BibTeX records: David Gerault

download as .bib file

@inproceedings{DBLP:conf/icete/BoureanuGL19,
  author    = {Ioana Boureanu and
               David Gerault and
               James Lewis},
  title     = {Here and There at Once, with my Mobile Phone!},
  booktitle = {Proceedings of the 16th International Joint Conference on e-Business
               and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague,
               Czech Republic, July 26-28, 2019.},
  pages     = {478--484},
  year      = {2019},
  crossref  = {DBLP:conf/icete/2019-2},
  url       = {https://doi.org/10.5220/0007953004780484},
  doi       = {10.5220/0007953004780484},
  timestamp = {Wed, 18 Sep 2019 16:23:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icete/BoureanuGL19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/GeraultB19,
  author    = {David Gerault and
               Ioana Boureanu},
  title     = {Distance bounding under different assumptions: opinion},
  booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless
               and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019.},
  pages     = {245--248},
  year      = {2019},
  crossref  = {DBLP:conf/wisec/2019},
  url       = {https://doi.org/10.1145/3317549.3319729},
  doi       = {10.1145/3317549.3319729},
  timestamp = {Tue, 21 May 2019 10:54:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/GeraultB19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/GeraultLMS18,
  author    = {David G{\'{e}}rault and
               Pascal Lafourcade and
               Marine Minier and
               Christine Solnon},
  title     = {Revisiting {AES} related-key differential attacks with constraint
               programming},
  journal   = {Inf. Process. Lett.},
  volume    = {139},
  pages     = {24--29},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.ipl.2018.07.001},
  doi       = {10.1016/j.ipl.2018.07.001},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ipl/GeraultLMS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoureanuGL18a,
  author    = {Ioana Boureanu and
               David Gerault and
               Pascal Lafourcade},
  title     = {Implementation-Level Corruptions in Distance Bounding - Exhibiting
               Faults and Provably-Secure Fixes in the Electronic Payment Protocol
               PayPass -},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {1243},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/1243},
  timestamp = {Thu, 17 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BoureanuGL18a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SunGLYTQH17,
  author    = {Siwei Sun and
               David Gerault and
               Pascal Lafourcade and
               Qianqian Yang and
               Yosuke Todo and
               Kexin Qiao and
               Lei Hu},
  title     = {Analysis of AES, SKINNY, and Others with Constraint Programming},
  journal   = {{IACR} Trans. Symmetric Cryptol.},
  volume    = {2017},
  number    = {1},
  pages     = {281--306},
  year      = {2017},
  url       = {https://doi.org/10.13154/tosc.v2017.i1.281-306},
  doi       = {10.13154/tosc.v2017.i1.281-306},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tosc/SunGLYTQH17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AvoineBGG0OR17,
  author    = {Gildas Avoine and
               Xavier Bultel and
               S{\'{e}}bastien Gambs and
               David G{\'{e}}rault and
               Pascal Lafourcade and
               Cristina Onete and
               Jean{-}Marc Robert},
  title     = {A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding
               Protocol},
  booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
               Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
               2017},
  pages     = {800--814},
  year      = {2017},
  crossref  = {DBLP:conf/ccs/2017asia},
  url       = {https://doi.org/10.1145/3052973.3053000},
  doi       = {10.1145/3052973.3053000},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/AvoineBGG0OR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/GeraultMS17,
  author    = {David Gerault and
               Marine Minier and
               Christine Solnon},
  title     = {Using Constraint Programming to solve a Cryptanalytic Problem},
  booktitle = {Proceedings of the Twenty-Sixth International Joint Conference on
               Artificial Intelligence, {IJCAI} 2017, Melbourne, Australia, August
               19-25, 2017},
  pages     = {4844--4848},
  year      = {2017},
  crossref  = {DBLP:conf/ijcai/2017},
  url       = {https://doi.org/10.24963/ijcai.2017/679},
  doi       = {10.24963/ijcai.2017/679},
  timestamp = {Tue, 20 Aug 2019 16:16:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ijcai/GeraultMS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/BultelDGGG017,
  author    = {Xavier Bultel and
               Manik Lal Das and
               Hardik Gajera and
               David G{\'{e}}rault and
               Matthieu Giraud and
               Pascal Lafourcade},
  title     = {Verifiable Private Polynomial Evaluation},
  booktitle = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
               China, October 23-25, 2017, Proceedings},
  pages     = {487--506},
  year      = {2017},
  crossref  = {DBLP:conf/provsec/2017},
  url       = {https://doi.org/10.1007/978-3-319-68637-0\_29},
  doi       = {10.1007/978-3-319-68637-0\_29},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/BultelDGGG017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BoureanuG0O17,
  author    = {Ioana Boureanu and
               David Gerault and
               Pascal Lafourcade and
               Cristina Onete},
  title     = {Breaking and fixing the {HB+DB} protocol},
  booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
               Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
               2017},
  pages     = {241--246},
  year      = {2017},
  crossref  = {DBLP:conf/wisec/2017},
  url       = {https://doi.org/10.1145/3098243.3098263},
  doi       = {10.1145/3098243.3098263},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/BoureanuG0O17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeraultLMS17,
  author    = {David G{\'{e}}rault and
               Pascal Lafourcade and
               Marine Minier and
               Christine Solnon},
  title     = {Revisiting {AES} Related-Key Differential Attacks with Constraint
               Programming},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {139},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/139},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GeraultLMS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunGLYTQH17,
  author    = {Siwei Sun and
               David Gerault and
               Pascal Lafourcade and
               Qianqian Yang and
               Yosuke Todo and
               Kexin Qiao and
               Lei Hu},
  title     = {Analysis of AES, SKINNY, and Others with Constraint Programming},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {162},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/162},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SunGLYTQH17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvoineBGGLOR17,
  author    = {Gildas Avoine and
               Xavier Bultel and
               S{\'{e}}bastien Gambs and
               David G{\'{e}}rault and
               Pascal Lafourcade and
               Cristina Onete and
               Jean{-}Marc Robert},
  title     = {A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding
               Protocol},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {297},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/297},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AvoineBGGLOR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoureanuG0O17,
  author    = {Ioana Boureanu and
               David Gerault and
               Pascal Lafourcade and
               Cristina Onete},
  title     = {Breaking and Fixing the {HB+DB} protocol},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {416},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/416},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BoureanuG0O17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BultelDGGGL17,
  author    = {Xavier Bultel and
               Manik Lal Das and
               Hardik Gajera and
               David G{\'{e}}rault and
               Matthieu Giraud and
               Pascal Lafourcade},
  title     = {Verifiable Private Polynomial Evaluation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {756},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/756},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BultelDGGGL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cp/GeraultMS16,
  author    = {David Gerault and
               Marine Minier and
               Christine Solnon},
  title     = {Constraint Programming Models for Chosen Key Differential Cryptanalysis},
  booktitle = {Principles and Practice of Constraint Programming - 22nd International
               Conference, {CP} 2016, Toulouse, France, September 5-9, 2016, Proceedings},
  pages     = {584--601},
  year      = {2016},
  crossref  = {DBLP:conf/cp/2016},
  url       = {https://doi.org/10.1007/978-3-319-44953-1\_37},
  doi       = {10.1007/978-3-319-44953-1\_37},
  timestamp = {Tue, 14 May 2019 10:00:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cp/GeraultMS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/GeraultL16,
  author    = {David G{\'{e}}rault and
               Pascal Lafourcade},
  title     = {Related-Key Cryptanalysis of Midori},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2016 - 17th International Conference
               on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings},
  pages     = {287--304},
  year      = {2016},
  crossref  = {DBLP:conf/indocrypt/2016},
  url       = {https://doi.org/10.1007/978-3-319-49890-4\_16},
  doi       = {10.1007/978-3-319-49890-4\_16},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/GeraultL16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BultelGGLOR16,
  author    = {Xavier Bultel and
               S{\'{e}}bastien Gambs and
               David Gerault and
               Pascal Lafourcade and
               Cristina Onete and
               Jean{-}Marc Robert},
  title     = {A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding
               Protocol},
  booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
               in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
               July 18-22, 2016},
  pages     = {121--133},
  year      = {2016},
  crossref  = {DBLP:conf/wisec/2016},
  url       = {https://doi.org/10.1145/2939918.2939919},
  doi       = {10.1145/2939918.2939919},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/BultelGGLOR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/BrelurutGL15,
  author    = {Agn{\`{e}}s Brelurut and
               David Gerault and
               Pascal Lafourcade},
  title     = {Survey of Distance Bounding Protocols and Threats},
  booktitle = {Foundations and Practice of Security - 8th International Symposium,
               {FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised
               Selected Papers},
  pages     = {29--49},
  year      = {2015},
  crossref  = {DBLP:conf/fps/2015},
  url       = {https://doi.org/10.1007/978-3-319-30303-1\_3},
  doi       = {10.1007/978-3-319-30303-1\_3},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fps/BrelurutGL15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icete/2019-2,
  editor    = {Mohammad S. Obaidat and
               Pierangela Samarati},
  title     = {Proceedings of the 16th International Joint Conference on e-Business
               and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague,
               Czech Republic, July 26-28, 2019},
  publisher = {SciTePress},
  year      = {2019},
  isbn      = {978-989-758-378-0},
  timestamp = {Wed, 18 Sep 2019 16:23:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icete/2019-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2019,
  title     = {Proceedings of the 12th Conference on Security and Privacy in Wireless
               and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3317549},
  doi       = {10.1145/3317549},
  isbn      = {978-1-4503-6726-4},
  timestamp = {Tue, 21 May 2019 10:54:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/2019},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017asia,
  editor    = {Ramesh Karri and
               Ozgur Sinanoglu and
               Ahmad{-}Reza Sadeghi and
               Xun Yi},
  title     = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
               Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
               2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3052973},
  doi       = {10.1145/3052973},
  isbn      = {978-1-4503-4944-4},
  timestamp = {Tue, 06 Nov 2018 11:07:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2017asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ijcai/2017,
  editor    = {Carles Sierra},
  title     = {Proceedings of the Twenty-Sixth International Joint Conference on
               Artificial Intelligence, {IJCAI} 2017, Melbourne, Australia, August
               19-25, 2017},
  publisher = {ijcai.org},
  year      = {2017},
  url       = {http://www.ijcai.org/Proceedings/2017/},
  isbn      = {978-0-9992411-0-3},
  timestamp = {Tue, 20 Aug 2019 16:16:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ijcai/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2017,
  editor    = {Tatsuaki Okamoto and
               Yong Yu and
               Man Ho Au and
               Yannan Li},
  title     = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
               China, October 23-25, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10592},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-68637-0},
  doi       = {10.1007/978-3-319-68637-0},
  isbn      = {978-3-319-68636-3},
  timestamp = {Tue, 14 May 2019 10:00:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2017,
  editor    = {Guevara Noubir and
               Mauro Conti and
               Sneha Kumar Kasera},
  title     = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
               Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
               2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3098243},
  doi       = {10.1145/3098243},
  isbn      = {978-1-4503-5084-6},
  timestamp = {Tue, 06 Nov 2018 16:59:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cp/2016,
  editor    = {Michel Rueher},
  title     = {Principles and Practice of Constraint Programming - 22nd International
               Conference, {CP} 2016, Toulouse, France, September 5-9, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9892},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-44953-1},
  doi       = {10.1007/978-3-319-44953-1},
  isbn      = {978-3-319-44952-4},
  timestamp = {Tue, 14 May 2019 10:00:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cp/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2016,
  editor    = {Orr Dunkelman and
               Somitra Kumar Sanadhya},
  title     = {Progress in Cryptology - {INDOCRYPT} 2016 - 17th International Conference
               on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10095},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49890-4},
  doi       = {10.1007/978-3-319-49890-4},
  isbn      = {978-3-319-49889-8},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2016,
  editor    = {Matthias Hollick and
               Panos Papadimitratos and
               William Enck},
  title     = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
               in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
               July 18-22, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2939918},
  doi       = {10.1145/2939918},
  isbn      = {978-1-4503-4270-4},
  timestamp = {Tue, 06 Nov 2018 16:59:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fps/2015,
  editor    = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
               Evangelos Kranakis and
               Guillaume Bonfante},
  title     = {Foundations and Practice of Security - 8th International Symposium,
               {FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9482},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-30303-1},
  doi       = {10.1007/978-3-319-30303-1},
  isbn      = {978-3-319-30302-4},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fps/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics