Brice Minaud

According to our database1, Brice Minaud authored at least 23 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
New Security Proofs and Techniques for Hash-and-Sign with Retry Signature Schemes.
IACR Cryptol. ePrint Arch., 2024

2023
Generalized cuckoo hashing with a stash, revisited.
Inf. Process. Lett., March, 2023

Rectangular Attack on VOX.
IACR Cryptol. ePrint Arch., 2023

Weighted Oblivious RAM, with Applications to Searchable Symmetric Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Hermes: I/O-Efficient Forward-Secure Searchable Symmetric Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Dynamic Local Searchable Symmetric Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
SSE and SSD: Page-Efficient Searchable Symmetric Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Note on Generalized Cuckoo Hashing with a Stash.
CoRR, 2020

2019
On Recovering Affine Encodings in White-Box Implementations.
IACR Cryptol. ePrint Arch., 2019

Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Cryptanalysis of MORUS.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Analysis of recent cryptographic primitives. (Analyse de primitives cryptographiques récentes).
PhD thesis, 2016

Cryptanalysis of the New CLT Multilinear Map over the Integers.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Efficient and Provable White-Box Primitives.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Cryptanalysis of the New Multilinear Map over the Integers.
IACR Cryptol. ePrint Arch., 2015

A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

The Iterated Random Permutation Problem with Applications to Cascade Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Key-Recovery Attacks on ASASA.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Linear Biases in AEGIS Keystream.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

Match Box Meet-in-the-Middle Attack Against KATAN.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014


  Loading...