default search action
BibTeX records: Marion Videau
@article{DBLP:journals/lmsjcm/GaudryGV16, author = {Pierrick Gaudry and Laurent Gr{\'{e}}my and Marion Videau}, title = {Collecting relations for the number field sieve in}, journal = {{LMS} J. Comput. Math.}, volume = {19}, number = {A}, pages = {332--350}, year = {2016}, url = {https://doi.org/10.1112/s1461157016000164}, doi = {10.1112/S1461157016000164}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/lmsjcm/GaudryGV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EyrollesGV16, author = {Ninon Eyrolles and Louis Goubin and Marion Videau}, editor = {Brecht Wyseur and Bjorn De Sutter}, title = {Defeating MBA-based Obfuscation}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Software PROtection, SPRO@CCS 2016, Vienna, Austria, October 24-28, 2016}, pages = {27--38}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2995306.2995308}, doi = {10.1145/2995306.2995308}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/EyrollesGV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaudryGV16, author = {Pierrick Gaudry and Laurent Gr{\'{e}}my and Marion Videau}, title = {Collecting relations for the Number Field Sieve in GF(p\({}^{\mbox{6)}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {124}, year = {2016}, url = {http://eprint.iacr.org/2016/124}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaudryGV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BarbulescuBDGJTVZ14, author = {Razvan Barbulescu and Cyril Bouvier and J{\'{e}}r{\'{e}}mie Detrey and Pierrick Gaudry and Hamza Jeljeli and Emmanuel Thom{\'{e}} and Marion Videau and Paul Zimmermann}, editor = {Hugo Krawczyk}, title = {Discrete Logarithm in {GF(2809)} with {FFS}}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {221--238}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_13}, doi = {10.1007/978-3-642-54631-0\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BarbulescuBDGJTVZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arith/DetreyGV13, author = {J{\'{e}}r{\'{e}}mie Detrey and Pierrick Gaudry and Marion Videau}, editor = {Alberto Nannarelli and Peter{-}Michael Seidel and Ping Tak Peter Tang}, title = {Relation Collection for the Function Field Sieve}, booktitle = {21st {IEEE} Symposium on Computer Arithmetic, {ARITH} 2013, Austin, TX, USA, April 7-10, 2013}, pages = {201--210}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ARITH.2013.28}, doi = {10.1109/ARITH.2013.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/arith/DetreyGV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DetreyGV13, author = {J{\'{e}}r{\'{e}}mie Detrey and Pierrick Gaudry and Marion Videau}, title = {Relation collection for the Function Field Sieve}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {71}, year = {2013}, url = {http://eprint.iacr.org/2013/071}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DetreyGV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarbulescuBDGJTVZ13, author = {Razvan Barbulescu and Cyril Bouvier and J{\'{e}}r{\'{e}}mie Detrey and Pierrick Gaudry and Hamza Jeljeli and Emmanuel Thom{\'{e}} and Marion Videau and Paul Zimmermann}, title = {Discrete logarithm in GF(2\({}^{\mbox{809}}\)) with {FFS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {197}, year = {2013}, url = {http://eprint.iacr.org/2013/197}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarbulescuBDGJTVZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LacharmeRSV12, author = {Patrick Lacharme and Andrea R{\"{o}}ck and Vincent Strubel and Marion Videau}, title = {The Linux Pseudorandom Number Generator Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {251}, year = {2012}, url = {http://eprint.iacr.org/2012/251}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LacharmeRSV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanteautFNPRV12, author = {Anne Canteaut and Thomas Fuhr and Mar{\'{\i}}a Naya{-}Plasencia and Pascal Paillier and Jean{-}Ren{\'{e}} Reinhard and Marion Videau}, title = {A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {363}, year = {2012}, url = {http://eprint.iacr.org/2012/363}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanteautFNPRV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbdelraheemBNVZ11, author = {Mohamed Ahmed Abdelraheem and C{\'{e}}line Blondeau and Mar{\'{\i}}a Naya{-}Plasencia and Marion Videau and Erik Zenner}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {Cryptanalysis of {ARMADILLO2}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {308--326}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_17}, doi = {10.1007/978-3-642-25385-0\_17}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbdelraheemBNVZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/FuhrGRV11, author = {Thomas Fuhr and Henri Gilbert and Jean{-}Ren{\'{e}} Reinhard and Marion Videau}, editor = {Ali Miri and Serge Vaudenay}, title = {Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3}, booktitle = {Selected Areas in Cryptography - 18th International Workshop, {SAC} 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7118}, pages = {230--242}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-28496-0\_14}, doi = {10.1007/978-3-642-28496-0\_14}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/FuhrGRV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Videau11, author = {Marion Videau}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Cube Attack}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {289--290}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_342}, doi = {10.1007/978-1-4419-5906-5\_342}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Videau11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Videau11a, author = {Marion Videau}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Distinguishing Attacks}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {358--359}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_345}, doi = {10.1007/978-1-4419-5906-5\_345}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Videau11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Videau11b, author = {Marion Videau}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {eSTREAM}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {426--427}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_347}, doi = {10.1007/978-1-4419-5906-5\_347}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Videau11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdelraheemBNVZ11, author = {Mohamed Ahmed Abdelraheem and C{\'{e}}line Blondeau and Mar{\'{\i}}a Naya{-}Plasencia and Marion Videau and Erik Zenner}, title = {Cryptanalysis of {ARMADILLO2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {160}, year = {2011}, url = {http://eprint.iacr.org/2011/160}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdelraheemBNVZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuhrGRV10, author = {Thomas Fuhr and Henri Gilbert and Jean{-}Ren{\'{e}} Reinhard and Marion Videau}, title = {A Forgery Attack on the Candidate {LTE} Integrity Algorithm 128-EIA3}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {618}, year = {2010}, url = {http://eprint.iacr.org/2010/618}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuhrGRV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BressonCCCFGIMNPPRTV09, author = {Emmanuel Bresson and Anne Canteaut and Beno{\^{\i}}t Chevallier{-}Mames and Christophe Clavier and Thomas Fuhr and Aline Gouget and Thomas Icart and Jean{-}Fran{\c{c}}ois Misarsky and Mar{\'{\i}}a Naya{-}Plasencia and Pascal Paillier and Thomas Pornin and Jean{-}Ren{\'{e}} Reinhard and C{\'{e}}line Thuillet and Marion Videau}, title = {Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {199}, year = {2009}, url = {http://eprint.iacr.org/2009/199}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BressonCCCFGIMNPPRTV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/LauradouxV08, author = {C{\'{e}}dric Lauradoux and Marion Videau}, editor = {Frank R. Kschischang and En{-}Hui Yang}, title = {Matriochka symmetric Boolean functions}, booktitle = {2008 {IEEE} International Symposium on Information Theory, {ISIT} 2008, Toronto, ON, Canada, July 6-11, 2008}, pages = {1631--1635}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISIT.2008.4595264}, doi = {10.1109/ISIT.2008.4595264}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/LauradouxV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Videau05, author = {Marion Videau}, title = {Crit{\`{e}}res de s{\'{e}}curit{\'{e}} des algorithmes de chiffrement {\`{a}} cl{\'{e}} secr{\`{e}}te. (Security criteria of secret key ciphers)}, school = {Pierre and Marie Curie University, Paris, France}, year = {2005}, url = {https://tel.archives-ouvertes.fr/tel-00011927}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Videau05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CanteautV05, author = {Anne Canteaut and Marion Videau}, title = {Symmetric Boolean functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {51}, number = {8}, pages = {2791--2811}, year = {2005}, url = {https://doi.org/10.1109/TIT.2005.851743}, doi = {10.1109/TIT.2005.851743}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CanteautV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/Videau04, author = {Marion Videau}, title = {On some properties of symmetric Boolean functions}, booktitle = {Proceedings of the 2004 {IEEE} International Symposium on Information Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois, USA, June 27 - July 2, 2004}, pages = {500}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ISIT.2004.1365536}, doi = {10.1109/ISIT.2004.1365536}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/Videau04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CanteautV02, author = {Anne Canteaut and Marion Videau}, editor = {Lars R. Knudsen}, title = {Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {518--533}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_34}, doi = {10.1007/3-540-46035-7\_34}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CanteautV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.