BibTeX records: David Gerault

download as .bib file

@article{DBLP:journals/iacr/BoureanuGL18,
  author    = {Ioana Boureanu and
               David Gerault and
               Pascal Lafourcade},
  title     = {Fine-Grained and Application-Ready Distance-Bounding Security},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {384},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/384},
  timestamp = {Mon, 04 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BoureanuGL18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SunGLYTQH17,
  author    = {Siwei Sun and
               David Gerault and
               Pascal Lafourcade and
               Qianqian Yang and
               Yosuke Todo and
               Kexin Qiao and
               Lei Hu},
  title     = {Analysis of AES, SKINNY, and Others with Constraint Programming},
  journal   = {{IACR} Trans. Symmetric Cryptol.},
  volume    = {2017},
  number    = {1},
  pages     = {281--306},
  year      = {2017},
  url       = {https://doi.org/10.13154/tosc.v2017.i1.281-306},
  doi       = {10.13154/tosc.v2017.i1.281-306},
  timestamp = {Wed, 06 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tosc/SunGLYTQH17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AvoineBGG0OR17,
  author    = {Gildas Avoine and
               Xavier Bultel and
               S{\'{e}}bastien Gambs and
               David G{\'{e}}rault and
               Pascal Lafourcade and
               Cristina Onete and
               Jean{-}Marc Robert},
  title     = {A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding
               Protocol},
  booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
               Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
               2017},
  pages     = {800--814},
  year      = {2017},
  crossref  = {DBLP:conf/ccs/2017asia},
  url       = {http://doi.acm.org/10.1145/3052973.3053000},
  doi       = {10.1145/3052973.3053000},
  timestamp = {Fri, 24 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/AvoineBGG0OR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/GeraultMS17,
  author    = {David Gerault and
               Marine Minier and
               Christine Solnon},
  title     = {Using Constraint Programming to solve a Cryptanalytic Problem},
  booktitle = {Proceedings of the Twenty-Sixth International Joint Conference on
               Artificial Intelligence, {IJCAI} 2017, Melbourne, Australia, August
               19-25, 2017},
  pages     = {4844--4848},
  year      = {2017},
  crossref  = {DBLP:conf/ijcai/2017},
  url       = {https://doi.org/10.24963/ijcai.2017/679},
  doi       = {10.24963/ijcai.2017/679},
  timestamp = {Wed, 27 Jun 2018 12:24:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ijcai/GeraultMS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/BultelDGGG017,
  author    = {Xavier Bultel and
               Manik Lal Das and
               Hardik Gajera and
               David G{\'{e}}rault and
               Matthieu Giraud and
               Pascal Lafourcade},
  title     = {Verifiable Private Polynomial Evaluation},
  booktitle = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
               China, October 23-25, 2017, Proceedings},
  pages     = {487--506},
  year      = {2017},
  crossref  = {DBLP:conf/provsec/2017},
  url       = {https://doi.org/10.1007/978-3-319-68637-0\_29},
  doi       = {10.1007/978-3-319-68637-0\_29},
  timestamp = {Wed, 18 Oct 2017 20:57:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/BultelDGGG017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BoureanuG0O17,
  author    = {Ioana Boureanu and
               David Gerault and
               Pascal Lafourcade and
               Cristina Onete},
  title     = {Breaking and fixing the {HB+DB} protocol},
  booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
               Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
               2017},
  pages     = {241--246},
  year      = {2017},
  crossref  = {DBLP:conf/wisec/2017},
  url       = {http://doi.acm.org/10.1145/3098243.3098263},
  doi       = {10.1145/3098243.3098263},
  timestamp = {Fri, 14 Jul 2017 13:38:05 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/BoureanuG0O17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeraultLMS17,
  author    = {David G{\'{e}}rault and
               Pascal Lafourcade and
               Marine Minier and
               Christine Solnon},
  title     = {Revisiting {AES} Related-Key Differential Attacks with Constraint
               Programming},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {139},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/139},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GeraultLMS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunGLYTQH17,
  author    = {Siwei Sun and
               David Gerault and
               Pascal Lafourcade and
               Qianqian Yang and
               Yosuke Todo and
               Kexin Qiao and
               Lei Hu},
  title     = {Analysis of AES, SKINNY, and Others with Constraint Programming},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {162},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/162},
  timestamp = {Wed, 06 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SunGLYTQH17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvoineBGGLOR17,
  author    = {Gildas Avoine and
               Xavier Bultel and
               S{\'{e}}bastien Gambs and
               David G{\'{e}}rault and
               Pascal Lafourcade and
               Cristina Onete and
               Jean{-}Marc Robert},
  title     = {A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding
               Protocol},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {297},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/297},
  timestamp = {Fri, 24 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AvoineBGGLOR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoureanuG0O17,
  author    = {Ioana Boureanu and
               David Gerault and
               Pascal Lafourcade and
               Cristina Onete},
  title     = {Breaking and Fixing the {HB+DB} protocol},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {416},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/416},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BoureanuG0O17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BultelDGGGL17,
  author    = {Xavier Bultel and
               Manik Lal Das and
               Hardik Gajera and
               David G{\'{e}}rault and
               Matthieu Giraud and
               Pascal Lafourcade},
  title     = {Verifiable Private Polynomial Evaluation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {756},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/756},
  timestamp = {Mon, 28 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BultelDGGGL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cp/GeraultMS16,
  author    = {David Gerault and
               Marine Minier and
               Christine Solnon},
  title     = {Constraint Programming Models for Chosen Key Differential Cryptanalysis},
  booktitle = {Principles and Practice of Constraint Programming - 22nd International
               Conference, {CP} 2016, Toulouse, France, September 5-9, 2016, Proceedings},
  pages     = {584--601},
  year      = {2016},
  crossref  = {DBLP:conf/cp/2016},
  url       = {https://doi.org/10.1007/978-3-319-44953-1\_37},
  doi       = {10.1007/978-3-319-44953-1\_37},
  timestamp = {Wed, 17 May 2017 14:24:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cp/GeraultMS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/GeraultL16,
  author    = {David G{\'{e}}rault and
               Pascal Lafourcade},
  title     = {Related-Key Cryptanalysis of Midori},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2016 - 17th International Conference
               on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings},
  pages     = {287--304},
  year      = {2016},
  crossref  = {DBLP:conf/indocrypt/2016},
  url       = {https://doi.org/10.1007/978-3-319-49890-4\_16},
  doi       = {10.1007/978-3-319-49890-4\_16},
  timestamp = {Fri, 19 May 2017 01:26:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/GeraultL16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BultelGGLOR16,
  author    = {Xavier Bultel and
               S{\'{e}}bastien Gambs and
               David Gerault and
               Pascal Lafourcade and
               Cristina Onete and
               Jean{-}Marc Robert},
  title     = {A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding
               Protocol},
  booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
               in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
               July 18-22, 2016},
  pages     = {121--133},
  year      = {2016},
  crossref  = {DBLP:conf/wisec/2016},
  url       = {http://doi.acm.org/10.1145/2939918.2939919},
  doi       = {10.1145/2939918.2939919},
  timestamp = {Fri, 24 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/BultelGGLOR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/BrelurutGL15,
  author    = {Agn{\`{e}}s Brelurut and
               David Gerault and
               Pascal Lafourcade},
  title     = {Survey of Distance Bounding Protocols and Threats},
  booktitle = {Foundations and Practice of Security - 8th International Symposium,
               {FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised
               Selected Papers},
  pages     = {29--49},
  year      = {2015},
  crossref  = {DBLP:conf/fps/2015},
  url       = {https://doi.org/10.1007/978-3-319-30303-1\_3},
  doi       = {10.1007/978-3-319-30303-1\_3},
  timestamp = {Wed, 24 May 2017 08:29:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fps/BrelurutGL15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017asia,
  editor    = {Ramesh Karri and
               Ozgur Sinanoglu and
               Ahmad{-}Reza Sadeghi and
               Xun Yi},
  title     = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
               Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
               2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://doi.acm.org/10.1145/3052973},
  doi       = {10.1145/3052973},
  isbn      = {978-1-4503-4944-4},
  timestamp = {Thu, 20 Apr 2017 14:32:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2017asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ijcai/2017,
  editor    = {Carles Sierra},
  title     = {Proceedings of the Twenty-Sixth International Joint Conference on
               Artificial Intelligence, {IJCAI} 2017, Melbourne, Australia, August
               19-25, 2017},
  publisher = {ijcai.org},
  year      = {2017},
  url       = {http://www.ijcai.org/Proceedings/2017/},
  isbn      = {978-0-9992411-0-3},
  timestamp = {Wed, 27 Jun 2018 12:24:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ijcai/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2017,
  editor    = {Tatsuaki Okamoto and
               Yong Yu and
               Man Ho Au and
               Yannan Li},
  title     = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
               China, October 23-25, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10592},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-68637-0},
  doi       = {10.1007/978-3-319-68637-0},
  isbn      = {978-3-319-68636-3},
  timestamp = {Wed, 18 Oct 2017 20:57:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2017,
  editor    = {Guevara Noubir and
               Mauro Conti and
               Sneha Kumar Kasera},
  title     = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
               Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
               2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://doi.acm.org/10.1145/3098243},
  doi       = {10.1145/3098243},
  isbn      = {978-1-4503-5084-6},
  timestamp = {Fri, 14 Jul 2017 13:38:05 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cp/2016,
  editor    = {Michel Rueher},
  title     = {Principles and Practice of Constraint Programming - 22nd International
               Conference, {CP} 2016, Toulouse, France, September 5-9, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9892},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-44953-1},
  doi       = {10.1007/978-3-319-44953-1},
  isbn      = {978-3-319-44952-4},
  timestamp = {Wed, 17 May 2017 14:24:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cp/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2016,
  editor    = {Orr Dunkelman and
               Somitra Kumar Sanadhya},
  title     = {Progress in Cryptology - {INDOCRYPT} 2016 - 17th International Conference
               on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10095},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49890-4},
  doi       = {10.1007/978-3-319-49890-4},
  isbn      = {978-3-319-49889-8},
  timestamp = {Fri, 19 May 2017 01:26:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2016,
  editor    = {Matthias Hollick and
               Panos Papadimitratos and
               William Enck},
  title     = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
               in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
               July 18-22, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://doi.acm.org/10.1145/2939918},
  doi       = {10.1145/2939918},
  isbn      = {978-1-4503-4270-4},
  timestamp = {Mon, 18 Jul 2016 09:34:19 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fps/2015,
  editor    = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
               Evangelos Kranakis and
               Guillaume Bonfante},
  title     = {Foundations and Practice of Security - 8th International Symposium,
               {FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9482},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-30303-1},
  doi       = {10.1007/978-3-319-30303-1},
  isbn      = {978-3-319-30302-4},
  timestamp = {Wed, 24 May 2017 08:29:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fps/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier