BibTeX records: Marion Videau

download as .bib file

@article{DBLP:journals/lmsjcm/GaudryGV16,
  author       = {Pierrick Gaudry and
                  Laurent Gr{\'{e}}my and
                  Marion Videau},
  title        = {Collecting relations for the number field sieve in},
  journal      = {{LMS} J. Comput. Math.},
  volume       = {19},
  number       = {A},
  pages        = {332--350},
  year         = {2016},
  url          = {https://doi.org/10.1112/s1461157016000164},
  doi          = {10.1112/S1461157016000164},
  timestamp    = {Thu, 21 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/lmsjcm/GaudryGV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EyrollesGV16,
  author       = {Ninon Eyrolles and
                  Louis Goubin and
                  Marion Videau},
  editor       = {Brecht Wyseur and
                  Bjorn De Sutter},
  title        = {Defeating MBA-based Obfuscation},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Software PROtection, SPRO@CCS
                  2016, Vienna, Austria, October 24-28, 2016},
  pages        = {27--38},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995306.2995308},
  doi          = {10.1145/2995306.2995308},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/EyrollesGV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaudryGV16,
  author       = {Pierrick Gaudry and
                  Laurent Gr{\'{e}}my and
                  Marion Videau},
  title        = {Collecting relations for the Number Field Sieve in GF(p\({}^{\mbox{6)}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {124},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/124},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaudryGV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BarbulescuBDGJTVZ14,
  author       = {Razvan Barbulescu and
                  Cyril Bouvier and
                  J{\'{e}}r{\'{e}}mie Detrey and
                  Pierrick Gaudry and
                  Hamza Jeljeli and
                  Emmanuel Thom{\'{e}} and
                  Marion Videau and
                  Paul Zimmermann},
  editor       = {Hugo Krawczyk},
  title        = {Discrete Logarithm in {GF(2809)} with {FFS}},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {221--238},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_13},
  doi          = {10.1007/978-3-642-54631-0\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BarbulescuBDGJTVZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arith/DetreyGV13,
  author       = {J{\'{e}}r{\'{e}}mie Detrey and
                  Pierrick Gaudry and
                  Marion Videau},
  editor       = {Alberto Nannarelli and
                  Peter{-}Michael Seidel and
                  Ping Tak Peter Tang},
  title        = {Relation Collection for the Function Field Sieve},
  booktitle    = {21st {IEEE} Symposium on Computer Arithmetic, {ARITH} 2013, Austin,
                  TX, USA, April 7-10, 2013},
  pages        = {201--210},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ARITH.2013.28},
  doi          = {10.1109/ARITH.2013.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/arith/DetreyGV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DetreyGV13,
  author       = {J{\'{e}}r{\'{e}}mie Detrey and
                  Pierrick Gaudry and
                  Marion Videau},
  title        = {Relation collection for the Function Field Sieve},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {71},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/071},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DetreyGV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarbulescuBDGJTVZ13,
  author       = {Razvan Barbulescu and
                  Cyril Bouvier and
                  J{\'{e}}r{\'{e}}mie Detrey and
                  Pierrick Gaudry and
                  Hamza Jeljeli and
                  Emmanuel Thom{\'{e}} and
                  Marion Videau and
                  Paul Zimmermann},
  title        = {Discrete logarithm in GF(2\({}^{\mbox{809}}\)) with {FFS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {197},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/197},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarbulescuBDGJTVZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LacharmeRSV12,
  author       = {Patrick Lacharme and
                  Andrea R{\"{o}}ck and
                  Vincent Strubel and
                  Marion Videau},
  title        = {The Linux Pseudorandom Number Generator Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {251},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/251},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LacharmeRSV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautFNPRV12,
  author       = {Anne Canteaut and
                  Thomas Fuhr and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Pascal Paillier and
                  Jean{-}Ren{\'{e}} Reinhard and
                  Marion Videau},
  title        = {A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based
                  Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/363},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanteautFNPRV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbdelraheemBNVZ11,
  author       = {Mohamed Ahmed Abdelraheem and
                  C{\'{e}}line Blondeau and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Marion Videau and
                  Erik Zenner},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {Cryptanalysis of {ARMADILLO2}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {308--326},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_17},
  doi          = {10.1007/978-3-642-25385-0\_17},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbdelraheemBNVZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/FuhrGRV11,
  author       = {Thomas Fuhr and
                  Henri Gilbert and
                  Jean{-}Ren{\'{e}} Reinhard and
                  Marion Videau},
  editor       = {Ali Miri and
                  Serge Vaudenay},
  title        = {Analysis of the Initial and Modified Versions of the Candidate 3GPP
                  Integrity Algorithm 128-EIA3},
  booktitle    = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
                  2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7118},
  pages        = {230--242},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-28496-0\_14},
  doi          = {10.1007/978-3-642-28496-0\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/FuhrGRV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Videau11,
  author       = {Marion Videau},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Cube Attack},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {289--290},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_342},
  doi          = {10.1007/978-1-4419-5906-5\_342},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Videau11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Videau11a,
  author       = {Marion Videau},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Distinguishing Attacks},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {358--359},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_345},
  doi          = {10.1007/978-1-4419-5906-5\_345},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Videau11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Videau11b,
  author       = {Marion Videau},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {eSTREAM},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {426--427},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_347},
  doi          = {10.1007/978-1-4419-5906-5\_347},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Videau11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdelraheemBNVZ11,
  author       = {Mohamed Ahmed Abdelraheem and
                  C{\'{e}}line Blondeau and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Marion Videau and
                  Erik Zenner},
  title        = {Cryptanalysis of {ARMADILLO2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {160},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/160},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdelraheemBNVZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuhrGRV10,
  author       = {Thomas Fuhr and
                  Henri Gilbert and
                  Jean{-}Ren{\'{e}} Reinhard and
                  Marion Videau},
  title        = {A Forgery Attack on the Candidate {LTE} Integrity Algorithm 128-EIA3},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {618},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/618},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuhrGRV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BressonCCCFGIMNPPRTV09,
  author       = {Emmanuel Bresson and
                  Anne Canteaut and
                  Beno{\^{\i}}t Chevallier{-}Mames and
                  Christophe Clavier and
                  Thomas Fuhr and
                  Aline Gouget and
                  Thomas Icart and
                  Jean{-}Fran{\c{c}}ois Misarsky and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Pascal Paillier and
                  Thomas Pornin and
                  Jean{-}Ren{\'{e}} Reinhard and
                  C{\'{e}}line Thuillet and
                  Marion Videau},
  title        = {Indifferentiability with Distinguishers: Why Shabal Does Not Require
                  Ideal Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {199},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/199},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BressonCCCFGIMNPPRTV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/LauradouxV08,
  author       = {C{\'{e}}dric Lauradoux and
                  Marion Videau},
  editor       = {Frank R. Kschischang and
                  En{-}Hui Yang},
  title        = {Matriochka symmetric Boolean functions},
  booktitle    = {2008 {IEEE} International Symposium on Information Theory, {ISIT}
                  2008, Toronto, ON, Canada, July 6-11, 2008},
  pages        = {1631--1635},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISIT.2008.4595264},
  doi          = {10.1109/ISIT.2008.4595264},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/LauradouxV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Videau05,
  author       = {Marion Videau},
  title        = {Crit{\`{e}}res de s{\'{e}}curit{\'{e}} des algorithmes de
                  chiffrement {\`{a}} cl{\'{e}} secr{\`{e}}te. (Security criteria
                  of secret key ciphers)},
  school       = {Pierre and Marie Curie University, Paris, France},
  year         = {2005},
  url          = {https://tel.archives-ouvertes.fr/tel-00011927},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Videau05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CanteautV05,
  author       = {Anne Canteaut and
                  Marion Videau},
  title        = {Symmetric Boolean functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {51},
  number       = {8},
  pages        = {2791--2811},
  year         = {2005},
  url          = {https://doi.org/10.1109/TIT.2005.851743},
  doi          = {10.1109/TIT.2005.851743},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/CanteautV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/Videau04,
  author       = {Marion Videau},
  title        = {On some properties of symmetric Boolean functions},
  booktitle    = {Proceedings of the 2004 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois,
                  USA, June 27 - July 2, 2004},
  pages        = {500},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ISIT.2004.1365536},
  doi          = {10.1109/ISIT.2004.1365536},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/Videau04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CanteautV02,
  author       = {Anne Canteaut and
                  Marion Videau},
  editor       = {Lars R. Knudsen},
  title        = {Degree of Composition of Highly Nonlinear Functions and Applications
                  to Higher Order Differential Cryptanalysis},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {518--533},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_34},
  doi          = {10.1007/3-540-46035-7\_34},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CanteautV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}