Projects per year
Fingerprint Dive into the research topics where Christophe Doche is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
Network
Recent external collaboration on country level. Dive into details by clicking on the dots.
Projects 2006 2021
AntiPort - Educating the Public on the risks and prevention of Mobile Number Porting Scams
Trueck, S., Selby, J., Doche, C. & Boyd, M.
1/02/19 → 31/12/20
Project: Research
Privacy-Preserving Online User Matching
Doche, C., Yi, X., Khalil, I. & Bertino, E.
8/03/18 → 7/03/21
Project: Research
Optus Macquarie University Cyber Security Hub
Doche, C., Alazab, M., Hitchens, M., Johnson, M., Leung, P., McIver, A., Schreer, B., Selvadurai, R., Sheng, Q., Shevchenko, P., Tran, H., Trueck, S., Wiggins, M., Worner, J. & Yang, J.
2/12/16 → …
Project: Research
Linear recurrence sequences over function fields and their applications in cryptography
Doche, C. & Sha, M.
27/06/16 → …
Project: Research
Research Outputs 2000 2019
Low-cost, low-power FPGA implementation of ED25519 and CURVE25519 point multiplication
Mehrabi, M. A. & Doche, C., Sep 2019, In : Information (Switzerland). 10, 9, 16 p., 285.Research output: Contribution to journal › Article › Research › peer-review
Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem
Sheikhi-Garjan, M., Bahramian, M. & Doche, C., 1 May 2019, In : IET Information Security. 13, 3, p. 278-284 7 p.Research output: Contribution to journal › Article › Research › peer-review
A strong lightweight authentication protocol for low-cost RFID systems
Shi, Z., Pieprzyk, J., Doche, C., Xia, Y., Zhang, Y. & Dai, J., 2014, In : International Journal of Security and its Applications. 8, 6, p. 225-234 10 p.Research output: Contribution to journal › Article › Research › peer-review
Faster repeated doublings on binary elliptic curves
Doche, C. & Sutantyo, D., 2014, Selected Areas in Cryptography, SAC 2013 - 20th International Conference, Revised Selected Papers. Lange, T., Lauter, K. & Lisoněk, P. (eds.). Heidelberg: Springer, Springer Nature, Vol. 8282 LNCS. p. 456-470 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8282 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference proceeding contribution › Research › peer-review
New and improved methods to analyze and compute double-scalar multiplications
Doche, C. & Sutantyo, D., Jan 2014, In : IEEE Transactions on Computers. 63, 1, p. 230-242 13 p., 6256663.Research output: Contribution to journal › Article › Research › peer-review
Press / Media
Australian Government Missed the Point with New Encryption Bill
15/05/19
1 media contribution
Press/Media: Expert Comment