BibTeX records: Marine Minier

download as .bib file

@article{DBLP:journals/jmc/RouquetteMS24,
  author       = {Lo{\"{\i}}c Rouquette and
                  Marine Minier and
                  Christine Solnon},
  title        = {Automatic boomerang attacks search on Rijndael},
  journal      = {J. Math. Cryptol.},
  volume       = {18},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1515/jmc-2023-0027},
  doi          = {10.1515/JMC-2023-0027},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/RouquetteMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/0001CLMP024,
  author       = {Elena Andreeva and
                  Beno{\^{\i}}t Cogliati and
                  Virginie Lallemand and
                  Marine Minier and
                  Antoon Purnal and
                  Arnab Roy},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Masked Iterate-Fork-Iterate: {A} New Design Paradigm for Tweakable
                  Expanding Pseudorandom Function},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  pages        = {433--459},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7\_17},
  doi          = {10.1007/978-3-031-54773-7\_17},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/0001CLMP024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/FrancqBHGMM22,
  author       = {Julien Francq and
                  Lo{\"{\i}}c Besson and
                  Paul Huynh and
                  Philippe Guillot and
                  Gilles Millerioux and
                  Marine Minier},
  title        = {Non-Triangular Self-Synchronizing Stream Ciphers},
  journal      = {{IEEE} Trans. Computers},
  volume       = {71},
  number       = {1},
  pages        = {134--145},
  year         = {2022},
  url          = {https://doi.org/10.1109/TC.2020.3043714},
  doi          = {10.1109/TC.2020.3043714},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/FrancqBHGMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LallemandMR22,
  author       = {Virginie Lallemand and
                  Marine Minier and
                  Lo{\"{\i}}c Rouquette},
  title        = {Automatic Search of Rectangle Attacks on Feistel Ciphers: Application
                  to {WARP}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {2},
  pages        = {113--140},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i2.113-140},
  doi          = {10.46586/TOSC.V2022.I2.113-140},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/LallemandMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/BlancLGMS22,
  author       = {Soline Blanc and
                  Abdelkader Lahmadi and
                  K{\'{e}}vin Le Gouguec and
                  Marine Minier and
                  Lama Sleem},
  title        = {Benchmarking of lightweight cryptographic algorithms for wireless
                  IoT networks},
  journal      = {Wirel. Networks},
  volume       = {28},
  number       = {8},
  pages        = {3453--3476},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11276-022-03046-1},
  doi          = {10.1007/S11276-022-03046-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/BlancLGMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/RouquetteGMS22,
  author       = {Lo{\"{\i}}c Rouquette and
                  David G{\'{e}}rault and
                  Marine Minier and
                  Christine Solnon},
  editor       = {Lejla Batina and
                  Joan Daemen},
  title        = {And Rijndael?: Automatic Related-Key Differential Analysis of Rijndael},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2022: 13th International Conference
                  on Cryptology in Africa, {AFRICACRYPT} 2022, Fes, Morocco, July 18-20,
                  2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13503},
  pages        = {150--175},
  publisher    = {Springer Nature Switzerland},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17433-9\_7},
  doi          = {10.1007/978-3-031-17433-9\_7},
  timestamp    = {Sun, 10 Dec 2023 00:28:26 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/RouquetteGMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsc2/BoukerrouMMF22,
  author       = {Hamid Boukerrou and
                  Gilles Millerioux and
                  Marine Minier and
                  Mirko Fiacchini},
  title        = {Construction of dead-beat switched automata: application to cryptography},
  booktitle    = {10th International Conference on Systems and Control, {ICSC} 2022,
                  Marseille, France, November 23-25, 2022},
  pages        = {23--30},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICSC57768.2022.9993895},
  doi          = {10.1109/ICSC57768.2022.9993895},
  timestamp    = {Wed, 18 Jan 2023 19:02:44 +0100},
  biburl       = {https://dblp.org/rec/conf/icsc2/BoukerrouMMF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icstcc/BoukerrouMM22,
  author       = {Hamid Boukerrou and
                  Gilles Millerioux and
                  Marine Minier},
  editor       = {Marian Barbu and
                  Razvan Solea},
  title        = {Towards a new design of ciphers to secure {CPS:} the role of control
                  theory},
  booktitle    = {26th International Conference on System Theory, Control and Computing
                  , {ICSTCC} 2022, Sinaia, Romania, October 19-21, 2022},
  pages        = {13--18},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICSTCC55426.2022.9931873},
  doi          = {10.1109/ICSTCC55426.2022.9931873},
  timestamp    = {Thu, 17 Nov 2022 21:19:26 +0100},
  biburl       = {https://dblp.org/rec/conf/icstcc/BoukerrouMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaCLMPR22,
  author       = {Elena Andreeva and
                  Benoit Cogliati and
                  Virginie Lallemand and
                  Marine Minier and
                  Antoon Purnal and
                  Arnab Roy},
  title        = {Masked Iterate-Fork-Iterate: {A} new Design Paradigm for Tweakable
                  Expanding Pseudorandom Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1534},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1534},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AndreevaCLMPR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/CogliatiELL0M21,
  author       = {Beno{\^{\i}}t Cogliati and
                  Jordan Ethan and
                  Virginie Lallemand and
                  ByeongHak Lee and
                  Jooyoung Lee and
                  Marine Minier},
  title        = {{CTET+:} {A} Beyond-Birthday-Bound Secure Tweakable Enciphering Scheme
                  Using a Single Pseudorandom Permutation},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {4},
  pages        = {1--35},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i4.1-35},
  doi          = {10.46586/TOSC.V2021.I4.1-35},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/CogliatiELL0M21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DelauneDHMMP21,
  author       = {St{\'{e}}phanie Delaune and
                  Patrick Derbez and
                  Paul Huynh and
                  Marine Minier and
                  Victor Mollimard and
                  Charles Prud'homme},
  editor       = {Kazue Sako and
                  Nils Ole Tippenhauer},
  title        = {Efficient Methods to Search for Best Differential Characteristics
                  on {SKINNY}},
  booktitle    = {Applied Cryptography and Network Security - 19th International Conference,
                  {ACNS} 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12727},
  pages        = {184--207},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78375-4\_8},
  doi          = {10.1007/978-3-030-78375-4\_8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/DelauneDHMMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ai/GeraultLMS20,
  author       = {David G{\'{e}}rault and
                  Pascal Lafourcade and
                  Marine Minier and
                  Christine Solnon},
  title        = {Computing {AES} related-key differential characteristics with constraint
                  programming},
  journal      = {Artif. Intell.},
  volume       = {278},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.artint.2019.103183},
  doi          = {10.1016/J.ARTINT.2019.103183},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ai/GeraultLMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BoukerrouHLMM20,
  author       = {Hamid Boukerrou and
                  Paul Huynh and
                  Virginie Lallemand and
                  Bimal Mandal and
                  Marine Minier},
  title        = {On the Feistel Counterpart of the Boomerang Connectivity Table Introduction
                  and Analysis of the {FBCT}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {1},
  pages        = {331--362},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i1.331-362},
  doi          = {10.13154/TOSC.V2020.I1.331-362},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BoukerrouHLMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/Rasoamiaramanana20,
  author       = {Sandra Rasoamiaramanana and
                  Marine Minier and
                  Gilles Macario{-}Rat},
  editor       = {Pierangela Samarati and
                  Sabrina De Capitani di Vimercati and
                  Mohammad S. Obaidat and
                  Jalel Ben{-}Othman},
  title        = {A White-Box Encryption Scheme using Physically Unclonable Functions},
  booktitle    = {Proceedings of the 17th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint,
                  Paris, France, July 8-10, 2020},
  pages        = {279--286},
  publisher    = {ScitePress},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009781002790286},
  doi          = {10.5220/0009781002790286},
  timestamp    = {Wed, 29 Jul 2020 16:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/Rasoamiaramanana20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DelauneDHMMP20,
  author       = {St{\'{e}}phanie Delaune and
                  Patrick Derbez and
                  Paul Huynh and
                  Marine Minier and
                  Victor Mollimard and
                  Charles Prud'homme},
  title        = {{SKINNY} with Scalpel - Comparing Tools for Differential Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1402},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1402},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DelauneDHMMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SolovevaAJMZ19,
  author       = {Faina I. Solov'eva and
                  Daniel Augot and
                  Thomas Johansson and
                  Marine Minier and
                  Victor A. Zinoviev},
  title        = {Editorial: Special issue on coding and cryptography},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {183--184},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-00601-w},
  doi          = {10.1007/S10623-018-00601-W},
  timestamp    = {Wed, 20 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/SolovevaAJMZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Rasoamiaramanana19,
  author       = {Sandra Rasoamiaramanana and
                  Gilles Macario{-}Rat and
                  Marine Minier},
  editor       = {Emil Simion and
                  R{\'{e}}mi G{\'{e}}raud{-}Stewart},
  title        = {White-Box Traitor-Tracing from Tardos Probabilistic Codes},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 12th International Conference, SecITC 2019, Bucharest, Romania,
                  November 14-15, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12001},
  pages        = {125--141},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41025-4\_9},
  doi          = {10.1007/978-3-030-41025-4\_9},
  timestamp    = {Fri, 06 Mar 2020 14:27:55 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/Rasoamiaramanana19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/GeraultLMS18,
  author       = {David G{\'{e}}rault and
                  Pascal Lafourcade and
                  Marine Minier and
                  Christine Solnon},
  title        = {Revisiting {AES} related-key differential attacks with constraint
                  programming},
  journal      = {Inf. Process. Lett.},
  volume       = {139},
  pages        = {24--29},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ipl.2018.07.001},
  doi          = {10.1016/J.IPL.2018.07.001},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/GeraultLMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Minier17,
  author       = {Marine Minier},
  title        = {Improving impossible-differential attacks against Rijndael-160 and
                  Rijndael-224},
  journal      = {Des. Codes Cryptogr.},
  volume       = {82},
  number       = {1-2},
  pages        = {117--129},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0206-7},
  doi          = {10.1007/S10623-016-0206-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Minier17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/AlagganCM17,
  author       = {Mohammad Alaggan and
                  Mathieu Cunche and
                  Marine Minier},
  editor       = {Rakesh M. Verma and
                  Bhavani Thuraisingham},
  title        = {Non-interactive (t, n)-Incidence Counting from Differentially Private
                  Indicator Vectors},
  booktitle    = {Proceedings of the 3rd {ACM} on International Workshop on Security
                  And Privacy Analytics, IWSPA@CODASPY 2017, Scottsdale, Arizona, USA,
                  March 24, 2017},
  pages        = {1--9},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3041008.3041017},
  doi          = {10.1145/3041008.3041017},
  timestamp    = {Wed, 29 Jun 2022 15:37:42 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/AlagganCM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/GeraultMS17,
  author       = {David G{\'{e}}rault and
                  Marine Minier and
                  Christine Solnon},
  editor       = {Carles Sierra},
  title        = {Using Constraint Programming to solve a Cryptanalytic Problem},
  booktitle    = {Proceedings of the Twenty-Sixth International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2017, Melbourne, Australia, August
                  19-25, 2017},
  pages        = {4844--4848},
  publisher    = {ijcai.org},
  year         = {2017},
  url          = {https://doi.org/10.24963/ijcai.2017/679},
  doi          = {10.24963/IJCAI.2017/679},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/GeraultMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeraultLMS17,
  author       = {David G{\'{e}}rault and
                  Pascal Lafourcade and
                  Marine Minier and
                  Christine Solnon},
  title        = {Revisiting {AES} Related-Key Differential Attacks with Constraint
                  Programming},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {139},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/139},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeraultLMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/BergerFMT16,
  author       = {Thierry P. Berger and
                  Julien Francq and
                  Marine Minier and
                  Ga{\"{e}}l Thomas},
  title        = {Extended Generalized Feistel Networks Using Matrix Representation
                  to Propose a New Lightweight Block Cipher: Lilliput},
  journal      = {{IEEE} Trans. Computers},
  volume       = {65},
  number       = {7},
  pages        = {2074--2089},
  year         = {2016},
  url          = {https://doi.org/10.1109/TC.2015.2468218},
  doi          = {10.1109/TC.2015.2468218},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/BergerFMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cp/GeraultMS16,
  author       = {David G{\'{e}}rault and
                  Marine Minier and
                  Christine Solnon},
  editor       = {Michel Rueher},
  title        = {Constraint Programming Models for Chosen Key Differential Cryptanalysis},
  booktitle    = {Principles and Practice of Constraint Programming - 22nd International
                  Conference, {CP} 2016, Toulouse, France, September 5-9, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9892},
  pages        = {584--601},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44953-1\_37},
  doi          = {10.1007/978-3-319-44953-1\_37},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cp/GeraultMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/MinierP16,
  author       = {Marine Minier and
                  Raphael C.{-}W. Phan},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Tuple Cryptanalysis: Slicing and Fusing Multisets},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {294--320},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_15},
  doi          = {10.1007/978-3-319-61273-7\_15},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/MinierP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/BrunisholzE0QMV15,
  author       = {Pierre Brunisholz and
                  Ochirkhand Erdene{-}Ochir and
                  Mohamed M. Abdallah and
                  Khalid A. Qaraqe and
                  Marine Minier and
                  Fabrice Valois},
  title        = {Network Coding versus Replication Based Resilient Techniques to Mitigate
                  Insider Attacks for Smart Metering},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {11},
  pages        = {737269:1--737269:11},
  year         = {2015},
  url          = {https://doi.org/10.1155/2015/737269},
  doi          = {10.1155/2015/737269},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/BrunisholzE0QMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CazorlaGMM15,
  author       = {Micka{\"{e}}l Cazorla and
                  Sylvain Gourgeon and
                  Kevin Marquet and
                  Marine Minier},
  title        = {Survey and benchmark of lightweight block ciphers for {MSP430} 16-bit
                  microcontroller},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3564--3579},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1281},
  doi          = {10.1002/SEC.1281},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/CazorlaGMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c2si/BergerFM15,
  author       = {Thierry P. Berger and
                  Julien Francq and
                  Marine Minier},
  editor       = {Said El Hajji and
                  Abderrahmane Nitaj and
                  Claude Carlet and
                  El Mamoun Souidi},
  title        = {{CUBE} Cipher: {A} Family of Quasi-Involutive Block Ciphers Easy to
                  Mask},
  booktitle    = {Codes, Cryptology, and Information Security - First International
                  Conference, {C2SI} 2015, Rabat, Morocco, May 26-28, 2015, Proceedings
                  - In Honor of Thierry Berger},
  series       = {Lecture Notes in Computer Science},
  volume       = {9084},
  pages        = {89--105},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18681-8\_8},
  doi          = {10.1007/978-3-319-18681-8\_8},
  timestamp    = {Tue, 27 Aug 2019 17:49:45 +0200},
  biburl       = {https://dblp.org/rec/conf/c2si/BergerFM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BlondeauM15,
  author       = {C{\'{e}}line Blondeau and
                  Marine Minier},
  editor       = {Gregor Leander},
  title        = {Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II
                  Generalized Feistel Networks Using the Matrix Method},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {92--113},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_5},
  doi          = {10.1007/978-3-662-48116-5\_5},
  timestamp    = {Sat, 19 Oct 2019 20:27:47 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BlondeauM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BergerM15,
  author       = {Thierry P. Berger and
                  Marine Minier},
  editor       = {Alex Biryukov and
                  Vipul Goyal},
  title        = {Some Results Using the Matrix Methods on Impossible, Integral and
                  Zero-Correlation Distinguishers for Feistel-Like Ciphers},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2015 - 16th International Conference
                  on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9462},
  pages        = {180--197},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26617-6\_10},
  doi          = {10.1007/978-3-319-26617-6\_10},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BergerM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/Erdene-OchirAQM15,
  author       = {Ochirkhand Erdene{-}Ochir and
                  Mohamed M. Abdallah and
                  Khalid A. Qaraqe and
                  Marine Minier and
                  Fabrice Valois},
  title        = {A theoretical framework of resilience: Biased random walk routing
                  against insider attacks},
  booktitle    = {2015 {IEEE} Wireless Communications and Networking Conference, {WCNC}
                  2015, New Orleans, LA, USA, March 9-12, 2015},
  pages        = {1602--1607},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCNC.2015.7127707},
  doi          = {10.1109/WCNC.2015.7127707},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/Erdene-OchirAQM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlondeauM15,
  author       = {C{\'{e}}line Blondeau and
                  Marine Minier},
  title        = {Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II
                  Generalized Feistel Networks using the Matrix Method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {141},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/141},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlondeauM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/Erdene-OchirAQM14,
  author       = {Ochirkhand Erdene{-}Ochir and
                  Mohamed M. Abdallah and
                  Khalid A. Qaraqe and
                  Marine Minier and
                  Fabrice Valois},
  title        = {Routing resilience evaluation for smart metering: Definition, metric
                  and techniques},
  booktitle    = {25th {IEEE} Annual International Symposium on Personal, Indoor, and
                  Mobile Radio Communication, {PIMRC} 2014, Washington DC, USA, September
                  2-5, 2014},
  pages        = {1867--1871},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/PIMRC.2014.7136474},
  doi          = {10.1109/PIMRC.2014.7136474},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/Erdene-OchirAQM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BrunisholzMV14,
  author       = {Pierre Brunisholz and
                  Marine Minier and
                  Fabrice Valois},
  title        = {The Gain of Network Coding in Wireless Sensor Networking},
  journal      = {CoRR},
  volume       = {abs/1412.2570},
  year         = {2014},
  url          = {http://arxiv.org/abs/1412.2570},
  eprinttype    = {arXiv},
  eprint       = {1412.2570},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BrunisholzMV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouraMNS14,
  author       = {Christina Boura and
                  Marine Minier and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Valentin Suder},
  title        = {Improved Impossible Differential Attacks against Round-Reduced LBlock},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {279},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/279},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouraMNS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/ZnaidiMU13,
  author       = {Wassim Znaidi and
                  Marine Minier and
                  St{\'{e}}phane Ub{\'{e}}da},
  title        = {Hierarchical Node Replication Attacks Detection in Wireless Sensor
                  Networks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {9},
  year         = {2013},
  url          = {https://doi.org/10.1155/2013/745069},
  doi          = {10.1155/2013/745069},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/ZnaidiMU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/ZhangM13,
  author       = {Yuanyuan Zhang and
                  Marine Minier},
  title        = {How network coding system constrains packet pollution attacks in wireless
                  sensor networks},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {4},
  number       = {2/3},
  pages        = {197--203},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJGUC.2013.056256},
  doi          = {10.1504/IJGUC.2013.056256},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijguc/ZhangM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Minier013,
  author       = {Marine Minier and
                  Ga{\"{e}}l Thomas},
  editor       = {Goutam Paul and
                  Serge Vaudenay},
  title        = {An Integral Distinguisher on Gr{\o}stl-512 v3},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2013 - 14th International Conference
                  on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8250},
  pages        = {50--59},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-03515-4\_4},
  doi          = {10.1007/978-3-319-03515-4\_4},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/Minier013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Minier13,
  author       = {Marine Minier},
  editor       = {Goutam Paul and
                  Serge Vaudenay},
  title        = {On the Security of Piccolo Lightweight Block Cipher against Related-Key
                  Impossible Differentials},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2013 - 14th International Conference
                  on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8250},
  pages        = {308--318},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-03515-4\_21},
  doi          = {10.1007/978-3-319-03515-4\_21},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/Minier13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/CuncheLMB13,
  author       = {Mathieu Cunche and
                  C{\'{e}}dric Lauradoux and
                  Marine Minier and
                  Roksana Boreli},
  title        = {Private and resilient data aggregation},
  booktitle    = {38th Annual {IEEE} Conference on Local Computer Networks, Sydney,
                  Australia, October 21-24, 2013},
  pages        = {759--762},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/LCN.2013.6761329},
  doi          = {10.1109/LCN.2013.6761329},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/CuncheLMB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BergerM013,
  author       = {Thierry P. Berger and
                  Marine Minier and
                  Ga{\"{e}}l Thomas},
  editor       = {Tanja Lange and
                  Kristin E. Lauter and
                  Petr Lisonek},
  title        = {Extended Generalized Feistel Networks Using Matrix Representation},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
                  Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8282},
  pages        = {289--305},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43414-7\_15},
  doi          = {10.1007/978-3-662-43414-7\_15},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BergerM013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CazorlaMM13,
  author       = {Micka{\"{e}}l Cazorla and
                  Kevin Marquet and
                  Marine Minier},
  editor       = {Pierangela Samarati},
  title        = {Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor
                  Networks},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {543--548},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223213/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CazorlaMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CazorlaMM13,
  author       = {Micka{\"{e}}l Cazorla and
                  Kevin Marquet and
                  Marine Minier},
  title        = {Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor
                  Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {295},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/295},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CazorlaMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/hal/Minier12,
  author       = {Marine Minier},
  title        = {Quelques r{\'{e}}sultats en cryptographie sym{\'{e}}trique,
                  pour les mod{\`{e}}les de confiance dans les r{\'{e}}seaux ambiants
                  et la s{\'{e}}curit{\'{e}} dans les r{\'{e}}seaux de
                  capteurs sans fil. (Some results in symmetric key cryptography, for
                  trust models in ambient networks and security in wireless sensor networks)},
  year         = {2012},
  url          = {https://tel.archives-ouvertes.fr/tel-00918938},
  timestamp    = {Sat, 30 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/hal/Minier12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/ApavatjrutZFGJLM12,
  author       = {Anya Apavatjrut and
                  Wassim Znaidi and
                  Antoine Fraboulet and
                  Claire Goursaud and
                  Katia Jaffr{\`{e}}s{-}Runser and
                  C{\'{e}}dric Lauradoux and
                  Marine Minier},
  title        = {Energy efficient authentication strategies for network coding},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {24},
  number       = {10},
  pages        = {1086--1107},
  year         = {2012},
  url          = {https://doi.org/10.1002/cpe.1767},
  doi          = {10.1002/CPE.1767},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/ApavatjrutZFGJLM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MinierPP12,
  author       = {Marine Minier and
                  Raphael C.{-}W. Phan and
                  Benjamin Pousse},
  title        = {On Integral Distinguishers of Rijndael Family of Ciphers},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {2},
  pages        = {104--118},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.635110},
  doi          = {10.1080/01611194.2012.635110},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MinierPP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/Erdene-OchirKMV12,
  author       = {Ochirkhand Erdene{-}Ochir and
                  Apostolos A. Kountouris and
                  Marine Minier and
                  Fabrice Valois},
  title        = {A New Metric to Quantify Resiliency in Networking},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {16},
  number       = {10},
  pages        = {1699--1702},
  year         = {2012},
  url          = {https://doi.org/10.1109/LCOMM.2012.081612.121191},
  doi          = {10.1109/LCOMM.2012.081612.121191},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/Erdene-OchirKMV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/MinierN12,
  author       = {Marine Minier and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {A related key impossible differential attack against 22 rounds of
                  the lightweight block cipher LBlock},
  journal      = {Inf. Process. Lett.},
  volume       = {112},
  number       = {16},
  pages        = {624--629},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ipl.2012.04.012},
  doi          = {10.1016/J.IPL.2012.04.012},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/MinierN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcnc/ZhangM12,
  author       = {Yuanyuan Zhang and
                  Marine Minier},
  title        = {Selective Forwarding Attacks against Data and {ACK} Flows in Network
                  Coding and Countermeasures},
  journal      = {J. Comput. Networks Commun.},
  volume       = {2012},
  pages        = {184783:1--184783:14},
  year         = {2012},
  url          = {https://doi.org/10.1155/2012/184783},
  doi          = {10.1155/2012/184783},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcnc/ZhangM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/ZnaidiM12,
  author       = {Wassim Znaidi and
                  Marine Minier},
  title        = {Key establishment and management for WSNs},
  journal      = {Telecommun. Syst.},
  volume       = {50},
  number       = {2},
  pages        = {113--125},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11235-010-9391-2},
  doi          = {10.1007/S11235-010-9391-2},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/ZnaidiM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BergerDMMT12,
  author       = {Thierry P. Berger and
                  Joffrey D'Hayer and
                  Kevin Marquet and
                  Marine Minier and
                  Ga{\"{e}}l Thomas},
  editor       = {Aikaterini Mitrokotsa and
                  Serge Vaudenay},
  title        = {The {GLUON} Family: {A} Lightweight Hash Function Family Based on
                  FCSRs},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
                  on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7374},
  pages        = {306--323},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31410-0\_19},
  doi          = {10.1007/978-3-642-31410-0\_19},
  timestamp    = {Sun, 02 Jun 2019 21:14:37 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/BergerDMMT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BergerM12,
  author       = {Thierry P. Berger and
                  Marine Minier},
  editor       = {Steven D. Galbraith and
                  Mridul Nandi},
  title        = {Cryptanalysis of Pseudo-random Generators Based on Vectorial FCSRs},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
                  on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7668},
  pages        = {209--224},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34931-7\_13},
  doi          = {10.1007/978-3-642-34931-7\_13},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BergerM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/Erdene-OchirMVK12,
  author       = {Ochirkhand Erdene{-}Ochir and
                  Marine Minier and
                  Fabrice Valois and
                  Apostolos A. Kountouris},
  title        = {Resiliency taxonomy of routing protocols in Wireless Sensor Networks},
  booktitle    = {37th Annual {IEEE} Conference on Local Computer Networks, Clearwater
                  Beach, FL, USA, October 22-25, 2012},
  pages        = {324--327},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/LCN.2012.6423640},
  doi          = {10.1109/LCN.2012.6423640},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/Erdene-OchirMVK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/ArnaultBMP11,
  author       = {Fran{\c{c}}ois Arnault and
                  Thierry P. Berger and
                  Marine Minier and
                  Benjamin Pousse},
  title        = {Revisiting LFSRs for Cryptographic Applications},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {57},
  number       = {12},
  pages        = {8095--8113},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIT.2011.2164234},
  doi          = {10.1109/TIT.2011.2164234},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/ArnaultBMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MinierNP11,
  author       = {Marine Minier and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin},
  editor       = {Antoine Joux},
  title        = {Analysis of Reduced-SHAvite-3-256 v2},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {68--87},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_5},
  doi          = {10.1007/978-3-642-21702-9\_5},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/MinierNP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-4/MinierP11,
  author       = {Marine Minier and
                  Raphael C.{-}W. Phan},
  editor       = {Jan Camenisch and
                  Dogan Kesdogan},
  title        = {Energy-Efficient Cryptographic Engineering Paradigm},
  booktitle    = {Open Problems in Network Security - {IFIP} {WG} 11.4 International
                  Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7039},
  pages        = {78--88},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27585-2\_7},
  doi          = {10.1007/978-3-642-27585-2\_7},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-4/MinierP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ZhangZLM11,
  author       = {Yuanyuan Zhang and
                  Wassim Znaidi and
                  C{\'{e}}dric Lauradoux and
                  Marine Minier},
  editor       = {Pierangela Samarati and
                  Sara Foresti and
                  Jiankun Hu and
                  Giovanni Livraga},
  title        = {Flooding attacks against network coding and countermeasures},
  booktitle    = {5th International Conference on Network and System Security, {NSS}
                  2011, Milan, Italy, September 6-8, 2011},
  pages        = {305--309},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICNSS.2011.6060020},
  doi          = {10.1109/ICNSS.2011.6060020},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/ZhangZLM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MinierNP11,
  author       = {Marine Minier and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin},
  title        = {Analysis of reduced-SHAvite-3-256 v2},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MinierNP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/MinierPP10,
  author       = {Marine Minier and
                  Raphael C.{-}W. Phan and
                  Benjamin Pousse},
  editor       = {Swee{-}Huay Heng and
                  Rebecca N. Wright and
                  Bok{-}Min Goi},
  title        = {Integral Distinguishers of Some {SHA-3} Candidates},
  booktitle    = {Cryptology and Network Security - 9th International Conference, {CANS}
                  2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6467},
  pages        = {106--123},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17619-7\_9},
  doi          = {10.1007/978-3-642-17619-7\_9},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/MinierPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict/Erdene-OchirMVK10,
  author       = {Ochirkhand Erdene{-}Ochir and
                  Marine Minier and
                  Fabrice Valois and
                  Apostolos A. Kountouris},
  title        = {Resiliency of wireless sensor networks: Definitions and analyses},
  booktitle    = {17th International Conference on Telecommunications, {ICT} 2010, Doha,
                  Qatar, April 4-7, 2010},
  pages        = {828--835},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICTEL.2010.5478822},
  doi          = {10.1109/ICTEL.2010.5478822},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ict/Erdene-OchirMVK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ApavatjrutZFGLM10,
  author       = {Anya Apavatjrut and
                  Wassim Znaidi and
                  Antoine Fraboulet and
                  Claire Goursaud and
                  C{\'{e}}dric Lauradoux and
                  Marine Minier},
  editor       = {Yang Xiang and
                  Pierangela Samarati and
                  Jiankun Hu and
                  Wanlei Zhou and
                  Ahmad{-}Reza Sadeghi},
  title        = {Energy Friendly Integrity for Network Coding in Wireless Sensor Networks},
  booktitle    = {Fourth International Conference on Network and System Security, {NSS}
                  2010, Melbourne, Victoria, Australia, September 1-3, 2010},
  pages        = {223--230},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/NSS.2010.32},
  doi          = {10.1109/NSS.2010.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/ApavatjrutZFGLM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scube/BoucettaKM10,
  author       = {Ch{\'{e}}rifa Boucetta and
                  Mohamed Ali K{\^{a}}afar and
                  Marine Minier},
  editor       = {Gerard Parr and
                  Philip J. Morrow},
  title        = {How Secure are Secure Localization Protocols in WSNs?},
  booktitle    = {Sensor Systems and Software - Second International {ICST} Conference,
                  S-Cube 2010, Miami, FL, USA, December 13-15, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {57},
  pages        = {164--178},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23583-2\_12},
  doi          = {10.1007/978-3-642-23583-2\_12},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scube/BoucettaKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1003-5104,
  author       = {Ochirkhand Erdene{-}Ochir and
                  Marine Minier and
                  Fabrice Valois and
                  Apostolos A. Kountouris},
  title        = {Resilient networking in wireless sensor networks},
  journal      = {CoRR},
  volume       = {abs/1003.5104},
  year         = {2010},
  url          = {http://arxiv.org/abs/1003.5104},
  eprinttype    = {arXiv},
  eprint       = {1003.5104},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1003-5104.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1004-4806,
  author       = {Fran{\c{c}}ois Arnault and
                  Thierry P. Berger and
                  Marine Minier and
                  Benjamin Pousse},
  title        = {Revisiting LFSMs},
  journal      = {CoRR},
  volume       = {abs/1004.4806},
  year         = {2010},
  url          = {http://arxiv.org/abs/1004.4806},
  eprinttype    = {arXiv},
  eprint       = {1004.4806},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1004-4806.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/MinierPP09,
  author       = {Marine Minier and
                  Raphael C.{-}W. Phan and
                  Benjamin Pousse},
  editor       = {Bart Preneel},
  title        = {Distinguishers for Ciphers and Known Key Attack against Rijndael with
                  Large Blocks},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International
                  Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5580},
  pages        = {60--76},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02384-2\_5},
  doi          = {10.1007/978-3-642-02384-2\_5},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/MinierPP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BergerMP09,
  author       = {Thierry P. Berger and
                  Marine Minier and
                  Benjamin Pousse},
  editor       = {Bimal K. Roy and
                  Nicolas Sendrier},
  title        = {Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
                  on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5922},
  pages        = {119--135},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10628-6\_8},
  doi          = {10.1007/978-3-642-10628-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BergerMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/GavinM09,
  author       = {G{\'{e}}rald Gavin and
                  Marine Minier},
  editor       = {Bimal K. Roy and
                  Nicolas Sendrier},
  title        = {Oblivious Multi-variate Polynomial Evaluation},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
                  on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5922},
  pages        = {430--442},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10628-6\_28},
  doi          = {10.1007/978-3-642-10628-6\_28},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/GavinM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/ZnaidiMU09,
  author       = {Wassim Znaidi and
                  Marine Minier and
                  St{\'{e}}phane Ub{\'{e}}da},
  title        = {Hierarchical node replication attacks detection in wireless sensors
                  networks},
  booktitle    = {Proceedings of the {IEEE} 20th International Symposium on Personal,
                  Indoor and Mobile Radio Communications, {PIMRC} 2009, 13-16 September
                  2009, Tokyo, Japan},
  pages        = {82--86},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/PIMRC.2009.5450196},
  doi          = {10.1109/PIMRC.2009.5450196},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/ZnaidiMU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/ArnaultBLMP09,
  author       = {Fran{\c{c}}ois Arnault and
                  Thierry P. Berger and
                  C{\'{e}}dric Lauradoux and
                  Marine Minier and
                  Benjamin Pousse},
  editor       = {Michael J. Jacobson Jr. and
                  Vincent Rijmen and
                  Reihaneh Safavi{-}Naini},
  title        = {A New Approach for FCSRs},
  booktitle    = {Selected Areas in Cryptography, 16th Annual International Workshop,
                  {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5867},
  pages        = {433--448},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05445-7\_27},
  doi          = {10.1007/978-3-642-05445-7\_27},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/ArnaultBLMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ZnaidiML09,
  author       = {Wassim Znaidi and
                  Marine Minier and
                  C{\'{e}}dric Lauradoux},
  editor       = {Yan Chen and
                  Tassos Dimitriou and
                  Jianying Zhou},
  title        = {Aggregated Authentication {(AMAC)} Using Universal Hash Functions},
  booktitle    = {Security and Privacy in Communication Networks - 5th International
                  {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {19},
  pages        = {248--264},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05284-2\_14},
  doi          = {10.1007/978-3-642-05284-2\_14},
  timestamp    = {Sun, 07 Jan 2018 16:56:18 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/ZnaidiML09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0910-2153,
  author       = {Marine Minier and
                  Benjamin Pousse},
  title        = {Improving Integral Cryptanalysis against Rijndael with Large Blocks},
  journal      = {CoRR},
  volume       = {abs/0910.2153},
  year         = {2009},
  url          = {http://arxiv.org/abs/0910.2153},
  eprinttype    = {arXiv},
  eprint       = {0910.2153},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0910-2153.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArnaultBLMP09,
  author       = {Fran{\c{c}}ois Arnault and
                  Thierry P. Berger and
                  C{\'{e}}dric Lauradoux and
                  Marine Minier and
                  Benjamin Pousse},
  title        = {A new approach for FCSRs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {167},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArnaultBLMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/ArnaultBM08,
  author       = {Fran{\c{c}}ois Arnault and
                  Thierry P. Berger and
                  Marine Minier},
  title        = {Some Results on {FCSR} Automata With Applications to the Security
                  of FCSR-Based Pseudorandom Generators},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {54},
  number       = {2},
  pages        = {836--840},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIT.2007.913244},
  doi          = {10.1109/TIT.2007.913244},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/ArnaultBM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/GaliceM08,
  author       = {Samuel Galice and
                  Marine Minier},
  editor       = {Serge Vaudenay},
  title        = {Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference
                  on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5023},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68164-9\_1},
  doi          = {10.1007/978-3-540-68164-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/GaliceM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/ZnaidiMB08,
  author       = {Wassim Znaidi and
                  Marine Minier and
                  Jean{-}Philippe Babau},
  title        = {Detecting wormhole attacks in wireless networks using local neighborhood
                  information},
  booktitle    = {Proceedings of the {IEEE} 19th International Symposium on Personal,
                  Indoor and Mobile Radio Communications, {PIMRC} 2008, 15-18 September
                  2008, Cannes, French Riviera, France},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/PIMRC.2008.4699583},
  doi          = {10.1109/PIMRC.2008.4699583},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/ZnaidiMB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/BerbainBCCGGGGLMPS08,
  author       = {C{\^{o}}me Berbain and
                  Olivier Billet and
                  Anne Canteaut and
                  Nicolas T. Courtois and
                  Henri Gilbert and
                  Louis Goubin and
                  Aline Gouget and
                  Louis Granboulan and
                  C{\'{e}}dric Lauradoux and
                  Marine Minier and
                  Thomas Pornin and
                  Herv{\'{e}} Sibert},
  editor       = {Matthew J. B. Robshaw and
                  Olivier Billet},
  title        = {Sosemanuk, a Fast Software-Oriented Stream Cipher},
  booktitle    = {New Stream Cipher Designs - The eSTREAM Finalists},
  series       = {Lecture Notes in Computer Science},
  volume       = {4986},
  pages        = {98--118},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68351-3\_9},
  doi          = {10.1007/978-3-540-68351-3\_9},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/BerbainBCCGGGGLMPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/BerbainBCCDGGGGLMPS08,
  author       = {C{\^{o}}me Berbain and
                  Olivier Billet and
                  Anne Canteaut and
                  Nicolas T. Courtois and
                  Blandine Debraize and
                  Henri Gilbert and
                  Louis Goubin and
                  Aline Gouget and
                  Louis Granboulan and
                  C{\'{e}}dric Lauradoux and
                  Marine Minier and
                  Thomas Pornin and
                  Herv{\'{e}} Sibert},
  editor       = {Matthew J. B. Robshaw and
                  Olivier Billet},
  title        = {Decimv2},
  booktitle    = {New Stream Cipher Designs - The eSTREAM Finalists},
  series       = {Lecture Notes in Computer Science},
  volume       = {4986},
  pages        = {140--151},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68351-3\_11},
  doi          = {10.1007/978-3-540-68351-3\_11},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/BerbainBCCDGGGGLMPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0810-1858,
  author       = {C{\^{o}}me Berbain and
                  Olivier Billet and
                  Anne Canteaut and
                  Nicolas T. Courtois and
                  Henri Gilbert and
                  Louis Goubin and
                  Aline Gouget and
                  Louis Granboulan and
                  C{\'{e}}dric Lauradoux and
                  Marine Minier and
                  Thomas Pornin and
                  Herv{\'{e}} Sibert},
  title        = {{SOSEMANUK:} a fast software-oriented stream cipher},
  journal      = {CoRR},
  volume       = {abs/0810.1858},
  year         = {2008},
  url          = {http://arxiv.org/abs/0810.1858},
  eprinttype    = {arXiv},
  eprint       = {0810.1858},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0810-1858.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/GaliceMU07,
  author       = {Samuel Galice and
                  Marine Minier and
                  St{\'{e}}phane Ub{\'{e}}da},
  editor       = {Sandro Etalle and
                  Stephen Marsh},
  title        = {A trust protocol for community collaboration},
  booktitle    = {Trust Management - Proceedings of {IFIPTM} 2007: Joint iTrust and
                  {PST} Conferences on Privacy, Trust Management and Security, July
                  30- August 2, 2007, Moncton, New Brunswick, Canada},
  series       = {{IFIP}},
  volume       = {238},
  pages        = {169--184},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-73655-6\_12},
  doi          = {10.1007/978-0-387-73655-6\_12},
  timestamp    = {Tue, 29 Dec 2020 11:03:37 +0100},
  biburl       = {https://dblp.org/rec/conf/ifiptm/GaliceMU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ArnaultBLM07,
  author       = {Fran{\c{c}}ois Arnault and
                  Thierry P. Berger and
                  C{\'{e}}dric Lauradoux and
                  Marine Minier},
  editor       = {K. Srinathan and
                  C. Pandu Rangan and
                  Moti Yung},
  title        = {{X-FCSR} - {A} New Software Oriented Stream Cipher Based Upon FCSRs},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
                  on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4859},
  pages        = {341--350},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77026-8\_26},
  doi          = {10.1007/978-3-540-77026-8\_26},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/ArnaultBLM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/FournelMU07,
  author       = {Nicolas Fournel and
                  Marine Minier and
                  St{\'{e}}phane Ub{\'{e}}da},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {202--214},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_17},
  doi          = {10.1007/978-3-540-72354-7\_17},
  timestamp    = {Sun, 02 Oct 2022 16:17:41 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/FournelMU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArnaultBLM07,
  author       = {Fran{\c{c}}ois Arnault and
                  Thierry P. Berger and
                  C{\'{e}}dric Lauradoux and
                  Marine Minier},
  title        = {{X-FCSR:} a new software oriented stream cipher based upon FCSRs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {380},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/380},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArnaultBLM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/GaliceMMU06,
  author       = {Samuel Galice and
                  Marine Minier and
                  John Mullins and
                  St{\'{e}}phane Ub{\'{e}}da},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {Cryptographic Protocol to Establish Trusted History of Interactions},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {136--149},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_13},
  doi          = {10.1007/11964254\_13},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/GaliceMMU06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/GaliceLMMU06,
  author       = {Samuel Galice and
                  V{\'{e}}ronique Legrand and
                  Marine Minier and
                  John Mullins and
                  St{\'{e}}phane Ub{\'{e}}da},
  title        = {A History-Based Framework to Build Trust Management Systems},
  booktitle    = {Second International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
                  2, 2006 - September 1, 2006},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/SECCOMW.2006.359580},
  doi          = {10.1109/SECCOMW.2006.359580},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/GaliceLMMU06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0606005,
  author       = {Samuel Galice and
                  V{\'{e}}ronique Legrand and
                  Marine Minier and
                  John Mullins and
                  St{\'{e}}phane Ub{\'{e}}da},
  title        = {The {KAA} project: a trust policy point of view},
  journal      = {CoRR},
  volume       = {abs/cs/0606005},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0606005},
  eprinttype    = {arXiv},
  eprint       = {cs/0606005},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0606005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BergerM05,
  author       = {Thierry P. Berger and
                  Marine Minier},
  editor       = {Subhamoy Maitra and
                  C. E. Veni Madhavan and
                  Ramarathnam Venkatesan},
  title        = {Two Algebraic Attacks Against the F-FCSRs Using the {IV} Mode},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2005, 6th International Conference
                  on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3797},
  pages        = {143--154},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596219\_12},
  doi          = {10.1007/11596219\_12},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BergerM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/Minier04,
  author       = {Marine Minier},
  editor       = {Hans Dobbertin and
                  Vincent Rijmen and
                  Aleksandra Sowa},
  title        = {A Three Rounds Property of the {AES}},
  booktitle    = {Advanced Encryption Standard - AES, 4th International Conference,
                  {AES} 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3373},
  pages        = {16--26},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11506447\_3},
  doi          = {10.1007/11506447\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/Minier04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GilbertM02,
  author       = {Henri Gilbert and
                  Marine Minier},
  editor       = {Lars R. Knudsen},
  title        = {Cryptanalysis of {SFLASH}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {288--298},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_19},
  doi          = {10.1007/3-540-46035-7\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GilbertM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GilbertM01,
  author       = {Henri Gilbert and
                  Marine Minier},
  editor       = {Mitsuru Matsui},
  title        = {New Results on the Pseudorandomness of Some Blockcipher Constructions},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {248--266},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_21},
  doi          = {10.1007/3-540-45473-X\_21},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/GilbertM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/GilbertM00,
  author       = {Henri Gilbert and
                  Marine Minier},
  title        = {A Collision Attack on 7 Rounds of Rijndael},
  booktitle    = {The Third Advanced Encryption Standard Candidate Conference, April
                  13-14, 2000, New York, New York, {USA}},
  pages        = {230--241},
  publisher    = {National Institute of Standards and Technology,},
  year         = {2000},
  timestamp    = {Thu, 08 Aug 2019 17:13:16 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/GilbertM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MinierG00,
  author       = {Marine Minier and
                  Henri Gilbert},
  editor       = {Bruce Schneier},
  title        = {Stochastic Cryptanalysis of Crypton},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {121--133},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_9},
  doi          = {10.1007/3-540-44706-7\_9},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MinierG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics