Web Page of Matthieu Finiasz
Research

My Publications bib file ]

Year 2014

  • G. Fanti, M. Finiasz, G. Friedland, and K. Ramchandran. Toward efficient, privacy-aware media classification on public databases. In M. S. Kankanhalli, S. Rueger, R. Manmatha, J. M. Jose, and K. van Rijsbergen, editors, ICMR'14. ACM, 2014. [ bib | .pdf ]
  • D. Augot and M. Finiasz. Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes. In C. Cid and C. Rechberger, editors, FSE 2014, volume 8540 of LNCS, pages 3-17. Springer, 2014. [ bib | .pdf | slides ]

Year 2013

  • D. Augot and M. Finiasz. Exhaustive Search for Small Dimension Recursive MDS Diffusion Layers for Block Ciphers and Hash Functions. In Proceedings of ISIT 2013. IEEE, 2013. [ bib | .pdf ]
  • G. Fanti, M. Finiasz, and K. Ramchandran. One-Way Private Media Search on Public Databases: The Role of Signal Processing. Signal Processing Magazine, IEEE, 30(2):53-61, march 2013. [ bib | .pdf ]

Year 2012

  • M. Finiasz and K. Ramchandran. Private Stream Search at Almost the Same Communication Cost as a Regular Search. In Proceedings of SAC 2012, volume 7707 of LNCS, pages 372-389. Springer, 2012. [ bib | slides | .pdf ]
  • M. Finiasz and K. Ramchandran. Private Stream Search at the Same Communication Cost as a Regular Search: Role of LDPC Codes. In Proceedings of ISIT 2012. IEEE, 2012. [ bib | slides | .pdf ]

Year 2010

  • M. Cluzeau, M. Finiasz, and J.-P. Tillich. Methods for the Reconstruction of Parallel Turbo Codes. In Proceedings of ISIT 2010. IEEE, 2010. [ bib | slides | .pdf ]
  • M. Finiasz. Parallel-CFS: Strengthening the CFS Mc-Eliece-Based Signature Scheme. In A. Biryukov, G. Gong, and D. Stinson, editors, SAC 2010, volume 6544 of LNCS, pages 161-172. Springer, 2010. [ bib | slides | .pdf ]

Year 2009

  • M. Finiasz and N. Sendrier. Security Bounds for the Design of Code-based Cryptosystems. In M. Matsui, editor, Asiacrypt 2009, volume 5912 of LNCS, pages 88-105. Springer, 2009. [ bib | eprint | slides | .pdf ]
  • M. Cluzeau and M. Finiasz. Reconstruction of Punctured Convolutional Codes. In Proceedings of ITW 2009, pages 75-79. IEEE, 2009. [ bib | poster | .pdf ]
  • M. Cluzeau and M. Finiasz. Recovering a Code's Length and Synchronization from a Noisy Intercepted Bitstream. In Proceedings of ISIT 2009. IEEE, 2009. [ bib | slides | .pdf ]

Year 2008

  • D. Augot, M. Finiasz, P. Gaborit, S. Manuel, and N. Sendrier. SHA-3 Proposal: FSB. Submission to the NIST SHA-3 competition, 2008. [ bib | slides | .pdf ]
  • M. Finiasz Syndrome Based Collision Resistant Hashing. In J. Buchmann and J. Ding, editors, PQCrypto 2008, volume 5299 of LNCS, pages 137-147. Springer, 2008. [ bib | slides | .pdf ]

Year 2007

  • M. Finiasz, P. Gaborit, and N. Sendrier. Improved Fast Syndrome Based Cryptographic Hash Functions. In V. Rijmen editor, ECRYPT Hash Workshop 2007. [ bib | slides | .pdf ]
  • J.-P. Aumasson, M. Finiasz, W. Meier, and S. Vaudenay. TCHo: a Hardware-Oriented Trapdoor Cipher. In J. Pieprzyk, H. Ghodosi, and E. Dawson, editors, ACISP 2007, volume 4586 of LNCS, pages 184-199. Springer, 2007. [ bib | .pdf ]

Year 2006

  • T. Baignères and M. Finiasz. KFC: the Krazy Feistel Cipher. In X. Lai and K. Chen, editors, Asiacrypt 2006, volume 4284 of LNCS, pages 380-395. Springer, 2006. [ bib | slides | .pdf ]
  • T. Baignères and M. Finiasz. Dial C for Cipher. In E. Biham and A. Youssef, editors, SAC 2006, volume 4356 of LNCS, pages 76-95. Springer, 2006. [ bib | slides | .pdf ]
  • M. Finiasz and S. Vaudenay. When stream cipher analysis meets public-key cryptography. In E. Biham and A. Youssef, editors, SAC 2006, volume 4356 of LNCS, pages 266-284. Springer, 2006. [ bib | .pdf ]

Year 2005

  • D. Augot, M. Finiasz, and N. Sendrier. A family of fast syndrome based cryptographic hash functions. In E. Dawson and S. Vaudenay, editors, Mycrypt 2005, volume 3715 of LNCS, pages 64-83. Springer, 2005. [ bib | slides | .pdf ]

Year 2004

  • M. Finiasz. Nouvelles constructions utilisant des codes correcteurs d'erreurs en cryptographie à clef publique. PhD thesis, INRIA - Ecole Polytechnique, 2004. [ bib | slides | .pdf ]

Year 2003

  • M. Finiasz. Words of minimal weight and weight distribution of binary Goppa codes. In Proceedings of ISIT 2003. IEEE, 2003. [ bib | extended | slides | .pdf ]
  • D. Augot and M. Finiasz. A public key encryption scheme based on the polynomial reconstruction problem. In E. Biham, editor, Eurocrypt 2003, volume 2656 of LNCS, pages 229-240. Springer, 2003. [ bib | slides | .pdf ]

Year 2002

  • A. Verroust and M. Finiasz. A control of smooth deformations with topological change on polyhedral mesh based on curves and loops. In SMI 2002, pages 191-200. IEEE Computer Society, 2002. [ bib | .ps.gz ]
  • N. Courtois, M. Finiasz, and N. Sendrier. Short McEliece-based digital signatures. In Proceedings of ISIT 2002. IEEE, 2002. [ bib | slides | .pdf ]

Year 2001

  • N. Courtois, M. Finiasz, and N. Sendrier. How to achieve a McEliece-based digital signature scheme. In C. Boyd, editor, Asiacrypt 2001, volume 2248 of LNCS, pages 157-174. Springer, 2001. [ bib | slides | .pdf ]

Other Works

Various Presentations

  • Vulgarization slides on Prevision and Random Generators (in French) for the TIPE 2012 on the topic of Prevision [ slides ]
  • Vulgarization slides on Information Theory (in French) for the TIPE 2008 on the topic of Information [ slides ]
  • Slides on Practical Decorrelation (in French) [ slides ]
  • A brief introduction to the various uses of Codes in Cryptographyslides ]

Program Committee Participations