Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Marine Minier
@article{DBLP:journals/jmc/RouquetteMS24, author = {Lo{\"{\i}}c Rouquette and Marine Minier and Christine Solnon}, title = {Automatic boomerang attacks search on Rijndael}, journal = {J. Math. Cryptol.}, volume = {18}, number = {1}, year = {2024}, url = {https://doi.org/10.1515/jmc-2023-0027}, doi = {10.1515/JMC-2023-0027}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/RouquetteMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/0001CLMP024, author = {Elena Andreeva and Beno{\^{\i}}t Cogliati and Virginie Lallemand and Marine Minier and Antoon Purnal and Arnab Roy}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Masked Iterate-Fork-Iterate: {A} New Design Paradigm for Tweakable Expanding Pseudorandom Function}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, pages = {433--459}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7\_17}, doi = {10.1007/978-3-031-54773-7\_17}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/0001CLMP024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/FrancqBHGMM22, author = {Julien Francq and Lo{\"{\i}}c Besson and Paul Huynh and Philippe Guillot and Gilles Millerioux and Marine Minier}, title = {Non-Triangular Self-Synchronizing Stream Ciphers}, journal = {{IEEE} Trans. Computers}, volume = {71}, number = {1}, pages = {134--145}, year = {2022}, url = {https://doi.org/10.1109/TC.2020.3043714}, doi = {10.1109/TC.2020.3043714}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/FrancqBHGMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LallemandMR22, author = {Virginie Lallemand and Marine Minier and Lo{\"{\i}}c Rouquette}, title = {Automatic Search of Rectangle Attacks on Feistel Ciphers: Application to {WARP}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {2}, pages = {113--140}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i2.113-140}, doi = {10.46586/TOSC.V2022.I2.113-140}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LallemandMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/BlancLGMS22, author = {Soline Blanc and Abdelkader Lahmadi and K{\'{e}}vin Le Gouguec and Marine Minier and Lama Sleem}, title = {Benchmarking of lightweight cryptographic algorithms for wireless IoT networks}, journal = {Wirel. Networks}, volume = {28}, number = {8}, pages = {3453--3476}, year = {2022}, url = {https://doi.org/10.1007/s11276-022-03046-1}, doi = {10.1007/S11276-022-03046-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/BlancLGMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/RouquetteGMS22, author = {Lo{\"{\i}}c Rouquette and David G{\'{e}}rault and Marine Minier and Christine Solnon}, editor = {Lejla Batina and Joan Daemen}, title = {And Rijndael?: Automatic Related-Key Differential Analysis of Rijndael}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2022: 13th International Conference on Cryptology in Africa, {AFRICACRYPT} 2022, Fes, Morocco, July 18-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13503}, pages = {150--175}, publisher = {Springer Nature Switzerland}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17433-9\_7}, doi = {10.1007/978-3-031-17433-9\_7}, timestamp = {Sun, 10 Dec 2023 00:28:26 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/RouquetteGMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsc2/BoukerrouMMF22, author = {Hamid Boukerrou and Gilles Millerioux and Marine Minier and Mirko Fiacchini}, title = {Construction of dead-beat switched automata: application to cryptography}, booktitle = {10th International Conference on Systems and Control, {ICSC} 2022, Marseille, France, November 23-25, 2022}, pages = {23--30}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICSC57768.2022.9993895}, doi = {10.1109/ICSC57768.2022.9993895}, timestamp = {Wed, 18 Jan 2023 19:02:44 +0100}, biburl = {https://dblp.org/rec/conf/icsc2/BoukerrouMMF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icstcc/BoukerrouMM22, author = {Hamid Boukerrou and Gilles Millerioux and Marine Minier}, editor = {Marian Barbu and Razvan Solea}, title = {Towards a new design of ciphers to secure {CPS:} the role of control theory}, booktitle = {26th International Conference on System Theory, Control and Computing , {ICSTCC} 2022, Sinaia, Romania, October 19-21, 2022}, pages = {13--18}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICSTCC55426.2022.9931873}, doi = {10.1109/ICSTCC55426.2022.9931873}, timestamp = {Thu, 17 Nov 2022 21:19:26 +0100}, biburl = {https://dblp.org/rec/conf/icstcc/BoukerrouMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndreevaCLMPR22, author = {Elena Andreeva and Benoit Cogliati and Virginie Lallemand and Marine Minier and Antoon Purnal and Arnab Roy}, title = {Masked Iterate-Fork-Iterate: {A} new Design Paradigm for Tweakable Expanding Pseudorandom Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1534}, year = {2022}, url = {https://eprint.iacr.org/2022/1534}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AndreevaCLMPR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/CogliatiELL0M21, author = {Beno{\^{\i}}t Cogliati and Jordan Ethan and Virginie Lallemand and ByeongHak Lee and Jooyoung Lee and Marine Minier}, title = {{CTET+:} {A} Beyond-Birthday-Bound Secure Tweakable Enciphering Scheme Using a Single Pseudorandom Permutation}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {4}, pages = {1--35}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i4.1-35}, doi = {10.46586/TOSC.V2021.I4.1-35}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/CogliatiELL0M21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DelauneDHMMP21, author = {St{\'{e}}phanie Delaune and Patrick Derbez and Paul Huynh and Marine Minier and Victor Mollimard and Charles Prud'homme}, editor = {Kazue Sako and Nils Ole Tippenhauer}, title = {Efficient Methods to Search for Best Differential Characteristics on {SKINNY}}, booktitle = {Applied Cryptography and Network Security - 19th International Conference, {ACNS} 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12727}, pages = {184--207}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78375-4\_8}, doi = {10.1007/978-3-030-78375-4\_8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/DelauneDHMMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ai/GeraultLMS20, author = {David G{\'{e}}rault and Pascal Lafourcade and Marine Minier and Christine Solnon}, title = {Computing {AES} related-key differential characteristics with constraint programming}, journal = {Artif. Intell.}, volume = {278}, year = {2020}, url = {https://doi.org/10.1016/j.artint.2019.103183}, doi = {10.1016/J.ARTINT.2019.103183}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ai/GeraultLMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BoukerrouHLMM20, author = {Hamid Boukerrou and Paul Huynh and Virginie Lallemand and Bimal Mandal and Marine Minier}, title = {On the Feistel Counterpart of the Boomerang Connectivity Table Introduction and Analysis of the {FBCT}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {1}, pages = {331--362}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i1.331-362}, doi = {10.13154/TOSC.V2020.I1.331-362}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BoukerrouHLMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/Rasoamiaramanana20, author = {Sandra Rasoamiaramanana and Marine Minier and Gilles Macario{-}Rat}, editor = {Pierangela Samarati and Sabrina De Capitani di Vimercati and Mohammad S. Obaidat and Jalel Ben{-}Othman}, title = {A White-Box Encryption Scheme using Physically Unclonable Functions}, booktitle = {Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020}, pages = {279--286}, publisher = {ScitePress}, year = {2020}, url = {https://doi.org/10.5220/0009781002790286}, doi = {10.5220/0009781002790286}, timestamp = {Wed, 29 Jul 2020 16:57:35 +0200}, biburl = {https://dblp.org/rec/conf/icete/Rasoamiaramanana20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DelauneDHMMP20, author = {St{\'{e}}phanie Delaune and Patrick Derbez and Paul Huynh and Marine Minier and Victor Mollimard and Charles Prud'homme}, title = {{SKINNY} with Scalpel - Comparing Tools for Differential Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1402}, year = {2020}, url = {https://eprint.iacr.org/2020/1402}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DelauneDHMMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SolovevaAJMZ19, author = {Faina I. Solov'eva and Daniel Augot and Thomas Johansson and Marine Minier and Victor A. Zinoviev}, title = {Editorial: Special issue on coding and cryptography}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {183--184}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-00601-w}, doi = {10.1007/S10623-018-00601-W}, timestamp = {Wed, 20 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/SolovevaAJMZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Rasoamiaramanana19, author = {Sandra Rasoamiaramanana and Gilles Macario{-}Rat and Marine Minier}, editor = {Emil Simion and R{\'{e}}mi G{\'{e}}raud{-}Stewart}, title = {White-Box Traitor-Tracing from Tardos Probabilistic Codes}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12001}, pages = {125--141}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41025-4\_9}, doi = {10.1007/978-3-030-41025-4\_9}, timestamp = {Fri, 06 Mar 2020 14:27:55 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Rasoamiaramanana19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/GeraultLMS18, author = {David G{\'{e}}rault and Pascal Lafourcade and Marine Minier and Christine Solnon}, title = {Revisiting {AES} related-key differential attacks with constraint programming}, journal = {Inf. Process. Lett.}, volume = {139}, pages = {24--29}, year = {2018}, url = {https://doi.org/10.1016/j.ipl.2018.07.001}, doi = {10.1016/J.IPL.2018.07.001}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/GeraultLMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Minier17, author = {Marine Minier}, title = {Improving impossible-differential attacks against Rijndael-160 and Rijndael-224}, journal = {Des. Codes Cryptogr.}, volume = {82}, number = {1-2}, pages = {117--129}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0206-7}, doi = {10.1007/S10623-016-0206-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Minier17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/AlagganCM17, author = {Mohammad Alaggan and Mathieu Cunche and Marine Minier}, editor = {Rakesh M. Verma and Bhavani Thuraisingham}, title = {Non-interactive (t, n)-Incidence Counting from Differentially Private Indicator Vectors}, booktitle = {Proceedings of the 3rd {ACM} on International Workshop on Security And Privacy Analytics, IWSPA@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017}, pages = {1--9}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3041008.3041017}, doi = {10.1145/3041008.3041017}, timestamp = {Wed, 29 Jun 2022 15:37:42 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/AlagganCM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/GeraultMS17, author = {David G{\'{e}}rault and Marine Minier and Christine Solnon}, editor = {Carles Sierra}, title = {Using Constraint Programming to solve a Cryptanalytic Problem}, booktitle = {Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, {IJCAI} 2017, Melbourne, Australia, August 19-25, 2017}, pages = {4844--4848}, publisher = {ijcai.org}, year = {2017}, url = {https://doi.org/10.24963/ijcai.2017/679}, doi = {10.24963/IJCAI.2017/679}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/GeraultMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeraultLMS17, author = {David G{\'{e}}rault and Pascal Lafourcade and Marine Minier and Christine Solnon}, title = {Revisiting {AES} Related-Key Differential Attacks with Constraint Programming}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {139}, year = {2017}, url = {http://eprint.iacr.org/2017/139}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeraultLMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/BergerFMT16, author = {Thierry P. Berger and Julien Francq and Marine Minier and Ga{\"{e}}l Thomas}, title = {Extended Generalized Feistel Networks Using Matrix Representation to Propose a New Lightweight Block Cipher: Lilliput}, journal = {{IEEE} Trans. Computers}, volume = {65}, number = {7}, pages = {2074--2089}, year = {2016}, url = {https://doi.org/10.1109/TC.2015.2468218}, doi = {10.1109/TC.2015.2468218}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/BergerFMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cp/GeraultMS16, author = {David G{\'{e}}rault and Marine Minier and Christine Solnon}, editor = {Michel Rueher}, title = {Constraint Programming Models for Chosen Key Differential Cryptanalysis}, booktitle = {Principles and Practice of Constraint Programming - 22nd International Conference, {CP} 2016, Toulouse, France, September 5-9, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9892}, pages = {584--601}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44953-1\_37}, doi = {10.1007/978-3-319-44953-1\_37}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cp/GeraultMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/MinierP16, author = {Marine Minier and Raphael C.{-}W. Phan}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Tuple Cryptanalysis: Slicing and Fusing Multisets}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {294--320}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_15}, doi = {10.1007/978-3-319-61273-7\_15}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/MinierP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/BrunisholzE0QMV15, author = {Pierre Brunisholz and Ochirkhand Erdene{-}Ochir and Mohamed M. Abdallah and Khalid A. Qaraqe and Marine Minier and Fabrice Valois}, title = {Network Coding versus Replication Based Resilient Techniques to Mitigate Insider Attacks for Smart Metering}, journal = {Int. J. Distributed Sens. Networks}, volume = {11}, pages = {737269:1--737269:11}, year = {2015}, url = {https://doi.org/10.1155/2015/737269}, doi = {10.1155/2015/737269}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/BrunisholzE0QMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CazorlaGMM15, author = {Micka{\"{e}}l Cazorla and Sylvain Gourgeon and Kevin Marquet and Marine Minier}, title = {Survey and benchmark of lightweight block ciphers for {MSP430} 16-bit microcontroller}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3564--3579}, year = {2015}, url = {https://doi.org/10.1002/sec.1281}, doi = {10.1002/SEC.1281}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CazorlaGMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c2si/BergerFM15, author = {Thierry P. Berger and Julien Francq and Marine Minier}, editor = {Said El Hajji and Abderrahmane Nitaj and Claude Carlet and El Mamoun Souidi}, title = {{CUBE} Cipher: {A} Family of Quasi-Involutive Block Ciphers Easy to Mask}, booktitle = {Codes, Cryptology, and Information Security - First International Conference, {C2SI} 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger}, series = {Lecture Notes in Computer Science}, volume = {9084}, pages = {89--105}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18681-8\_8}, doi = {10.1007/978-3-319-18681-8\_8}, timestamp = {Tue, 27 Aug 2019 17:49:45 +0200}, biburl = {https://dblp.org/rec/conf/c2si/BergerFM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BlondeauM15, author = {C{\'{e}}line Blondeau and Marine Minier}, editor = {Gregor Leander}, title = {Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix Method}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {92--113}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_5}, doi = {10.1007/978-3-662-48116-5\_5}, timestamp = {Sat, 19 Oct 2019 20:27:47 +0200}, biburl = {https://dblp.org/rec/conf/fse/BlondeauM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BergerM15, author = {Thierry P. Berger and Marine Minier}, editor = {Alex Biryukov and Vipul Goyal}, title = {Some Results Using the Matrix Methods on Impossible, Integral and Zero-Correlation Distinguishers for Feistel-Like Ciphers}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2015 - 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9462}, pages = {180--197}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26617-6\_10}, doi = {10.1007/978-3-319-26617-6\_10}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BergerM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/Erdene-OchirAQM15, author = {Ochirkhand Erdene{-}Ochir and Mohamed M. Abdallah and Khalid A. Qaraqe and Marine Minier and Fabrice Valois}, title = {A theoretical framework of resilience: Biased random walk routing against insider attacks}, booktitle = {2015 {IEEE} Wireless Communications and Networking Conference, {WCNC} 2015, New Orleans, LA, USA, March 9-12, 2015}, pages = {1602--1607}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/WCNC.2015.7127707}, doi = {10.1109/WCNC.2015.7127707}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/Erdene-OchirAQM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlondeauM15, author = {C{\'{e}}line Blondeau and Marine Minier}, title = {Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {141}, year = {2015}, url = {http://eprint.iacr.org/2015/141}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlondeauM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/Erdene-OchirAQM14, author = {Ochirkhand Erdene{-}Ochir and Mohamed M. Abdallah and Khalid A. Qaraqe and Marine Minier and Fabrice Valois}, title = {Routing resilience evaluation for smart metering: Definition, metric and techniques}, booktitle = {25th {IEEE} Annual International Symposium on Personal, Indoor, and Mobile Radio Communication, {PIMRC} 2014, Washington DC, USA, September 2-5, 2014}, pages = {1867--1871}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/PIMRC.2014.7136474}, doi = {10.1109/PIMRC.2014.7136474}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/Erdene-OchirAQM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BrunisholzMV14, author = {Pierre Brunisholz and Marine Minier and Fabrice Valois}, title = {The Gain of Network Coding in Wireless Sensor Networking}, journal = {CoRR}, volume = {abs/1412.2570}, year = {2014}, url = {http://arxiv.org/abs/1412.2570}, eprinttype = {arXiv}, eprint = {1412.2570}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BrunisholzMV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouraMNS14, author = {Christina Boura and Marine Minier and Mar{\'{\i}}a Naya{-}Plasencia and Valentin Suder}, title = {Improved Impossible Differential Attacks against Round-Reduced LBlock}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {279}, year = {2014}, url = {http://eprint.iacr.org/2014/279}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouraMNS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/ZnaidiMU13, author = {Wassim Znaidi and Marine Minier and St{\'{e}}phane Ub{\'{e}}da}, title = {Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {9}, year = {2013}, url = {https://doi.org/10.1155/2013/745069}, doi = {10.1155/2013/745069}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/ZnaidiMU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/ZhangM13, author = {Yuanyuan Zhang and Marine Minier}, title = {How network coding system constrains packet pollution attacks in wireless sensor networks}, journal = {Int. J. Grid Util. Comput.}, volume = {4}, number = {2/3}, pages = {197--203}, year = {2013}, url = {https://doi.org/10.1504/IJGUC.2013.056256}, doi = {10.1504/IJGUC.2013.056256}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijguc/ZhangM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Minier013, author = {Marine Minier and Ga{\"{e}}l Thomas}, editor = {Goutam Paul and Serge Vaudenay}, title = {An Integral Distinguisher on Gr{\o}stl-512 v3}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2013 - 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8250}, pages = {50--59}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03515-4\_4}, doi = {10.1007/978-3-319-03515-4\_4}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Minier013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Minier13, author = {Marine Minier}, editor = {Goutam Paul and Serge Vaudenay}, title = {On the Security of Piccolo Lightweight Block Cipher against Related-Key Impossible Differentials}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2013 - 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8250}, pages = {308--318}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03515-4\_21}, doi = {10.1007/978-3-319-03515-4\_21}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Minier13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/CuncheLMB13, author = {Mathieu Cunche and C{\'{e}}dric Lauradoux and Marine Minier and Roksana Boreli}, title = {Private and resilient data aggregation}, booktitle = {38th Annual {IEEE} Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013}, pages = {759--762}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/LCN.2013.6761329}, doi = {10.1109/LCN.2013.6761329}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/CuncheLMB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BergerM013, author = {Thierry P. Berger and Marine Minier and Ga{\"{e}}l Thomas}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Extended Generalized Feistel Networks Using Matrix Representation}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {289--305}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_15}, doi = {10.1007/978-3-662-43414-7\_15}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BergerM013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CazorlaMM13, author = {Micka{\"{e}}l Cazorla and Kevin Marquet and Marine Minier}, editor = {Pierangela Samarati}, title = {Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {543--548}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223213/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CazorlaMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CazorlaMM13, author = {Micka{\"{e}}l Cazorla and Kevin Marquet and Marine Minier}, title = {Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {295}, year = {2013}, url = {http://eprint.iacr.org/2013/295}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CazorlaMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/hal/Minier12, author = {Marine Minier}, title = {Quelques r{\'{e}}sultats en cryptographie sym{\'{e}}trique, pour les mod{\`{e}}les de confiance dans les r{\'{e}}seaux ambiants et la s{\'{e}}curit{\'{e}} dans les r{\'{e}}seaux de capteurs sans fil. (Some results in symmetric key cryptography, for trust models in ambient networks and security in wireless sensor networks)}, year = {2012}, url = {https://tel.archives-ouvertes.fr/tel-00918938}, timestamp = {Sat, 30 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/hal/Minier12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/ApavatjrutZFGJLM12, author = {Anya Apavatjrut and Wassim Znaidi and Antoine Fraboulet and Claire Goursaud and Katia Jaffr{\`{e}}s{-}Runser and C{\'{e}}dric Lauradoux and Marine Minier}, title = {Energy efficient authentication strategies for network coding}, journal = {Concurr. Comput. Pract. Exp.}, volume = {24}, number = {10}, pages = {1086--1107}, year = {2012}, url = {https://doi.org/10.1002/cpe.1767}, doi = {10.1002/CPE.1767}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/ApavatjrutZFGJLM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MinierPP12, author = {Marine Minier and Raphael C.{-}W. Phan and Benjamin Pousse}, title = {On Integral Distinguishers of Rijndael Family of Ciphers}, journal = {Cryptologia}, volume = {36}, number = {2}, pages = {104--118}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.635110}, doi = {10.1080/01611194.2012.635110}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MinierPP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/Erdene-OchirKMV12, author = {Ochirkhand Erdene{-}Ochir and Apostolos A. Kountouris and Marine Minier and Fabrice Valois}, title = {A New Metric to Quantify Resiliency in Networking}, journal = {{IEEE} Commun. Lett.}, volume = {16}, number = {10}, pages = {1699--1702}, year = {2012}, url = {https://doi.org/10.1109/LCOMM.2012.081612.121191}, doi = {10.1109/LCOMM.2012.081612.121191}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/Erdene-OchirKMV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/MinierN12, author = {Marine Minier and Mar{\'{\i}}a Naya{-}Plasencia}, title = {A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock}, journal = {Inf. Process. Lett.}, volume = {112}, number = {16}, pages = {624--629}, year = {2012}, url = {https://doi.org/10.1016/j.ipl.2012.04.012}, doi = {10.1016/J.IPL.2012.04.012}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/MinierN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcnc/ZhangM12, author = {Yuanyuan Zhang and Marine Minier}, title = {Selective Forwarding Attacks against Data and {ACK} Flows in Network Coding and Countermeasures}, journal = {J. Comput. Networks Commun.}, volume = {2012}, pages = {184783:1--184783:14}, year = {2012}, url = {https://doi.org/10.1155/2012/184783}, doi = {10.1155/2012/184783}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcnc/ZhangM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/ZnaidiM12, author = {Wassim Znaidi and Marine Minier}, title = {Key establishment and management for WSNs}, journal = {Telecommun. Syst.}, volume = {50}, number = {2}, pages = {113--125}, year = {2012}, url = {https://doi.org/10.1007/s11235-010-9391-2}, doi = {10.1007/S11235-010-9391-2}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/ZnaidiM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/BergerDMMT12, author = {Thierry P. Berger and Joffrey D'Hayer and Kevin Marquet and Marine Minier and Ga{\"{e}}l Thomas}, editor = {Aikaterini Mitrokotsa and Serge Vaudenay}, title = {The {GLUON} Family: {A} Lightweight Hash Function Family Based on FCSRs}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7374}, pages = {306--323}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31410-0\_19}, doi = {10.1007/978-3-642-31410-0\_19}, timestamp = {Sun, 02 Jun 2019 21:14:37 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/BergerDMMT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BergerM12, author = {Thierry P. Berger and Marine Minier}, editor = {Steven D. Galbraith and Mridul Nandi}, title = {Cryptanalysis of Pseudo-random Generators Based on Vectorial FCSRs}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7668}, pages = {209--224}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34931-7\_13}, doi = {10.1007/978-3-642-34931-7\_13}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BergerM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/Erdene-OchirMVK12, author = {Ochirkhand Erdene{-}Ochir and Marine Minier and Fabrice Valois and Apostolos A. Kountouris}, title = {Resiliency taxonomy of routing protocols in Wireless Sensor Networks}, booktitle = {37th Annual {IEEE} Conference on Local Computer Networks, Clearwater Beach, FL, USA, October 22-25, 2012}, pages = {324--327}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/LCN.2012.6423640}, doi = {10.1109/LCN.2012.6423640}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/Erdene-OchirMVK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/ArnaultBMP11, author = {Fran{\c{c}}ois Arnault and Thierry P. Berger and Marine Minier and Benjamin Pousse}, title = {Revisiting LFSRs for Cryptographic Applications}, journal = {{IEEE} Trans. Inf. Theory}, volume = {57}, number = {12}, pages = {8095--8113}, year = {2011}, url = {https://doi.org/10.1109/TIT.2011.2164234}, doi = {10.1109/TIT.2011.2164234}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/ArnaultBMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MinierNP11, author = {Marine Minier and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, editor = {Antoine Joux}, title = {Analysis of Reduced-SHAvite-3-256 v2}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {68--87}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_5}, doi = {10.1007/978-3-642-21702-9\_5}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/MinierNP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-4/MinierP11, author = {Marine Minier and Raphael C.{-}W. Phan}, editor = {Jan Camenisch and Dogan Kesdogan}, title = {Energy-Efficient Cryptographic Engineering Paradigm}, booktitle = {Open Problems in Network Security - {IFIP} {WG} 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7039}, pages = {78--88}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27585-2\_7}, doi = {10.1007/978-3-642-27585-2\_7}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-4/MinierP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ZhangZLM11, author = {Yuanyuan Zhang and Wassim Znaidi and C{\'{e}}dric Lauradoux and Marine Minier}, editor = {Pierangela Samarati and Sara Foresti and Jiankun Hu and Giovanni Livraga}, title = {Flooding attacks against network coding and countermeasures}, booktitle = {5th International Conference on Network and System Security, {NSS} 2011, Milan, Italy, September 6-8, 2011}, pages = {305--309}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICNSS.2011.6060020}, doi = {10.1109/ICNSS.2011.6060020}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/nss/ZhangZLM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MinierNP11, author = {Marine Minier and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, title = {Analysis of reduced-SHAvite-3-256 v2}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2011}, url = {http://eprint.iacr.org/2011/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MinierNP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/MinierPP10, author = {Marine Minier and Raphael C.{-}W. Phan and Benjamin Pousse}, editor = {Swee{-}Huay Heng and Rebecca N. Wright and Bok{-}Min Goi}, title = {Integral Distinguishers of Some {SHA-3} Candidates}, booktitle = {Cryptology and Network Security - 9th International Conference, {CANS} 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6467}, pages = {106--123}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17619-7\_9}, doi = {10.1007/978-3-642-17619-7\_9}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/MinierPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict/Erdene-OchirMVK10, author = {Ochirkhand Erdene{-}Ochir and Marine Minier and Fabrice Valois and Apostolos A. Kountouris}, title = {Resiliency of wireless sensor networks: Definitions and analyses}, booktitle = {17th International Conference on Telecommunications, {ICT} 2010, Doha, Qatar, April 4-7, 2010}, pages = {828--835}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICTEL.2010.5478822}, doi = {10.1109/ICTEL.2010.5478822}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ict/Erdene-OchirMVK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ApavatjrutZFGLM10, author = {Anya Apavatjrut and Wassim Znaidi and Antoine Fraboulet and Claire Goursaud and C{\'{e}}dric Lauradoux and Marine Minier}, editor = {Yang Xiang and Pierangela Samarati and Jiankun Hu and Wanlei Zhou and Ahmad{-}Reza Sadeghi}, title = {Energy Friendly Integrity for Network Coding in Wireless Sensor Networks}, booktitle = {Fourth International Conference on Network and System Security, {NSS} 2010, Melbourne, Victoria, Australia, September 1-3, 2010}, pages = {223--230}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/NSS.2010.32}, doi = {10.1109/NSS.2010.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/ApavatjrutZFGLM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scube/BoucettaKM10, author = {Ch{\'{e}}rifa Boucetta and Mohamed Ali K{\^{a}}afar and Marine Minier}, editor = {Gerard Parr and Philip J. Morrow}, title = {How Secure are Secure Localization Protocols in WSNs?}, booktitle = {Sensor Systems and Software - Second International {ICST} Conference, S-Cube 2010, Miami, FL, USA, December 13-15, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {57}, pages = {164--178}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23583-2\_12}, doi = {10.1007/978-3-642-23583-2\_12}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scube/BoucettaKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1003-5104, author = {Ochirkhand Erdene{-}Ochir and Marine Minier and Fabrice Valois and Apostolos A. Kountouris}, title = {Resilient networking in wireless sensor networks}, journal = {CoRR}, volume = {abs/1003.5104}, year = {2010}, url = {http://arxiv.org/abs/1003.5104}, eprinttype = {arXiv}, eprint = {1003.5104}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1003-5104.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1004-4806, author = {Fran{\c{c}}ois Arnault and Thierry P. Berger and Marine Minier and Benjamin Pousse}, title = {Revisiting LFSMs}, journal = {CoRR}, volume = {abs/1004.4806}, year = {2010}, url = {http://arxiv.org/abs/1004.4806}, eprinttype = {arXiv}, eprint = {1004.4806}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1004-4806.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/MinierPP09, author = {Marine Minier and Raphael C.{-}W. Phan and Benjamin Pousse}, editor = {Bart Preneel}, title = {Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5580}, pages = {60--76}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02384-2\_5}, doi = {10.1007/978-3-642-02384-2\_5}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/MinierPP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BergerMP09, author = {Thierry P. Berger and Marine Minier and Benjamin Pousse}, editor = {Bimal K. Roy and Nicolas Sendrier}, title = {Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5922}, pages = {119--135}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10628-6\_8}, doi = {10.1007/978-3-642-10628-6\_8}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BergerMP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/GavinM09, author = {G{\'{e}}rald Gavin and Marine Minier}, editor = {Bimal K. Roy and Nicolas Sendrier}, title = {Oblivious Multi-variate Polynomial Evaluation}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5922}, pages = {430--442}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10628-6\_28}, doi = {10.1007/978-3-642-10628-6\_28}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/GavinM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/ZnaidiMU09, author = {Wassim Znaidi and Marine Minier and St{\'{e}}phane Ub{\'{e}}da}, title = {Hierarchical node replication attacks detection in wireless sensors networks}, booktitle = {Proceedings of the {IEEE} 20th International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 2009, 13-16 September 2009, Tokyo, Japan}, pages = {82--86}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/PIMRC.2009.5450196}, doi = {10.1109/PIMRC.2009.5450196}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/ZnaidiMU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/ArnaultBLMP09, author = {Fran{\c{c}}ois Arnault and Thierry P. Berger and C{\'{e}}dric Lauradoux and Marine Minier and Benjamin Pousse}, editor = {Michael J. Jacobson Jr. and Vincent Rijmen and Reihaneh Safavi{-}Naini}, title = {A New Approach for FCSRs}, booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop, {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5867}, pages = {433--448}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05445-7\_27}, doi = {10.1007/978-3-642-05445-7\_27}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/ArnaultBLMP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ZnaidiML09, author = {Wassim Znaidi and Marine Minier and C{\'{e}}dric Lauradoux}, editor = {Yan Chen and Tassos Dimitriou and Jianying Zhou}, title = {Aggregated Authentication {(AMAC)} Using Universal Hash Functions}, booktitle = {Security and Privacy in Communication Networks - 5th International {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {19}, pages = {248--264}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05284-2\_14}, doi = {10.1007/978-3-642-05284-2\_14}, timestamp = {Sun, 07 Jan 2018 16:56:18 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/ZnaidiML09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0910-2153, author = {Marine Minier and Benjamin Pousse}, title = {Improving Integral Cryptanalysis against Rijndael with Large Blocks}, journal = {CoRR}, volume = {abs/0910.2153}, year = {2009}, url = {http://arxiv.org/abs/0910.2153}, eprinttype = {arXiv}, eprint = {0910.2153}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0910-2153.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArnaultBLMP09, author = {Fran{\c{c}}ois Arnault and Thierry P. Berger and C{\'{e}}dric Lauradoux and Marine Minier and Benjamin Pousse}, title = {A new approach for FCSRs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {167}, year = {2009}, url = {http://eprint.iacr.org/2009/167}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArnaultBLMP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/ArnaultBM08, author = {Fran{\c{c}}ois Arnault and Thierry P. Berger and Marine Minier}, title = {Some Results on {FCSR} Automata With Applications to the Security of FCSR-Based Pseudorandom Generators}, journal = {{IEEE} Trans. Inf. Theory}, volume = {54}, number = {2}, pages = {836--840}, year = {2008}, url = {https://doi.org/10.1109/TIT.2007.913244}, doi = {10.1109/TIT.2007.913244}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/ArnaultBM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/GaliceM08, author = {Samuel Galice and Marine Minier}, editor = {Serge Vaudenay}, title = {Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5023}, pages = {1--15}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68164-9\_1}, doi = {10.1007/978-3-540-68164-9\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/GaliceM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/ZnaidiMB08, author = {Wassim Znaidi and Marine Minier and Jean{-}Philippe Babau}, title = {Detecting wormhole attacks in wireless networks using local neighborhood information}, booktitle = {Proceedings of the {IEEE} 19th International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 2008, 15-18 September 2008, Cannes, French Riviera, France}, pages = {1--5}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/PIMRC.2008.4699583}, doi = {10.1109/PIMRC.2008.4699583}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/ZnaidiMB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/BerbainBCCGGGGLMPS08, author = {C{\^{o}}me Berbain and Olivier Billet and Anne Canteaut and Nicolas T. Courtois and Henri Gilbert and Louis Goubin and Aline Gouget and Louis Granboulan and C{\'{e}}dric Lauradoux and Marine Minier and Thomas Pornin and Herv{\'{e}} Sibert}, editor = {Matthew J. B. Robshaw and Olivier Billet}, title = {Sosemanuk, a Fast Software-Oriented Stream Cipher}, booktitle = {New Stream Cipher Designs - The eSTREAM Finalists}, series = {Lecture Notes in Computer Science}, volume = {4986}, pages = {98--118}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68351-3\_9}, doi = {10.1007/978-3-540-68351-3\_9}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/BerbainBCCGGGGLMPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/BerbainBCCDGGGGLMPS08, author = {C{\^{o}}me Berbain and Olivier Billet and Anne Canteaut and Nicolas T. Courtois and Blandine Debraize and Henri Gilbert and Louis Goubin and Aline Gouget and Louis Granboulan and C{\'{e}}dric Lauradoux and Marine Minier and Thomas Pornin and Herv{\'{e}} Sibert}, editor = {Matthew J. B. Robshaw and Olivier Billet}, title = {Decimv2}, booktitle = {New Stream Cipher Designs - The eSTREAM Finalists}, series = {Lecture Notes in Computer Science}, volume = {4986}, pages = {140--151}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68351-3\_11}, doi = {10.1007/978-3-540-68351-3\_11}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/BerbainBCCDGGGGLMPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0810-1858, author = {C{\^{o}}me Berbain and Olivier Billet and Anne Canteaut and Nicolas T. Courtois and Henri Gilbert and Louis Goubin and Aline Gouget and Louis Granboulan and C{\'{e}}dric Lauradoux and Marine Minier and Thomas Pornin and Herv{\'{e}} Sibert}, title = {{SOSEMANUK:} a fast software-oriented stream cipher}, journal = {CoRR}, volume = {abs/0810.1858}, year = {2008}, url = {http://arxiv.org/abs/0810.1858}, eprinttype = {arXiv}, eprint = {0810.1858}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0810-1858.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/GaliceMU07, author = {Samuel Galice and Marine Minier and St{\'{e}}phane Ub{\'{e}}da}, editor = {Sandro Etalle and Stephen Marsh}, title = {A trust protocol for community collaboration}, booktitle = {Trust Management - Proceedings of {IFIPTM} 2007: Joint iTrust and {PST} Conferences on Privacy, Trust Management and Security, July 30- August 2, 2007, Moncton, New Brunswick, Canada}, series = {{IFIP}}, volume = {238}, pages = {169--184}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73655-6\_12}, doi = {10.1007/978-0-387-73655-6\_12}, timestamp = {Tue, 29 Dec 2020 11:03:37 +0100}, biburl = {https://dblp.org/rec/conf/ifiptm/GaliceMU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ArnaultBLM07, author = {Fran{\c{c}}ois Arnault and Thierry P. Berger and C{\'{e}}dric Lauradoux and Marine Minier}, editor = {K. Srinathan and C. Pandu Rangan and Moti Yung}, title = {{X-FCSR} - {A} New Software Oriented Stream Cipher Based Upon FCSRs}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4859}, pages = {341--350}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77026-8\_26}, doi = {10.1007/978-3-540-77026-8\_26}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/ArnaultBLM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/FournelMU07, author = {Nicolas Fournel and Marine Minier and St{\'{e}}phane Ub{\'{e}}da}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {202--214}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_17}, doi = {10.1007/978-3-540-72354-7\_17}, timestamp = {Sun, 02 Oct 2022 16:17:41 +0200}, biburl = {https://dblp.org/rec/conf/wistp/FournelMU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArnaultBLM07, author = {Fran{\c{c}}ois Arnault and Thierry P. Berger and C{\'{e}}dric Lauradoux and Marine Minier}, title = {{X-FCSR:} a new software oriented stream cipher based upon FCSRs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {380}, year = {2007}, url = {http://eprint.iacr.org/2007/380}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArnaultBLM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/GaliceMMU06, author = {Samuel Galice and Marine Minier and John Mullins and St{\'{e}}phane Ub{\'{e}}da}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Cryptographic Protocol to Establish Trusted History of Interactions}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {136--149}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_13}, doi = {10.1007/11964254\_13}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/esas/GaliceMMU06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/GaliceLMMU06, author = {Samuel Galice and V{\'{e}}ronique Legrand and Marine Minier and John Mullins and St{\'{e}}phane Ub{\'{e}}da}, title = {A History-Based Framework to Build Trust Management Systems}, booktitle = {Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August 2, 2006 - September 1, 2006}, pages = {1--7}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/SECCOMW.2006.359580}, doi = {10.1109/SECCOMW.2006.359580}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/GaliceLMMU06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0606005, author = {Samuel Galice and V{\'{e}}ronique Legrand and Marine Minier and John Mullins and St{\'{e}}phane Ub{\'{e}}da}, title = {The {KAA} project: a trust policy point of view}, journal = {CoRR}, volume = {abs/cs/0606005}, year = {2006}, url = {http://arxiv.org/abs/cs/0606005}, eprinttype = {arXiv}, eprint = {cs/0606005}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0606005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BergerM05, author = {Thierry P. Berger and Marine Minier}, editor = {Subhamoy Maitra and C. E. Veni Madhavan and Ramarathnam Venkatesan}, title = {Two Algebraic Attacks Against the F-FCSRs Using the {IV} Mode}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3797}, pages = {143--154}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596219\_12}, doi = {10.1007/11596219\_12}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BergerM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aes/Minier04, author = {Marine Minier}, editor = {Hans Dobbertin and Vincent Rijmen and Aleksandra Sowa}, title = {A Three Rounds Property of the {AES}}, booktitle = {Advanced Encryption Standard - AES, 4th International Conference, {AES} 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers}, series = {Lecture Notes in Computer Science}, volume = {3373}, pages = {16--26}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11506447\_3}, doi = {10.1007/11506447\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/aes/Minier04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GilbertM02, author = {Henri Gilbert and Marine Minier}, editor = {Lars R. Knudsen}, title = {Cryptanalysis of {SFLASH}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {288--298}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_19}, doi = {10.1007/3-540-46035-7\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GilbertM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/GilbertM01, author = {Henri Gilbert and Marine Minier}, editor = {Mitsuru Matsui}, title = {New Results on the Pseudorandomness of Some Blockcipher Constructions}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {248--266}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_21}, doi = {10.1007/3-540-45473-X\_21}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/GilbertM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aes/GilbertM00, author = {Henri Gilbert and Marine Minier}, title = {A Collision Attack on 7 Rounds of Rijndael}, booktitle = {The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, {USA}}, pages = {230--241}, publisher = {National Institute of Standards and Technology,}, year = {2000}, timestamp = {Thu, 08 Aug 2019 17:13:16 +0200}, biburl = {https://dblp.org/rec/conf/aes/GilbertM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MinierG00, author = {Marine Minier and Henri Gilbert}, editor = {Bruce Schneier}, title = {Stochastic Cryptanalysis of Crypton}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {121--133}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_9}, doi = {10.1007/3-540-44706-7\_9}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/MinierG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.