On quasi-cyclic codes as a generalization of cyclic codes M Barbier, C Chabot, G Quintin Finite Fields and Their Applications 18 (5), 904-919, 2012 | 38 | 2012 |
Key reduction of McEliece's cryptosystem using list decoding M Barbier, PSLM Barreto 2011 IEEE International Symposium on Information Theory Proceedings, 2681-2685, 2011 | 33 | 2011 |
On generalized Reed–Solomon codes over commutative and noncommutative rings G Quintin, M Barbier, C Chabot IEEE transactions on information theory 59 (9), 5882-5897, 2013 | 23 | 2013 |
List-decoding of binary Goppa codes up to the binary Johnson bound D Augot, M Barbier, A Couvreur 2011 IEEE Information Theory Workshop, 229-233, 2011 | 21 | 2011 |
GREYC-Hashing: Combining biometrics and secret for enhancing the security of protected templates K Atighehchi, L Ghammam, M Barbier, C Rosenberger Future Generation Computer Systems 101, 819-830, 2019 | 20 | 2019 |
Enhancing the security of transformation based biometric template protection schemes L Ghammam, M Barbier, C Rosenberger 2018 International Conference on Cyberworlds (CW), 316-323, 2018 | 18 | 2018 |
Applied graph theory to security: A qualitative placement of security solutions within IoT networks T Godquin, M Barbier, C Gaber, JL Grimault, JM Le Bars Journal of information security and applications 55, 102640, 2020 | 13 | 2020 |
Placement optimization of IoT security solutions for edge computing based on graph theory T Godquin, M Barbier, C Gaber, JL Grimault, JM Le Bars 2019 IEEE 38th International Performance Computing and Communications …, 2019 | 12 | 2019 |
Wet paper codes and the dual distance in steganography C Munuera, M Barbier arXiv preprint arXiv:1104.1970, 2011 | 11 | 2011 |
Ensuring message embedding in wet paper steganography D Augot, M Barbier, C Fontaine Cryptography and Coding: 13th IMA International Conference, IMACC 2011 …, 2011 | 9 | 2011 |
Memory carving in embedded devices: separate the wheat from the chaff T Gougeon, M Barbier, P Lacharme, G Avoine, C Rosenberger Applied Cryptography and Network Security: 14th International Conference …, 2016 | 8 | 2016 |
On the computation of the Möbius transform M Barbier, H Cheballah, JM Le Bars Theoretical Computer Science 809, 171-188, 2020 | 7 | 2020 |
Image watermarking with biometric data for copyright protection M Barbier, JM Le Bars, C Rosenberger 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 7 | 2015 |
List-decoding of binary Goppa codes up to the binary Johnson bound D Augot, M Barbier, A Couvreur arXiv preprint arXiv:1012.3439, 2010 | 7 | 2010 |
Décodage en liste et application à la sécurité de l'information M Barbier Ecole Polytechnique X, 2011 | 5 | 2011 |
Signature renewal for low entropy data K Atighehchi, M Barbier 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 4 | 2018 |
Tatouage d'images avec des données biométriques révocables pour la preuve de propriété M Barbier, C Rosenberger Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d …, 2014 | 4 | 2014 |
New Set of Codes for the Maximum-Likelihood Decoding Problem M Barbier Yet Another Conference on Cryptography (YACC) 2010, 2010 | 4 | 2010 |
On the decoding of quasi-BCH codes M Barbier, C Pernet, G Quintin International Workshop on Coding and Cryptography (WCC) 2013, 2012 | 3 | 2012 |
Cryptanalysis of a code-based identification scheme presented in CANS 2018 B Seck, PL Cayrel, I Diop, M Barbier International Conference on Cryptography, Codes and Cyber Security, 3-19, 2022 | 2 | 2022 |