Marion Videau

According to our database1, Marion Videau authored at least 21 papers between 2002 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2016
Collecting relations for the Number Field Sieve in GF(p6).
IACR Cryptology ePrint Archive, 2016

Defeating MBA-based Obfuscation.
Proceedings of the 2016 ACM Workshop on Software PROtection, 2016

2014
Discrete Logarithm in GF(2809) with FFS.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

2013
Relation collection for the Function Field Sieve.
IACR Cryptology ePrint Archive, 2013

Discrete logarithm in GF(2809) with FFS.
IACR Cryptology ePrint Archive, 2013

Relation Collection for the Function Field Sieve.
Proceedings of the 21st IEEE Symposium on Computer Arithmetic, 2013

2012
The Linux Pseudorandom Number Generator Revisited.
IACR Cryptology ePrint Archive, 2012

A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions.
IACR Cryptology ePrint Archive, 2012

2011
eSTREAM.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Distinguishing Attacks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Cube Attack.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Cryptanalysis of ARMADILLO2.
IACR Cryptology ePrint Archive, 2011

Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

Cryptanalysis of ARMADILLO2.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3.
IACR Cryptology ePrint Archive, 2010

2009
Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers.
IACR Cryptology ePrint Archive, 2009

2008
Matriochka symmetric Boolean functions.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

2005
Critères de sécurité des algorithmes de chiffrement à clé secrète. (Security criteria of secret key ciphers).
PhD thesis, 2005

Symmetric Boolean functions.
IEEE Trans. Information Theory, 2005

2004
On some properties of symmetric Boolean functions.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

2002
Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002


  Loading...