Group c2
c2 (cybersecurity and cryptography)
LTCI, Telecom Paris
Themes: digital trust
c2 focuses on Cybersecurity, with a focus on network security, and Cryptography
Contact person: Duong Hieu Phan, https://www.telecom-paris.fr/phan?l=en
Journal articles
2022
- ref_biblio
- Ahmed Didouh, Yassin El Hillali, Atika Rivenq, Houda Labiod. Novel Centralized Pseudonym Changing Scheme for Location Privacy in V2X Communication. Energies, MDPI, 2022, 15 (3), pp.692. ⟨10.3390/en15030692⟩. ⟨hal-03596306⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Olivier Hudry, Irène Charon, Antoine Lobstein. Codes in the q-ary Lee Hypercube. WSEAS Transactions on Mathematics, World Scientific and Engineering Academy and Society (WSEAS), 2022. ⟨hal-03650634⟩
- Accès au bibtex
-
- ref_biblio
- Olivier Hudry. A variant of Young’s method in voting theory providing the same winners as Copeland’s method. International Journal of Mathematics, Statistics and Operations Research, Academic Research Foundations, 2022. ⟨hal-03626855⟩
- Accès au bibtex
-
- ref_biblio
- Olivier Hudry, Antoine Lobstein. Some rainbow problems in graphs have complexity equivalent to satisfiability problems. International Transactions in Operational Research, Wiley, 2022. ⟨hal-03466089⟩
- Accès au bibtex
-
2021
- ref_biblio
- Stéphane Ballet, Julia Pieltant, Jean Chaumine, Matthieu Rambaud, Hugues Randriambololona, et al.. On the tensor rank of multiplication in finite extensions of finite fields and related issues in algebraic geometry. Russian Mathematical Surveys, Turpion, 2021, 76 (1), pp.29-89. ⟨10.1070/RM9928⟩. ⟨hal-03661954⟩
- Accès au texte intégral et bibtex
-
- ref_biblio
- Fadlallah Chbib, Walid Fahs, Jamal Haydar, Lyes Khoukhi, Rida Khatoun. IEEE 802.11p performance enhancement based on Markov chain and neural networks for safety applications. Annals of Telecommunications - annales des télécommunications, Springer, 2021, 76 (9-10), pp.617-632. ⟨10.1007/s12243-021-00846-y⟩. ⟨hal-03404239⟩
- Accès au bibtex
-
- ref_biblio
- Khaled Hejja, Sara Berri, Houda Labiod. Network slicing with load-balancing for task offloading in vehicular edge computing. Vehicular Communications, Elsevier, 2021, pp.100419. ⟨10.1016/j.vehcom.2021.100419⟩. ⟨hal-03438958⟩
- Accès au bibtex
-
- ref_biblio
- Sihem Mesnager, Bimal Mandal, Mounira Msahli. Survey on recent trends towards generalized differential and boomerang uniformities. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , Springer, 2021, ⟨10.1007/s12095-021-00551-6⟩. ⟨hal-03569465⟩
- Accès au bibtex
-
- ref_biblio
- Duong Hieu Phan, Moti Yung. Privacy in Advanced Cryptographic Protocols: Prototypical Examples. Journal of Computer Science and Cybernetics, Vietnamese Academy of Science and Technology, Vietnam, Acedemie des Sciences du Vietnam, 2021, 37 (4), pp.429-451. ⟨10.15625/1813-9663/37/4/16104⟩. ⟨hal-03541793⟩
- Accès au bibtex
-
2020
- ref_biblio
- Raphaël Cw Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, et al.. Advances in security research in the Asiacrypt region. Communications of the ACM, Association for Computing Machinery, 2020, 63 (4), pp.76-81. ⟨10.1145/3378428⟩. ⟨hal-03540244⟩
- Accès au bibtex
-
Conference papers
2022
- ref_biblio
- Quang-Duy Nguyen, Saadia Dhouib, Jean-Pierre Chanet, Patrick Bellot. Towards a web-of-things approach for OPC UA field device discovery in the industrial IoT. WFCS 2022 - 18th IEEE International Conference on Factory Communication Systems, Apr 2022, Pavia, Italy. pp.1-4. ⟨cea-03633704⟩
- Accès au texte intégral et bibtex
-
2021
- ref_biblio
- Olivier Blazy, Sayantan Mukherjee, Huyen Nguyen, Duong Hieu Phan, Damien Stehlé. An Anonymous Trace-and-Revoke Broadcast Encryption Scheme. ACISP 2021 - Australasian Conference on Information Security and Privacy, Dec 2021, Perth, Australia. pp.214-233, ⟨10.1007/978-3-030-90567-5_11⟩. ⟨hal-03475739⟩
- Accès au bibtex
-
- ref_biblio
- Stéphan Clémençon, Safa Boudabous, Houda Labiod, Julian Garbiso. Dynamic Graph Convolutional LSTM application for traffic flow estimation from error-prone measurements: results and transferability analysis. 2021 IEEE 8th International Conference on Data Science and Advanced Analytics (DSAA), Oct 2021, Porto, Portugal. pp.1-10, ⟨10.1109/DSAA53316.2021.9564245⟩. ⟨hal-03559364⟩
- Accès au bibtex
-
2020
- ref_biblio
- Xuan Thanh Do, Duong Hieu Phan, Moti Yung. A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes. ACNS 2020 - International Conference on Applied Cryptography and Network Security, Nov 2020, Rome, Italy. pp.145-164, ⟨10.1007/978-3-030-57878-7_8⟩. ⟨hal-03540247⟩
- Accès au bibtex
-
- ref_biblio
- Thai Duong, Duong Hieu Phan, Ni Trieu. Catalic: Delegated PSI Cardinality with Applications to Contact Tracing. Advances in Cryptology - ASIACRYPT 2020, Dec 2020, Virtual, France. pp.870-899, ⟨10.1007/978-3-030-64840-4_29⟩. ⟨hal-03220027⟩
- Accès au bibtex
-
- ref_biblio
- Keun-Woo Lim, Katarzyna Kapusta, Gerard Memmi, Woo-Sung Jung. Multi-hop Data Fragmentation in Energy Harvesting Wireless Sensor Networks. 2020 Global Internet of Things Summit (GIoTS), Jun 2020, Dublin, France. pp.1-6, ⟨10.1109/GIOTS49054.2020.9119569⟩. ⟨hal-03559678⟩
- Accès au bibtex
-
Book sections
2021
- ref_biblio
- Laetitia Debesse, Sihem Mesnager, Mounira Msahli. POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack. Applied Cryptography and Network Security Workshops, 12809, Springer International Publishing, pp.485-489, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-81645-2_27⟩. ⟨hal-03569438⟩
- Accès au bibtex
-
Patents
2008
- ref_biblio
- Duong Hieu Phan, Olivier Billet. OBTAINING DERIVED VALUES DEPENDING ON A SECRET MASTER VALUE. France, Patent n° : EP2153575. 2008. ⟨hal-03541808⟩
- Accès au bibtex
-