default search action
Morgan Barbier
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c14]Sara Majbour, Morgan Barbier, Jean-Marie Le Bars:
Fuzzy Vault Security Enhancement Avoid Statistical Biases. SECRYPT 2024: 40-51 - 2023
- [c13]Boly Seck, Pierre-Louis Cayrel, Vlad-Florin Dragoi, Idy Diop, Morgan Barbier, Jean Belo Klamti, Vincent Grosso, Brice Colombier:
A Side-Channel Attack Against Classic McEliece When Loading the Goppa Polynomial. AFRICACRYPT 2023: 105-125 - 2021
- [c12]Tanguy Godquin, Morgan Barbier, Chrystel Gaber, Jean-Luc Grimault, Jean-Marie Le Bars:
A semantic approach for comparing Fog Service Placement Problems. IM 2021: 682-686 - 2020
- [j6]Tanguy Godquin, Morgan Barbier, Chrystel Gaber, Jean-Luc Grimault, Jean-Marie Le Bars:
Applied graph theory to security: A qualitative placement of security solutions within IoT networks. J. Inf. Secur. Appl. 55: 102640 (2020) - [j5]Morgan Barbier, Hayat Cheballah, Jean-Marie Le Bars:
On the computation of the Möbius transform. Theor. Comput. Sci. 809: 171-188 (2020) - [i12]Morgan Barbier, Hayat Cheballah, Jean-Marie Le Bars:
On the computation of the M{ö}bius transform. CoRR abs/2004.11146 (2020)
2010 – 2019
- 2019
- [j4]Kevin Atighehchi, Loubna Ghammam, Morgan Barbier, Christophe Rosenberger:
GREYC-Hashing: Combining biometrics and secret for enhancing the security of protected templates. Future Gener. Comput. Syst. 101: 819-830 (2019) - [c11]Tanguy Godquin, Morgan Barbier, Chrystel Gaber, Jean-Luc Grimault, Jean-Marie Le Bars:
Placement optimization of IoT security solutions for edge computing based on graph theory. IPCCC 2019: 1-7 - 2018
- [c10]Loubna Ghammam, Morgan Barbier, Christophe Rosenberger:
Enhancing the Security of Transformation Based Biometric Template Protection Schemes. CW 2018: 316-323 - [c9]Kevin Atighehchi, Morgan Barbier:
Signature Renewal for Low Entropy Data. TrustCom/BigDataSE 2018: 873-884 - 2017
- [c8]Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger:
Memory carving can finally unveil your embedded personal data. ARES 2017: 18:1-18:9 - [c7]Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger:
Retrieving dates in smart card dumps is as hard as finding a needle in a haystack. WIFS 2017: 1-6 - 2016
- [c6]Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger:
Memory Carving in Embedded Devices: Separate the Wheat from the Chaff. ACNS 2016: 592-608 - 2015
- [c5]Morgan Barbier, Jean-Marie Le Bars, Christophe Rosenberger:
Image Watermarking with Biometric Data for Copyright Protection. ARES 2015: 618-625 - [i11]Morgan Barbier, Jean-Marie Le Bars, Christophe Rosenberger:
Image Watermaking With Biometric Data For Copyright Protection. CoRR abs/1503.04624 (2015) - [i10]Morgan Barbier, Hayat Cheballah, Jean-Marie Le Bars:
Properties and constructions of coincident functions. CoRR abs/1507.05316 (2015) - 2014
- [c4]Morgan Barbier:
Re-encoding reformulation and application to Welch-Berlekamp algorithm. ISIT 2014: 1782-1786 - 2013
- [j3]Guillaume Quintin, Morgan Barbier, Christophe Chabot:
On Generalized Reed-Solomon Codes Over Commutative and Noncommutative Rings. IEEE Trans. Inf. Theory 59(9): 5882-5897 (2013) - [i9]Morgan Barbier, Carlos Munuera:
Improving success probability and embedding efficiency in code based steganography. CoRR abs/1302.2048 (2013) - 2012
- [j2]Carlos Munuera, Morgan Barbier:
Wet paper codes and the dual distance in steganography. Adv. Math. Commun. 6(3): 273-285 (2012) - [j1]Morgan Barbier, Christophe Chabot, Guillaume Quintin:
On quasi-cyclic codes as a generalization of cyclic codes. Finite Fields Their Appl. 18(5): 904-919 (2012) - [i8]Morgan Barbier:
Re-encoding reformulation and application to Welch-Berlekamp algorithm. CoRR abs/1212.5554 (2012) - [i7]Morgan Barbier, Clément Pernet, Guillaume Quintin:
On the decoding of quasi-BCH codes. CoRR abs/1212.5663 (2012) - 2011
- [b1]Morgan Barbier:
Décodage en liste et application à la sécurité de l'information. (List Decoding and application to information security). École Polytechnique, Palaiseau, France, 2011 - [c3]Daniel Augot, Morgan Barbier, Caroline Fontaine:
Ensuring Message Embedding in Wet Paper Steganography. IMACC 2011: 244-258 - [c2]Morgan Barbier, Paulo S. L. M. Barreto:
Key reduction of McEliece's cryptosystem using list decoding. ISIT 2011: 2681-2685 - [c1]Daniel Augot, Morgan Barbier, Alain Couvreur:
List-decoding of binary Goppa codes up to the binary Johnson bound. ITW 2011: 229-233 - [i6]Morgan Barbier:
Key Reduction of McEliece's Cryptosystem Using List Decoding. CoRR abs/1102.2566 (2011) - [i5]Carlos Munuera, Morgan Barbier:
Wet paper codes and the dual distance in steganography. CoRR abs/1104.1970 (2011) - [i4]Morgan Barbier, Christophe Chabot, Guillaume Quintin:
On Quasi-Cyclic Codes as a Generalization of Cyclic Codes. CoRR abs/1108.3754 (2011) - [i3]Daniel Augot, Morgan Barbier, Caroline Fontaine:
Ensuring message embedding in wet paper steganography. CoRR abs/1111.2301 (2011) - 2010
- [i2]Morgan Barbier:
New Set of Codes for the Maximum-Likelihood Decoding Problem. CoRR abs/1011.2834 (2010) - [i1]Daniel Augot, Morgan Barbier, Alain Couvreur:
List-decoding of binary Goppa codes up to the binary Johnson bound. CoRR abs/1012.3439 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 02:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint