Key reduction of McEliece's cryptosystem using list decoding M Barbier, PSLM Barreto 2011 IEEE International Symposium on Information Theory Proceedings, 2681-2685, 2011 | 32 | 2011 |
On quasi-cyclic codes as a generalization of cyclic codes M Barbier, C Chabot, G Quintin Finite Fields and Their Applications 18 (5), 904-919, 2012 | 27 | 2012 |
List-decoding of binary Goppa codes up to the binary Johnson bound D Augot, M Barbier, A Couvreur 2011 IEEE Information Theory Workshop, 229-233, 2011 | 15 | 2011 |
On Generalized Reed–Solomon Codes Over Commutative and Noncommutative Rings G Quintin, M Barbier, C Chabot IEEE transactions on information theory 59 (9), 5882-5897, 2013 | 9 | 2013 |
Wet paper codes and the dual distance in steganography C Munuera, M Barbier arXiv preprint arXiv:1104.1970, 2011 | 9 | 2011 |
Enhancing the security of transformation based biometric template protection schemes L Ghammam, M Barbier, C Rosenberger 2018 International Conference on Cyberworlds (CW), 316-323, 2018 | 7 | 2018 |
Memory carving in embedded devices: separate the wheat from the chaff T Gougeon, M Barbier, P Lacharme, G Avoine, C Rosenberger International Conference on Applied Cryptography and Network Security, 592-608, 2016 | 6 | 2016 |
List-decoding of binary Goppa codes up to the binary Johnson bound D Augot, M Barbier, A Couvreur arXiv preprint arXiv:1012.3439, 2010 | 6 | 2010 |
Ensuring message embedding in wet paper steganography D Augot, M Barbier, C Fontaine IMA International Conference on Cryptography and Coding, 244-258, 2011 | 5 | 2011 |
Décodage en liste et application à la sécurité de l'information M Barbier Ecole Polytechnique X, 2011 | 4 | 2011 |
GREYC-Hashing: Combining biometrics and secret for enhancing the security of protected templates K Atighehchi, L Ghammam, M Barbier, C Rosenberger Future Generation Computer Systems 101, 819-830, 2019 | 3 | 2019 |
Image watermarking with biometric data for copyright protection M Barbier, JM Le Bars, C Rosenberger 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 3 | 2015 |
On the decoding of quasi-BCH codes M Barbier, C Pernet, G Quintin International Workshop on Coding and Cryptography (WCC) 2013, 2012 | 3 | 2012 |
New Set of Codes for the Maximum-Likelihood Decoding Problem M Barbier Yet Another Conference on Cryptography (YACC) 2010, 2010 | 3 | 2010 |
Placement optimization of IoT security solutions for edge computing based on graph theory T Godquin, M Barbier, C Gaber, JL Grimault, JM Le Bars 2019 IEEE 38th International Performance Computing and Communications …, 2019 | 2 | 2019 |
Practical Solutions to Save Bitcoins Applied to an Identity System Proposal. D Augot, H Chabanne, W George ICISSP, 511-518, 2019 | 2 | 2019 |
Memory carving can finally unveil your embedded personal data T Gougeon, M Barbier, P Lacharme, G Avoine, C Rosenberger Proceedings of the 12th International Conference on Availability …, 2017 | 2 | 2017 |
Applied graph theory to security: A qualitative placement of security solutions within IoT networks T Godquin, M Barbier, C Gaber, JL Grimault, JM Le Bars Journal of Information Security and Applications 55, 102640, 2020 | 1 | 2020 |
On the computation of the M {\" o} bius transform M Barbier, H Cheballah, JML Bars arXiv preprint arXiv:2004.11146, 2020 | 1 | 2020 |
IoT: Vers un contrôle des fonctionnalités au vu des menaces liées T Godquin, M Barbier, C Gaber, JL Grimault, JM Le Bars Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes …, 2018 | 1 | 2018 |