Brice Minaud

According to our database1, Brice Minaud authored at least 22 papers between 2014 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Generalized cuckoo hashing with a stash, revisited.
Inf. Process. Lett., March, 2023

Hermes: I/O-Efficient Forward-Secure Searchable Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2023

Rectangular Attack on VOX.
IACR Cryptol. ePrint Arch., 2023

Weighted Oblivious RAM, with Applications to Searchable Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2023

2022
Dynamic Local Searchable Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2022

2021
SSE and SSD: Page-Efficient Searchable Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2021

2020
Note on Generalized Cuckoo Hashing with a Stash.
CoRR, 2020

2019
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks.
IACR Cryptol. ePrint Arch., 2019

2018
On Recovering Affine Encodings in White-Box Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Key-Recovery Attacks on ASASA.
J. Cryptol., 2018

Linear Biases in AEGIS Keystream.
IACR Cryptol. ePrint Arch., 2018

Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries.
IACR Cryptol. ePrint Arch., 2018

Cryptanalysis of MORUS.
IACR Cryptol. ePrint Arch., 2018

2017
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage.
IACR Cryptol. ePrint Arch., 2017

Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives.
IACR Cryptol. ePrint Arch., 2017

2016
Analysis of recent cryptographic primitives. (Analyse de primitives cryptographiques récentes).
PhD thesis, 2016

Efficient and Provable White-Box Primitives.
IACR Cryptol. ePrint Arch., 2016

Cryptanalysis of the New CLT Multilinear Map over the Integers.
IACR Cryptol. ePrint Arch., 2016

2015
The Iterated Random Permutation Problem with Applications to Cascade Encryption.
IACR Cryptol. ePrint Arch., 2015

Cryptanalysis of the New Multilinear Map over the Integers.
IACR Cryptol. ePrint Arch., 2015

A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro.
IACR Cryptol. ePrint Arch., 2015

2014
Match Box Meet-in-the-Middle Attack Against KATAN.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014


  Loading...