A new security model for authenticated key agreement AP Sarr, P Elbaz-Vincent, JC Bajard
Security and Cryptography for Networks: 7th International Conference, SCN …, 2010
89 2010 On poly (ana) logs I P Elbaz-Vincent, H Gangl
Compositio Mathematica 130 (2), 161-214, 2002
70 2002 A secure and efficient authenticated Diffie–Hellman protocol AP Sarr, P Elbaz-Vincent, JC Bajard
Public Key Infrastructures, Services and Applications: 6th European Workshop …, 2010
69 2010 Milnor K-theory of rings, higher Chow groups and applications P Elbaz-Vincent, S Müller-Stach
Inventiones mathematicae 148, 177-206, 2002
50 2002 Quelques calculs de la cohomologie de et de la K -théorie de P Elbaz-Vincent, H Gangl, C Soulé
Comptes rendus. Mathématique 335 (4), 321-324, 2002
49 2002 Perfect forms, K-theory and the cohomology of modular groups P Elbaz-Vincent, H Gangl, C Soulé
Advances in Mathematics 245, 587-624, 2013
48 2013 Defeating opaque predicates statically through machine learning and binary analysis R Tofighi-Shirazi, IM Asavoae, P Elbaz-Vincent, TH Le
Proceedings of the 3rd ACM Workshop on Software Protection, 3-14, 2019
28 2019 Influence of the temperature on true random number generators M Soucarros, C Canovas-Dumas, J Clédière, P Elbaz-Vincent, D Réal
2011 IEEE International Symposium on Hardware-Oriented Security and Trust, 24-27, 2011
28 2011 The indecomposable K3 of rings and homology of SL2 P Elbaz-Vincent
Journal of Pure and Applied Algebra 132 (1), 27-71, 1998
22 1998 Parallel computation of the rank of large sparse matrices from algebraic K-theory JG Dumas, P Elbaz-Vincent, P Giorgi, A Urbanska
Proceedings of the 2007 international workshop on Parallel symbolic …, 2007
20 2007 Finite polylogarithms, their multiple analogues and the Shannon entropy P Elbaz-Vincent, H Gangl
International Conference on Geometric Science of Information, 277-285, 2015
14 2015 Dose: Deobfuscation based on semantic equivalence R Tofighi-Shirazi, M Christofi, P Elbaz-Vincent, TH Le
Proceedings of the 8th Software Security, Protection, and Reverse …, 2018
13 2018 Fault analysis and evaluation of a true random number generator embedded in a processor M Soucarros, J Clédière, C Dumas, P Elbaz-Vincent
Journal of Electronic Testing 29 (3), 367-381, 2013
13 2013 On the security of the (F) HMQV protocol AP Sarr, P Elbaz–Vincent
International Conference on Cryptology in Africa, 207-224, 2016
9 2016 Fine-grained static detection of obfuscation transforms using ensemble-learning and semantic reasoning R Tofighi-Shirazi, IM Asăvoae, P Elbaz-Vincent
Proceedings of the 9th Workshop on Software Security, Protection, and …, 2019
8 2019 Homology of linear groups with coefficients in the adjoint action and K-theory P Elbaz-Vincent
K-Theory 16 (1), 35-50, 1999
8 1999 K3 indécomposable des anneaux et homologie de SL2 P Elbaz-Vincent
These de doctorat, Nice, 1995
8 1995 MPHELL: A fast and robust library with unified and versatile arithmetics for elliptic curves cryptography T Coladon, P Elbaz-Vincent, C Hugounenq
2021 IEEE 28th Symposium on Computer Arithmetic (ARITH), 78-85, 2021
7 2021 VORONOI COMPLEXES IN HIGHER DIMENSIONS, COHOMOLOGY OF FOR AND THE TRIVIALITY OF MD Sikiric, P Elbaz-Vincent, A Kupers, J Martinet
7 2019 A CAS as an assistant to reasoned instrumentation P Elbaz-Vincent
The didactical challenge of symbolic calculators: turning a computational …, 2005
7 2005