Skip to Main content Skip to Navigation

hal-02864914v1  Journal articles
Stefan KölblElmar TischhauserPatrick DerbezAndrey Bogdanov. Troika: a ternary cryptographic hash function
Designs, Codes and Cryptography, Springer Verlag, 2020, 88 (1), pp.91-117. ⟨10.1007/s10623-019-00673-2⟩
hal-02372730v1  Directions of work or proceedings
Eitan AltmanKonstantin AvrachenkovFrancesco de PellegriniRachid ElazouziHuijuan Wang. Multilevel Strategic Interaction Game Models for Complex Networks
Altman, Eitan; Avrachenkov, Konstantin E; De Pellegrini, Francesco; El-Azouzi, Rachid; Wang, Huijuan. Springer International Publishing, 2019, ⟨10.1007/978-3-030-24455-2⟩
hal-01872303v1  Conference papers
Ali MarandiTorsten BraunKavé SalamatianNikolaos Thomos. A Comparative Analysis of Bloom Filter-based Routing Protocols for Information-Centric Networks
IEEE Symposium on Computer Communications (ISCC'18)., Jun 2018, Natal, Brazil
hal-01860823v1  Journal articles
Myriam Djoukwe TapiLeïla Bagny BeilheSamuel BowongYves Dumont. Models for Miridae, a cocoa insect pest. Application in control strategies
Mathematical Methods in the Applied Sciences, Wiley, In press, 41 (18), pp.8673-8696. ⟨10.1002/mma.5063⟩
hal-01378341v1  Conference papers
Zvika BrakerskiDavid CashRotem TsabaryHoeteck Wee. Targeted Homomorphic Attribute-Based Encryption
14th International Conference, TCC 2016-B, Oct 2016, Beijing, China. pp.330-360
hal-01326779v1  Conference papers
David EppsteinPhilipp KindermannStephen KobourovGiuseppe LiottaAnna Lubiw et al.  On the Planar Split Thickness of Graphs
LATIN 2016: Theoretical Informatics: 12th Latin American Symposium, Apr 2016, Ensenada, Mexico. pp.403-415, ⟨10.1007/978-3-662-49529-2_30⟩
hal-01421407v1  Conference papers
Moreno FalaschiMaurizio GabbrielliCarlos OlarteCatuscia Palamidessi. Slicing Concurrent Constraint Programs
Pre-proceedings of the 26th International Symposium on Logic-Based Program Synthesis and Transformation (LOPSTR 2016), 2016, Edinburgh, United Kingdom
hal-01241081v1  Conference papers
Elena AndreevaBegül BilginAndrey BogdanovAtul LuykxFlorian Mendel et al.  PRIMATEs v2.0
DIAC 2015 - Directions in Authenticated Ciphers, Sep 2015, Singapore, Singapore
hal-01206289v1  Conference papers
David BernhardVéronique CortierDavid GalindoOlivier PereiraBogdan Warinschi. A comprehensive analysis of game-based ballot privacy definitions
36th IEEE Symposium on Security and Privacy (S&P'15), May 2015, San Jose, United States. ⟨10.1109/SP.2015.37⟩
hal-01271650v1  Book sections
Davide ChiarugiMoreno FalaschiCarlos OlarteCatuscia Palamidessi. A Declarative View of Signaling Pathways
Chiara Bodei; Gian Luigi Ferrari; Corrado Priami. Programming Languages with Applications to Biology and Security, 9465, Springer, pp.183-201, 2015, Lecture Notes in Computer Science, 978-3-319-25526-2
hal-00919935v1  Conference papers
Ismael FigueroaTom SchrijversNicolas TabareauÉric Tanter. Compositional Reasoning About Aspect Interference
13th International Conference on Modularity (Modularity'14), Apr 2014, Lugano, Switzerland
hal-00922228v1  Conference papers
Dongxia BaiHongbo YuGaoli WangXiaoyun Wang. Improved Boomerang Attacks on SM3
ACISP 2013 - 18th Australasian Conference Information Security and Privacy, Jul 2013, Brisbane, Australia. pp.251-266, ⟨10.1007/978-3-642-39059-3_17⟩
hal-00912561v1  Journal articles
Pierre FraigniaudAmos KormanDavid Peleg. Local Distributed Decision
Journal of the ACM (JACM), Association for Computing Machinery, 2013, pp.35
hal-00732904v1  Conference papers
David BernhardVéronique CortierOlivier PereiraBogdan Warinschi. Measuring Vote Privacy, Revisited.
19th ACM Conference on Computer and Communications Security (CCS'12), Oct 2012, Raleigh, United States
hal-00922231v1  Conference papers
Hongbo YuJiazhe ChenXiaoyun Wang. The Boomerang Attacks on the Round-Reduced Skein-512
SAC 2012 - 19th International Conference Selected Areas in Cryptography, Aug 2012, Windsor, Canada. pp.287-303, ⟨10.1007/978-3-642-35999-6_19⟩
hal-00725839v1  Conference papers
Ittai AbrahamShiri ChechikCyril Gavoille. Fully dynamic approximate distance oracles for planar graphs via forbidden-set distance labels
44th Annual ACM Symposium on Theory of Computing (STOC), May 2012, New-York, United States. pp.1199-1217, ⟨10.1145/2213977.2214084⟩
hal-00766871v1  Journal articles
Philippe DarondeauLaurie Ricker. Distributed Control of Discrete Event Systems: A First Step
LNCS Transactions on Petri Nets and Other Models of Concurrency, Springer, 2012, 6, pp.24-45
hal-01272900v1  Book sections
Ioannis Z. EmirisVictor Y. PanElias P. Tsigaridas. Algebraic and numerical algorithms
Algorithms and Theory of Computation Handbook, CRC Press Inc., pp.1-40, 2012
hal-00650973v1  Conference papers
Philippe DarondeauLaurie Ricker. Towards Distributed Control of Discrete Event Systems
ART2011 : Workshop on Applications of Region Theory, Jun 2011, Newcastle upon Tyne, United Kingdom. pp.63-78
inria-00638464v1  Conference papers
Frédéric HavetJørgen Bang-JensenNicolas Trotignon. Finding an induced subdivision of a digraph
VI Latin-American Algorithms, Graphs and Optimization Symposium (LAGOS 2011), Apr 2011, Bariloche, Argentina. pp.09--14
hal-01101279v1  Book sections
Rien van de WeygaertGert VegterHerbert EdelsbrunnerBernard JonesPratyush Pranav et al.  Alpha, Betti and the Megaparsec Universe: On the Topology of the Cosmic Web
Transactions on Computational Science XIV, Springer, pp.60-101, 2011, Lecture Notes in Computer Science, 978-3-642-25248-8. ⟨10.1007/978-3-642-25249-5_3⟩
inria-00388501v1  Journal articles
Peter KornerupChristoph LauterVincent LefèvreNicolas LouvetJean-Michel Muller. Computing Correctly Rounded Integer Powers in Floating-Point Arithmetic
ACM Transactions on Mathematical Software, Association for Computing Machinery, 2010, 37 (1), pp.4:1-4:23. ⟨10.1145/1644001.1644005⟩
inria-00530964v1  Book sections
Tibor CinklerDavid CoudertMichele FlamminiGianpiero MonacoLuca Moscardelli et al.  Traffic Grooming: Combinatorial Results and Practical Resolutions.
Arie Koster and Xavier Muñoz. Graphs and Algorithms in Communication Networks: Studies in Broadband, Optical, Wireless, and Ad Hoc Networks., XXVII, Springer, pp.63-94, 2010, EATCS Texts in Theoretical Computer Science, 978-3-642-02249-4. ⟨10.1007/978-3-642-02250-0⟩
hal-01148162v1  Journal articles
Bernd BankMarc GiustiJoos HeintzMohab Safey El DinÉric Schost. On the geometry of polar varieties
Applicable Algebra in Engineering, Communication and Computing, Springer Verlag, 2010, 21 (1), pp.33--83. ⟨10.1007/s00200-009-0117-1⟩
hal-00408725v1  Conference papers
Bilel DerbelCyril GavoilleDavid PelegLaurent Viennot. Local Computation of Nearly Additive Spanners
DISC, Sep 2009, Elche/Elx, Spain. pp.176-190
hal-00804527v1  Conference papers
Afzal GodilHelin DutagaciCeyhun Burak AkgülApostolos AxenopoulosBenjamin Bustos et al.  SHREC'09 Track: Generic Shape Retrieval
Eurographics workshop on 3D Object Retrieval, Eurographics, Mar 2009, Munich, Germany. ⟨10.2312/3DOR/3DOR09/061-068⟩
hal-00432732v1  Conference papers
Rubén MondéjarPedro GarciaCarles PairotPascal UrsoPascal Molli. Designing a distributed AOP runtime composition model
24th Annual ACM Symposium on Applied Computing - SAC 2009, Mar 2009, Honolulu, Hawaii, United States. pp.539-540, ⟨10.1145/1529282.1529395⟩
lirmm-00324589v1  Conference papers
David BremnerJonathan LenchnerGiuseppe LiottaChristophe PaulMarc Pouget et al.  A Note on α-Drawable k-Trees
CCCG'08: Canadian Conference on Computational Geometry, Canada. pp.23-27