Morgan Barbier

According to our database1, Morgan Barbier authored at least 27 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Side-Channel Attack Against Classic McEliece When Loading the Goppa Polynomial.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2023, 2023

2021
A semantic approach for comparing Fog Service Placement Problems.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

2020
On the computation of the Möbius transform.
Theor. Comput. Sci., 2020

Applied graph theory to security: A qualitative placement of security solutions within IoT networks.
J. Inf. Secur. Appl., 2020

On the computation of the M{ö}bius transform.
CoRR, 2020

2019
GREYC-Hashing: Combining biometrics and secret for enhancing the security of protected templates.
Future Gener. Comput. Syst., 2019

Placement optimization of IoT security solutions for edge computing based on graph theory.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

2018
Signature Renewal for Low Entropy Data.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Enhancing the Security of Transformation Based Biometric Template Protection Schemes.
Proceedings of the 2018 International Conference on Cyberworlds, 2018

2017
Retrieving dates in smart card dumps is as hard as finding a needle in a haystack.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Memory carving can finally unveil your embedded personal data.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Memory Carving in Embedded Devices: Separate the Wheat from the Chaff.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Properties and constructions of coincident functions.
CoRR, 2015

Image Watermaking With Biometric Data For Copyright Protection.
CoRR, 2015

Image Watermarking with Biometric Data for Copyright Protection.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Re-encoding reformulation and application to Welch-Berlekamp algorithm.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

2013
On Generalized Reed-Solomon Codes Over Commutative and Noncommutative Rings.
IEEE Trans. Inf. Theory, 2013

Improving success probability and embedding efficiency in code based steganography
CoRR, 2013

2012
On quasi-cyclic codes as a generalization of cyclic codes.
Finite Fields Their Appl., 2012

On the decoding of quasi-BCH codes
CoRR, 2012

Wet paper codes and the dual distance in steganography.
Adv. Math. Commun., 2012

2011
Décodage en liste et application à la sécurité de l'information. (List Decoding and application to information security).
PhD thesis, 2011

Key Reduction of McEliece's Cryptosystem Using List Decoding
CoRR, 2011

List-decoding of binary Goppa codes up to the binary Johnson bound.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

Key reduction of McEliece's cryptosystem using list decoding.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Ensuring Message Embedding in Wet Paper Steganography.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

2010
New Set of Codes for the Maximum-Likelihood Decoding Problem
CoRR, 2010


  Loading...