default search action
Marine Minier
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Loïc Rouquette, Marine Minier, Christine Solnon:
Automatic boomerang attacks search on Rijndael. J. Math. Cryptol. 18(1) (2024) - [j23]Xavier Bonnetain, Margarita Cordero, Virginie Lallemand, Marine Minier, María Naya-Plasencia:
On Impossible Boomerang Attacks Application to Simon and SKINNYee. IACR Trans. Symmetric Cryptol. 2024(2): 222-253 (2024) - [c50]Elena Andreeva, Benoît Cogliati, Virginie Lallemand, Marine Minier, Antoon Purnal, Arnab Roy:
Masked Iterate-Fork-Iterate: A New Design Paradigm for Tweakable Expanding Pseudorandom Function. ACNS (2) 2024: 433-459 - 2022
- [j22]Julien Francq, Loïc Besson, Paul Huynh, Philippe Guillot, Gilles Millerioux, Marine Minier:
Non-Triangular Self-Synchronizing Stream Ciphers. IEEE Trans. Computers 71(1): 134-145 (2022) - [j21]Virginie Lallemand, Marine Minier, Loïc Rouquette:
Automatic Search of Rectangle Attacks on Feistel Ciphers: Application to WARP. IACR Trans. Symmetric Cryptol. 2022(2): 113-140 (2022) - [j20]Soline Blanc, Abdelkader Lahmadi, Kévin Le Gouguec, Marine Minier, Lama Sleem:
Benchmarking of lightweight cryptographic algorithms for wireless IoT networks. Wirel. Networks 28(8): 3453-3476 (2022) - [c49]Loïc Rouquette, David Gérault, Marine Minier, Christine Solnon:
And Rijndael?: Automatic Related-Key Differential Analysis of Rijndael. AFRICACRYPT 2022: 150-175 - [c48]Hamid Boukerrou, Gilles Millerioux, Marine Minier, Mirko Fiacchini:
Construction of dead-beat switched automata: application to cryptography. ICSC 2022: 23-30 - [c47]Hamid Boukerrou, Gilles Millerioux, Marine Minier:
Towards a new design of ciphers to secure CPS: the role of control theory. ICSTCC 2022: 13-18 - [i15]Elena Andreeva, Benoit Cogliati, Virginie Lallemand, Marine Minier, Antoon Purnal, Arnab Roy:
Masked Iterate-Fork-Iterate: A new Design Paradigm for Tweakable Expanding Pseudorandom Function. IACR Cryptol. ePrint Arch. 2022: 1534 (2022) - 2021
- [j19]Benoît Cogliati, Jordan Ethan, Virginie Lallemand, ByeongHak Lee, Jooyoung Lee, Marine Minier:
CTET+: A Beyond-Birthday-Bound Secure Tweakable Enciphering Scheme Using a Single Pseudorandom Permutation. IACR Trans. Symmetric Cryptol. 2021(4): 1-35 (2021) - [c46]Stéphanie Delaune, Patrick Derbez, Paul Huynh, Marine Minier, Victor Mollimard, Charles Prud'homme:
Efficient Methods to Search for Best Differential Characteristics on SKINNY. ACNS (2) 2021: 184-207 - 2020
- [j18]David Gérault, Pascal Lafourcade, Marine Minier, Christine Solnon:
Computing AES related-key differential characteristics with constraint programming. Artif. Intell. 278 (2020) - [j17]Hamid Boukerrou, Paul Huynh, Virginie Lallemand, Bimal Mandal, Marine Minier:
On the Feistel Counterpart of the Boomerang Connectivity Table Introduction and Analysis of the FBCT. IACR Trans. Symmetric Cryptol. 2020(1): 331-362 (2020) - [c45]Sandra Rasoamiaramanana, Marine Minier, Gilles Macario-Rat:
A White-Box Encryption Scheme using Physically Unclonable Functions. ICETE (2) 2020: 279-286 - [i14]Stéphanie Delaune, Patrick Derbez, Paul Huynh, Marine Minier, Victor Mollimard, Charles Prud'homme:
SKINNY with Scalpel - Comparing Tools for Differential Analysis. IACR Cryptol. ePrint Arch. 2020: 1402 (2020)
2010 – 2019
- 2019
- [j16]Faina I. Solov'eva, Daniel Augot, Thomas Johansson, Marine Minier, Victor A. Zinoviev:
Editorial: Special issue on coding and cryptography. Des. Codes Cryptogr. 87(2-3): 183-184 (2019) - [c44]Sandra Rasoamiaramanana, Gilles Macario-Rat, Marine Minier:
White-Box Traitor-Tracing from Tardos Probabilistic Codes. SECITC 2019: 125-141 - 2018
- [j15]David Gérault, Pascal Lafourcade, Marine Minier, Christine Solnon:
Revisiting AES related-key differential attacks with constraint programming. Inf. Process. Lett. 139: 24-29 (2018) - 2017
- [j14]Marine Minier:
Improving impossible-differential attacks against Rijndael-160 and Rijndael-224. Des. Codes Cryptogr. 82(1-2): 117-129 (2017) - [c43]Mohammad Alaggan, Mathieu Cunche, Marine Minier:
Non-interactive (t, n)-Incidence Counting from Differentially Private Indicator Vectors. IWSPA@CODASPY 2017: 1-9 - [c42]David Gérault, Marine Minier, Christine Solnon:
Using Constraint Programming to solve a Cryptanalytic Problem. IJCAI 2017: 4844-4848 - [i13]David Gérault, Pascal Lafourcade, Marine Minier, Christine Solnon:
Revisiting AES Related-Key Differential Attacks with Constraint Programming. IACR Cryptol. ePrint Arch. 2017: 139 (2017) - 2016
- [j13]Thierry P. Berger, Julien Francq, Marine Minier, Gaël Thomas:
Extended Generalized Feistel Networks Using Matrix Representation to Propose a New Lightweight Block Cipher: Lilliput. IEEE Trans. Computers 65(7): 2074-2089 (2016) - [c41]David Gérault, Marine Minier, Christine Solnon:
Constraint Programming Models for Chosen Key Differential Cryptanalysis. CP 2016: 584-601 - [c40]Marine Minier, Raphael C.-W. Phan:
Tuple Cryptanalysis: Slicing and Fusing Multisets. Mycrypt 2016: 294-320 - 2015
- [j12]Pierre Brunisholz, Ochirkhand Erdene-Ochir, Mohamed M. Abdallah, Khalid A. Qaraqe, Marine Minier, Fabrice Valois:
Network Coding versus Replication Based Resilient Techniques to Mitigate Insider Attacks for Smart Metering. Int. J. Distributed Sens. Networks 11: 737269:1-737269:11 (2015) - [j11]Mickaël Cazorla, Sylvain Gourgeon, Kevin Marquet, Marine Minier:
Survey and benchmark of lightweight block ciphers for MSP430 16-bit microcontroller. Secur. Commun. Networks 8(18): 3564-3579 (2015) - [c39]Thierry P. Berger, Julien Francq, Marine Minier:
CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask. C2SI 2015: 89-105 - [c38]Céline Blondeau, Marine Minier:
Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix Method. FSE 2015: 92-113 - [c37]Thierry P. Berger, Marine Minier:
Some Results Using the Matrix Methods on Impossible, Integral and Zero-Correlation Distinguishers for Feistel-Like Ciphers. INDOCRYPT 2015: 180-197 - [c36]Ochirkhand Erdene-Ochir, Mohamed M. Abdallah, Khalid A. Qaraqe, Marine Minier, Fabrice Valois:
A theoretical framework of resilience: Biased random walk routing against insider attacks. WCNC 2015: 1602-1607 - [i12]Céline Blondeau, Marine Minier:
Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method. IACR Cryptol. ePrint Arch. 2015: 141 (2015) - 2014
- [c35]Ochirkhand Erdene-Ochir, Mohamed M. Abdallah, Khalid A. Qaraqe, Marine Minier, Fabrice Valois:
Routing resilience evaluation for smart metering: Definition, metric and techniques. PIMRC 2014: 1867-1871 - [i11]Pierre Brunisholz, Marine Minier, Fabrice Valois:
The Gain of Network Coding in Wireless Sensor Networking. CoRR abs/1412.2570 (2014) - [i10]Christina Boura, Marine Minier, María Naya-Plasencia, Valentin Suder:
Improved Impossible Differential Attacks against Round-Reduced LBlock. IACR Cryptol. ePrint Arch. 2014: 279 (2014) - 2013
- [j10]Wassim Znaidi, Marine Minier, Stéphane Ubéda:
Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j9]Yuanyuan Zhang, Marine Minier:
How network coding system constrains packet pollution attacks in wireless sensor networks. Int. J. Grid Util. Comput. 4(2/3): 197-203 (2013) - [c34]Marine Minier, Gaël Thomas:
An Integral Distinguisher on Grøstl-512 v3. INDOCRYPT 2013: 50-59 - [c33]Marine Minier:
On the Security of Piccolo Lightweight Block Cipher against Related-Key Impossible Differentials. INDOCRYPT 2013: 308-318 - [c32]Mathieu Cunche, Cédric Lauradoux, Marine Minier, Roksana Boreli:
Private and resilient data aggregation. LCN 2013: 759-762 - [c31]Thierry P. Berger, Marine Minier, Gaël Thomas:
Extended Generalized Feistel Networks Using Matrix Representation. Selected Areas in Cryptography 2013: 289-305 - [c30]Mickaël Cazorla, Kevin Marquet, Marine Minier:
Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks. SECRYPT 2013: 543-548 - [i9]Mickaël Cazorla, Kevin Marquet, Marine Minier:
Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks. IACR Cryptol. ePrint Arch. 2013: 295 (2013) - 2012
- [b1]Marine Minier:
Quelques résultats en cryptographie symétrique, pour les modèles de confiance dans les réseaux ambiants et la sécurité dans les réseaux de capteurs sans fil. (Some results in symmetric key cryptography, for trust models in ambient networks and security in wireless sensor networks). INSA de Lyon, Lyon - Villeurbanne, France, 2012 - [j8]Anya Apavatjrut, Wassim Znaidi, Antoine Fraboulet, Claire Goursaud, Katia Jaffrès-Runser, Cédric Lauradoux, Marine Minier:
Energy efficient authentication strategies for network coding. Concurr. Comput. Pract. Exp. 24(10): 1086-1107 (2012) - [j7]Marine Minier, Raphael C.-W. Phan, Benjamin Pousse:
On Integral Distinguishers of Rijndael Family of Ciphers. Cryptologia 36(2): 104-118 (2012) - [j6]Ochirkhand Erdene-Ochir, Apostolos A. Kountouris, Marine Minier, Fabrice Valois:
A New Metric to Quantify Resiliency in Networking. IEEE Commun. Lett. 16(10): 1699-1702 (2012) - [j5]Marine Minier, María Naya-Plasencia:
A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock. Inf. Process. Lett. 112(16): 624-629 (2012) - [j4]Yuanyuan Zhang, Marine Minier:
Selective Forwarding Attacks against Data and ACK Flows in Network Coding and Countermeasures. J. Comput. Networks Commun. 2012: 184783:1-184783:14 (2012) - [j3]Wassim Znaidi, Marine Minier:
Key establishment and management for WSNs. Telecommun. Syst. 50(2): 113-125 (2012) - [c29]Thierry P. Berger, Joffrey D'Hayer, Kevin Marquet, Marine Minier, Gaël Thomas:
The GLUON Family: A Lightweight Hash Function Family Based on FCSRs. AFRICACRYPT 2012: 306-323 - [c28]Thierry P. Berger, Marine Minier:
Cryptanalysis of Pseudo-random Generators Based on Vectorial FCSRs. INDOCRYPT 2012: 209-224 - [c27]Ochirkhand Erdene-Ochir, Marine Minier, Fabrice Valois, Apostolos A. Kountouris:
Resiliency taxonomy of routing protocols in Wireless Sensor Networks. LCN 2012: 324-327 - 2011
- [j2]François Arnault, Thierry P. Berger, Marine Minier, Benjamin Pousse:
Revisiting LFSRs for Cryptographic Applications. IEEE Trans. Inf. Theory 57(12): 8095-8113 (2011) - [c26]Marine Minier, María Naya-Plasencia, Thomas Peyrin:
Analysis of Reduced-SHAvite-3-256 v2. FSE 2011: 68-87 - [c25]Marine Minier, Raphael C.-W. Phan:
Energy-Efficient Cryptographic Engineering Paradigm. iNetSeC 2011: 78-88 - [c24]Yuanyuan Zhang, Wassim Znaidi, Cédric Lauradoux, Marine Minier:
Flooding attacks against network coding and countermeasures. NSS 2011: 305-309 - [i8]Marine Minier, María Naya-Plasencia, Thomas Peyrin:
Analysis of reduced-SHAvite-3-256 v2. IACR Cryptol. ePrint Arch. 2011: 175 (2011) - 2010
- [c23]Marine Minier, Raphael C.-W. Phan, Benjamin Pousse:
Integral Distinguishers of Some SHA-3 Candidates. CANS 2010: 106-123 - [c22]Ochirkhand Erdene-Ochir, Marine Minier, Fabrice Valois, Apostolos A. Kountouris:
Resiliency of wireless sensor networks: Definitions and analyses. ICT 2010: 828-835 - [c21]Anya Apavatjrut, Wassim Znaidi, Antoine Fraboulet, Claire Goursaud, Cédric Lauradoux, Marine Minier:
Energy Friendly Integrity for Network Coding in Wireless Sensor Networks. NSS 2010: 223-230 - [c20]Chérifa Boucetta, Mohamed Ali Kâafar, Marine Minier:
How Secure are Secure Localization Protocols in WSNs? S-CUBE 2010: 164-178 - [i7]Ochirkhand Erdene-Ochir, Marine Minier, Fabrice Valois, Apostolos A. Kountouris:
Resilient networking in wireless sensor networks. CoRR abs/1003.5104 (2010) - [i6]François Arnault, Thierry P. Berger, Marine Minier, Benjamin Pousse:
Revisiting LFSMs. CoRR abs/1004.4806 (2010)
2000 – 2009
- 2009
- [c19]Marine Minier, Raphael C.-W. Phan, Benjamin Pousse:
Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks. AFRICACRYPT 2009: 60-76 - [c18]Thierry P. Berger, Marine Minier, Benjamin Pousse:
Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode. INDOCRYPT 2009: 119-135 - [c17]Gérald Gavin, Marine Minier:
Oblivious Multi-variate Polynomial Evaluation. INDOCRYPT 2009: 430-442 - [c16]Wassim Znaidi, Marine Minier, Stéphane Ubéda:
Hierarchical node replication attacks detection in wireless sensors networks. PIMRC 2009: 82-86 - [c15]François Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier, Benjamin Pousse:
A New Approach for FCSRs. Selected Areas in Cryptography 2009: 433-448 - [c14]Wassim Znaidi, Marine Minier, Cédric Lauradoux:
Aggregated Authentication (AMAC) Using Universal Hash Functions. SecureComm 2009: 248-264 - [i5]Marine Minier, Benjamin Pousse:
Improving Integral Cryptanalysis against Rijndael with Large Blocks. CoRR abs/0910.2153 (2009) - [i4]François Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier, Benjamin Pousse:
A new approach for FCSRs. IACR Cryptol. ePrint Arch. 2009: 167 (2009) - 2008
- [j1]François Arnault, Thierry P. Berger, Marine Minier:
Some Results on FCSR Automata With Applications to the Security of FCSR-Based Pseudorandom Generators. IEEE Trans. Inf. Theory 54(2): 836-840 (2008) - [c13]Samuel Galice, Marine Minier:
Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds. AFRICACRYPT 2008: 1-15 - [c12]Wassim Znaidi, Marine Minier, Jean-Philippe Babau:
Detecting wormhole attacks in wireless networks using local neighborhood information. PIMRC 2008: 1-5 - [p2]Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas T. Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert:
Sosemanuk, a Fast Software-Oriented Stream Cipher. The eSTREAM Finalists 2008: 98-118 - [p1]Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas T. Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert:
Decimv2. The eSTREAM Finalists 2008: 140-151 - [i3]Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas T. Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert:
SOSEMANUK: a fast software-oriented stream cipher. CoRR abs/0810.1858 (2008) - 2007
- [c11]Samuel Galice, Marine Minier, Stéphane Ubéda:
A trust protocol for community collaboration. IFIPTM 2007: 169-184 - [c10]François Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier:
X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs. INDOCRYPT 2007: 341-350 - [c9]Nicolas Fournel, Marine Minier, Stéphane Ubéda:
Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks. WISTP 2007: 202-214 - [i2]François Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier:
X-FCSR: a new software oriented stream cipher based upon FCSRs. IACR Cryptol. ePrint Arch. 2007: 380 (2007) - 2006
- [c8]Samuel Galice, Marine Minier, John Mullins, Stéphane Ubéda:
Cryptographic Protocol to Establish Trusted History of Interactions. ESAS 2006: 136-149 - [c7]Samuel Galice, Véronique Legrand, Marine Minier, John Mullins, Stéphane Ubéda:
A History-Based Framework to Build Trust Management Systems. SecureComm 2006: 1-7 - [i1]Samuel Galice, Véronique Legrand, Marine Minier, John Mullins, Stéphane Ubéda:
The KAA project: a trust policy point of view. CoRR abs/cs/0606005 (2006) - 2005
- [c6]Thierry P. Berger, Marine Minier:
Two Algebraic Attacks Against the F-FCSRs Using the IV Mode. INDOCRYPT 2005: 143-154 - 2004
- [c5]Marine Minier:
A Three Rounds Property of the AES. AES Conference 2004: 16-26 - 2002
- [c4]Henri Gilbert, Marine Minier:
Cryptanalysis of SFLASH. EUROCRYPT 2002: 288-298 - 2001
- [c3]Henri Gilbert, Marine Minier:
New Results on the Pseudorandomness of Some Blockcipher Constructions. FSE 2001: 248-266 - 2000
- [c2]Henri Gilbert, Marine Minier:
A Collision Attack on 7 Rounds of Rijndael. AES Candidate Conference 2000: 230-241 - [c1]Marine Minier, Henri Gilbert:
Stochastic Cryptanalysis of Crypton. FSE 2000: 121-133
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint