Skip to Main content Skip to Navigation

hal-01408633v1  Conference papers
Julia ChauletNicolas Sendrier. Worst case QC-MDPC decoder for McEliece cryptosystem
IEEE International Symposium on Information Theory, ISIT 2016, Jul 2016, Barcelone, Spain. pp.5, ⟨10.1109/ISIT.2016.7541522⟩
hal-01170042v2  Conference papers
Bernardetta AddisDallal BelabedMathieu BouetStefano Secci. Virtual Network Functions Placement and Routing Optimization
CloudNet 2015 - IEEE 4th International Conference on Cloud Networking, Oct 2015, Niagara Falls, ON, Canada. pp.171-177, ⟨10.1109/CloudNet.2015.7335301⟩
hal-01362552v1  Conference papers
Margaux DugardinSylvain GuilleyMartin MoreauZakaria NajmPablo Rauzy. Using Modular Extension to Provably Protect Edwards Curves Against Fault Attacks
PROOFS: Security Proofs for Embedded Systems 2016, Aug 2016, San, United States
hal-02417544v1  Conference papers
Thomas PrestDahmun GoudarziAnge MartinelliAlain Passelègue. Unifying Leakage Models on a Rényi Day
Crypto 2019 - 39th Annual International Cryptology Conference, Aug 2019, Santa Barbara, CA, United States. pp.683-712, ⟨10.1007/978-3-030-26948-7_24⟩
hal-01410216v1  Conference papers
Gilles BartheSonia BelaïdFrançois DupressoirPierre-Alain FouqueBenjamin Grégoire et al.  Strong Non-Interference and Type-Directed Higher-Order Masking
CCS 2016 - 23rd ACM Conference on Computer and Communications Security, Oct 2016, Vienne, Austria. pp.116 - 129, ⟨10.1145/2976749.2978427⟩
tel-01235207v1  Theses
Sonia Belaïd. Security of Cryptosystems Against Power-Analysis Attacks
Cryptography and Security [cs.CR]. ENS, 2015. English
hal-01401251v1  Conference papers
Ahmed LoukiliDamien SaucezThierry TurlettiMathieu Bouet. Seamless content distribution with OpenFlow
Student Workshop at ACM CoNEXT, Dec 2016, Irvine, United States. pp.3
hal-01613773v1  Conference papers
Sonia BelaidFabrice BenhamoudaAlain PasselègueEmmanuel ProuffAdrian Thillard et al.  Private Multiplication over Finite Fields
Advances in Cryptology - CRYPTO 2017, Aug 2017, Santa Barbara, United States. pp.397-426, ⟨10.1007/978-3-319-63697-9_14⟩
hal-01516180v1  Conference papers
Jad OueisVania ConanDamien LavauxRazvan StanicaFabrice Valois. Placement du coeur d'un réseau mobile autonome
ALGOTEL 2017 - 19èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, May 2017, Quiberon, France
hal-01573383v1  Journal articles
Jad OueisVania ConanDamien LavauxRazvan StanicaFabrice Valois. Overview of LTE Isolated E-UTRAN Operation for Public Safety
IEEE Communications Standards Magazine, Institute of Electrical and Electronics Engineers, 2017, 1 (2), pp.98-105. ⟨10.1109/MCOMSTD.2017.1600875⟩
hal-01343275v1  Conference papers
Ghada MouallaThierry TurlettiMathieu BouetDamien Saucez. On the Necessity of Accounting for Resiliency in SFC
First International Workshop on Programmability for Cloud Networks and Applications (PROCON), Sep 2016, Wuerzburg, Germany
hal-00998856v1  Conference papers
Dramane OuattaraMinh Thao QuachFrancine KriefMohamed Aymen ChaloufHicham Khalifé. Mitigating the Hospital Area Communication's Interference using Cognitive Radio Networks
2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013), Oct 2013, Lisbon, Portugal. pp.Page(s): 324 - 328
hal-00853899v1  Journal articles
Dramane OuattaraQuach Minh ThaoFrancine KriefMohamed Aymen ChaloufHicham Khalifé. Mitigating the Hospital Area Communication's Interference using Cognitive Radio Networks
IEEE International Conference on e-Health Networking, Application & Services (IEEE Healthcom), 2013
hal-01900708v1  Conference papers
Gilles BartheSonia BelaïdThomas EspitauPierre-Alain FouqueBenjamin Grégoire et al.  Masking the GLP Lattice-Based Signature Scheme at Any Order
Eurocrypt 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Apr 2018, Tel Aviv, Israel. pp.354-384, ⟨10.1007/978-3-319-78375-8_12⟩
hal-01088439v1  Book sections
Michel BourdellesShuai LiImran Rafiq QuadriEtienne BrosseAndrey Sadovykh et al.  Fostering Analysis from Industrial Embedded Systems Modeling
Alessandra Bagnato; Leandro Soares Indrusiak; Imran Rafiq Quadri; Matteo Rossi. Handbook of Research on Embedded Systems Design, IGI Global, pp.283--300, 2014, 9781466661943. ⟨10.4018/978-1-4666-6194-3.ch011⟩
tel-02946399v1  Theses
Mélissa Rossi. Extended Security of Lattice-Based Cryptography
Cryptography and Security [cs.CR]. Équipe CASCADE, Département d'Informatique de l'ENS de Paris; Université PSL, 2020. English
hal-01573380v1  Conference papers
Jad OueisVania ConanDamien LavauxRazvan StanicaFabrice Valois. Core Network Function Placement in Mobile Networks
PIMRC 2017 - IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Oct 2017, Montreal, Canada. pp.5
hal-00976877v1  Conference papers
Filippo RebecchiMarcelo Dias de AmorimVania Conan. Adaptive Mobile Traffic Offloading
ALGOTEL 2014 -- 16èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Jun 2014, Le Bois-Plage-en-Ré, France. pp.1-4
hal-03206297v1  Directions of work or proceedings
François de VieillevilleStéphane MayAdrien LagrangeA DupuisRosa Ruiloba et al.  Actes de la conférence CAID 2020
CAID 2020 - Second Conference on Artificial Intelligence for Defence, Dec 2020, Rennes, France. 2021