Christophe Doche

Associate Professor

  • 411 Citations
  • 8 h-Index
20002021
If you made any changes in Pure these will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 1 Similar Profiles
Scalar multiplication Mathematics
Cryptography Engineering & Materials Science
Elliptic Curves Mathematics
Numbering systems Engineering & Materials Science
Polynomial Mathematics
Curve Mathematics
Finite Field Arithmetic Mathematics
Polynomials Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 2006 2021

Research Output 2000 2014

A strong lightweight authentication protocol for low-cost RFID systems

Shi, Z., Pieprzyk, J., Doche, C., Xia, Y., Zhang, Y. & Dai, J., 2014, In : International Journal of Security and its Applications. 8, 6, p. 225-234 10 p.

Research output: Contribution to journalArticleResearchpeer-review

Radio frequency identification (RFID)
Authentication
Costs
Hash functions

Faster repeated doublings on binary elliptic curves

Doche, C. & Sutantyo, D., 2014, Selected Areas in Cryptography, SAC 2013 - 20th International Conference, Revised Selected Papers. Lange, T., Lauter, K. & Lisoněk, P. (eds.). Heidelberg: Springer, Springer Nature, Vol. 8282 LNCS. p. 456-470 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8282 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Doubling
Elliptic Curves
Binary
P-point
Bandwidth

New and improved methods to analyze and compute double-scalar multiplications

Doche, C. & Sutantyo, D., Jan 2014, In : IEEE Transactions on Computers. 63, 1, p. 230-242 13 p., 6256663.

Research output: Contribution to journalArticleResearchpeer-review

Numbering systems
Scalar multiplication
Ternary
Number system
Binary

On the enumeration of double-base chains with applications to elliptic curve cryptography

Doche, C., Dec 2014, Advances in Cryptology - ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I. Sarkar, P. & Iwata, T. (eds.). Berlin; New York: Springer, Springer Nature, p. 297-316 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8873).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cryptography
Elliptic Curves
Enumeration
Numbering systems
Scalar multiplication

Algorithms

Doche, C., 1 Jan 2013, Handbook of finite fields. Mullen, G. L. & Panario, D. (eds.). CRC Press, Taylor & Francis Group, p. 345-404 60 p. (Discrete mathematics and its applications).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Multiplication
Maple
Mathematica
Software Tools
Polynomials