Christophe Doche

Associate Professor

  • 422 Citations
  • 8 h-Index
20002021
If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Christophe Doche is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 1 Similar Profiles
Cryptography Engineering & Materials Science
Scalar multiplication Mathematics
Elliptic Curves Mathematics
Numbering systems Engineering & Materials Science
Polynomial Mathematics
Curve Mathematics
Finite Field Arithmetic Mathematics
Polynomials Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 2006 2021

Research Outputs 2000 2019

Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem

Sheikhi-Garjan, M., Bahramian, M. & Doche, C., 1 May 2019, In : IET Information Security. 13, 3, p. 278-284 7 p.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
Hardness
Network protocols
Communication

A strong lightweight authentication protocol for low-cost RFID systems

Shi, Z., Pieprzyk, J., Doche, C., Xia, Y., Zhang, Y. & Dai, J., 2014, In : International Journal of Security and its Applications. 8, 6, p. 225-234 10 p.

Research output: Contribution to journalArticleResearchpeer-review

Radio frequency identification (RFID)
Authentication
Costs
Hash functions

Faster repeated doublings on binary elliptic curves

Doche, C. & Sutantyo, D., 2014, Selected Areas in Cryptography, SAC 2013 - 20th International Conference, Revised Selected Papers. Lange, T., Lauter, K. & Lisoněk, P. (eds.). Heidelberg: Springer, Springer Nature, Vol. 8282 LNCS. p. 456-470 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8282 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Doubling
Elliptic Curves
Binary
P-point
Bandwidth

New and improved methods to analyze and compute double-scalar multiplications

Doche, C. & Sutantyo, D., Jan 2014, In : IEEE Transactions on Computers. 63, 1, p. 230-242 13 p., 6256663.

Research output: Contribution to journalArticleResearchpeer-review

Numbering systems
Scalar multiplication
Ternary
Number system
Binary

On the enumeration of double-base chains with applications to elliptic curve cryptography

Doche, C., Dec 2014, Advances in Cryptology - ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I. Sarkar, P. & Iwata, T. (eds.). Berlin; New York: Springer, Springer Nature, p. 297-316 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8873).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Cryptography
Elliptic Curves
Enumeration
Numbering systems
Scalar multiplication