Skip to Main content Skip to Navigation


...
tel-01950884v2  Theses
Nadim Kobeissi. Formal Verification for Real-World Cryptographic Protocols and Implementations
Computer Science [cs]. INRIA Paris; Ecole Normale Supérieure de Paris - ENS Paris, 2018. English
...
tel-01995823v1  Habilitation à diriger des recherches
Cătălin Hriţcu. The Quest for Formally Secure Compartmentalizing Compilation
Programming Languages [cs.PL]. ENS Paris; PSL Research University, 2019
hal-01672706v1  Journal articles
Jonathan ProtzenkoJean‐karim ZinzindohouéAseem RastogiTahina RamananandroPeng Wang et al.  Verified Low‐Level Programming Embedded in F*
Proceedings of the ACM on Programming Languages, ACM, 2017, 1 (ICFP), pp.17:1--17:29. ⟨10.1145/3110261⟩
...
hal-01483768v1  Journal articles
Craig CostelloBenjamin Smith. Montgomery curves and their arithmetic
Journal of Cryptographic Engineering, Springer, 2017, Special issue on Montgomery arithmetic, ⟨10.1007/s13389-017-0157-6⟩
...
hal-00939188v1  Journal articles
Nikhil SwamyJuan ChenCédric FournetPierre-Yves StrubKarthikeyan Bhargavan et al.  Secure Distributed Programming with Value-Dependent Types
Journal of Functional Programming, Cambridge University Press (CUP), 2013, 23 (4), pp.402-451
...
hal-01242268v1  Journal articles
Sébastien GambsMarc-Olivier KillijianMiguel Nuñez del Prado Cortez. De-anonymization attack on geolocated data
Journal of Computer and System Sciences, Elsevier, 2014, 80 (8), pp.1597-1614. ⟨10.1016/j.jcss.2014.04.024⟩
hal-02470995v1  Journal articles
Brice MinaudPatrick DerbezPierre-Alain FouquePierre Karpman. Key-Recovery Attacks on ASASA.
Journal of Cryptology, Springer Verlag, 2018, 31 (3), pp.845-884
hal-01645392v1  Journal articles
Yayaoui CheherazedJean-Louis LanetMohamed MezghicheKarim Tamine. Machine Learning Techniques to Predict Sensitive Patterns to Fault Attack in the Java Card Application
Journal of Experimental and Theoretical Artificial Intelligence, Taylor & Francis, 2018, 30 (1), pp.101-127. ⟨10.1080/0952813x.2017.1409276⟩
...
hal-02264449v1  Journal articles
Erwan Le MerrerPatrick PérezGilles Trédan. Adversarial frontier stitching for remote neural network watermarking
Neural Computing and Applications, Springer Verlag, 2019, 32 (13), pp.9233-9244. ⟨10.1007/s00521-019-04434-z⟩
hal-01934181v1  Journal articles
Gottfried HeroldElena KirshanovaAlexander May. On the asymptotic complexity of solving LWE
Designs, Codes and Cryptography, Springer Verlag, 2018, 86 (1), pp.55 - 83. ⟨10.1007/s10623-016-0326-0⟩
hal-02864914v1  Journal articles
Stefan KölblElmar TischhauserPatrick DerbezAndrey Bogdanov. Troika: a ternary cryptographic hash function
Designs, Codes and Cryptography, Springer Verlag, 2020, 88 (1), pp.91-117. ⟨10.1007/s10623-019-00673-2⟩
...
hal-01593371v1  Journal articles
Marine Minier. Improving impossible-differential attacks against Rijndael-160 and Rijndael-224
Designs, Codes and Cryptography, Springer Verlag, 2017, 82 (1-2), pp.117 - 129. ⟨10.1007/s10623-016-0206-7⟩
...
hal-00710290v3  Journal articles
Alexander ZehSergey Bezzateev. A New Bound on the Minimum Distance of Cyclic Codes Using Small-Minimum-Distance Cyclic Codes
Designs, Codes and Cryptography, Springer Verlag, 2012, pp.229-246
...
hal-01215623v1  Journal articles
Steven GalbraithPierrick Gaudry. Recent progress on the elliptic curve discrete logarithm problem
Designs, Codes and Cryptography, Springer Verlag, 2016, 78 (1), pp.51-72. ⟨10.1007/s10623-015-0146-7⟩
...
inria-00172366v1  Conference papers
Jean-Pierre BarbotMichel FliessThierry Floquet. An algebraic framework for the design of nonlinear observers with unknown inputs
46th IEEE Conference on Decision and Control, 2007, New Orleans, United States
...
inria-00001150v1  Conference papers
Jamal DaafouzMichel FliessGilles Millérioux. Une approche intrinsèque des observateurs linéaires à entrées inconnues
Conférence internationale francophone d'automatique (CIFA 2006), 2006, Bordeaux, France
hal-00639562v1  Conference papers
Boris RyabkoDaniil Ryabko. Using Kolmogorov Complexity for Understanding Some Limitations on Steganography
IEEE International Symposium on Information Theory, 2009, seoul, South Korea. pp.2733-2736
...
hal-03118271v1  Conference papers
Karim BagheryAlonso GonzálezZaira PindadoCarla Ràfols. Signatures of Knowledge for Boolean Circuits under Standard Assumptions (Full version)
AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Jul 2020, Cairo / Virtual, Egypt. ⟨10.1007/978-3-030-51938-4_2⟩
...
tel-01243295v1  Theses
Marco Stronati. Designing Location Privacy Mechanisms for flexibility over time and space
Cryptography and Security [cs.CR]. Ecole Polytechnique, 2015. English
...
tel-01941697v1  Habilitation à diriger des recherches
Tamara Rezk. Secure Programming
Cryptography and Security [cs.CR]. Université de Nice - Sophia Antipolis, 2018