Rémi Géraud
Orcid: 0000-0001-8719-1724
According to our database1,
Rémi Géraud
authored at least 60 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A systematic literature review on the impact of AI models on the security of code generation.
Frontiers Big Data, 2024
2023
IACR Cryptol. ePrint Arch., 2023
2022
A forensic analysis of the Google Home: repairing compressed data without error correction.
Digit. Investig., 2022
2021
IACR Cryptol. ePrint Arch., 2021
Primary Elements in Cyclotomic Fields with Applications to Power Residue Symbols, and More.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
2020
At Most 43 Moves, At Least 29: Optimal Strategies and Bounds for Ultimate Tic-Tac-Toe.
CoRR, 2020
Proceedings of the Computing and Combinatorics - 26th International Conference, 2020
2019
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
2018
From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions.
CoRR, 2018
Proceedings of the Advances in Information and Computer Security, 2018
Proceedings of the 1st International Conference on Historical Cryptology, 2018
Proceedings of the Cyber-Physical Systems Security., 2018
2017
Advances in public-key cryptology and computer exploitation. (Avancées en cryptologie à clé publique et exploitation informatique).
PhD thesis, 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms.
IACR Cryptol. ePrint Arch., 2017
Generating Functionally Equivalent Programs Having Non-isomorphic Control-Flow Graphs.
Proceedings of the Secure IT Systems, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
When organized crime applies academic results: a forensic analysis of an in-card listening device.
J. Cryptogr. Eng., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
Proceedings of the Information Security Practice and Experience, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015