A new security model for authenticated key agreement AP Sarr, P Elbaz-Vincent, JC Bajard Security and Cryptography for Networks: 7th International Conference, SCN …, 2010 | 92 | 2010 |
A secure and efficient authenticated Diffie–Hellman protocol AP Sarr, P Elbaz-Vincent, JC Bajard Public Key Infrastructures, Services and Applications: 6th European Workshop …, 2010 | 72 | 2010 |
On poly (ana) logs I P Elbaz-Vincent, H Gangl Compositio Mathematica 130 (2), 161-214, 2002 | 69 | 2002 |
Perfect forms, K-theory and the cohomology of modular groups P Elbaz-Vincent, H Gangl, C Soulé Advances in Mathematics 245, 587-624, 2013 | 51 | 2013 |
Quelques calculs de la cohomologie de et de la K-théorie de P Elbaz-Vincent, H Gangl, C Soulé Comptes rendus. Mathématique 335 (4), 321-324, 2002 | 50 | 2002 |
Milnor K-theory of rings, higher Chow groups and applications P Elbaz-Vincent, S Müller-Stach Inventiones mathematicae 148, 177-206, 2002 | 49 | 2002 |
Defeating opaque predicates statically through machine learning and binary analysis R Tofighi-Shirazi, IM Asavoae, P Elbaz-Vincent, TH Le Proceedings of the 3rd ACM Workshop on Software Protection, 3-14, 2019 | 29 | 2019 |
Influence of the temperature on true random number generators M Soucarros, C Canovas-Dumas, J Clédière, P Elbaz-Vincent, D Réal 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, 24-27, 2011 | 27 | 2011 |
The indecomposable K3 of rings and homology of SL2 P Elbaz-Vincent Journal of Pure and Applied Algebra 132 (1), 27-71, 1998 | 22 | 1998 |
Parallel computation of the rank of large sparse matrices from algebraic K-theory JG Dumas, P Elbaz-Vincent, P Giorgi, A Urbanska Proceedings of the 2007 international workshop on Parallel symbolic …, 2007 | 19 | 2007 |
Dose: Deobfuscation based on semantic equivalence R Tofighi-Shirazi, M Christofi, P Elbaz-Vincent, TH Le Proceedings of the 8th Software Security, Protection, and Reverse …, 2018 | 14 | 2018 |
Finite polylogarithms, their multiple analogues and the Shannon entropy P Elbaz-Vincent, H Gangl International Conference on Geometric Science of Information, 277-285, 2015 | 14 | 2015 |
Fault analysis and evaluation of a true random number generator embedded in a processor M Soucarros, J Clédière, C Dumas, P Elbaz-Vincent Journal of Electronic Testing 29 (3), 367-381, 2013 | 14 | 2013 |
Fine-grained static detection of obfuscation transforms using ensemble-learning and semantic reasoning R Tofighi-Shirazi, IM Asăvoae, P Elbaz-Vincent Proceedings of the 9th Workshop on Software Security, Protection, and …, 2019 | 11 | 2019 |
On the security of the (F) HMQV protocol AP Sarr, P Elbaz–Vincent International Conference on Cryptology in Africa, 207-224, 2016 | 10 | 2016 |
MPHELL: A fast and robust library with unified and versatile arithmetics for elliptic curves cryptography T Coladon, P Elbaz-Vincent, C Hugounenq 2021 IEEE 28th Symposium on Computer Arithmetic (ARITH), 78-85, 2021 | 8 | 2021 |
VORONOI COMPLEXES IN HIGHER DIMENSIONS, COHOMOLOGY OF FOR AND THE TRIVIALITY OF MD Sikiric, P Elbaz-Vincent, A Kupers, J Martinet | 8 | 2019 |
Homology of linear groups with coefficients in the adjoint action and K-theory P Elbaz-Vincent K-Theory 16 (1), 35-50, 1999 | 8 | 1999 |
K3 indécomposable des anneaux et homologie de SL2 P Elbaz-Vincent These de doctorat, Nice, 1995 | 8 | 1995 |
A CAS as an assistant to reasoned instrumentation P Elbaz-Vincent The didactical challenge of symbolic calculators: turning a computational …, 2005 | 7 | 2005 |