scispace - formally typeset
B

Benoit Chevallier-Mames

Researcher at Apple Inc.

Publications -  76
Citations -  1470

Benoit Chevallier-Mames is an academic researcher from Apple Inc.. The author has contributed to research in topics: Cryptography & Hash chain. The author has an hindex of 18, co-authored 73 publications receiving 1433 citations. Previous affiliations of Benoit Chevallier-Mames include Gemalto.

Papers
More filters
Journal ArticleDOI

Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity

TL;DR: In this article, the authors introduce simple methods to convert a cryptographic algorithm into an algorithm protected against simple side-channel attacks, which are not at the expense of the execution time.
Posted Content

Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity.

TL;DR: This work presents several novel exponentiation algorithms, namely, a protected square-and-multiply algorithm, its right-to-left counterpart, and several protected sliding-window algorithms, which share the common feature that the complexity is globally unchanged compared to the corresponding unprotected implementations.
Book ChapterDOI

Secure delegation of elliptic-curve pairing

TL;DR: In this paper, a simple protocol for secure delegation of the elliptic-curve pairing is described, where a computationally limited device (typically a smart-card) will delegate the computation of the pairing e(A,B) to a more powerful device (for example a PC), in such a way that the powerful device learns nothing about the points A and B, and can detect when the limited device is cheating.

On Some Incompatible Properties of Voting Schemes

TL;DR: In this article, it was shown that a voting system that wants to publish the final list of the voters who actually voted, and to compute the number of times each candidate has been chosen, cannot achieve universal verifiability of the computation of the tally, unconditional privacy/anonymity of the votes, and on the receipt-freeness properties, for the most classical election processes.
Book ChapterDOI

An efficient CDH-based signature scheme with a tight security reduction

TL;DR: Goh and Jarecki as discussed by the authors proposed a new signature scheme that also has a tight security reduction to CDH but whose resulting signatures are smaller than EDL signatures, and similarly to Schnorr signature scheme (but contrary to EDL), their signature is naturally efficient on-line: no additional trick is needed for the off-line phase and the verification process is unchanged.