CSDAI

Department of Institut Polytechnique de Paris

Group c2

c2 (cybersecurity and cryptography)

LTCI, Telecom Paris

Themes: digital trust

c2 focuses on Cybersecurity, with a focus on network security, and Cryptography

Contact person: Duong Hieu Phan, https://www.telecom-paris.fr/phan?l=en

Web site: https://www.telecom-paris.fr/en/research/laboratories/information-processing-and-communication-laboratory-ltci/research-teams/cybersecurity-cryptography-c2

Journal articles

2024

ref_biblio
Olivier Hudry, Ville Junnila, Antoine Lobstein. On Iiro Honkala’s contributions to identifying codes. Fundamenta Informaticae, In press. ⟨hal-04568130⟩
Accès au bibtex
BibTex

2023

ref_biblio
Antoine Boudermine, Rida Khatoun, Jean-Henri Choyer. Dynamic logic-based attack graph for risk assessment in complex computer systems. Computer Networks, 2023, 228, pp.109730. ⟨10.1016/j.comnet.2023.109730⟩. ⟨hal-04370488⟩
Accès au bibtex
BibTex
ref_biblio
Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen. On the Hardness of Module Learning with Errors with Short Distributions. Journal of Cryptology, 2023, 36 (1), pp.1-70. ⟨10.1007/s00145-022-09441-3⟩. ⟨hal-04028217⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04028217/file/2022-12-01_hardness_mlwe_with_short_distributions_eprint_revised.pdf BibTex
ref_biblio
Olivier Hudry, Antoine Lobstein. Some Complexity Considerations on the Uniqueness of Graph Colouring. WSEAS Transactions on Mathematics, 2023, 22, pp.483-493. ⟨hal-04178848⟩
Accès au bibtex
BibTex
ref_biblio
Miroslaw Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada. The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography. Proceedings on Privacy Enhancing Technologies, 2023, 2023 (4), pp.170-183. ⟨10.56553/popets-2023-0104⟩. ⟨hal-04194142⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04194142/file/2023-434.pdf BibTex
ref_biblio
Ali Mustapha, Rida Khatoun, Sherali Zeadally, Fadlallah Chbib, Ahmad Fadlallah, et al.. Detecting DDoS attacks using adversarial neural network. Computers & Security, 2023, 127, pp.103117. ⟨10.1016/j.cose.2023.103117⟩. ⟨hal-04370499⟩
Accès au bibtex
BibTex

2022

ref_biblio
Elena Berardini, Jade Nardi. Curves on Frobenius classical surfaces in $\mathbb{P}^{3}$ over finite fields. Acta Arithmetica, 2022, 205 (4), pp.323-340. ⟨10.4064/aa211118-12-9⟩. ⟨hal-03889512⟩
Accès au bibtex
https://arxiv.org/pdf/2111.09578 BibTex
ref_biblio
Claude Carlet, Sihem Mesnager. On those multiplicative subgroups of $${\mathbb F}_{2^n}^*$$ which are Sidon sets and/or sum-free sets. Journal of Algebraic Combinatorics, 2022, 55 (1), pp.43-59. ⟨10.1007/s10801-020-00988-7⟩. ⟨hal-03960675⟩
Accès au bibtex
BibTex
ref_biblio
Fadlallah Chbib, Sherali Zeadally, Rida Khatoun, Lyes Khoukhi, Walid Fahs, et al.. A secure cross-layer architecture for reactive routing in vehicle to vehicle (V2V) communications. Vehicular Communications, 2022, 38, pp.100541. ⟨10.1016/j.vehcom.2022.100541⟩. ⟨hal-04370526⟩
Accès au bibtex
BibTex
ref_biblio
Ahmed Didouh, Yassin El Hillali, Atika Rivenq, Houda Labiod. Novel Centralized Pseudonym Changing Scheme for Location Privacy in V2X Communication. Energies, 2022, 15 (3), pp.692. ⟨10.3390/en15030692⟩. ⟨hal-03596306⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03596306/file/Didouh_2022_energies-15-00692.pdf BibTex
ref_biblio
Said Eddahmani, Sihem Mesnager. Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the gold, and the Bracken-Leander S-boxes. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2022, 14 (6), pp.1301-1344. ⟨10.1007/s12095-022-00581-8⟩. ⟨hal-03960658⟩
Accès au bibtex
BibTex
ref_biblio
Zhi Gu, Zhengchun Zhou, Sihem Mesnager, Udaya Parampalli. A new family of polyphase sequences with low correlation. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2022, 14 (1), pp.135-144. ⟨10.1007/s12095-021-00522-x⟩. ⟨hal-03960670⟩
Accès au bibtex
BibTex
ref_biblio
Badis Hammi, Yacine Mohamed Idir, Sherali Zeadally, Rida Khatoun, Jamel Nebhen. Is it Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position Paper. IEEE Transactions on Intelligent Transportation Systems, 2022, 23 (10), pp.18273-18287. ⟨10.1109/TITS.2022.3165513⟩. ⟨hal-03860322⟩
Accès au bibtex
BibTex
ref_biblio
Badis Hammi, Sherali Zeadally, Rida Khatoun, Jamel Nebhen. Survey on smart homes: Vulnerabilities, risks, and countermeasures. Computers & Security, 2022, 117, pp.102677. ⟨10.1016/j.cose.2022.102677⟩. ⟨hal-03860307⟩
Accès au bibtex
BibTex
ref_biblio
Badis Hammi, Sherali Zeadally, Yves Christian Elloh Adja, Manlio Del Giudice, Jamel Nebhen. Blockchain-Based Solution for Detecting and Preventing Fake Check Scams. IEEE Transactions on Engineering Management, 2022, 69 (6), pp.3710-3725. ⟨10.1109/TEM.2021.3087112⟩. ⟨hal-04400815⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04400815/file/Blockchain%20Based%20Solution%20For%20Detecting_and_Preventing_Fake_Check_Scams.pdf BibTex
ref_biblio
Olivier Hudry, Antoine Lobstein. Some Rainbow Problems in Graphs Have Complexity Equivalent to Satisfiability Problems. International Transactions in Operational Research, 2022, 29 (3), pp.1547-1572. ⟨hal-02916921⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02916921/file/OH-AL-TROPical.pdf BibTex
ref_biblio
Olivier Hudry. A variant of Young’s method in voting theory providing the same winners as Copeland’s method. International Journal of Mathematics, Statistics and Operations Research, 2022, 1 (2), pp.101-107. ⟨hal-03626855⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Hudry, Antoine Lobstein. On the Complexity of Determining Whether there is a Unique Hamiltonian Cycle or Path. WSEAS Transactions on Mathematics, 2022, 21, pp.433-446. ⟨hal-03700181⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Hudry, Irène Charon, Antoine Lobstein. Codes in the q-ary Lee Hypercube. WSEAS Transactions on Mathematics, 2022, 21, pp.173-186. ⟨hal-03650634⟩
Accès au bibtex
BibTex
ref_biblio
Kwang Ho Kim, Sihem Mesnager. Solving X 2 3 n + 2 2 n + 2 n − 1 + ( X + 1 ) 2 3 n + 2 2 n + 2 n − 1 = b in F 2 4 n and an alternative proof of a conjecture on the differential spectrum of the related monomial functions. Finite Fields and Their Applications, 2022, 83, pp.102086. ⟨10.1016/j.ffa.2022.102086⟩. ⟨hal-03960659⟩
Accès au bibtex
BibTex
ref_biblio
Kwang Ho Kim, Sihem Mesnager, Jong Hyok Choe, Dok Nam Lee. Preimages of p −Linearized Polynomials over ${\mathbb {F}}_{p}$. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2022, 14 (1), pp.75-86. ⟨10.1007/s12095-021-00514-x⟩. ⟨hal-03960672⟩
Accès au bibtex
BibTex
ref_biblio
Kwang Ho Kim, Sihem Mesnager, Jong Hyok Choe, Dok Nam Lee, Sengsan Lee, et al.. On permutation quadrinomials with boomerang uniformity 4 and the best-known nonlinearity. Designs, Codes and Cryptography, 2022, 90 (6), pp.1437-1461. ⟨10.1007/s10623-022-01047-x⟩. ⟨hal-03960666⟩
Accès au bibtex
BibTex
ref_biblio
Yanjun Li, Haibin Kan, Sihem Mesnager, Jie Peng, Chik How Tan, et al.. Generic Constructions of (Boolean and Vectorial) Bent Functions and Their Consequences. IEEE Transactions on Information Theory, 2022, 68 (4), pp.2735-2751. ⟨10.1109/TIT.2022.3140180⟩. ⟨hal-03960662⟩
Accès au bibtex
BibTex
ref_biblio
Huicong Liang, Sihem Mesnager, Meiqin Wang. Cryptanalysis of the AEAD and hash algorithm DryGASCON. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2022, 14 (3), pp.597-625. ⟨10.1007/s12095-021-00542-7⟩. ⟨hal-03960665⟩
Accès au bibtex
BibTex
ref_biblio
Ruge Lin, Weiqiang Wen. Quantum computation capability verification protocol for NISQ devices with dihedral coset problem. Physical Review A, 2022, 106 (1), pp.012430. ⟨10.1103/PhysRevA.106.012430⟩. ⟨hal-04577018⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04577018/file/2202.06984v3.pdf BibTex
ref_biblio
Qi Liu, Cunsheng Ding, Sihem Mesnager, Chunming Tang, Vladimir Tonchev. Survey on recent trends towards generalized differential and boomerang uniformities. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2022, 14 (4), pp.691-735. ⟨10.1109/TIT.2021.3139687⟩. ⟨hal-03960660⟩
Accès au bibtex
https://arxiv.org/pdf/2109.09051 BibTex
ref_biblio
Sylvain Lombardy, Jacques Sakarovitch. Morphisms and minimisation of weighted automata. Fundamenta Informaticae, 2022, 186 (1-4), pp.195-218. ⟨10.3233/FI-222126⟩. ⟨hal-03483922v5⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03483922/file/9174-final.pdf BibTex
ref_biblio
Zhenyu Lu, Sihem Mesnager, Tingting Cui, Yanhong Fan, Meiqin Wang. An STP-based model toward designing S-boxes with good cryptographic properties. Designs, Codes and Cryptography, 2022, 90 (5), pp.1179-1202. ⟨10.1007/s10623-022-01034-2⟩. ⟨hal-03960669⟩
Accès au bibtex
BibTex
ref_biblio
Makhan Maji, Sihem Mesnager, Santanu Sarkar, Kalyan Hansda. On One-Dimensional Linear Minimal Codes Over Finite (Commutative) Rings. IEEE Transactions on Information Theory, 2022, 68 (5), pp.2990-2998. ⟨10.1109/TIT.2021.3133959⟩. ⟨hal-03960661⟩
Accès au bibtex
BibTex
ref_biblio
Sihem Mesnager, Sihong Su, Jingjing Li, Linya Zhu. Concrete constructions of weightwise perfectly balanced (2-rotation symmetric) functions with optimal algebraic immunity and high weightwise nonlinearity. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2022, 14 (6), pp.1371-1389. ⟨10.1007/s12095-022-00603-5⟩. ⟨hal-03960656⟩
Accès au bibtex
BibTex
ref_biblio
Pan Tan, Cuiling Fan, Sihem Mesnager, Wei Guo. Linear codes from support designs of ternary cyclic codes. Designs, Codes and Cryptography, 2022, 90 (3), pp.681-693. ⟨10.1007/s10623-021-01001-3⟩. ⟨hal-03960674⟩
Accès au bibtex
BibTex
ref_biblio
Hui Zhang, Cuiling Fan, Sihem Mesnager. Constructions of two-dimensional Z-complementary array pairs with large ZCZ ratio. Designs, Codes and Cryptography, 2022, 90 (5), pp.1221-1239. ⟨10.1007/s10623-022-01035-1⟩. ⟨hal-03960668⟩
Accès au bibtex
BibTex

2021

ref_biblio
Kanat Abdukhalikov, Cunsheng Ding, Sihem Mesnager, Chunming Tang, Maosheng Xiong. Cyclic Bent Functions and Their Applications in Sequences. IEEE Transactions on Information Theory, 2021, 67 (6), pp.3473-3485. ⟨10.1109/TIT.2021.3057896⟩. ⟨hal-03960634⟩
Accès au bibtex
BibTex
ref_biblio
Stéphane Ballet, Julia Pieltant, Jean Chaumine, Matthieu Rambaud, Hugues Randriambololona, et al.. On the tensor rank of multiplication in finite extensions of finite fields and related issues in algebraic geometry. Russian Mathematical Surveys, 2021, 76 (1), pp.29-89. ⟨10.1070/RM9928⟩. ⟨hal-03661954⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03661954/file/Survey_mult.pdf BibTex
ref_biblio
Alexander Barg, Lara Dolecek, Ryan Gabrys, Gyula Katona, Janos Korner, et al.. Guest Editorial Special Issue: “From Deletion-Correction to Graph Reconstruction: In Memory of Vladimir I. Levenshtein”. IEEE Transactions on Information Theory, 2021, 67 (6), pp.3187-3189. ⟨10.1109/TIT.2021.3072555⟩. ⟨hal-03960636⟩
Accès au bibtex
BibTex
ref_biblio
M. Boumezbeur, Sihem Mesnager, K. Guenda. Linear codes from vectorial Boolean functions in the context of algebraic attacks. Discrete Mathematics, Algorithms and Applications, 2021, 13 (03), pp.2150032. ⟨10.1142/S1793830921500324⟩. ⟨hal-03960619⟩
Accès au bibtex
BibTex
ref_biblio
Claude Carlet, Kwang Ho Kim, Sihem Mesnager. A direct proof of APN-ness of the Kasami functions. Designs, Codes and Cryptography, 2021, 89 (3), pp.441-446. ⟨10.1007/s10623-020-00830-y⟩. ⟨hal-03960643⟩
Accès au bibtex
https://arxiv.org/pdf/2002.00050 BibTex
ref_biblio
Fadlallah Chbib, Walid Fahs, Jamal Haydar, Lyes Khoukhi, Rida Khatoun. IEEE 802.11p performance enhancement based on Markov chain and neural networks for safety applications. Annals of Telecommunications - annales des télécommunications, 2021, 76 (9-10), pp.617-632. ⟨10.1007/s12243-021-00846-y⟩. ⟨hal-03404239⟩
Accès au bibtex
BibTex
ref_biblio
Hang Chen, Cunsheng Ding, Sihem Mesnager, Chunming Tang. A Novel Application of Boolean Functions With High Algebraic Immunity in Minimal Codes. IEEE Transactions on Information Theory, 2021, 67 (10), pp.6856-6867. ⟨10.1109/TIT.2021.3102314⟩. ⟨hal-03960615⟩
Accès au bibtex
https://arxiv.org/pdf/2004.04932 BibTex
ref_biblio
Ruikai Chen, Sihem Mesnager, Chang-An Zhao. Good polynomials for optimal LRC of low locality. Designs, Codes and Cryptography, 2021, 89 (7), pp.1639-1660. ⟨10.1007/s10623-021-00886-4⟩. ⟨hal-03960639⟩
Accès au bibtex
BibTex
ref_biblio
Sumit Kumar Debnath, Sihem Mesnager, Kunal Dey, Nibedita Kundu. Post-Quantum Secure Inner Product Functional Encryption Using Multivariate Public Key Cryptography. Mediterranean Journal of Mathematics, 2021, 18 (5), pp.204. ⟨10.1007/s00009-021-01841-2⟩. ⟨hal-03960628⟩
Accès au bibtex
BibTex
ref_biblio
Yanhong Fan, Sihem Mesnager, Weijia Wang, Yongqing Li, Tingting Cui, et al.. Investigation for 8-bit SKINNY-like S-boxes, analysis and applications. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2021, 13 (5), pp.617-636. ⟨10.1007/s12095-021-00486-y⟩. ⟨hal-03960607⟩
Accès au bibtex
BibTex
ref_biblio
Chunyu Gan, Chengju Li, Sihem Mesnager, Haifeng Qian. On Hulls of Some Primitive BCH Codes and Self-Orthogonal Codes. IEEE Transactions on Information Theory, 2021, 67 (10), pp.6442-6455. ⟨10.1109/TIT.2021.3076878⟩. ⟨hal-03960617⟩
Accès au bibtex
BibTex
ref_biblio
Khaled Hejja, Sara Berri, Houda Labiod. Network slicing with load-balancing for task offloading in vehicular edge computing. Vehicular Communications, 2021, pp.100419. ⟨10.1016/j.vehcom.2021.100419⟩. ⟨hal-03438958⟩
Accès au bibtex
BibTex
ref_biblio
Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Ivan Gazeau, Jingxuan Ma, et al.. Security Analysis of Machine Learning-Based PUF Enrollment Protocols: A Review. Sensors, 2021, 21 (24), pp.8415. ⟨10.3390/s21248415⟩. ⟨hal-04427680⟩
Accès au bibtex
BibTex
ref_biblio
Kwang Ho Kim, Jong Hyok Choe, Sihem Mesnager. Complete solution over F p n of the equation X p k + 1 + X + a = 0. Finite Fields and Their Applications, 2021, 76, pp.101902. ⟨10.1016/j.ffa.2021.101902⟩. ⟨hal-03960627⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03960627/file/S1071579721000964.pdf BibTex
ref_biblio
Kangquan Li, Sihem Mesnager, Longjiang Qu. Further Study of 2-to-1 Mappings Over F 2 n. IEEE Transactions on Information Theory, 2021, 67 (6), pp.3486-3496. ⟨10.1109/TIT.2021.3057094⟩. ⟨hal-03960633⟩
Accès au bibtex
BibTex
ref_biblio
Yubo Li, Kangquan Li, Sihem Mesnager, Longjiang Qu. More permutations and involutions for constructing bent functions. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2021, 13 (3), pp.459-473. ⟨10.1007/s12095-021-00482-2⟩. ⟨hal-03960609⟩
Accès au bibtex
BibTex
ref_biblio
Sylvain Lombardy, Jacques Sakarovitch. Derived Terms without Derivation -- A shifted perspective on the derived-term automaton. Journal of Computer Science and Cybernetics, Vietnamese Academy of Science and Technology, Vietnam, 2021, 37 (3), pp.201-221. ⟨10.15625/1813-9663/37/3/16263⟩. ⟨hal-03382261⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03382261/file/DTWD.pdf BibTex
ref_biblio
Sihem Mesnager, Bimal Mandal, Mounira Msahli. Survey on recent trends towards generalized differential and boomerang uniformities. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2021, ⟨10.1007/s12095-021-00551-6⟩. ⟨hal-03569465⟩
Accès au bibtex
BibTex
ref_biblio
Sihem Mesnager, Sihong Su. On constructions of weightwise perfectly balanced Boolean functions. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2021, 13 (6), pp.951-979. ⟨10.1007/s12095-021-00481-3⟩. ⟨hal-03960605⟩
Accès au bibtex
BibTex
ref_biblio
Sihem Mesnager, Ferruh Özbudak, Ahmet Sinak. Secondary constructions of (non)weakly regular plateaued functions over finite fields. Turkish Journal of Mathematics, 2021, 45 (5), pp.2295-2306. ⟨10.3906/mat-2104-5⟩. ⟨hal-03960600⟩
Accès au bibtex
BibTex
ref_biblio
Sihem Mesnager, Constanza Riera, Pantelimon Stanica, Haode Yan, Zhengchun Zhou. Investigations on c -(Almost) Perfect Nonlinear Functions. IEEE Transactions on Information Theory, 2021, 67 (10), pp.6916-6925. ⟨10.1109/TIT.2021.3081348⟩. ⟨hal-03960613⟩
Accès au bibtex
https://arxiv.org/pdf/2010.10023 BibTex
ref_biblio
Sihem Mesnager, Chunming Tang. Fast Algebraic Immunity of Boolean Functions and LCD Codes. IEEE Transactions on Information Theory, 2021, 67 (7), pp.4828-4837. ⟨10.1109/TIT.2021.3056716⟩. ⟨hal-03960632⟩
Accès au bibtex
https://arxiv.org/pdf/2006.08372 BibTex
ref_biblio
Sihem Mesnager, Sihong Su. On Correlation Immune Boolean Functions With Minimum Hamming Weight Power of 2. IEEE Transactions on Information Theory, 2021, 67 (11), pp.7501-7517. ⟨10.1109/TIT.2021.3109946⟩. ⟨hal-03960612⟩
Accès au bibtex
BibTex
ref_biblio
Sihem Mesnager, Sihong Su, Hui Zhang. A construction method of balanced rotation symmetric Boolean functions on arbitrary even number of variables with optimal algebraic immunity. Designs, Codes and Cryptography, 2021, 89 (1), pp.1-17. ⟨10.1007/s10623-020-00806-y⟩. ⟨hal-03960647⟩
Accès au bibtex
BibTex
ref_biblio
Duong Hieu Phan, Moti Yung. Privacy in Advanced Cryptographic Protocols: Prototypical Examples. Journal of Computer Science and Cybernetics, Vietnamese Academy of Science and Technology, Vietnam, 2021, 37 (4), pp.429-451. ⟨10.15625/1813-9663/37/4/16104⟩. ⟨hal-03541793⟩
Accès au bibtex
BibTex
ref_biblio
Liqin Qian, Xiwang Cao, Sihem Mesnager. Linear codes with one-dimensional hull associated with Gaussian sums. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2021, 13 (2), pp.225-243. ⟨10.1007/s12095-020-00462-y⟩. ⟨hal-03960638⟩
Accès au bibtex
BibTex

2020

ref_biblio
Valerie Berthe, Christiane Frougny, Michel Rigo, Jacques Sakarovitch. The carry propagation of the successor function. Advances in Applied Mathematics, 2020, 120, pp.102062. ⟨10.1016/j.aam.2020.102062⟩. ⟨hal-03379583⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03379583/file/1907.01464.pdf BibTex
ref_biblio
Raphaël Cw Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, et al.. Advances in security research in the Asiacrypt region. Communications of the ACM, 2020, 63 (4), pp.76-81. ⟨10.1145/3378428⟩. ⟨hal-03540244⟩
Accès au bibtex
BibTex

2018

ref_biblio
Shigeki Akiyama, Victor Marsault, Jacques Sakarovitch. On subtrees of the representation tree in rational base numeration systems. Discrete Mathematics and Theoretical Computer Science, 2018, 20 (1), pp.1-33. ⟨10.23638/DMTCS-20-1-10⟩. ⟨hal-02287876⟩
Accès au bibtex
BibTex

2016

ref_biblio
Gérard Cohen, Sihem Mesnager, Hugues Randriambololona. Yet another variation on minimal linear codes. Advances in mathmatics of Communications, 2016, 10 (1), pp.53-61. ⟨hal-02287564⟩
Accès au bibtex
BibTex

Conference papers

2024

ref_biblio
Olivier Hudry. Complexity of the uniqueness problem of a minimum vertex cover in a graph. 37th Conference of the European Chapter on Combinatorial Optimization (ECCO XXXVII), Jun 2024, Gand, Belgium. ⟨hal-04568134⟩
Accès au bibtex
BibTex
ref_biblio
Alberto Ibarrondo Luis, Ismet Kerenciler, Hervé Chabanne, Vincent Despiegel, Melek Önen. Monchi: Multi-scheme Optimization For Collaborative Homomorphic Identification. IH&MMSec 2024, 12th ACM Workshop on Information Hiding and Multimedia Security, ACM, Jun 2024, Baiona, Spain. ⟨10.1145/3658664.3659633⟩. ⟨hal-04562874⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04562874/file/2024-654.pdf BibTex
ref_biblio
San Ling, Khoa Nguyen, Duong Hieu Phan, Khai Hanh Tang, Huaxiong Wang, et al.. Fully Dynamic Attribute-Based Signatures for Circuits from Codes. PKC 2024 : Public-Key Cryptography – PKC 2024, Apr 2024, Sydney, Australia. pp.37-73, ⟨10.1007/978-3-031-57718-5_2⟩. ⟨hal-04577056⟩
Accès au texte intégral et bibtex
https://telecom-paris.hal.science/hal-04577056/file/eprint_2024-022.pdf BibTex

2023

ref_biblio
Ali El Attar, Ayoub Wehby, Fadlallah Chbib, Hassane Aissaoui Mehrez, Ahmad Fadlallah, et al.. Analysis of Machine Learning Algorithms for DDoS Attack Detection in Connected Cars Environment. 2023 Eighth International Conference On Mobile And Secure Services (MobiSecServ), Nov 2023, Miami Beach, United States. pp.1-7, ⟨10.1109/MobiSecServ58080.2023.10329152⟩. ⟨hal-04370557⟩
Accès au bibtex
BibTex
ref_biblio
Anaïs Barthoulot, Olivier Blazy, Sébastien Canard. Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption. CANS 2023 - Cryptology and Network Security, Oct 2023, Augusta, United States. pp.538-562, ⟨10.1007/978-981-99-7563-1_24⟩. ⟨hal-04271645⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04271645/file/2023-1277.pdf BibTex
ref_biblio
Thai Duong, Jiahui Gao, Duong Hieu Phan, Ni Trieu. Privacy-Preserving Digital Vaccine Passport. CANS 2023 - The 22nd International Conference on Cryptology and Network Security, Oct 2023, Augusta, United States. pp.137-161, ⟨10.1007/978-981-99-7563-1_7⟩. ⟨hal-04276497⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04276497/file/2023-1656.pdf BibTex
ref_biblio
Hao Fan, Yonglin Hao, Qingju Wang, Xinxin Gong, Lin Jiao. Key Filtering in Cube Attacks from the Implementation Aspect. International Conference on Cryptology and Network Security - CANS 2023, Oct 2023, Augusta, GA, United States. pp.293-317, ⟨10.1007/978-981-99-7563-1_14⟩. ⟨hal-04282347⟩
Accès au bibtex
BibTex
ref_biblio
Pierre-Alain Fouque, Adela Georgescu, Chen Qian, Adeline Roux-Langlois, Weiqiang Wen. A Generic Transform from Multi-Round Interactive Proof to NIZK. PKC 2023 - International Conference on Practice and Theory of Public-Key Cryptography, May 2023, Atlanta, United States. pp.461-481, ⟨10.1007/978-3-031-31371-4_16⟩. ⟨hal-04163128⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04163128/file/PKC_2023.pdf BibTex
ref_biblio
Lorenzo Grassi, Irati Manterola Ayala, Martha Norberg Hovd, Morten Øygarden, Håvard Raddum, et al.. Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato. Advances in Cryptology - CRYPTO 2023, IACR, Aug 2023, Santa Barbara, United States. pp.305-339, ⟨10.1007/978-3-031-38548-3_11⟩. ⟨hal-04282311⟩
Accès au bibtex
BibTex
ref_biblio
Lorenzo Grassi, Yonglin Hao, Christian Rechberger, Markus Schofnegger, Roman Walch, et al.. Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications. Advances in Cryptology - CRYPTO 2023, IACR, Aug 2023, Santa Barbara, United States. pp.573-606, ⟨10.1007/978-3-031-38548-3_19⟩. ⟨hal-04282328⟩
Accès au bibtex
BibTex
ref_biblio
Iman Hmedoush, Pengwenlong Gu, Cédric Adjih, Paul Mühlethaler, Ahmed Serhrouchni. DS-IRSA: A Deep Reinforcement Learning and Sensing Based IRSA. GLOBECOM 2023 - IEEE Global Communications Conference, Dec 2023, Kuala Lumpur, Malaysia. ⟨hal-04238023⟩
Accès au texte intégral et bibtex
https://inria.hal.science/hal-04238023/file/DS_IRSA_article.pdf BibTex
ref_biblio
Olivier Hudry. Complexity of domination problems in graphs. 36th Conference of the European Chapter on Combinatorial Optimization (ECCO XXXVI), May 2023, La Canée (Crete), Greece. ⟨hal-04178439⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Hudry. Iiro Honkala’s contributions to some conjectures on identifying codes. Symposium in the honour of Iiro Honkala, Jan 2023, Turku, Finland. ⟨hal-03945718⟩
Accès au bibtex
BibTex
ref_biblio
Adonis Jamal, Ali El Attar, Fadlallah Chbib, Rida Khatoun. Comparison of Data Cleansing Methods for Network DDoS Attacks Mitigation. 2023 9th International Conference on Control, Decision and Information Technologies (CoDIT), Jul 2023, Rome, Italy. pp.459-464, ⟨10.1109/CoDIT58514.2023.10284093⟩. ⟨hal-04370537⟩
Accès au bibtex
BibTex
ref_biblio
Hamza Khemissa, Pascal Urien. Towards a centralized security architecture for SOME/IP automotive services. 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), Jan 2023, Las Vegas, United States. pp.977-978, ⟨10.1109/CCNC51644.2023.10059950⟩. ⟨hal-04285097⟩
Accès au bibtex
BibTex
ref_biblio
Mirosław Kutyłowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada. Anamorphic Signatures: Secrecy from a Dictator Who Only Permits Authentication!. Advances in Cryptology – CRYPTO 2023, Aug 2023, Santa Barbara (CA), United States. pp.759-790, ⟨10.1007/978-3-031-38545-2_25⟩. ⟨hal-04194141⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04194141/file/2023-356.pdf BibTex
ref_biblio
Brigitte Lonc, Alexandre Aubry, Hafeda Bakhti, Maria Christofi, Hassane Aissaoui Mehrez. Feasibility and Benchmarking of Post-Quantum Cryptography in the Cooperative ITS Ecosystem. IEEE Vehicular Networking Conference (VNC), Apr 2023, Istanbul, Turkey. ⟨hal-04050027⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04050027/file/2023066543%20Preprint.pdf BibTex
ref_biblio
Duy Nguyen, Duong Hieu Phan, David Pointcheval. Verifiable Decentralized Multi-Client Functional Encryption for Inner Product. Advances in Cryptology - ASIACRYPT 2023, Dec 2023, Guanzhou, China. ⟨hal-04276484⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04276484/file/2023-268.pdf BibTex
ref_biblio
Ky Nguyen, Duong Hieu Phan, David Pointcheval. Optimal Security Notion for Decentralized Multi-Client Functional Encryption. Applied Cryptography and Network Security. ACNS 2023, Jun 2023, Kyoto, Japan. pp.336-365, ⟨10.1007/978-3-031-33491-7_13⟩. ⟨hal-04194145⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04194145/file/2023-435.pdf BibTex
ref_biblio
Minh-Thuyen Thi, Siwar Ben Hadj Said, Adrien Roberty, Fadlallah Chbib, Rida Khatoun, et al.. Enabling programmable deterministic communications in 6G. 6G-PDN Workshop - 6G Programmable Deterministic Networking with AI, Oct 2023, Washington, United States. ⟨hal-04210299⟩
Accès au texte intégral et bibtex
https://telecom-paris.hal.science/hal-04210299/file/6g_pdn_submitted.pdf BibTex
ref_biblio
Pascal Urien. On Line Secure Elements: Deploying High Security Keystores and Personal HSMs. 2023 International Conference on Computing, Networking and Communications (ICNC), Feb 2023, Honolulu, United States. pp.450-455, ⟨10.1109/ICNC57223.2023.10074066⟩. ⟨hal-04225785⟩
Accès au texte intégral et bibtex
https://telecom-paris.hal.science/hal-04225785/file/Microsoft%20Word%20-%20paper_icnc_2023_f2.pdf BibTex
ref_biblio
Pascal Urien. Demonstration Of Performance For Low Cost Personal HSM. 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), Jan 2023, Las Vegas, United States. pp.879-880, ⟨10.1109/CCNC51644.2023.10060586⟩. ⟨hal-04285114⟩
Accès au bibtex
BibTex
ref_biblio
Pascal Urien. Demonstrating Low Cost SIM Bluetooth Token For Generation Of Ethereum Transactions. 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), May 2023, Dubai, United Arab Emirates. pp.1-3, ⟨10.1109/ICBC56567.2023.10174874⟩. ⟨hal-04285135⟩
Accès au bibtex
BibTex
ref_biblio
Pascal Urien. On Line Secure Elements: Deploying High Security Keystores and Personal HSMs. 2023 International Conference on Computing, Networking and Communications (ICNC), Feb 2023, Honolulu, United States. pp.450-455, ⟨10.1109/ICNC57223.2023.10074066⟩. ⟨hal-04285122⟩
Accès au bibtex
BibTex
ref_biblio
Kaiyi Zhang, Qingju Wang, Yu Yu, Chun Guo, Hongrui Cui. Algebraic Attacks on Round-Reduced RAIN and Full AIM-III. Advances in Cryptology - ASIACRYPT 2023, IACR, Dec 2023, Guangzhou, China. ⟨hal-04282430⟩
Accès au bibtex
BibTex

2022

ref_biblio
Sarah Bordage, Mathieu Lhotel, Jade Nardi, Hugues Randriam. Interactive Oracle Proofs of Proximity to Algebraic Geometry Codes. CCC 2022 - 37th Computational Complexity Conference, Jul 2022, Philadelphie, United States. pp.30:1--30:45, ⟨10.4230/LIPIcs.CCC.2022.30⟩. ⟨hal-03832439⟩
Accès au texte intégral et bibtex
https://telecom-paris.hal.science/hal-03832439/file/2022%2CIOPP%2Csubmitted.pdf BibTex
ref_biblio
Antoine Boudermine, Rida Khatoun, Jean-Henri Choyer. Attack Graph-based Solution for Vulnerabilities Impact Assessment in Dynamic Environment. 2022 5th Conference on Cloud and Internet of Things (CIoT), Mar 2022, Marrakech, Morocco. pp.24-31, ⟨10.1109/CIoT53061.2022.9766588⟩. ⟨hal-03860336⟩
Accès au bibtex
BibTex
ref_biblio
Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen. Entropic Hardness of Module-LWE from Module-NTRU. 23rd International Conference on Cryptology, Kolkata, India : Progress in Cryptology – INDOCRYPT 2022, Dec 2022, Kolkata, India. pp.78 - 99, ⟨10.1007/978-3-031-22912-1_4⟩. ⟨hal-04028179⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04028179/file/2023-02-20_entropic_hardness_of_module-lwe_from_module-ntru_eprint_revised.pdf BibTex
ref_biblio
Andre Esser, Alexander May, Javier A. Verbel, Weiqiang Wen. Partial Key Exposure Attacks on BIKE, Rainbow and NTRU. Advances in Cryptology - CRYPTO 2022, Aug 2022, Santa Barbara, United States. pp.3-31, ⟨10.1007/978-3-031-15982-4_1⟩. ⟨hal-03876958⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03876958/file/KEAonLattices.pdf BibTex
ref_biblio
Danylo Goncharskyi, Sung Yong Kim, Ahmed Serhrouchni, Pengwenlong Gu, Rida Khatoun, et al.. Delay Measurement of 0-RTT Transport Layer Security (TLS) Handshake Protocol. 2022 8th International Conference on Control, Decision and Information Technologies (CoDIT), May 2022, Istanbul, France. pp.1450-1454, ⟨10.1109/CoDIT55151.2022.9803984⟩. ⟨hal-03860343⟩
Accès au bibtex
BibTex
ref_biblio
Badis Hammi, Mohamed Yacine Idir, Rida Khatoun. A machine learning based approach for the detection of sybil attacks in C-ITS. 2022 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS), Sep 2022, Takamatsu, Japan. pp.1-4, ⟨10.23919/APNOMS56106.2022.9919991⟩. ⟨hal-03860326⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Hudry, Antoine Lobstein. Complexité du problème de l'unicité d'un transversal minimum dans un graphe. 23ème congrès annuel de la Société Française de Recherche Opérationnelle et d'Aide à la Décision, INSA Lyon, Feb 2022, Villeurbanne - Lyon, France. ⟨hal-03596176⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03596176/file/resume_Hudry_ROADEF_2022.pdf BibTex
ref_biblio
Olivier Hudry. Characterization of the majority matrices of profiles of equivalence relations. 7th International Symposium on Combinatorial Optimization (ISCO 2022), 2022, à distance, France. ⟨hal-03697613⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Hudry, Antoine Lobstein. Complexity of the unicity of an optimal vertex cover in graphs. Stockholm Optimization Days 2022, Jun 2022, Stockholm, Sweden. ⟨hal-03714746⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Hudry, Irene Charon, Antoine Lobstein. Dominating, Locating-Dominating and Identifying Codes in the q-ary Lee Hypercube. 11th International Colloquium on Graph Theory and Combinatorics (ICGT 2022), 2022, Montpellier, France. ⟨hal-03744673⟩
Accès au bibtex
BibTex
ref_biblio
Hamza Khemissa, Pascal Urien. Centralized architecture for ECU security management in connected and autonomous vehicles. 2022 13th International Conference on Information and Communication Technology Convergence (ICTC), Oct 2022, Jeju Island, South Korea. pp.1409-1414, ⟨10.1109/ICTC55196.2022.9952757⟩. ⟨hal-04285073⟩
Accès au bibtex
BibTex
ref_biblio
Sung Yong Kim, Danylo Goncharskyi, Pengwenlong Gu, Ahmed Serhrouchni, Rida Khatoun, et al.. TLS Early Data Resistance to Replay Attacks in Wireless Internet of Things. GLOBECOM 2022 - 2022 IEEE Global Communications Conference, Dec 2022, Rio de Janeiro, France. pp.3539-3544, ⟨10.1109/GLOBECOM48099.2022.10001106⟩. ⟨hal-04370533⟩
Accès au bibtex
BibTex
ref_biblio
Sylvain Lombardy, Jacques Sakarovitch. The Net Automaton of a Rational Expression. LATIN 2022: LATIN 2022: Theoretical Informatics, Armando Castañeda, Francisco Rodríguez-Henríquez, Nov 2022, Guanajuato, Mexico. pp.376-392, ⟨10.1007/978-3-031-20624-5_23⟩. ⟨hal-03986317⟩
Accès au bibtex
BibTex
ref_biblio
Quang-Duy Nguyen, Saadia Dhouib, Yining Huang, Patrick Bellot. An approach to bridge ROS 1 and ROS 2 devices into an OPC UA-based testbed for industry 4.0. ONCON 2022 - 1st IEEE Industrial Electronics Society Annual On-Line Conference, Dec 2022, Online conference, India. ⟨cea-03870393⟩
Accès au texte intégral et bibtex
https://cea.hal.science/cea-03870393/file/paper_oncon22_vHal.pdf BibTex
ref_biblio
Quang-Duy Nguyen, Saadia Dhouib, Patrick Bellot. A unified method to design bridges for OPC UA PubSub networks in the industrial IoT. IEEE CAMAD 2022 - IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, Nov 2022, Paris, France. ⟨cea-03870289⟩
Accès au texte intégral et bibtex
https://cea.hal.science/cea-03870289/file/paper-camad22-vHal.pdf BibTex
ref_biblio
Ky Nguyen, Duong Hieu Phan, David Pointcheval. Multi-Client Functional Encryption with Fine-Grained Access Control. Asiacrypt 2022 - 28th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2022, Taipei, Taiwan. ⟨10.1007/978-3-031-22963-3_4⟩. ⟨hal-03910053v2⟩
Accès au texte intégral et bibtex
https://inria.hal.science/hal-03910053/file/ab-ip-mcfe-full.pdf BibTex
ref_biblio
Quang-Duy Nguyen, Saadia Dhouib, Jean-Pierre Chanet, Patrick Bellot. Towards a web-of-things approach for OPC UA field device discovery in the industrial IoT. WFCS 2022 - 18th IEEE International Conference on Factory Communication Systems, Apr 2022, Pavia, Italy. pp.1-4, ⟨10.1109/WFCS53837.2022.9779181⟩. ⟨cea-03633704⟩
Accès au texte intégral et bibtex
https://cea.hal.science/cea-03633704/file/WFCS22_WIP_WoT4UA-vInit-3.pdf BibTex
ref_biblio
Giuseppe Persiano, Duong Hieu Phan, Moti Yung. Anamorphic Encryption: Private Communication Against a Dictator. Advances in Cryptology - EUROCRYPT 2022, May 2022, Trondheim ( Norvège), Norway. pp.34-63, ⟨10.1007/978-3-031-07085-3_2⟩. ⟨hal-03773135⟩
Accès au bibtex
BibTex
ref_biblio
Matthieu Rambaud, Andrei Tonkikh, Mark Abspoel. Linear View Change in Optimistically Fast BFT. ConsensusDay '22: Proceedings of the 2022 ACM Workshop on Developments in Consensus, Nov 2022, Los Angeles CA USA, France. pp.67-78, ⟨10.1145/3560829.3563562⟩. ⟨hal-04252576⟩
Accès au bibtex
BibTex
ref_biblio
Pascal Urien. Estimating Speedup Factor For Personal HSMs Based On Secure Elements. 2022 6th Cyber Security in Networking Conference (CSNet), Oct 2022, Rio de Janeiro, Brazil. pp.1-4, ⟨10.1109/CSNet56116.2022.9955609⟩. ⟨hal-04285083⟩
Accès au bibtex
BibTex
ref_biblio
Pascal Urien. Innovative Secure Element Grids For Internet Of Secure Elements Servers. 2022 18th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Oct 2022, Thessaloniki, Greece. pp.466-469, ⟨10.1109/WiMob55322.2022.9941674⟩. ⟨hal-04285042⟩
Accès au bibtex
BibTex

2021

ref_biblio
Olivier Blazy, Sayantan Mukherjee, Huyen Nguyen, Duong Hieu Phan, Damien Stehlé. An Anonymous Trace-and-Revoke Broadcast Encryption Scheme. ACISP 2021 - Australasian Conference on Information Security and Privacy, Dec 2021, Perth, Australia. pp.214-233, ⟨10.1007/978-3-030-90567-5_11⟩. ⟨hal-03475739⟩
Accès au bibtex
BibTex
ref_biblio
Stéphan Clémençon, Safa Boudabous, Houda Labiod, Julian Garbiso. Dynamic Graph Convolutional LSTM application for traffic flow estimation from error-prone measurements: results and transferability analysis. 2021 IEEE 8th International Conference on Data Science and Advanced Analytics (DSAA), Oct 2021, Porto, Portugal. pp.1-10, ⟨10.1109/DSAA53316.2021.9564245⟩. ⟨hal-03559364⟩
Accès au bibtex
BibTex
ref_biblio
Pengwenlong Gu, Dingjie Zhong, Cunqing Hua, Farid Nait-Abdesselam, Ahmed Serhrouchni, et al.. Scaling A Blockchain System For 5G-based Vehicular Networks Using Heuristic Sharding. GLOBECOM 2021 - 2021 IEEE Global Communications Conference, Dec 2021, Madrid, France. pp.1-6, ⟨10.1109/GLOBECOM46510.2021.9685234⟩. ⟨hal-03860353⟩
Accès au bibtex
BibTex
ref_biblio
Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Ivan Gazeau, Jingxuan Ma, et al.. Water- PUF: An Insider Threat Resistant PUF Enrollment Protocol Based on Machine Learning Watermarking. 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA), Nov 2021, Boston, United States. pp.1-10, ⟨10.1109/NCA53618.2021.9685239⟩. ⟨hal-04262875⟩
Accès au bibtex
BibTex
ref_biblio
San Ling, Khoa Nguyen, Duong Hieu Phan, Hanh Tang, Huaxiong Wang. Zero-Knowledge Proofs for Committed Symmetric Boolean Functions. Post-Quantum Cryptography, Jul 2021, Daegeon, South Korea. pp.339-359, ⟨10.1007/978-3-030-81293-5_18⟩. ⟨hal-03540237⟩
Accès au bibtex
BibTex
ref_biblio
Sihem Mesnager. ``{Readers} digest of'' 17-year achievements on {Boolean} and vectorial functions and open problems.. Cryptography and coding theory conference, 2021, Rome (Italia), Italy. ⟨hal-03960654⟩
Accès au bibtex
BibTex
ref_biblio
Quang-Duy Nguyen, Catherine Roussey, Patrick Bellot, Jean-Pierre Chanet. Stack of Services for Context-Aware Systems: An Internet-Of-Things System Design Approach. The 15th IEEE-RIVF International Conference on Computing and Communication Technologies, Aug 2021, Hanoi, Vietnam. ⟨10.1109/RIVF51545.2021.9642107⟩. ⟨hal-03195120v5⟩
Accès au texte intégral et bibtex
https://telecom-paris.hal.science/hal-03195120/file/Paper-vHAL.pdf BibTex
ref_biblio
Pascal Urien. Innovative Countermeasures to Defeat Cyber Attacks Against Blockchain Wallets: A Crypto Terminal Use Case. 5th Cyber Security in Networking Conference (CSNet), 2021, IEEE, Oct 2021, Rio de Jaineiro, Brazil. pp.49-54, ⟨10.1109/csnet52717.2021.9614649⟩. ⟨hal-04051629⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04051629/file/CT_extented_paper.pdf BibTex

2020

ref_biblio
Xuan Thanh Do, Duong Hieu Phan, Moti Yung. A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes. ACNS 2020 - International Conference on Applied Cryptography and Network Security, Nov 2020, Rome, Italy. pp.145-164, ⟨10.1007/978-3-030-57878-7_8⟩. ⟨hal-03540247⟩
Accès au bibtex
BibTex
ref_biblio
Thai Duong, Duong Hieu Phan, Ni Trieu. Catalic: Delegated PSI Cardinality with Applications to Contact Tracing. Advances in Cryptology - ASIACRYPT 2020, Dec 2020, Virtual, France. pp.870-899, ⟨10.1007/978-3-030-64840-4_29⟩. ⟨hal-03220027⟩
Accès au bibtex
BibTex
ref_biblio
Hugues Randriambololona, Édouard Rousseau. Trisymmetric Multiplication Formulae in Finite Fields. WAIFI 2020, Jul 2020, Rennes, France. pp.92-111, ⟨10.1007/978-3-030-68869-1_5⟩. ⟨hal-03832419⟩
Accès au texte intégral et bibtex
https://telecom-paris.hal.science/hal-03832419/file/tri-sym.pdf BibTex

2019

ref_biblio
Shi Bai, Shaun Miller, Weiqiang Wen. A refined analysis of the cost for solving LWE via uSVP. Africacrypt 2019 - 11th International Conference on Cryptology in Africa, Jul 2019, Rabat, Morocco. ⟨hal-02886638⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02886638/file/uSVP.pdf BibTex

2018

ref_biblio
Olivier Hudry. Complexity of the computation of dominating sets in graphs. EURO/ALIO International Conference 2018 on Applied Combinatorial Optimization, 2018, Bologne, Italy. ⟨hal-04283510⟩
Accès au bibtex
BibTex
ref_biblio
Sylvain Lombardy, Jacques Sakarovitch. Two Routes to Automata Minimization and the Ways to Reach It Efficiently. International Conference on Implementation and Application of Automata, CIAA 2018, Jul 2018, Charlottetown, Canada. pp.248-260, ⟨10.1007/978-3-319-94812-6_21⟩. ⟨hal-01866176⟩
Accès au bibtex
BibTex

2013

ref_biblio
Julien Bringer, Hervé Chabanne, Alain Patey. SHADE: Secure HAmming DistancE Computation from Oblivious Transfer. WAHC : 17th International Conference on Financial Cryptology and Data Security, FC 2013, Apr 2013, Okinawa, Japan. pp.164-176. ⟨hal-00872212⟩
Accès au bibtex
BibTex

Book sections

2022

ref_biblio
Duong Hieu Phan. Broadcast Encryption and Traitor Tracing. Asymmetric Cryptography: Primitives and Protocols, 1, Wiley, 2022, 9781394188369. ⟨10.1002/9781394188369.ch6⟩. ⟨hal-04283588⟩
Accès au bibtex
BibTex

2021

ref_biblio
Laetitia Debesse, Sihem Mesnager, Mounira Msahli. POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack. Applied Cryptography and Network Security Workshops, 12809, Springer International Publishing, pp.485-489, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-81645-2_27⟩. ⟨hal-03569438⟩
Accès au bibtex
BibTex
ref_biblio
Sihem Mesnager. Linear codes from functions. Concise encyclopedia of coding theory, , pp.463--526, 2021, 9781315147901. ⟨hal-03960624⟩
Accès au bibtex
BibTex

Books

2023

ref_biblio
Olivier Hudry, Irène Charon. Analyse combinatoire. Lavoisier. 2023. ⟨hal-04283499⟩
Accès au bibtex
BibTex

2022

ref_biblio
Rida Khatoun. Cybersecurity in Smart Homes: Architectures, Solutions and Technologies. , 2022, Wiley Data and Cybersecurity, 9781119987444. ⟨hal-04370568⟩
Accès au bibtex
BibTex

Patents

2023

ref_biblio
Sameh Khalfaoui, Arthur Villard, Jingxuan Ma, Jean Leneutre. Procédé et système d’authentification par un équipement vérificateur d’un dispositif à authentifier équipé d’un circuit PUF. France, Patent n° : FR3124870. 2023. ⟨hal-04427708⟩
Accès au bibtex
BibTex

2022

ref_biblio
Sameh Khalfaoui, Arthur Villard, Jingxuan MA, Jean Leneutre. Procédé d'appairage. France, N° de brevet: FR3110796. 2022. ⟨hal-04427706⟩
Accès au bibtex
BibTex

2008

ref_biblio
Duong Hieu Phan, Olivier Billet. OBTAINING DERIVED VALUES DEPENDING ON A SECRET MASTER VALUE. France, Patent n° : EP2153575. 2008. ⟨hal-03541808⟩
Accès au bibtex
BibTex

Preprints, Working Papers, ...

2023

ref_biblio
David Auger, Johanne Cohen, Antoine Lobstein. Nonatomic Non-Cooperative Neighbourhood Balancing Games. 2023. ⟨hal-04380503⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04380503/file/2303.08507v2.pdf BibTex
ref_biblio
Paul Frixons, Sébastien Canard, Loïc Ferreira. Quantum Security of the UMTS-AKA Protocol and its Primitives, Milenage and TUAK. 2023. ⟨hal-04334580⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04334580/file/Quantum_AKA__DCC_-1.pdf BibTex
ref_biblio
Christophe Levrat. Computing the cohomology of constructible \'etale sheaves on curves. 2023. ⟨hal-04286657⟩
Accès au bibtex
https://arxiv.org/pdf/2306.03283 BibTex
ref_biblio
Christophe Levrat. Curves are algebraic $K(\pi,1)$: theoretical and practical aspects. 2023. ⟨hal-04286664⟩
Accès au bibtex
https://arxiv.org/pdf/2306.03295 BibTex