Group c2
c2 (cybersecurity and cryptography)
LTCI, Telecom Paris
Themes: digital trust
c2 focuses on Cybersecurity, with a focus on network security, and Cryptography
Contact person: Duong Hieu Phan, https://www.telecom-paris.fr/phan?l=en
Journal articles
2024
- ref_biblio
- Ferran Alborch Escobar, Sébastien Canard, Fabien Laguillaumie, Duong Hieu Phan. Computational Differential Privacy for Encrypted Databases Supporting Linear Queries. Proceedings on Privacy Enhancing Technologies, 2024, 2024 (4), pp.583-604. ⟨10.56553/popets-2024-0131⟩. ⟨hal-04659467⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Farah-Emma Braiteh, Francesca Bassi, Rida Khatoun. Platooning in Connected Vehicles: A Review of Current Solutions, Standardization Activities, Cybersecurity, and Research Opportunities. IEEE Transactions on Intelligent Vehicles, 2024, pp.1-23. ⟨10.1109/TIV.2024.3447916⟩. ⟨hal-04755422⟩
- Accès au bibtex
- ref_biblio
- Olivier Hudry, Ville Junnila, Antoine Lobstein. On Iiro Honkala’s contributions to identifying codes. Fundamenta Informaticae, In press, 191 (3-4), pp.165-196. ⟨10.3233/FI-242178⟩. ⟨hal-04568130⟩
- Accès au bibtex
- ref_biblio
- Olivier Hudry. New dominating, locating-dominating or identifying codes in the q-ary Lee Hypercube. WSEAS Transactions on Mathematics, In press. ⟨hal-04667153⟩
- Accès au bibtex
2023
- ref_biblio
- Patrice Bertail, Mohammed Bouchouia, Ons Jelassi, Jessica Tressou, Mélanie Zetlaoui. Scaling by subsampling for big data, with applications to statistical learning. Journal of Nonparametric Statistics, 2023, 36 (1), pp.78-117. ⟨10.1080/10485252.2023.2219782⟩. ⟨hal-04244852v2⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Antoine Boudermine, Rida Khatoun, Jean-Henri Choyer. Dynamic logic-based attack graph for risk assessment in complex computer systems. Computer Networks, 2023, 228, pp.109730. ⟨10.1016/j.comnet.2023.109730⟩. ⟨hal-04370488⟩
- Accès au bibtex
- ref_biblio
- Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen. On the Hardness of Module Learning with Errors with Short Distributions. Journal of Cryptology, 2023, 36 (1), pp.1-70. ⟨10.1007/s00145-022-09441-3⟩. ⟨hal-04028217⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Miroslaw Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada. The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography. Proceedings on Privacy Enhancing Technologies, 2023, 2023 (4), pp.170-183. ⟨10.56553/popets-2023-0104⟩. ⟨hal-04194142⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Ali Mustapha, Rida Khatoun, Sherali Zeadally, Fadlallah Chbib, Ahmad Fadlallah, et al.. Detecting DDoS attacks using adversarial neural network. Computers & Security, 2023, 127, pp.103117. ⟨10.1016/j.cose.2023.103117⟩. ⟨hal-04370499⟩
- Accès au bibtex
2022
- ref_biblio
- Elena Berardini, Jade Nardi. Curves on Frobenius classical surfaces in $\mathbb{P}^{3}$ over finite fields. Acta Arithmetica, 2022, 205 (4), pp.323-340. ⟨10.4064/aa211118-12-9⟩. ⟨hal-03889512⟩
- Accès au bibtex
- ref_biblio
- Claude Carlet, Sihem Mesnager. On those multiplicative subgroups of $${\mathbb F}_{2^n}^*$$ which are Sidon sets and/or sum-free sets. Journal of Algebraic Combinatorics, 2022, 55 (1), pp.43-59. ⟨10.1007/s10801-020-00988-7⟩. ⟨hal-03960675⟩
- Accès au bibtex
- ref_biblio
- Fadlallah Chbib, Sherali Zeadally, Rida Khatoun, Lyes Khoukhi, Walid Fahs, et al.. A secure cross-layer architecture for reactive routing in vehicle to vehicle (V2V) communications. Vehicular Communications, 2022, 38, pp.100541. ⟨10.1016/j.vehcom.2022.100541⟩. ⟨hal-04370526⟩
- Accès au bibtex
- ref_biblio
- Ahmed Didouh, Yassin El Hillali, Atika Rivenq, Houda Labiod. Novel Centralized Pseudonym Changing Scheme for Location Privacy in V2X Communication. Energies, 2022, 15 (3), pp.692. ⟨10.3390/en15030692⟩. ⟨hal-03596306⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Said Eddahmani, Sihem Mesnager. Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the gold, and the Bracken-Leander S-boxes. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2022, 14 (6), pp.1301-1344. ⟨10.1007/s12095-022-00581-8⟩. ⟨hal-03960658⟩
- Accès au bibtex
- ref_biblio
- Zhi Gu, Zhengchun Zhou, Sihem Mesnager, Udaya Parampalli. A new family of polyphase sequences with low correlation. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2022, 14 (1), pp.135-144. ⟨10.1007/s12095-021-00522-x⟩. ⟨hal-03960670⟩
- Accès au bibtex
- ref_biblio
- Badis Hammi, Yacine Mohamed Idir, Sherali Zeadally, Rida Khatoun, Jamel Nebhen. Is it Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position Paper. IEEE Transactions on Intelligent Transportation Systems, 2022, 23 (10), pp.18273-18287. ⟨10.1109/TITS.2022.3165513⟩. ⟨hal-03860322⟩
- Accès au bibtex
- ref_biblio
- Badis Hammi, Sherali Zeadally, Rida Khatoun, Jamel Nebhen. Survey on smart homes: Vulnerabilities, risks, and countermeasures. Computers & Security, 2022, 117, pp.102677. ⟨10.1016/j.cose.2022.102677⟩. ⟨hal-03860307⟩
- Accès au bibtex
- ref_biblio
- Badis Hammi, Sherali Zeadally, Yves Christian Elloh Adja, Manlio Del Giudice, Jamel Nebhen. Blockchain-Based Solution for Detecting and Preventing Fake Check Scams. IEEE Transactions on Engineering Management, 2022, 69 (6), pp.3710-3725. ⟨10.1109/TEM.2021.3087112⟩. ⟨hal-04400815⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Olivier Hudry, Antoine Lobstein. Some Rainbow Problems in Graphs Have Complexity Equivalent to Satisfiability Problems. International Transactions in Operational Research, 2022, 29 (3), pp.1547-1572. ⟨10.1111/itor.12847⟩. ⟨hal-02916921⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Olivier Hudry. A variant of Young’s method in voting theory providing the same winners as Copeland’s method. International Journal of Mathematics, Statistics and Operations Research, 2022, 1 (2), pp.101-107. ⟨hal-03626855⟩
- Accès au bibtex
- ref_biblio
- Olivier Hudry, Irène Charon, Antoine Lobstein. Codes in the q-ary Lee Hypercube. WSEAS Transactions on Mathematics, 2022, 21, pp.173-186. ⟨10.37394/23206.2022.21.24⟩. ⟨hal-03650634⟩
- Accès au bibtex
- ref_biblio
- Olivier Hudry, Antoine Lobstein. On the Complexity of Determining Whether there is a Unique Hamiltonian Cycle or Path. WSEAS Transactions on Mathematics, 2022, 21, pp.433-446. ⟨10.37394/23206.2022.21.51⟩. ⟨hal-01680709⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Kwang Ho Kim, Sihem Mesnager. Solving X 2 3 n + 2 2 n + 2 n − 1 + ( X + 1 ) 2 3 n + 2 2 n + 2 n − 1 = b in F 2 4 n and an alternative proof of a conjecture on the differential spectrum of the related monomial functions. Finite Fields and Their Applications, 2022, 83, pp.102086. ⟨10.1016/j.ffa.2022.102086⟩. ⟨hal-03960659⟩
- Accès au bibtex
- ref_biblio
- Kwang Ho Kim, Sihem Mesnager, Jong Hyok Choe, Dok Nam Lee. Preimages of p −Linearized Polynomials over ${\mathbb {F}}_{p}$. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2022, 14 (1), pp.75-86. ⟨10.1007/s12095-021-00514-x⟩. ⟨hal-03960672⟩
- Accès au bibtex
- ref_biblio
- Kwang Ho Kim, Sihem Mesnager, Jong Hyok Choe, Dok Nam Lee, Sengsan Lee, et al.. On permutation quadrinomials with boomerang uniformity 4 and the best-known nonlinearity. Designs, Codes and Cryptography, 2022, 90 (6), pp.1437-1461. ⟨10.1007/s10623-022-01047-x⟩. ⟨hal-03960666⟩
- Accès au bibtex
- ref_biblio
- Yanjun Li, Haibin Kan, Sihem Mesnager, Jie Peng, Chik How Tan, et al.. Generic Constructions of (Boolean and Vectorial) Bent Functions and Their Consequences. IEEE Transactions on Information Theory, 2022, 68 (4), pp.2735-2751. ⟨10.1109/TIT.2022.3140180⟩. ⟨hal-03960662⟩
- Accès au bibtex
- ref_biblio
- Huicong Liang, Sihem Mesnager, Meiqin Wang. Cryptanalysis of the AEAD and hash algorithm DryGASCON. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2022, 14 (3), pp.597-625. ⟨10.1007/s12095-021-00542-7⟩. ⟨hal-03960665⟩
- Accès au bibtex
- ref_biblio
- Ruge Lin, Weiqiang Wen. Quantum computation capability verification protocol for NISQ devices with dihedral coset problem. Physical Review A, 2022, 106 (1), pp.012430. ⟨10.1103/PhysRevA.106.012430⟩. ⟨hal-04577018⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Qi Liu, Cunsheng Ding, Sihem Mesnager, Chunming Tang, Vladimir Tonchev. Survey on recent trends towards generalized differential and boomerang uniformities. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2022, 14 (4), pp.691-735. ⟨10.1109/TIT.2021.3139687⟩. ⟨hal-03960660⟩
- Accès au bibtex
- ref_biblio
- Sylvain Lombardy, Jacques Sakarovitch. Morphisms and minimisation of weighted automata. Fundamenta Informaticae, 2022, 186 (1-4), pp.195-218. ⟨10.3233/FI-222126⟩. ⟨hal-03483922v5⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Zhenyu Lu, Sihem Mesnager, Tingting Cui, Yanhong Fan, Meiqin Wang. An STP-based model toward designing S-boxes with good cryptographic properties. Designs, Codes and Cryptography, 2022, 90 (5), pp.1179-1202. ⟨10.1007/s10623-022-01034-2⟩. ⟨hal-03960669⟩
- Accès au bibtex
- ref_biblio
- Makhan Maji, Sihem Mesnager, Santanu Sarkar, Kalyan Hansda. On One-Dimensional Linear Minimal Codes Over Finite (Commutative) Rings. IEEE Transactions on Information Theory, 2022, 68 (5), pp.2990-2998. ⟨10.1109/TIT.2021.3133959⟩. ⟨hal-03960661⟩
- Accès au bibtex
- ref_biblio
- Sihem Mesnager, Sihong Su, Jingjing Li, Linya Zhu. Concrete constructions of weightwise perfectly balanced (2-rotation symmetric) functions with optimal algebraic immunity and high weightwise nonlinearity. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2022, 14 (6), pp.1371-1389. ⟨10.1007/s12095-022-00603-5⟩. ⟨hal-03960656⟩
- Accès au bibtex
- ref_biblio
- Pan Tan, Cuiling Fan, Sihem Mesnager, Wei Guo. Linear codes from support designs of ternary cyclic codes. Designs, Codes and Cryptography, 2022, 90 (3), pp.681-693. ⟨10.1007/s10623-021-01001-3⟩. ⟨hal-03960674⟩
- Accès au bibtex
- ref_biblio
- Hui Zhang, Cuiling Fan, Sihem Mesnager. Constructions of two-dimensional Z-complementary array pairs with large ZCZ ratio. Designs, Codes and Cryptography, 2022, 90 (5), pp.1221-1239. ⟨10.1007/s10623-022-01035-1⟩. ⟨hal-03960668⟩
- Accès au bibtex
2021
- ref_biblio
- Kanat Abdukhalikov, Cunsheng Ding, Sihem Mesnager, Chunming Tang, Maosheng Xiong. Cyclic Bent Functions and Their Applications in Sequences. IEEE Transactions on Information Theory, 2021, 67 (6), pp.3473-3485. ⟨10.1109/TIT.2021.3057896⟩. ⟨hal-03960634⟩
- Accès au bibtex
- ref_biblio
- Stéphane Ballet, Julia Pieltant, Jean Chaumine, Matthieu Rambaud, Hugues Randriambololona, et al.. On the tensor rank of multiplication in finite extensions of finite fields and related issues in algebraic geometry. Russian Mathematical Surveys, 2021, 76 (1), pp.29-89. ⟨10.1070/RM9928⟩. ⟨hal-03661954⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Alexander Barg, Lara Dolecek, Ryan Gabrys, Gyula Katona, Janos Korner, et al.. Guest Editorial Special Issue: “From Deletion-Correction to Graph Reconstruction: In Memory of Vladimir I. Levenshtein”. IEEE Transactions on Information Theory, 2021, 67 (6), pp.3187-3189. ⟨10.1109/TIT.2021.3072555⟩. ⟨hal-03960636⟩
- Accès au bibtex
- ref_biblio
- M. Boumezbeur, Sihem Mesnager, K. Guenda. Linear codes from vectorial Boolean functions in the context of algebraic attacks. Discrete Mathematics, Algorithms and Applications, 2021, 13 (03), pp.2150032. ⟨10.1142/S1793830921500324⟩. ⟨hal-03960619⟩
- Accès au bibtex
- ref_biblio
- Claude Carlet, Kwang Ho Kim, Sihem Mesnager. A direct proof of APN-ness of the Kasami functions. Designs, Codes and Cryptography, 2021, 89 (3), pp.441-446. ⟨10.1007/s10623-020-00830-y⟩. ⟨hal-03960643⟩
- Accès au bibtex
- ref_biblio
- Fadlallah Chbib, Walid Fahs, Jamal Haydar, Lyes Khoukhi, Rida Khatoun. IEEE 802.11p performance enhancement based on Markov chain and neural networks for safety applications. Annals of Telecommunications - annales des télécommunications, 2021, 76 (9-10), pp.617-632. ⟨10.1007/s12243-021-00846-y⟩. ⟨hal-03404239⟩
- Accès au bibtex
- ref_biblio
- Ruikai Chen, Sihem Mesnager, Chang-An Zhao. Good polynomials for optimal LRC of low locality. Designs, Codes and Cryptography, 2021, 89 (7), pp.1639-1660. ⟨10.1007/s10623-021-00886-4⟩. ⟨hal-03960639⟩
- Accès au bibtex
- ref_biblio
- Hang Chen, Cunsheng Ding, Sihem Mesnager, Chunming Tang. A Novel Application of Boolean Functions With High Algebraic Immunity in Minimal Codes. IEEE Transactions on Information Theory, 2021, 67 (10), pp.6856-6867. ⟨10.1109/TIT.2021.3102314⟩. ⟨hal-03960615⟩
- Accès au bibtex
- ref_biblio
- Sumit Kumar Debnath, Sihem Mesnager, Kunal Dey, Nibedita Kundu. Post-Quantum Secure Inner Product Functional Encryption Using Multivariate Public Key Cryptography. Mediterranean Journal of Mathematics, 2021, 18 (5), pp.204. ⟨10.1007/s00009-021-01841-2⟩. ⟨hal-03960628⟩
- Accès au bibtex
- ref_biblio
- Yanhong Fan, Sihem Mesnager, Weijia Wang, Yongqing Li, Tingting Cui, et al.. Investigation for 8-bit SKINNY-like S-boxes, analysis and applications. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2021, 13 (5), pp.617-636. ⟨10.1007/s12095-021-00486-y⟩. ⟨hal-03960607⟩
- Accès au bibtex
- ref_biblio
- Chunyu Gan, Chengju Li, Sihem Mesnager, Haifeng Qian. On Hulls of Some Primitive BCH Codes and Self-Orthogonal Codes. IEEE Transactions on Information Theory, 2021, 67 (10), pp.6442-6455. ⟨10.1109/TIT.2021.3076878⟩. ⟨hal-03960617⟩
- Accès au bibtex
- ref_biblio
- Khaled Hejja, Sara Berri, Houda Labiod. Network slicing with load-balancing for task offloading in vehicular edge computing. Vehicular Communications, 2021, pp.100419. ⟨10.1016/j.vehcom.2021.100419⟩. ⟨hal-03438958⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Ivan Gazeau, Jingxuan Ma, et al.. Security Analysis of Machine Learning-Based PUF Enrollment Protocols: A Review. Sensors, 2021, 21 (24), pp.8415. ⟨10.3390/s21248415⟩. ⟨hal-04427680⟩
- Accès au bibtex
- ref_biblio
- Kwang Ho Kim, Jong Hyok Choe, Sihem Mesnager. Complete solution over F p n of the equation X p k + 1 + X + a = 0. Finite Fields and Their Applications, 2021, 76, pp.101902. ⟨10.1016/j.ffa.2021.101902⟩. ⟨hal-03960627⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Kangquan Li, Sihem Mesnager, Longjiang Qu. Further Study of 2-to-1 Mappings Over F 2 n. IEEE Transactions on Information Theory, 2021, 67 (6), pp.3486-3496. ⟨10.1109/TIT.2021.3057094⟩. ⟨hal-03960633⟩
- Accès au bibtex
- ref_biblio
- Yubo Li, Kangquan Li, Sihem Mesnager, Longjiang Qu. More permutations and involutions for constructing bent functions. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2021, 13 (3), pp.459-473. ⟨10.1007/s12095-021-00482-2⟩. ⟨hal-03960609⟩
- Accès au bibtex
- ref_biblio
- Sylvain Lombardy, Jacques Sakarovitch. Derived Terms without Derivation -- A shifted perspective on the derived-term automaton. Journal of Computer Science and Cybernetics, Vietnamese Academy of Science and Technology, Vietnam, 2021, 37 (3), pp.201-221. ⟨10.15625/1813-9663/37/3/16263⟩. ⟨hal-03382261⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Sihem Mesnager, Bimal Mandal, Mounira Msahli. Survey on recent trends towards generalized differential and boomerang uniformities. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2021, ⟨10.1007/s12095-021-00551-6⟩. ⟨hal-03569465⟩
- Accès au bibtex
- ref_biblio
- Sihem Mesnager, Constanza Riera, Pantelimon Stanica, Haode Yan, Zhengchun Zhou. Investigations on c -(Almost) Perfect Nonlinear Functions. IEEE Transactions on Information Theory, 2021, 67 (10), pp.6916-6925. ⟨10.1109/TIT.2021.3081348⟩. ⟨hal-03960613⟩
- Accès au bibtex
- ref_biblio
- Sihem Mesnager, Ferruh Özbudak, Ahmet Sinak. Secondary constructions of (non)weakly regular plateaued functions over finite fields. Turkish Journal of Mathematics, 2021, 45 (5), pp.2295-2306. ⟨10.3906/mat-2104-5⟩. ⟨hal-03960600⟩
- Accès au bibtex
- ref_biblio
- Sihem Mesnager, Sihong Su. On constructions of weightwise perfectly balanced Boolean functions. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2021, 13 (6), pp.951-979. ⟨10.1007/s12095-021-00481-3⟩. ⟨hal-03960605⟩
- Accès au bibtex
- ref_biblio
- Sihem Mesnager, Chunming Tang. Fast Algebraic Immunity of Boolean Functions and LCD Codes. IEEE Transactions on Information Theory, 2021, 67 (7), pp.4828-4837. ⟨10.1109/TIT.2021.3056716⟩. ⟨hal-03960632⟩
- Accès au bibtex
- ref_biblio
- Sihem Mesnager, Sihong Su. On Correlation Immune Boolean Functions With Minimum Hamming Weight Power of 2. IEEE Transactions on Information Theory, 2021, 67 (11), pp.7501-7517. ⟨10.1109/TIT.2021.3109946⟩. ⟨hal-03960612⟩
- Accès au bibtex
- ref_biblio
- Sihem Mesnager, Sihong Su, Hui Zhang. A construction method of balanced rotation symmetric Boolean functions on arbitrary even number of variables with optimal algebraic immunity. Designs, Codes and Cryptography, 2021, 89 (1), pp.1-17. ⟨10.1007/s10623-020-00806-y⟩. ⟨hal-03960647⟩
- Accès au bibtex
- ref_biblio
- Duong Hieu Phan, Moti Yung. Privacy in Advanced Cryptographic Protocols: Prototypical Examples. Journal of Computer Science and Cybernetics, Vietnamese Academy of Science and Technology, Vietnam, 2021, 37 (4), pp.429-451. ⟨10.15625/1813-9663/37/4/16104⟩. ⟨hal-03541793⟩
- Accès au bibtex
- ref_biblio
- Liqin Qian, Xiwang Cao, Sihem Mesnager. Linear codes with one-dimensional hull associated with Gaussian sums. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2021, 13 (2), pp.225-243. ⟨10.1007/s12095-020-00462-y⟩. ⟨hal-03960638⟩
- Accès au bibtex
2020
- ref_biblio
- Valerie Berthe, Christiane Frougny, Michel Rigo, Jacques Sakarovitch. The carry propagation of the successor function. Advances in Applied Mathematics, 2020, 120, pp.102062. ⟨10.1016/j.aam.2020.102062⟩. ⟨hal-03379583⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Raphaël Cw Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, et al.. Advances in security research in the Asiacrypt region. Communications of the ACM, 2020, 63 (4), pp.76-81. ⟨10.1145/3378428⟩. ⟨hal-03540244⟩
- Accès au bibtex
2018
- ref_biblio
- Shigeki Akiyama, Victor Marsault, Jacques Sakarovitch. On subtrees of the representation tree in rational base numeration systems. Discrete Mathematics and Theoretical Computer Science, 2018, 20 (1), pp.1-33. ⟨10.23638/DMTCS-20-1-10⟩. ⟨hal-02287876⟩
- Accès au bibtex
2016
- ref_biblio
- Gérard Cohen, Sihem Mesnager, Hugues Randriambololona. Yet another variation on minimal linear codes. Advances in mathmatics of Communications, 2016, 10 (1), pp.53-61. ⟨hal-02287564⟩
- Accès au bibtex
Conference papers
2024
- ref_biblio
- Anaïs Barthoulot, Olivier Blazy, Sébastien Canard. Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs. AFRICACRYPT 2024 - 15th International Conference on Cryptology, Jul 2024, Douala, Cameroon. In press. ⟨hal-04618343⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Fadlallah Chbib, Ali El Attar, Rida Khatoun, Ahmad Fadlallah, Ahmed Serhrouchni. DNS flooding attack detection scheme through Machine Learning. IEEE Wireless Communications and Networking Conference (WCNC), Apr 2024, Dubai, United Arab Emirates. ⟨hal-04616511⟩
- Accès au bibtex
- ref_biblio
- Fadlallah Chbib, Razan Sujud, Rida Khatoun, Walid Fahs. Cyberbullying Detection Using Bidirectional Encoder Representations from Transformers (BERT). IEEE International Mediterranean Conference on Communications and Networking (IEEE MeditCom 2024)., Jul 2024, Madrid, Spain. ⟨hal-04616521⟩
- Accès au bibtex
- ref_biblio
- Badis Hammi, Joel Hachem, Ali Rachini, Rida Khatoun. Malware detection through windows system call analysis. 9th International Conference On Mobile And Secure Services (MOBISECSERV), Nov 2024, Miami, United States. pp.7. ⟨hal-04739413⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Olivier Hudry. Complexity of the uniqueness problem of a minimum vertex cover in a graph. 37th Conference of the European Chapter on Combinatorial Optimization (ECCO XXXVII), Jun 2024, Gand, Belgium. ⟨hal-04568134⟩
- Accès au bibtex
- ref_biblio
- Alberto Ibarrondo Luis, Ismet Kerenciler, Hervé Chabanne, Vincent Despiegel, Melek Önen. Monchi: Multi-scheme Optimization For Collaborative Homomorphic Identification. IH&MMSec 2024, 12th ACM Workshop on Information Hiding and Multimedia Security, ACM, Jun 2024, Baiona, Spain. ⟨10.1145/3658664.3659633⟩. ⟨hal-04562874⟩
- Accès au texte intégral et bibtex
- ref_biblio
- San Ling, Khoa Nguyen, Duong Hieu Phan, Khai Hanh Tang, Huaxiong Wang, et al.. Fully Dynamic Attribute-Based Signatures for Circuits from Codes. PKC 2024 : Public-Key Cryptography – PKC 2024, Apr 2024, Sydney, Australia. pp.37-73, ⟨10.1007/978-3-031-57718-5_2⟩. ⟨hal-04577056⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Yunmeng Shu, Pengwenlong Gu, Cédric Adjih, Chung Shue Chen, Ahmed Serhrouchni. DynSplit: A Dynamic Split Learning Scheme for 5G-Enpowered Metaverse. 2024 IEEE International Conference on Metaverse Computing, Networking, and Applications (MetaCom), Aug 2024, Hong Kong, China. pp.214-221, ⟨10.1109/MetaCom62920.2024.00043⟩. ⟨hal-04779140⟩
- Accès au bibtex
- ref_biblio
- Ayoub Wehby, Rida Khatoun, Ahmad Fadlallah. Shielding the Connected Cars: A Dataset-Powered Defense Against DDoS. The 11th International Conference on Wireless Networks and Mobile Communications, Jul 2024, Leeds, United Kingdom. ⟨hal-04616515⟩
- Accès au bibtex
- ref_biblio
- Ayoub Wehby, Sherali Zeadally, Rida Khatoun, Mohammed Bouchouia, Ahmad Fadlallah. How Does Distributed Denial of Service Affect the Connected Cars Environment?. International Conference on Control, Decision and Information Technologies (CoDIT'2024), Jul 2024, Valletta, Malta. ⟨hal-04616517⟩
- Accès au bibtex
2023
- ref_biblio
- Ali El Attar, Ayoub Wehby, Fadlallah Chbib, Hassane Aissaoui Mehrez, Ahmad Fadlallah, et al.. Analysis of Machine Learning Algorithms for DDoS Attack Detection in Connected Cars Environment. 2023 Eighth International Conference On Mobile And Secure Services (MobiSecServ), Nov 2023, Miami Beach, United States. pp.1-7, ⟨10.1109/MobiSecServ58080.2023.10329152⟩. ⟨hal-04370557⟩
- Accès au bibtex
- ref_biblio
- Anaïs Barthoulot, Olivier Blazy, Sébastien Canard. Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption. CANS 2023 - Cryptology and Network Security, Oct 2023, Augusta, United States. pp.538-562, ⟨10.1007/978-981-99-7563-1_24⟩. ⟨hal-04271645⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Thai Duong, Jiahui Gao, Duong Hieu Phan, Ni Trieu. Privacy-Preserving Digital Vaccine Passport. CANS 2023 - The 22nd International Conference on Cryptology and Network Security, Oct 2023, Augusta, United States. pp.137-161, ⟨10.1007/978-981-99-7563-1_7⟩. ⟨hal-04276497⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Hao Fan, Yonglin Hao, Qingju Wang, Xinxin Gong, Lin Jiao. Key Filtering in Cube Attacks from the Implementation Aspect. International Conference on Cryptology and Network Security - CANS 2023, Oct 2023, Augusta, GA, United States. pp.293-317, ⟨10.1007/978-981-99-7563-1_14⟩. ⟨hal-04282347⟩
- Accès au bibtex
- ref_biblio
- Pierre-Alain Fouque, Adela Georgescu, Chen Qian, Adeline Roux-Langlois, Weiqiang Wen. A Generic Transform from Multi-Round Interactive Proof to NIZK. PKC 2023 - International Conference on Practice and Theory of Public-Key Cryptography, May 2023, Atlanta, United States. pp.461-481, ⟨10.1007/978-3-031-31371-4_16⟩. ⟨hal-04163128⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Danylo Goncharskyi, Sung Yong Kim, Pengwenlong Gu, Ahmed Serhrouchni, Rida Khatoun, et al.. Lightweight TLS 1.3 Handshake for C-ITS Systems. ICC 2023 - IEEE International Conference on Communications, May 2023, Rome, Italy. pp.1432-1437, ⟨10.1109/ICC45041.2023.10279295⟩. ⟨hal-04698769⟩
- Accès au bibtex
- ref_biblio
- Lorenzo Grassi, Yonglin Hao, Christian Rechberger, Markus Schofnegger, Roman Walch, et al.. Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications. Advances in Cryptology - CRYPTO 2023, IACR, Aug 2023, Santa Barbara, United States. pp.573-606, ⟨10.1007/978-3-031-38548-3_19⟩. ⟨hal-04282328⟩
- Accès au bibtex
- ref_biblio
- Lorenzo Grassi, Irati Manterola Ayala, Martha Norberg Hovd, Morten Øygarden, Håvard Raddum, et al.. Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato. Advances in Cryptology - CRYPTO 2023, IACR, Aug 2023, Santa Barbara, United States. pp.305-339, ⟨10.1007/978-3-031-38548-3_11⟩. ⟨hal-04282311⟩
- Accès au bibtex
- ref_biblio
- Iman Hmedoush, Pengwenlong Gu, Cédric Adjih, Paul Mühlethaler, Ahmed Serhrouchni. DS-IRSA: A Deep Reinforcement Learning and Sensing Based IRSA. GLOBECOM 2023 - IEEE Global Communications Conference, Dec 2023, Kuala Lumpur, Malaysia. ⟨hal-04238023⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Olivier Hudry. Iiro Honkala’s contributions to some conjectures on identifying codes. Symposium in the honour of Iiro Honkala, Jan 2023, Turku, Finland. ⟨hal-03945718⟩
- Accès au bibtex
- ref_biblio
- Olivier Hudry. Complexity of domination problems in graphs. 36th Conference of the European Chapter on Combinatorial Optimization (ECCO XXXVI), May 2023, La Canée (Crete), Greece. ⟨hal-04178439⟩
- Accès au bibtex
- ref_biblio
- Adonis Jamal, Ali El Attar, Fadlallah Chbib, Rida Khatoun. Comparison of Data Cleansing Methods for Network DDoS Attacks Mitigation. 2023 9th International Conference on Control, Decision and Information Technologies (CoDIT), Jul 2023, Rome, Italy. pp.459-464, ⟨10.1109/CoDIT58514.2023.10284093⟩. ⟨hal-04370537⟩
- Accès au bibtex
- ref_biblio
- Hamza Khemissa, Pascal Urien. Towards a centralized security architecture for SOME/IP automotive services. 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), Jan 2023, Las Vegas, United States. pp.977-978, ⟨10.1109/CCNC51644.2023.10059950⟩. ⟨hal-04285097⟩
- Accès au bibtex
- ref_biblio
- Mirosław Kutyłowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada. Anamorphic Signatures: Secrecy from a Dictator Who Only Permits Authentication!. Advances in Cryptology – CRYPTO 2023, Aug 2023, Santa Barbara (CA), United States. pp.759-790, ⟨10.1007/978-3-031-38545-2_25⟩. ⟨hal-04194141⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Brigitte Lonc, Alexandre Aubry, Hafeda Bakhti, Maria Christofi, Hassane Aissaoui Mehrez. Feasibility and Benchmarking of Post-Quantum Cryptography in the Cooperative ITS Ecosystem. IEEE Vehicular Networking Conference (VNC), Apr 2023, Istanbul, Turkey. ⟨hal-04050027⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Ky Nguyen, Duong Hieu Phan, David Pointcheval. Optimal Security Notion for Decentralized Multi-Client Functional Encryption. Applied Cryptography and Network Security. ACNS 2023, Jun 2023, Kyoto, Japan. pp.336-365, ⟨10.1007/978-3-031-33491-7_13⟩. ⟨hal-04194145⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Duy Nguyen, Duong Hieu Phan, David Pointcheval. Verifiable Decentralized Multi-Client Functional Encryption for Inner Product. Advances in Cryptology - ASIACRYPT 2023, Dec 2023, Guanzhou, China. ⟨hal-04276484⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Minh-Thuyen Thi, Siwar Ben Hadj Said, Adrien Roberty, Fadlallah Chbib, Rida Khatoun, et al.. Enabling programmable deterministic communications in 6G. 6G-PDN Workshop - 6G Programmable Deterministic Networking with AI, Oct 2023, Washington, United States. ⟨hal-04210299⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Pascal Urien. On Line Secure Elements: Deploying High Security Keystores and Personal HSMs. 2023 International Conference on Computing, Networking and Communications (ICNC), Feb 2023, Honolulu, United States. pp.450-455, ⟨10.1109/ICNC57223.2023.10074066⟩. ⟨hal-04225785⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Pascal Urien. Demonstration Of Performance For Low Cost Personal HSM. 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), Jan 2023, Las Vegas, United States. pp.879-880, ⟨10.1109/CCNC51644.2023.10060586⟩. ⟨hal-04285114⟩
- Accès au bibtex
- ref_biblio
- Pascal Urien. Demonstrating Low Cost SIM Bluetooth Token For Generation Of Ethereum Transactions. 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), May 2023, Dubai, United Arab Emirates. pp.1-3, ⟨10.1109/ICBC56567.2023.10174874⟩. ⟨hal-04285135⟩
- Accès au bibtex
- ref_biblio
- Pascal Urien. On Line Secure Elements: Deploying High Security Keystores and Personal HSMs. 2023 International Conference on Computing, Networking and Communications (ICNC), Feb 2023, Honolulu, United States. pp.450-455, ⟨10.1109/ICNC57223.2023.10074066⟩. ⟨hal-04285122⟩
- Accès au bibtex
- ref_biblio
- Kaiyi Zhang, Qingju Wang, Yu Yu, Chun Guo, Hongrui Cui. Algebraic Attacks on Round-Reduced RAIN and Full AIM-III. Advances in Cryptology - ASIACRYPT 2023, IACR, Dec 2023, Guangzhou, China. ⟨hal-04282430⟩
- Accès au bibtex
2022
- ref_biblio
- Sarah Bordage, Mathieu Lhotel, Jade Nardi, Hugues Randriam. Interactive Oracle Proofs of Proximity to Algebraic Geometry Codes. CCC 2022 - 37th Computational Complexity Conference, Jul 2022, Philadelphie, United States. pp.30:1--30:45, ⟨10.4230/LIPIcs.CCC.2022.30⟩. ⟨hal-03832439⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Antoine Boudermine, Rida Khatoun, Jean-Henri Choyer. Attack Graph-based Solution for Vulnerabilities Impact Assessment in Dynamic Environment. 2022 5th Conference on Cloud and Internet of Things (CIoT), Mar 2022, Marrakech, Morocco. pp.24-31, ⟨10.1109/CIoT53061.2022.9766588⟩. ⟨hal-03860336⟩
- Accès au bibtex
- ref_biblio
- Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen. Entropic Hardness of Module-LWE from Module-NTRU. 23rd International Conference on Cryptology, Kolkata, India : Progress in Cryptology – INDOCRYPT 2022, Dec 2022, Kolkata, India. pp.78 - 99, ⟨10.1007/978-3-031-22912-1_4⟩. ⟨hal-04028179⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Andre Esser, Alexander May, Javier A. Verbel, Weiqiang Wen. Partial Key Exposure Attacks on BIKE, Rainbow and NTRU. Advances in Cryptology - CRYPTO 2022, Aug 2022, Santa Barbara, United States. pp.3-31, ⟨10.1007/978-3-031-15982-4_1⟩. ⟨hal-03876958⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Danylo Goncharskyi, Sung Yong Kim, Ahmed Serhrouchni, Pengwenlong Gu, Rida Khatoun, et al.. Delay Measurement of 0-RTT Transport Layer Security (TLS) Handshake Protocol. 2022 8th International Conference on Control, Decision and Information Technologies (CoDIT), May 2022, Istanbul, France. pp.1450-1454, ⟨10.1109/CoDIT55151.2022.9803984⟩. ⟨hal-03860343⟩
- Accès au bibtex
- ref_biblio
- Badis Hammi, Mohamed Yacine Idir, Rida Khatoun. A machine learning based approach for the detection of sybil attacks in C-ITS. 2022 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS), Sep 2022, Takamatsu, Japan. pp.1-4, ⟨10.23919/APNOMS56106.2022.9919991⟩. ⟨hal-03860326⟩
- Accès au bibtex
- ref_biblio
- Olivier Hudry, Antoine Lobstein. Complexité du problème de l'unicité d'un transversal minimum dans un graphe. 23ème congrès annuel de la Société Française de Recherche Opérationnelle et d'Aide à la Décision, INSA Lyon, Feb 2022, Villeurbanne - Lyon, France. ⟨hal-03596176⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Olivier Hudry, Antoine Lobstein. Complexity of the unicity of an optimal vertex cover in graphs. Stockholm Optimization Days 2022, Jun 2022, Stockholm, Sweden. ⟨hal-03714746⟩
- Accès au bibtex
- ref_biblio
- Olivier Hudry. Characterization of the majority matrices of profiles of equivalence relations. 7th International Symposium on Combinatorial Optimization (ISCO 2022), 2022, à distance, France. ⟨hal-03697613⟩
- Accès au bibtex
- ref_biblio
- Olivier Hudry, Irene Charon, Antoine Lobstein. Dominating, Locating-Dominating and Identifying Codes in the q-ary Lee Hypercube. 11th International Colloquium on Graph Theory and Combinatorics (ICGT 2022), 2022, Montpellier, France. ⟨hal-03744673⟩
- Accès au bibtex
- ref_biblio
- Hamza Khemissa, Pascal Urien. Centralized architecture for ECU security management in connected and autonomous vehicles. 2022 13th International Conference on Information and Communication Technology Convergence (ICTC), Oct 2022, Jeju Island, South Korea. pp.1409-1414, ⟨10.1109/ICTC55196.2022.9952757⟩. ⟨hal-04285073⟩
- Accès au bibtex
- ref_biblio
- Sung Yong Kim, Danylo Goncharskyi, Pengwenlong Gu, Ahmed Serhrouchni, Rida Khatoun, et al.. TLS Early Data Resistance to Replay Attacks in Wireless Internet of Things. GLOBECOM 2022 - 2022 IEEE Global Communications Conference, Dec 2022, Rio de Janeiro, France. pp.3539-3544, ⟨10.1109/GLOBECOM48099.2022.10001106⟩. ⟨hal-04370533⟩
- Accès au bibtex
- ref_biblio
- Sylvain Lombardy, Jacques Sakarovitch. The Net Automaton of a Rational Expression. LATIN 2022: LATIN 2022: Theoretical Informatics, Armando Castañeda, Francisco Rodríguez-Henríquez, Nov 2022, Guanajuato, Mexico. pp.376-392, ⟨10.1007/978-3-031-20624-5_23⟩. ⟨hal-03986317⟩
- Accès au bibtex
- ref_biblio
- Ky Nguyen, Duong Hieu Phan, David Pointcheval. Multi-Client Functional Encryption with Fine-Grained Access Control. Asiacrypt 2022 - 28th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2022, Taipei, Taiwan. ⟨10.1007/978-3-031-22963-3_4⟩. ⟨hal-03910053v2⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Quang-Duy Nguyen, Saadia Dhouib, Patrick Bellot. A unified method to design bridges for OPC UA PubSub networks in the industrial IoT. IEEE CAMAD 2022 - IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, Nov 2022, Paris, France. ⟨cea-03870289⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Quang-Duy Nguyen, Saadia Dhouib, Yining Huang, Patrick Bellot. An approach to bridge ROS 1 and ROS 2 devices into an OPC UA-based testbed for industry 4.0. ONCON 2022 - 1st IEEE Industrial Electronics Society Annual On-Line Conference, Dec 2022, Online conference, India. ⟨cea-03870393⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Quang-Duy Nguyen, Saadia Dhouib, Jean-Pierre Chanet, Patrick Bellot. Towards a web-of-things approach for OPC UA field device discovery in the industrial IoT. WFCS 2022 - 18th IEEE International Conference on Factory Communication Systems, Apr 2022, Pavia, Italy. pp.1-4, ⟨10.1109/WFCS53837.2022.9779181⟩. ⟨cea-03633704⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Giuseppe Persiano, Duong Hieu Phan, Moti Yung. Anamorphic Encryption: Private Communication Against a Dictator. Advances in Cryptology - EUROCRYPT 2022, May 2022, Trondheim ( Norvège), Norway. pp.34-63, ⟨10.1007/978-3-031-07085-3_2⟩. ⟨hal-03773135⟩
- Accès au bibtex
- ref_biblio
- Matthieu Rambaud, Andrei Tonkikh, Mark Abspoel. Linear View Change in Optimistically Fast BFT. ConsensusDay '22: Proceedings of the 2022 ACM Workshop on Developments in Consensus, Nov 2022, Los Angeles CA USA, France. pp.67-78, ⟨10.1145/3560829.3563562⟩. ⟨hal-04252576⟩
- Accès au bibtex
- ref_biblio
- Pascal Urien. Innovative Secure Element Grids For Internet Of Secure Elements Servers. 2022 18th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Oct 2022, Thessaloniki, Greece. pp.466-469, ⟨10.1109/WiMob55322.2022.9941674⟩. ⟨hal-04285042⟩
- Accès au bibtex
- ref_biblio
- Pascal Urien. Estimating Speedup Factor For Personal HSMs Based On Secure Elements. 2022 6th Cyber Security in Networking Conference (CSNet), Oct 2022, Rio de Janeiro, Brazil. pp.1-4, ⟨10.1109/CSNet56116.2022.9955609⟩. ⟨hal-04285083⟩
- Accès au bibtex
2021
- ref_biblio
- Olivier Blazy, Sayantan Mukherjee, Huyen Nguyen, Duong Hieu Phan, Damien Stehlé. An Anonymous Trace-and-Revoke Broadcast Encryption Scheme. ACISP 2021 - Australasian Conference on Information Security and Privacy, Dec 2021, Perth, Australia. pp.214-233, ⟨10.1007/978-3-030-90567-5_11⟩. ⟨hal-03475739⟩
- Accès au bibtex
- ref_biblio
- Stéphan Clémençon, Safa Boudabous, Houda Labiod, Julian Garbiso. Dynamic Graph Convolutional LSTM application for traffic flow estimation from error-prone measurements: results and transferability analysis. 2021 IEEE 8th International Conference on Data Science and Advanced Analytics (DSAA), Oct 2021, Porto, Portugal. pp.1-10, ⟨10.1109/DSAA53316.2021.9564245⟩. ⟨hal-03559364⟩
- Accès au bibtex
- ref_biblio
- Pengwenlong Gu, Dingjie Zhong, Cunqing Hua, Farid Nait-Abdesselam, Ahmed Serhrouchni, et al.. Scaling A Blockchain System For 5G-based Vehicular Networks Using Heuristic Sharding. GLOBECOM 2021 - 2021 IEEE Global Communications Conference, Dec 2021, Madrid, France. pp.1-6, ⟨10.1109/GLOBECOM46510.2021.9685234⟩. ⟨hal-03860353⟩
- Accès au bibtex
- ref_biblio
- Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Ivan Gazeau, Jingxuan Ma, et al.. Water- PUF: An Insider Threat Resistant PUF Enrollment Protocol Based on Machine Learning Watermarking. 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA), Nov 2021, Boston, United States. pp.1-10, ⟨10.1109/NCA53618.2021.9685239⟩. ⟨hal-04262875⟩
- Accès au bibtex
- ref_biblio
- San Ling, Khoa Nguyen, Duong Hieu Phan, Hanh Tang, Huaxiong Wang. Zero-Knowledge Proofs for Committed Symmetric Boolean Functions. Post-Quantum Cryptography, Jul 2021, Daegeon, South Korea. pp.339-359, ⟨10.1007/978-3-030-81293-5_18⟩. ⟨hal-03540237⟩
- Accès au bibtex
- ref_biblio
- Sihem Mesnager. ``{Readers} digest of'' 17-year achievements on {Boolean} and vectorial functions and open problems.. Cryptography and coding theory conference, 2021, Rome (Italia), Italy. ⟨hal-03960654⟩
- Accès au bibtex
- ref_biblio
- Quang-Duy Nguyen, Catherine Roussey, Patrick Bellot, Jean-Pierre Chanet. Stack of Services for Context-Aware Systems: An Internet-Of-Things System Design Approach. The 15th IEEE-RIVF International Conference on Computing and Communication Technologies, Aug 2021, Hanoi, Vietnam. ⟨10.1109/RIVF51545.2021.9642107⟩. ⟨hal-03195120v5⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Pascal Urien. Innovative Countermeasures to Defeat Cyber Attacks Against Blockchain Wallets: A Crypto Terminal Use Case. 5th Cyber Security in Networking Conference (CSNet), 2021, IEEE, Oct 2021, Rio de Jaineiro, Brazil. pp.49-54, ⟨10.1109/csnet52717.2021.9614649⟩. ⟨hal-04051629⟩
- Accès au texte intégral et bibtex
2020
- ref_biblio
- Xuan Thanh Do, Duong Hieu Phan, Moti Yung. A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes. ACNS 2020 - International Conference on Applied Cryptography and Network Security, Nov 2020, Rome, Italy. pp.145-164, ⟨10.1007/978-3-030-57878-7_8⟩. ⟨hal-03540247⟩
- Accès au bibtex
- ref_biblio
- Thai Duong, Duong Hieu Phan, Ni Trieu. Catalic: Delegated PSI Cardinality with Applications to Contact Tracing. Advances in Cryptology - ASIACRYPT 2020, Dec 2020, Virtual, France. pp.870-899, ⟨10.1007/978-3-030-64840-4_29⟩. ⟨hal-03220027⟩
- Accès au bibtex
- ref_biblio
- Hugues Randriambololona, Édouard Rousseau. Trisymmetric Multiplication Formulae in Finite Fields. WAIFI 2020, Jul 2020, Rennes, France. pp.92-111, ⟨10.1007/978-3-030-68869-1_5⟩. ⟨hal-03832419⟩
- Accès au texte intégral et bibtex
2019
- ref_biblio
- Shi Bai, Shaun Miller, Weiqiang Wen. A refined analysis of the cost for solving LWE via uSVP. Africacrypt 2019 - 11th International Conference on Cryptology in Africa, Jul 2019, Rabat, Morocco. ⟨hal-02886638⟩
- Accès au texte intégral et bibtex
2018
- ref_biblio
- Olivier Hudry. Complexity of the computation of dominating sets in graphs. EURO/ALIO International Conference 2018 on Applied Combinatorial Optimization, 2018, Bologne, Italy. ⟨hal-04283510⟩
- Accès au bibtex
- ref_biblio
- Sylvain Lombardy, Jacques Sakarovitch. Two Routes to Automata Minimization and the Ways to Reach It Efficiently. International Conference on Implementation and Application of Automata, CIAA 2018, Jul 2018, Charlottetown, Canada. pp.248-260, ⟨10.1007/978-3-319-94812-6_21⟩. ⟨hal-01866176⟩
- Accès au bibtex
2013
- ref_biblio
- Julien Bringer, Hervé Chabanne, Alain Patey. SHADE: Secure HAmming DistancE Computation from Oblivious Transfer. WAHC : 17th International Conference on Financial Cryptology and Data Security, FC 2013, Apr 2013, Okinawa, Japan. pp.164-176. ⟨hal-00872212⟩
- Accès au bibtex
Book sections
2022
- ref_biblio
- Duong Hieu Phan. Broadcast Encryption and Traitor Tracing. Asymmetric Cryptography: Primitives and Protocols, 1, Wiley, 2022, 9781394188369. ⟨10.1002/9781394188369.ch6⟩. ⟨hal-04283588⟩
- Accès au bibtex
2021
- ref_biblio
- Laetitia Debesse, Sihem Mesnager, Mounira Msahli. POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack. Applied Cryptography and Network Security Workshops, 12809, Springer International Publishing, pp.485-489, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-81645-2_27⟩. ⟨hal-03569438⟩
- Accès au bibtex
- ref_biblio
- Sihem Mesnager. Linear codes from functions. W. Cary Huffman, Jon-Lark Kim, Patrick Solé. Concise encyclopedia of coding theory, Chapman and Hall/CRC, pp.463-526, 2021, 9781315147901. ⟨10.1201/9781315147901-22⟩. ⟨hal-03960624⟩
- Accès au bibtex
Books
2024
- ref_biblio
- Olivier Hudry, Irène Charon. Analyse combinatoire. Hermes - John Libbey Eurotext. 2024, Iris, Nicolas Puech. ⟨hal-04283499⟩
- Accès au bibtex
- ref_biblio
- Rida Khatoun (Dir.). Cybersécurité des maisons intelligentes : architectures, solutions et technologies. ISTE éditions, pp.1-314, 2024, Réseaux et communications, 9781789480863. ⟨hal-04745147⟩
- Accès au bibtex
2022
- ref_biblio
- Rida Khatoun. Cybersecurity in Smart Homes: Architectures, Solutions and Technologies. , 2022, Wiley Data and Cybersecurity, 9781119987444. ⟨hal-04370568⟩
- Accès au bibtex
Patents
2023
- ref_biblio
- Sameh Khalfaoui, Arthur Villard, Jingxuan Ma, Jean Leneutre. Procédé et système d’authentification par un équipement vérificateur d’un dispositif à authentifier équipé d’un circuit PUF. France, Patent n° : FR3124870. 2023. ⟨hal-04427708⟩
- Accès au bibtex
2022
- ref_biblio
- Sameh Khalfaoui, Arthur Villard, Jingxuan MA, Jean Leneutre. Procédé d'appairage. France, N° de brevet: FR3110796. 2022. ⟨hal-04427706⟩
- Accès au bibtex
2008
- ref_biblio
- Duong Hieu Phan, Olivier Billet. OBTAINING DERIVED VALUES DEPENDING ON A SECRET MASTER VALUE. France, Patent n° : EP2153575. 2008. ⟨hal-03541808⟩
- Accès au bibtex
Proceedings
2024
- ref_biblio
- Clemente Galdi, Duong Hieu Phan. Security and Cryptography for Networks, Part I. 14th International Conference, SCN 2024, Amalfi, Italy, September 11–13, 2024, Proceedings, Part I, 14973, Springer Nature, 2024, Lecture Notes in Computer Science (LNCS, volume 14973), ⟨10.1007/978-3-031-71070-4⟩. ⟨hal-04704764⟩
- Accès au bibtex
- ref_biblio
- Clemente Galdi, Duong Hieu Phan. Security and Cryptography for Networks, Part II. 14th International Conference, SCN 2024, Amalfi, Italy, September 11–13, 2024, Proceedings, Part II, 14974, Springer Nature, 2024, Lecture Notes in Computer Science (LNCS, volume 14974), ⟨10.1007/978-3-031-71073-5⟩. ⟨hal-04704765⟩
- Accès au bibtex
Preprints, Working Papers, ...
2023
- ref_biblio
- David Auger, Johanne Cohen, Antoine Lobstein. Nonatomic Non-Cooperative Neighbourhood Balancing Games. 2023. ⟨hal-04380503⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Paul Frixons, Sébastien Canard, Loïc Ferreira. Quantum Security of the UMTS-AKA Protocol and its Primitives, Milenage and TUAK. 2023. ⟨hal-04334580⟩
- Accès au texte intégral et bibtex
- ref_biblio
- Christophe Levrat. Computing the cohomology of constructible \'etale sheaves on curves. 2023. ⟨hal-04286657⟩
- Accès au bibtex
- ref_biblio
- Christophe Levrat. Curves are algebraic $K(\pi,1)$: theoretical and practical aspects. 2023. ⟨hal-04286664⟩
- Accès au bibtex