Marine Minier
Orcid: 0000-0003-3252-2578
According to our database1,
Marine Minier
authored at least 85 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IACR Trans. Symmetric Cryptol., 2024
2022
Wirel. Networks, 2022
IACR Trans. Symmetric Cryptol., 2022
Masked Iterate-Fork-Iterate: A new Design Paradigm for Tweakable Expanding Pseudorandom Function.
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 26th International Conference on System Theory, Control and Computing , 2022
Proceedings of the 10th International Conference on Systems and Control, 2022
Proceedings of the Progress in Cryptology, 2022
2021
CTET+: A Beyond-Birthday-Bound Secure Tweakable Enciphering Scheme Using a Single Pseudorandom Permutation.
IACR Trans. Symmetric Cryptol., 2021
Proceedings of the Applied Cryptography and Network Security, 2021
2020
On the Feistel Counterpart of the Boomerang Connectivity Table Introduction and Analysis of the FBCT.
IACR Trans. Symmetric Cryptol., 2020
IACR Cryptol. ePrint Arch., 2020
Artif. Intell., 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
2019
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019
2018
Inf. Process. Lett., 2018
2017
Des. Codes Cryptogr., 2017
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017
Non-interactive (t, n)-Incidence Counting from Differentially Private Indicator Vectors.
Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, 2017
2016
Extended Generalized Feistel Networks Using Matrix Representation to Propose a New Lightweight Block Cipher: Lilliput.
IEEE Trans. Computers, 2016
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
Proceedings of the Principles and Practice of Constraint Programming, 2016
2015
Secur. Commun. Networks, 2015
Network Coding versus Replication Based Resilient Techniques to Mitigate Insider Attacks for Smart Metering.
Int. J. Distributed Sens. Networks, 2015
Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method.
IACR Cryptol. ePrint Arch., 2015
A theoretical framework of resilience: Biased random walk routing against insider attacks.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015
Some Results Using the Matrix Methods on Impossible, Integral and Zero-Correlation Distinguishers for Feistel-Like Ciphers.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015
Proceedings of the Codes, Cryptology, and Information Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 25th IEEE Annual International Symposium on Personal, 2014
2013
How network coding system constrains packet pollution attacks in wireless sensor networks.
Int. J. Grid Util. Comput., 2013
Int. J. Distributed Sens. Networks, 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013
On the Security of Piccolo Lightweight Block Cipher against Related-Key Impossible Differentials.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013
2012
Selective Forwarding Attacks against Data and ACK Flows in Network Coding and Countermeasures.
J. Comput. Networks Commun., 2012
A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock.
Inf. Process. Lett., 2012
Concurr. Comput. Pract. Exp., 2012
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012
Proceedings of the Progress in Cryptology, 2012
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
Quelques résultats en cryptographie symétrique, pour les modèles de confiance dans les réseaux ambiants et la sécurité dans les réseaux de capteurs sans fil. (Some results in symmetric key cryptography, for trust models in ambient networks and security in wireless sensor networks).
, 2012
2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011
2010
Proceedings of the Sensor Systems and Software - Second International ICST Conference, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the 17th International Conference on Telecommunications, 2010
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010
2009
Proceedings of the Security and Privacy in Communication Networks, 2009
Proceedings of the IEEE 20th International Symposium on Personal, 2009
Proceedings of the Progress in Cryptology, 2009
Proceedings of the Progress in Cryptology, 2009
Proceedings of the Progress in Cryptology, 2009
2008
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008
Some Results on FCSR Automata With Applications to the Security of FCSR-Based Pseudorandom Generators.
IEEE Trans. Inf. Theory, 2008
Detecting wormhole attacks in wireless networks using local neighborhood information.
Proceedings of the IEEE 19th International Symposium on Personal, 2008
Proceedings of the Progress in Cryptology, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007
Proceedings of the Trust Management, 2007
2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006
2005
Proceedings of the Progress in Cryptology, 2005
2004
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004
2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
2001
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001
2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
A Collision Attack on 7 Rounds of Rijndael.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000