Morgan Barbier
Morgan Barbier
ENSICAEN - GREYC
Adresse e-mail validée de ensicaen.fr
Titre
Citée par
Citée par
Année
Key reduction of McEliece's cryptosystem using list decoding
M Barbier, PSLM Barreto
2011 IEEE International Symposium on Information Theory Proceedings, 2681-2685, 2011
322011
On quasi-cyclic codes as a generalization of cyclic codes
M Barbier, C Chabot, G Quintin
Finite Fields and Their Applications 18 (5), 904-919, 2012
272012
List-decoding of binary Goppa codes up to the binary Johnson bound
D Augot, M Barbier, A Couvreur
2011 IEEE Information Theory Workshop, 229-233, 2011
152011
On Generalized Reed–Solomon Codes Over Commutative and Noncommutative Rings
G Quintin, M Barbier, C Chabot
IEEE transactions on information theory 59 (9), 5882-5897, 2013
92013
Wet paper codes and the dual distance in steganography
C Munuera, M Barbier
arXiv preprint arXiv:1104.1970, 2011
92011
Enhancing the security of transformation based biometric template protection schemes
L Ghammam, M Barbier, C Rosenberger
2018 International Conference on Cyberworlds (CW), 316-323, 2018
72018
Memory carving in embedded devices: separate the wheat from the chaff
T Gougeon, M Barbier, P Lacharme, G Avoine, C Rosenberger
International Conference on Applied Cryptography and Network Security, 592-608, 2016
62016
List-decoding of binary Goppa codes up to the binary Johnson bound
D Augot, M Barbier, A Couvreur
arXiv preprint arXiv:1012.3439, 2010
62010
Ensuring message embedding in wet paper steganography
D Augot, M Barbier, C Fontaine
IMA International Conference on Cryptography and Coding, 244-258, 2011
52011
Décodage en liste et application à la sécurité de l'information
M Barbier
Ecole Polytechnique X, 2011
42011
GREYC-Hashing: Combining biometrics and secret for enhancing the security of protected templates
K Atighehchi, L Ghammam, M Barbier, C Rosenberger
Future Generation Computer Systems 101, 819-830, 2019
32019
Image watermarking with biometric data for copyright protection
M Barbier, JM Le Bars, C Rosenberger
2015 10th International Conference on Availability, Reliability and Security …, 2015
32015
On the decoding of quasi-BCH codes
M Barbier, C Pernet, G Quintin
International Workshop on Coding and Cryptography (WCC) 2013, 2012
32012
New Set of Codes for the Maximum-Likelihood Decoding Problem
M Barbier
Yet Another Conference on Cryptography (YACC) 2010, 2010
32010
Placement optimization of IoT security solutions for edge computing based on graph theory
T Godquin, M Barbier, C Gaber, JL Grimault, JM Le Bars
2019 IEEE 38th International Performance Computing and Communications …, 2019
22019
Practical Solutions to Save Bitcoins Applied to an Identity System Proposal.
D Augot, H Chabanne, W George
ICISSP, 511-518, 2019
22019
Memory carving can finally unveil your embedded personal data
T Gougeon, M Barbier, P Lacharme, G Avoine, C Rosenberger
Proceedings of the 12th International Conference on Availability …, 2017
22017
Applied graph theory to security: A qualitative placement of security solutions within IoT networks
T Godquin, M Barbier, C Gaber, JL Grimault, JM Le Bars
Journal of Information Security and Applications 55, 102640, 2020
12020
On the computation of the M {\" o} bius transform
M Barbier, H Cheballah, JML Bars
arXiv preprint arXiv:2004.11146, 2020
12020
IoT: Vers un contrôle des fonctionnalités au vu des menaces liées
T Godquin, M Barbier, C Gaber, JL Grimault, JM Le Bars
Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes …, 2018
12018
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20