CSDAI

Department of Institut Polytechnique de Paris

Group c2

c2 (cybersecurity and cryptography)

LTCI, Telecom Paris

Themes: digital trust

c2 focuses on Cybersecurity, with a focus on network security, and Cryptography

Contact person: Duong Hieu Phan, https://www.telecom-paris.fr/phan?l=en

Web site: https://www.telecom-paris.fr/en/research/laboratories/information-processing-and-communication-laboratory-ltci/research-teams/cybersecurity-cryptography-c2

Journal articles

2023

ref_biblio
Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen. On the Hardness of Module Learning with Errors with Short Distributions. Journal of Cryptology, 2023, 36 (1), pp.1. ⟨10.1007/s00145-022-09441-3⟩. ⟨hal-04028217⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04028217/file/2022-12-01_hardness_mlwe_with_short_distributions_eprint_revised.pdf BibTex

2022

ref_biblio
Elena Berardini, Jade Nardi. Curves on Frobenius classical surfaces in $\mathbb{P}^{3}$ over finite fields. Acta Arithmetica, 2022, 205 (4), pp.323-340. ⟨10.4064/aa211118-12-9⟩. ⟨hal-03889512⟩
Accès au bibtex
https://arxiv.org/pdf/2111.09578 BibTex
ref_biblio
Claude Carlet, Sihem Mesnager. On those multiplicative subgroups of $${\mathbb F}_{2^n}^*$$ which are Sidon sets and/or sum-free sets. Journal of Algebraic Combinatorics, 2022, 55 (1), pp.43-59. ⟨10.1007/s10801-020-00988-7⟩. ⟨hal-03960675⟩
Accès au bibtex
BibTex
ref_biblio
Ahmed Didouh, Yassin El Hillali, Atika Rivenq, Houda Labiod. Novel Centralized Pseudonym Changing Scheme for Location Privacy in V2X Communication. Energies, 2022, 15 (3), pp.692. ⟨10.3390/en15030692⟩. ⟨hal-03596306⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03596306/file/Didouh_2022_energies-15-00692.pdf BibTex
ref_biblio
Said Eddahmani, Sihem Mesnager. Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the gold, and the Bracken-Leander S-boxes. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2022, 14 (6), pp.1301-1344. ⟨10.1007/s12095-022-00581-8⟩. ⟨hal-03960658⟩
Accès au bibtex
BibTex
ref_biblio
Zhi Gu, Zhengchun Zhou, Sihem Mesnager, Udaya Parampalli. A new family of polyphase sequences with low correlation. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2022, 14 (1), pp.135-144. ⟨10.1007/s12095-021-00522-x⟩. ⟨hal-03960670⟩
Accès au bibtex
BibTex
ref_biblio
Badis Hammi, Sherali Zeadally, Rida Khatoun, Jamel Nebhen. Survey on smart homes: Vulnerabilities, risks, and countermeasures. Computers and Security, 2022, 117, pp.102677. ⟨10.1016/j.cose.2022.102677⟩. ⟨hal-03860307⟩
Accès au bibtex
BibTex
ref_biblio
Badis Hammi, Yacine Mohamed Idir, Sherali Zeadally, Rida Khatoun, Jamel Nebhen. Is it Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position Paper. IEEE Transactions on Intelligent Transportation Systems, 2022, 23 (10), pp.18273-18287. ⟨10.1109/TITS.2022.3165513⟩. ⟨hal-03860322⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Hudry, Antoine Lobstein. On the Complexity of Determining Whether there is a Unique Hamiltonian Cycle or Path. WSEAS Transactions on Mathematics, 2022. ⟨hal-03700181⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Hudry. A variant of Young’s method in voting theory providing the same winners as Copeland’s method. International Journal of Mathematics, Statistics and Operations Research, 2022. ⟨hal-03626855⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Hudry, Antoine Lobstein. Some rainbow problems in graphs have complexity equivalent to satisfiability problems. International Transactions in Operational Research, 2022. ⟨hal-03466089⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Hudry, Irène Charon, Antoine Lobstein. Codes in the q-ary Lee Hypercube. WSEAS Transactions on Mathematics, 2022. ⟨hal-03650634⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Hudry, Antoine Lobstein. Some Rainbow Problems in Graphs Have Complexity Equivalent to Satisfiability Problems. International Transactions in Operational Research, 2022, 29 (3), pp.1547-1572. ⟨hal-04098405⟩
Accès au bibtex
BibTex
ref_biblio
Kwang Ho Kim, Sihem Mesnager. Solving X 2 3 n + 2 2 n + 2 n − 1 + ( X + 1 ) 2 3 n + 2 2 n + 2 n − 1 = b in F 2 4 n and an alternative proof of a conjecture on the differential spectrum of the related monomial functions. Finite Fields and Their Applications, 2022, 83, pp.102086. ⟨10.1016/j.ffa.2022.102086⟩. ⟨hal-03960659⟩
Accès au bibtex
BibTex
ref_biblio
Kwang Ho Kim, Sihem Mesnager, Jong Hyok Choe, Dok Nam Lee, Sengsan Lee, et al.. On permutation quadrinomials with boomerang uniformity 4 and the best-known nonlinearity. Designs, Codes and Cryptography, 2022, 90 (6), pp.1437-1461. ⟨10.1007/s10623-022-01047-x⟩. ⟨hal-03960666⟩
Accès au bibtex
BibTex
ref_biblio
Kwang Ho Kim, Sihem Mesnager, Jong Hyok Choe, Dok Nam Lee. Preimages of p −Linearized Polynomials over ${\mathbb {F}}_{p}$. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2022, 14 (1), pp.75-86. ⟨10.1007/s12095-021-00514-x⟩. ⟨hal-03960672⟩
Accès au bibtex
BibTex
ref_biblio
Yanjun Li, Haibin Kan, Sihem Mesnager, Jie Peng, Chik How Tan, et al.. Generic Constructions of (Boolean and Vectorial) Bent Functions and Their Consequences. IEEE Transactions on Information Theory, 2022, 68 (4), pp.2735-2751. ⟨10.1109/TIT.2022.3140180⟩. ⟨hal-03960662⟩
Accès au bibtex
BibTex
ref_biblio
Huicong Liang, Sihem Mesnager, Meiqin Wang. Cryptanalysis of the AEAD and hash algorithm DryGASCON. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2022, 14 (3), pp.597-625. ⟨10.1007/s12095-021-00542-7⟩. ⟨hal-03960665⟩
Accès au bibtex
BibTex
ref_biblio
Qi Liu, Cunsheng Ding, Sihem Mesnager, Chunming Tang, Vladimir Tonchev. Survey on recent trends towards generalized differential and boomerang uniformities. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2022, 14 (4), pp.691-735. ⟨10.1109/TIT.2021.3139687⟩. ⟨hal-03960660⟩
Accès au bibtex
https://arxiv.org/pdf/2109.09051 BibTex
ref_biblio
Zhenyu Lu, Sihem Mesnager, Tingting Cui, Yanhong Fan, Meiqin Wang. An STP-based model toward designing S-boxes with good cryptographic properties. Designs, Codes and Cryptography, 2022, 90 (5), pp.1179-1202. ⟨10.1007/s10623-022-01034-2⟩. ⟨hal-03960669⟩
Accès au bibtex
BibTex
ref_biblio
Makhan Maji, Sihem Mesnager, Santanu Sarkar, Kalyan Hansda. On One-Dimensional Linear Minimal Codes Over Finite (Commutative) Rings. IEEE Transactions on Information Theory, 2022, 68 (5), pp.2990-2998. ⟨10.1109/TIT.2021.3133959⟩. ⟨hal-03960661⟩
Accès au bibtex
BibTex
ref_biblio
Sihem Mesnager, Sihong Su, Jingjing Li, Linya Zhu. Concrete constructions of weightwise perfectly balanced (2-rotation symmetric) functions with optimal algebraic immunity and high weightwise nonlinearity. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2022, 14 (6), pp.1371-1389. ⟨10.1007/s12095-022-00603-5⟩. ⟨hal-03960656⟩
Accès au bibtex
BibTex
ref_biblio
Sihem Mesnager, Sihong Su, Jingjing Li, Linya Zhu. Concrete constructions of weightwise perfectly balanced (2-rotation symmetric) functions with optimal algebraic immunity and high weightwise nonlinearity. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2022, 14 (6), pp.1371-1389. ⟨10.1007/s12095-022-00603-5⟩. ⟨hal-04004873⟩
Accès au bibtex
BibTex
ref_biblio
Pan Tan, Cuiling Fan, Sihem Mesnager, Wei Guo. Linear codes from support designs of ternary cyclic codes. Designs, Codes and Cryptography, 2022, 90 (3), pp.681-693. ⟨10.1007/s10623-021-01001-3⟩. ⟨hal-03960674⟩
Accès au bibtex
BibTex
ref_biblio
Hui Zhang, Cuiling Fan, Sihem Mesnager. Constructions of two-dimensional Z-complementary array pairs with large ZCZ ratio. Designs, Codes and Cryptography, 2022, 90 (5), pp.1221-1239. ⟨10.1007/s10623-022-01035-1⟩. ⟨hal-03960668⟩
Accès au bibtex
BibTex

2021

ref_biblio
Kanat Abdukhalikov, Cunsheng Ding, Sihem Mesnager, Chunming Tang, Maosheng Xiong. Cyclic Bent Functions and Their Applications in Sequences. IEEE Transactions on Information Theory, 2021, 67 (6), pp.3473-3485. ⟨10.1109/TIT.2021.3057896⟩. ⟨hal-03960634⟩
Accès au bibtex
BibTex
ref_biblio
Stéphane Ballet, Julia Pieltant, Jean Chaumine, Matthieu Rambaud, Hugues Randriambololona, et al.. On the tensor rank of multiplication in finite extensions of finite fields and related issues in algebraic geometry. Russian Mathematical Surveys, 2021, 76 (1), pp.29-89. ⟨10.1070/RM9928⟩. ⟨hal-03661954⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03661954/file/Survey_mult.pdf BibTex
ref_biblio
Alexander Barg, Lara Dolecek, Ryan Gabrys, Gyula Katona, Janos Korner, et al.. Guest Editorial Special Issue: “From Deletion-Correction to Graph Reconstruction: In Memory of Vladimir I. Levenshtein”. IEEE Transactions on Information Theory, 2021, 67 (6), pp.3187-3189. ⟨10.1109/TIT.2021.3072555⟩. ⟨hal-03960636⟩
Accès au bibtex
BibTex
ref_biblio
M. Boumezbeur, Sihem Mesnager, K. Guenda. Linear codes from vectorial Boolean functions in the context of algebraic attacks. Discrete Mathematics, Algorithms and Applications, 2021, 13 (03), pp.2150032. ⟨10.1142/S1793830921500324⟩. ⟨hal-03960619⟩
Accès au bibtex
BibTex
ref_biblio
Claude Carlet, Kwang Ho Kim, Sihem Mesnager. A direct proof of APN-ness of the Kasami functions. Designs, Codes and Cryptography, 2021, 89 (3), pp.441-446. ⟨10.1007/s10623-020-00830-y⟩. ⟨hal-03960643⟩
Accès au bibtex
https://arxiv.org/pdf/2002.00050 BibTex
ref_biblio
Fadlallah Chbib, Walid Fahs, Jamal Haydar, Lyes Khoukhi, Rida Khatoun. IEEE 802.11p performance enhancement based on Markov chain and neural networks for safety applications. Annals of Telecommunications - annales des télécommunications, 2021, 76 (9-10), pp.617-632. ⟨10.1007/s12243-021-00846-y⟩. ⟨hal-03404239⟩
Accès au bibtex
BibTex
ref_biblio
Hang Chen, Cunsheng Ding, Sihem Mesnager, Chunming Tang. A Novel Application of Boolean Functions With High Algebraic Immunity in Minimal Codes. IEEE Transactions on Information Theory, 2021, 67 (10), pp.6856-6867. ⟨10.1109/TIT.2021.3102314⟩. ⟨hal-03960615⟩
Accès au bibtex
https://arxiv.org/pdf/2004.04932 BibTex
ref_biblio
Ruikai Chen, Sihem Mesnager, Chang-An Zhao. Good polynomials for optimal LRC of low locality. Designs, Codes and Cryptography, 2021, 89 (7), pp.1639-1660. ⟨10.1007/s10623-021-00886-4⟩. ⟨hal-03960639⟩
Accès au bibtex
BibTex
ref_biblio
Sumit Kumar Debnath, Sihem Mesnager, Kunal Dey, Nibedita Kundu. Post-Quantum Secure Inner Product Functional Encryption Using Multivariate Public Key Cryptography. Mediterranean Journal of Mathematics, 2021, 18 (5), pp.204. ⟨10.1007/s00009-021-01841-2⟩. ⟨hal-03960628⟩
Accès au bibtex
BibTex
ref_biblio
Yanhong Fan, Sihem Mesnager, Weijia Wang, Yongqing Li, Tingting Cui, et al.. Investigation for 8-bit SKINNY-like S-boxes, analysis and applications. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2021, 13 (5), pp.617-636. ⟨10.1007/s12095-021-00486-y⟩. ⟨hal-03960607⟩
Accès au bibtex
BibTex
ref_biblio
Chunyu Gan, Chengju Li, Sihem Mesnager, Haifeng Qian. On Hulls of Some Primitive BCH Codes and Self-Orthogonal Codes. IEEE Transactions on Information Theory, 2021, 67 (10), pp.6442-6455. ⟨10.1109/TIT.2021.3076878⟩. ⟨hal-03960617⟩
Accès au bibtex
BibTex
ref_biblio
Khaled Hejja, Sara Berri, Houda Labiod. Network slicing with load-balancing for task offloading in vehicular edge computing. Vehicular Communications, 2021, pp.100419. ⟨10.1016/j.vehcom.2021.100419⟩. ⟨hal-03438958⟩
Accès au bibtex
BibTex
ref_biblio
Kwang Ho Kim, Jong Hyok Choe, Sihem Mesnager. Complete solution over F p n of the equation X p k + 1 + X + a = 0. Finite Fields and Their Applications, 2021, 76, pp.101902. ⟨10.1016/j.ffa.2021.101902⟩. ⟨hal-03960627⟩
Accès au bibtex
BibTex
ref_biblio
Kwang Ho Kim, Junyop Choe, Sihem Mesnager. Solving X+1 + X + a = 0 over finite fields. Finite Fields and Their Applications, 2021, 70, pp.101797. ⟨10.1016/j.ffa.2020.101797⟩. ⟨hal-03960644⟩
Accès au bibtex
BibTex
ref_biblio
Yubo Li, Kangquan Li, Sihem Mesnager, Longjiang Qu. More permutations and involutions for constructing bent functions. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2021, 13 (3), pp.459-473. ⟨10.1007/s12095-021-00482-2⟩. ⟨hal-03960609⟩
Accès au bibtex
BibTex
ref_biblio
Kangquan Li, Sihem Mesnager, Longjiang Qu. Further Study of 2-to-1 Mappings Over F 2 n. IEEE Transactions on Information Theory, 2021, 67 (6), pp.3486-3496. ⟨10.1109/TIT.2021.3057094⟩. ⟨hal-03960633⟩
Accès au bibtex
BibTex
ref_biblio
Sihem Mesnager, Constanza Riera, Pantelimon Stanica, Haode Yan, Zhengchun Zhou. Investigations on c -(Almost) Perfect Nonlinear Functions. IEEE Transactions on Information Theory, 2021, 67 (10), pp.6916-6925. ⟨10.1109/TIT.2021.3081348⟩. ⟨hal-03960613⟩
Accès au bibtex
https://arxiv.org/pdf/2010.10023 BibTex
ref_biblio
Sihem Mesnager, Chunming Tang. Fast Algebraic Immunity of Boolean Functions and LCD Codes. IEEE Transactions on Information Theory, 2021, 67 (7), pp.4828-4837. ⟨10.1109/TIT.2021.3056716⟩. ⟨hal-03960632⟩
Accès au bibtex
https://arxiv.org/pdf/2006.08372 BibTex
ref_biblio
Sihem Mesnager, Ferruh Özbudak, Ahmet Sinak. Secondary constructions of (non)weakly regular plateaued functions over finite fields. Turkish Journal of Mathematics, 2021, 45 (5), pp.2295-2306. ⟨10.3906/mat-2104-5⟩. ⟨hal-03960600⟩
Accès au bibtex
BibTex
ref_biblio
Sihem Mesnager, Sihong Su. On constructions of weightwise perfectly balanced Boolean functions. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2021, 13 (6), pp.951-979. ⟨10.1007/s12095-021-00481-3⟩. ⟨hal-03960605⟩
Accès au bibtex
BibTex
ref_biblio
Sihem Mesnager, Sihong Su. On Correlation Immune Boolean Functions With Minimum Hamming Weight Power of 2. IEEE Transactions on Information Theory, 2021, 67 (11), pp.7501-7517. ⟨10.1109/TIT.2021.3109946⟩. ⟨hal-03960612⟩
Accès au bibtex
BibTex
ref_biblio
Sihem Mesnager, Sihong Su, Hui Zhang. A construction method of balanced rotation symmetric Boolean functions on arbitrary even number of variables with optimal algebraic immunity. Designs, Codes and Cryptography, 2021, 89 (1), pp.1-17. ⟨10.1007/s10623-020-00806-y⟩. ⟨hal-03960647⟩
Accès au bibtex
BibTex
ref_biblio
Sihem Mesnager, Bimal Mandal, Mounira Msahli. Survey on recent trends towards generalized differential and boomerang uniformities. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2021, ⟨10.1007/s12095-021-00551-6⟩. ⟨hal-03569465⟩
Accès au bibtex
BibTex
ref_biblio
Duong Hieu Phan, Moti Yung. Privacy in Advanced Cryptographic Protocols: Prototypical Examples. Journal of Computer Science and Cybernetics, Vietnamese Academy of Science and Technology, Vietnam, 2021, 37 (4), pp.429-451. ⟨10.15625/1813-9663/37/4/16104⟩. ⟨hal-03541793⟩
Accès au bibtex
BibTex
ref_biblio
Liqin Qian, Xiwang Cao, Sihem Mesnager. Linear codes with one-dimensional hull associated with Gaussian sums. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2021, 13 (2), pp.225-243. ⟨10.1007/s12095-020-00462-y⟩. ⟨hal-03960638⟩
Accès au bibtex
BibTex

2020

ref_biblio
Raphaël Cw Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, et al.. Advances in security research in the Asiacrypt region. Communications of the ACM, 2020, 63 (4), pp.76-81. ⟨10.1145/3378428⟩. ⟨hal-03540244⟩
Accès au bibtex
BibTex

2016

ref_biblio
Gérard Cohen, Sihem Mesnager, Hugues Randriambololona. Yet another variation on minimal linear codes. Advances in mathmatics of Communications, 2016, 10 (1), pp.53-61. ⟨hal-02287564⟩
Accès au bibtex
BibTex

Conference papers

2023

ref_biblio
Olivier Hudry. Iiro Honkala’s contributions to some conjectures on identifying codes. Symposium in the honour of Iiro Honkala, Jan 2023, Turku, Finland. ⟨hal-03945718⟩
Accès au bibtex
BibTex

2022

ref_biblio
Sarah Bordage, Mathieu Lhotel, Jade Nardi, Hugues Randriam. Interactive Oracle Proofs of Proximity to Algebraic Geometry Codes. CCC 2022 - 37th Computational Complexity Conference, Jul 2022, Philadelphie, United States. pp.30:1--30:45, ⟨10.4230/LIPIcs.CCC.2022.30⟩. ⟨hal-03832439⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-03832439/file/2022%2CIOPP%2Csubmitted.pdf BibTex
ref_biblio
Antoine Boudermine, Rida Khatoun, Jean-Henri Choyer. Attack Graph-based Solution for Vulnerabilities Impact Assessment in Dynamic Environment. 2022 5th Conference on Cloud and Internet of Things (CIoT), Mar 2022, Marrakech, Morocco. pp.24-31, ⟨10.1109/CIoT53061.2022.9766588⟩. ⟨hal-03860336⟩
Accès au bibtex
BibTex
ref_biblio
Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen. Entropic Hardness of Module-LWE from Module-NTRU. Indocrypt, Dec 2022, Kolkata, India. pp.78 - 99, ⟨10.1007/978-3-031-22912-1_4⟩. ⟨hal-04028179⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04028179/file/2023-02-20_entropic_hardness_of_module-lwe_from_module-ntru_eprint_revised.pdf BibTex
ref_biblio
Danylo Goncharskyi, Sung Yong Kim, Ahmed Serhrouchni, Pengwenlong Gu, Rida Khatoun, et al.. Delay Measurement of 0-RTT Transport Layer Security (TLS) Handshake Protocol. 2022 8th International Conference on Control, Decision and Information Technologies (CoDIT), May 2022, Istanbul, France. pp.1450-1454, ⟨10.1109/CoDIT55151.2022.9803984⟩. ⟨hal-03860343⟩
Accès au bibtex
BibTex
ref_biblio
Badis Hammi, Mohamed Yacine Idir, Rida Khatoun. A machine learning based approach for the detection of sybil attacks in C-ITS. 2022 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS), Sep 2022, Takamatsu, Japan. pp.1-4, ⟨10.23919/APNOMS56106.2022.9919991⟩. ⟨hal-03860326⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Hudry, Antoine Lobstein. Complexity of the unicity of an optimal vertex cover in graphs. Stockholm Optimization Days 2022, Jun 2022, Stockholm, Sweden. ⟨hal-03714746⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Hudry, Antoine Lobstein. Complexité du problème de l'unicité d'un transversal minimum dans un graphe. 23ème congrès annuel de la Société Française de Recherche Opérationnelle et d'Aide à la Décision, INSA Lyon, Feb 2022, Villeurbanne - Lyon, France. ⟨hal-03596176⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03596176/file/resume_Hudry_ROADEF_2022.pdf BibTex
ref_biblio
Olivier Hudry. Characterization of the majority matrices of profiles of equivalence relations. 7th International Symposium on Combinatorial Optimization (ISCO 2022), 2022, à distance, France. ⟨hal-03697613⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Hudry, Irene Charon, Antoine Lobstein. Dominating, Locating-Dominating and Identifying Codes in the q-ary Lee Hypercube. 11th International Colloquium on Graph Theory and Combinatorics (ICGT 2022), 2022, Montpellier, France. ⟨hal-03744673⟩
Accès au bibtex
BibTex
ref_biblio
Ky Nguyen, Duong Hieu Phan, David Pointcheval. Multi-Client Functional Encryption with Fine-Grained Access Control. Asiacrypt 2022 - 28th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2022, Taipei, Taiwan. ⟨hal-03910053⟩
Accès au texte intégral et bibtex
https://hal.inria.fr/hal-03910053/file/ab-ip-mcfe-full.pdf BibTex
ref_biblio
Quang-Duy Nguyen, Saadia Dhouib, Yining Huang, Patrick Bellot. An approach to bridge ROS 1 and ROS 2 devices into an OPC UA-based testbed for industry 4.0. ONCON 2022 - 1st IEEE Industrial Electronics Society Annual On-Line Conference, Dec 2022, Online conference, India. ⟨cea-03870393⟩
Accès au texte intégral et bibtex
https://hal-cea.archives-ouvertes.fr/cea-03870393/file/paper_oncon22_vHal.pdf BibTex
ref_biblio
Quang-Duy Nguyen, Saadia Dhouib, Patrick Bellot. A unified method to design bridges for OPC UA PubSub networks in the industrial IoT. IEEE CAMAD 2022 - IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, Nov 2022, Paris, France. ⟨cea-03870289⟩
Accès au texte intégral et bibtex
https://hal-cea.archives-ouvertes.fr/cea-03870289/file/paper-camad22-vHal.pdf BibTex
ref_biblio
Quang-Duy Nguyen, Saadia Dhouib, Jean-Pierre Chanet, Patrick Bellot. Towards a web-of-things approach for OPC UA field device discovery in the industrial IoT. WFCS 2022 - 18th IEEE International Conference on Factory Communication Systems, Apr 2022, Pavia, Italy. pp.1-4, ⟨10.1109/WFCS53837.2022.9779181⟩. ⟨cea-03633704⟩
Accès au texte intégral et bibtex
https://hal-cea.archives-ouvertes.fr/cea-03633704/file/WFCS22_WIP_WoT4UA-vInit-3.pdf BibTex

2021

ref_biblio
Olivier Blazy, Sayantan Mukherjee, Huyen Nguyen, Duong Hieu Phan, Damien Stehlé. An Anonymous Trace-and-Revoke Broadcast Encryption Scheme. ACISP 2021 - Australasian Conference on Information Security and Privacy, Dec 2021, Perth, Australia. pp.214-233, ⟨10.1007/978-3-030-90567-5_11⟩. ⟨hal-03475739⟩
Accès au bibtex
BibTex
ref_biblio
Stéphan Clémençon, Safa Boudabous, Houda Labiod, Julian Garbiso. Dynamic Graph Convolutional LSTM application for traffic flow estimation from error-prone measurements: results and transferability analysis. 2021 IEEE 8th International Conference on Data Science and Advanced Analytics (DSAA), Oct 2021, Porto, Portugal. pp.1-10, ⟨10.1109/DSAA53316.2021.9564245⟩. ⟨hal-03559364⟩
Accès au bibtex
BibTex
ref_biblio
Pengwenlong Gu, Dingjie Zhong, Cunqing Hua, Farid Nait-Abdesselam, Ahmed Serhrouchni, et al.. Scaling A Blockchain System For 5G-based Vehicular Networks Using Heuristic Sharding. GLOBECOM 2021 - 2021 IEEE Global Communications Conference, Dec 2021, Madrid, France. pp.1-6, ⟨10.1109/GLOBECOM46510.2021.9685234⟩. ⟨hal-03860353⟩
Accès au bibtex
BibTex
ref_biblio
San Ling, Khoa Nguyen, Duong Hieu Phan, Hanh Tang, Huaxiong Wang. Zero-Knowledge Proofs for Committed Symmetric Boolean Functions. Post-Quantum Cryptography, Jul 2021, Daegeon, South Korea. pp.339-359, ⟨10.1007/978-3-030-81293-5_18⟩. ⟨hal-03540237⟩
Accès au bibtex
BibTex
ref_biblio
Sihem Mesnager. ``{Readers} digest of'' 17-year achievements on {Boolean} and vectorial functions and open problems.. Cryptography and coding theory conference, 2021, Rome (Italia), Italy. ⟨hal-03960654⟩
Accès au bibtex
BibTex
ref_biblio
Quang-Duy Nguyen, Catherine Roussey, Patrick Bellot, Jean-Pierre Chanet. Stack of Services for Context-Aware Systems: An Internet-Of-Things System Design Approach. The 15th IEEE-RIVF International Conference on Computing and Communication Technologies, Aug 2021, Hanoi, Vietnam. ⟨10.1109/RIVF51545.2021.9642107⟩. ⟨hal-03195120v5⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-03195120/file/Paper-vHAL.pdf BibTex
ref_biblio
Pascal Urien. Innovative Countermeasures to Defeat Cyber Attacks Against Blockchain Wallets: A Crypto Terminal Use Case. 5th Cyber Security in Networking Conference (CSNet), 2021, IEEE, Oct 2021, Rio de Jaineiro, Brazil. pp.49-54, ⟨10.1109/csnet52717.2021.9614649⟩. ⟨hal-04051629⟩
Accès au texte intégral et bibtex
https://hal.science/hal-04051629/file/CT_extented_paper.pdf BibTex

2020

ref_biblio
Xuan Thanh Do, Duong Hieu Phan, Moti Yung. A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes. ACNS 2020 - International Conference on Applied Cryptography and Network Security, Nov 2020, Rome, Italy. pp.145-164, ⟨10.1007/978-3-030-57878-7_8⟩. ⟨hal-03540247⟩
Accès au bibtex
BibTex
ref_biblio
Thai Duong, Duong Hieu Phan, Ni Trieu. Catalic: Delegated PSI Cardinality with Applications to Contact Tracing. Advances in Cryptology - ASIACRYPT 2020, Dec 2020, Virtual, France. pp.870-899, ⟨10.1007/978-3-030-64840-4_29⟩. ⟨hal-03220027⟩
Accès au bibtex
BibTex
ref_biblio
Keun-Woo Lim, Katarzyna Kapusta, Gerard Memmi, Woo-Sung Jung. Multi-hop Data Fragmentation in Energy Harvesting Wireless Sensor Networks. 2020 Global Internet of Things Summit (GIoTS), Jun 2020, Dublin, France. pp.1-6, ⟨10.1109/GIOTS49054.2020.9119569⟩. ⟨hal-03559678⟩
Accès au bibtex
BibTex
ref_biblio
Hugues Randriambololona, Édouard Rousseau. Trisymmetric Multiplication Formulae in Finite Fields. WAIFI 2020, Jul 2020, Rennes, France. pp.92-111, ⟨10.1007/978-3-030-68869-1_5⟩. ⟨hal-03832419⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-03832419/file/tri-sym.pdf BibTex

Book sections

2022

ref_biblio
Andre Esser, Alexander May, Javier A. Verbel, Weiqiang Wen. Partial Key Exposure Attacks on BIKE, Rainbow and NTRU. Advances in Cryptology – CRYPTO 2022, 13509, Springer Nature Switzerland, pp.3-31, 2022, Lecture Notes in Computer Science, ⟨10.1007/978-3-031-15982-4_1⟩. ⟨hal-03876958⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03876958/file/KEAonLattices.pdf BibTex
ref_biblio
Giuseppe Persiano, Duong Hieu Phan, Moti Yung. Anamorphic Encryption: Private Communication Against a Dictator. Advances in Cryptology – EUROCRYPT 2022, 13276, Springer International Publishing, pp.34-63, 2022, Lecture Notes in Computer Science, ⟨10.1007/978-3-031-07085-3_2⟩. ⟨hal-03773135⟩
Accès au bibtex
BibTex

2021

ref_biblio
Laetitia Debesse, Sihem Mesnager, Mounira Msahli. POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack. Applied Cryptography and Network Security Workshops, 12809, Springer International Publishing, pp.485-489, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-81645-2_27⟩. ⟨hal-03569438⟩
Accès au bibtex
BibTex
ref_biblio
Sihem Mesnager. Linear codes from functions. Concise encyclopedia of coding theory, , pp.463--526, 2021, 9781315147901. ⟨hal-03960624⟩
Accès au bibtex
BibTex

Patents

2008

ref_biblio
Duong Hieu Phan, Olivier Billet. OBTAINING DERIVED VALUES DEPENDING ON A SECRET MASTER VALUE. France, Patent n° : EP2153575. 2008. ⟨hal-03541808⟩
Accès au bibtex
BibTex