlying privacy and(More)
HAL is a multidisciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L'archive ouverte pluridisciplinaire HAL, est destinée au dépôt età la diffusion(More)
This poster proposes a secure e-payment architecture for on-line shopping protecting users' privacy. Introduction. Online shopping is becoming more and more interesting for customers because of the ease of use and the large choice of products. A vast amount of sensitive information is transferred during such online payment transactions what involves privacy(More)
The emergence of the NFC (Near Field Communication) technology brings new capacities to the next generation of smartphones, but also new security and privacy challenges. Indeed through its contactless interactions with external entities, the smartphone of an individual will become an essential authentication tool for service providers such as transport(More)