The SCEAS System
Navigation Menu

Search the dblp DataBase


Marine Minier: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Henri Gilbert, Marine Minier
    A Collision Attack on 7 Rounds of Rijndael. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:230-241 [Conf]
  2. Marine Minier
    A Three Rounds Property of the AES. [Citation Graph (0, 0)][DBLP]
    AES Conference, 2004, pp:16-26 [Conf]
  3. Samuel Galice, Marine Minier, John Mullins, Stéphane Ubéda
    Cryptographic Protocol to Establish Trusted History of Interactions. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:136-149 [Conf]
  4. Henri Gilbert, Marine Minier
    Cryptanalysis of SFLASH. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:288-298 [Conf]
  5. Henri Gilbert, Marine Minier
    New Results on the Pseudorandomness of Some Blockcipher Constructions. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:248-266 [Conf]
  6. Marine Minier, Henri Gilbert
    Stochastic Cryptanalysis of Crypton. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:121-133 [Conf]
  7. Thierry P. Berger, Marine Minier
    Two Algebraic Attacks Against the F-FCSRs Using the IV Mode. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:143-154 [Conf]
  8. Nicolas Fournel, Marine Minier, Stéphane Ubéda
    Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:202-214 [Conf]
  9. Samuel Galice, Véronique Legrand, Marine Minier, John Mullins, Stéphane Ubéda
    The KAA project: a trust policy point of view [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  10. X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs. [Citation Graph (, )][DBLP]

  11. Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode. [Citation Graph (, )][DBLP]

  12. Oblivious Multi-variate Polynomial Evaluation. [Citation Graph (, )][DBLP]

  13. A New Approach for FCSRs. [Citation Graph (, )][DBLP]

  14. Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds. [Citation Graph (, )][DBLP]

  15. Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks. [Citation Graph (, )][DBLP]

  16. Detecting wormhole attacks in wireless networks using local neighborhood information. [Citation Graph (, )][DBLP]

  17. SOSEMANUK: a fast software-oriented stream cipher [Citation Graph (, )][DBLP]

  18. Improving Integral Cryptanalysis against Rijndael with Large Blocks [Citation Graph (, )][DBLP]

  19. Resilient networking in wireless sensor networks [Citation Graph (, )][DBLP]

  20. Revisiting LFSMs [Citation Graph (, )][DBLP]

Search in 0.039secs, Finished in 0.040secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002