Skip to Main content Skip to Navigation


hal-02864914v1  Journal articles
Stefan KölblElmar TischhauserPatrick DerbezAndrey Bogdanov. Troika: a ternary cryptographic hash function
Designs, Codes and Cryptography, Springer Verlag, 2020, 88 (1), pp.91-117. ⟨10.1007/s10623-019-00673-2⟩
hal-02372730v1  Directions of work or proceedings
Eitan AltmanKonstantin AvrachenkovFrancesco de PellegriniRachid ElazouziHuijuan Wang. Multilevel Strategic Interaction Game Models for Complex Networks
Altman, Eitan; Avrachenkov, Konstantin E; De Pellegrini, Francesco; El-Azouzi, Rachid; Wang, Huijuan. Springer International Publishing, 2019, ⟨10.1007/978-3-030-24455-2⟩
hal-01872303v1  Conference papers
Ali MarandiTorsten BraunKavé SalamatianNikolaos Thomos. A Comparative Analysis of Bloom Filter-based Routing Protocols for Information-Centric Networks
IEEE Symposium on Computer Communications (ISCC'18)., Jun 2018, Natal, Brazil
hal-01860823v1  Journal articles
Myriam Djoukwe TapiLeïla Bagny BeilheSamuel BowongYves Dumont. Models for Miridae, a cocoa insect pest. Application in control strategies
Mathematical Methods in the Applied Sciences, Wiley, In press, 41 (18), pp.8673-8696. ⟨10.1002/mma.5063⟩
hal-01378341v1  Conference papers
Zvika BrakerskiDavid CashRotem TsabaryHoeteck Wee. Targeted Homomorphic Attribute-Based Encryption
14th International Conference, TCC 2016-B, Oct 2016, Beijing, China. pp.330-360
hal-01326779v1  Conference papers
David EppsteinPhilipp KindermannStephen KobourovGiuseppe LiottaAnna Lubiw et al.  On the Planar Split Thickness of Graphs
LATIN 2016: Theoretical Informatics: 12th Latin American Symposium, Apr 2016, Ensenada, Mexico. pp.403-415, ⟨10.1007/978-3-662-49529-2_30⟩
hal-01421407v1  Conference papers
Moreno FalaschiMaurizio GabbrielliCarlos OlarteCatuscia Palamidessi. Slicing Concurrent Constraint Programs
Pre-proceedings of the 26th International Symposium on Logic-Based Program Synthesis and Transformation (LOPSTR 2016), 2016, Edinburgh, United Kingdom
hal-01241081v1  Conference papers
Elena AndreevaBegül BilginAndrey BogdanovAtul LuykxFlorian Mendel et al.  PRIMATEs v2.0
DIAC 2015 - Directions in Authenticated Ciphers, Sep 2015, Singapore, Singapore
hal-01206289v1  Conference papers
David BernhardVéronique CortierDavid GalindoOlivier PereiraBogdan Warinschi. A comprehensive analysis of game-based ballot privacy definitions
36th IEEE Symposium on Security and Privacy (S&P'15), May 2015, San Jose, United States. ⟨10.1109/SP.2015.37⟩
hal-01271650v1  Book sections
Davide ChiarugiMoreno FalaschiCarlos OlarteCatuscia Palamidessi. A Declarative View of Signaling Pathways
Chiara Bodei; Gian Luigi Ferrari; Corrado Priami. Programming Languages with Applications to Biology and Security, 9465, Springer, pp.183-201, 2015, Lecture Notes in Computer Science, 978-3-319-25526-2
hal-00919935v1  Conference papers
Ismael FigueroaTom SchrijversNicolas TabareauÉric Tanter. Compositional Reasoning About Aspect Interference
13th International Conference on Modularity (Modularity'14), Apr 2014, Lugano, Switzerland
hal-00922228v1  Conference papers
Dongxia BaiHongbo YuGaoli WangXiaoyun Wang. Improved Boomerang Attacks on SM3
ACISP 2013 - 18th Australasian Conference Information Security and Privacy, Jul 2013, Brisbane, Australia. pp.251-266, ⟨10.1007/978-3-642-39059-3_17⟩
hal-00865699v1  Conference papers
Joerg KappesBjoern AndresFred HamprechtChristoph SchnörrSebastian Nowozin et al.  A Comparative Study of Modern Inference Techniques for Discrete Energy Minimization Problems
IEEE Conference on Computer Vision and Pattern Recognition 2013, 2013, United States. pp.1-8
hal-00912561v1  Journal articles
Pierre FraigniaudAmos KormanDavid Peleg. Local Distributed Decision
Journal of the ACM (JACM), Association for Computing Machinery, 2013, pp.35