finiasz.bib
@String{LNCS = {Lecture Notes in Computer Science}}
@InProceedings{augot-finiasz-eurocrypt03,
author = {Augot, Daniel and Finiasz, Matthieu},
title = {A Public Key Encryption Scheme Based on the Polynomial
Reconstruction Problem},
booktitle = {Eurocrypt 2003},
pages = {229--240},
year = 2003,
editor = {Biham, E.},
volume = 2656,
series = LNCS,
publisher = {Springer},
url = {http://finiasz.net/research/2003/augot-finiasz-eurocrypt03.pdf},
slides = {http://finiasz.net/research/2003/augot-finiasz-eurocrypt03-slides.pdf}
}
@InProceedings{augot-finiasz-isit13,
author = {Augot, Daniel and Finiasz, Matthieu},
title = {Exhaustive Search for Small Dimension Recursive MDS Diffusion Layers for Block Ciphers and Hash Functions},
booktitle = {Proceedings of the 2013 IEEE International Symposium on
Information Theory},
pages = {1551--1555},
year = 2013,
publisher = {IEEE},
url = {http://finiasz.net/research/2013/augot-finiasz-isit13.pdf},
}
@InProceedings{augot-finiasz-fse14,
author = {Augot, Daniel and Finiasz, Matthieu},
title = {Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes},
booktitle = {FSE 2014},
pages = {3--17},
year = 2014,
editor = {Cid, C. and Rechberger, C.},
volume = {8540},
series = LNCS,
publisher = {Springer},
url = {http://finiasz.net/research/2014/augot-finiasz-fse14.pdf},
slides = {http://finiasz.net/research/2014/augot-finiasz-fse14-slides.pdf},
}
@Misc{augot-finiasz-gaborit-manuel-sendrier-sha3,
author = {Augot, Daniel and Finiasz, Matthieu and Gaborit, Philippe and Manuel, Stéphane and Sendrier, Nicolas},
title = {{SHA}-3 Proposal: {FSB}},
howpublished = {Submission to the NIST SHA-3 competition},
year = 2008,
url = {http://finiasz.net/research/2008/augot-finiasz-gaborit-manuel-sendrier-sha3.pdf},
slides = {http://finiasz.net/research/2008/augot-finiasz-gaborit-manuel-sendrier-sha3-slides.pdf}
}
@InProceedings{augot-finiasz-sendrier-mycrypt05,
author = {Augot, Daniel and Finiasz, Matthieu and Sendrier, Nicolas},
title = {A Family of Fast Syndrome Based Cryptographic Hash Functions},
booktitle = {Mycrypt 2005},
pages = {64--83},
year = 2005,
editor = {Dawson, E. and Vaudenay, S.},
volume = 3715,
series = LNCS,
publisher = {Springer},
url = {http://finiasz.net/research/2005/augot-finiasz-sendrier-mycrypt05.pdf},
slides = {http://finiasz.net/research/2005/augot-finiasz-sendrier-mycrypt05-slides.pdf}
}
@InProceedings{aumasson-finiasz-meier-vaudenay-acisp07,
author = {Aumasson, Jean-Philippe and Finiasz, Matthieu and Meier, Willi and Vaudenay, Serge},
title = {{TCHo}: a Hardware-Oriented Trapdoor Cipher},
booktitle = {ACISP 2007},
pages = {184--199},
year = 2007,
editor = {Pieprzyk, J. and Ghodosi, H. and Dawson, E.},
volume = 4586,
series = LNCS,
publisher = {Springer},
url = {http://finiasz.net/research/2007/aumasson-finiasz-meier-vaudenay-acisp07.pdf}
}
@InProceedings{baigneres-finiasz-asiacrypt06,
author = {Baignères, Thomas and Finiasz, Matthieu},
title = {{KFC}: the {Krazy Feistel Cipher}},
booktitle = {Asiacrypt 2006},
pages = {380--395},
year = 2006,
editor = {Lai, X. and Chen, K.},
volume = 4284,
series = LNCS,
publisher = {Springer},
url = {http://finiasz.net/research/2006/baigneres-finiasz-asiacrypt06.pdf},
slides = {http://finiasz.net/research/2006/baigneres-finiasz-asiacrypt06-slides.pdf}
}
@InProceedings{baigneres-finiasz-sac06,
author = {Baignères, Thomas and Finiasz, Matthieu},
title = {Dial {C} for {C}ipher},
booktitle = {SAC 2006},
pages = {76--95},
year = 2006,
editor = {Biham, E. and Youssef, A.},
volume = 4356,
series = LNCS,
publisher = {Springer},
url = {http://finiasz.net/research/2006/baigneres-finiasz-sac06.pdf},
slides = {http://finiasz.net/research/2006/baigneres-finiasz-sac06-slides.pdf}
}
@InProceedings{cluzeau-finiasz-isit09,
author = {Cluzeau, Mathieu and Finiasz, Matthieu},
title = {Recovering a Code's Length and Synchronization from a Noisy Intercepted Bitstream},
booktitle = {Proceedings of the 2009 IEEE International Symposium on
Information Theory},
pages = {2737--2741},
year = 2009,
publisher = {IEEE},
url = {http://finiasz.net/research/2009/cluzeau-finiasz-isit09.pdf},
slides = {http://finiasz.net/research/2009/cluzeau-finiasz-isit09-slides.pdf},
}
@InProceedings{cluzeau-finiasz-itw09,
author = {Cluzeau, Mathieu and Finiasz, Matthieu},
title = {Reconstruction of Punctured Convolutional Codes},
booktitle = {Proceedings of the 2009 IEEE Information Theory Workshop},
pages = {75--79},
year = 2009,
publisher = {IEEE},
url = {http://finiasz.net/research/2009/cluzeau-finiasz-itw09.pdf},
poster = {http://finiasz.net/research/2009/cluzeau-finiasz-itw09-poster.pdf},
}
@InProceedings{cluzeau-finiasz-tillich-isit10,
author = {Cluzeau, Mathieu and Finiasz, Matthieu and Tillich, Jean-Pierre},
title = {Methods for the Reconstruction of Parallel Turbo Codes},
booktitle = {Proceedings of the 2010 IEEE International Symposium on
Information Theory},
pages = {2008--2012},
year = 2010,
publisher = {IEEE},
url = {http://finiasz.net/research/2010/cluzeau-finiasz-tillich-isit10.pdf},
slides = {http://finiasz.net/research/2010/cluzeau-finiasz-tillich-isit10-slides.pdf}
}
@InProceedings{courtois-finiasz-sendrier-asiacrypt01,
author = {Courtois, Nicolas and Finiasz, Matthieu and Sendrier, Nicolas},
title = {How to achieve a {McEliece}-based Digital Signature Scheme},
booktitle = {Asiacrypt 2001},
pages = {157--174},
year = 2001,
editor = {Boyd, C.},
volume = {2248},
series = LNCS,
publisher = {Springer},
url = {http://finiasz.net/research/2001/courtois-finiasz-sendrier-asiacrypt01.pdf},
slides = {http://finiasz.net/research/2001/courtois-finiasz-sendrier-asiacrypt01-slides.pdf}
}
@InProceedings{courtois-finiasz-sendrier-isit02,
author = {Courtois, Nicolas and Finiasz, Matthieu and Sendrier, Nicolas},
title = {Short {McEliece}-based Digital Signatures},
booktitle = {Proceedings of the 2002 IEEE International Symposium on
Information Theory},
year = 2002,
publisher = {IEEE},
url = {http://finiasz.net/research/2002/courtois-finiasz-sendrier-isit02.pdf},
slides = {http://finiasz.net/research/2002/courtois-finiasz-sendrier-isit02-slides.pdf}
}
@InProceedings{fanti-finiasz-friedland-ramchandran-acmicmr14,
author = {Fanti, Giulia and Finiasz, Matthieu and Friedland, Gerald and Ramchandran, Kannan},
title = {Toward efficient, privacy-aware media classification on public databases},
booktitle = {Proceedings of the ACM International Conference on Multimedia Retrieval 2014},
year = 2014,
editor = {Kankanhalli, M. S. and Rueger, S. and Manmatha, R. and Jose, J. M. and van Rijsbergen, K.},
publisher = {ACM},
url = {http://finiasz.net/research/2014/fanti-finiasz-friedland-ramchandran-acmicmr14.pdf}
}
@Article{fanti-finiasz-ramchandran-spm13,
author = {Fanti, Giulia and Finiasz, Matthieu and Ramchandran, Kannan},
title = {One-Way Private Media Search on Public Databases: The Role of Signal Processing},
journal = {Signal Processing Magazine, IEEE},
volume = 30,
number = 2,
pages = {53--61},
month = {march},
year = 2013,
url = {http://finiasz.net/research/2013/fanti-finiasz-ramchandran-spm13.pdf}
}
@InProceedings{finiasz-isit03,
author = {Finiasz, Matthieu},
title = {Words of minimal weight and weight distribution of binary {Goppa}
codes},
booktitle = {Proceedings of the 2003 IEEE International Symposium on
Information Theory},
year = 2003,
publisher = {IEEE},
url = {http://finiasz.net/research/2003/finiasz-isit03.pdf},
extended = {http://finiasz.net/research/2003/finiasz-isit03-extended.pdf},
slides = {http://finiasz.net/research/2003/finiasz-isit03-slides.pdf}
}
@InProceedings{finiasz-pqcrypto08,
author = {Finiasz, Matthieu},
title = {Syndrome Based Collision Resistant Hashing},
booktitle = {PQCrypto 2008},
pages = {137--147},
year = 2008,
editor = {Buchmann, J. and Ding, J.},
volume = 5299,
series = LNCS,
publisher = {Springer},
url = {http://finiasz.net/research/2008/finiasz-pqcrypto08.pdf},
slides = {http://finiasz.net/research/2008/finiasz-pqcrypto08-slides.pdf}
}
@InProceedings{finiasz-sac10,
author = {Finiasz, Matthieu},
title = {Parallel-{CFS}: Strengthening the {CFS} {McEliece}-Based Signature Scheme},
booktitle = {SAC 2010},
pages = {161--172},
year = 2010,
editor = {Biryukov, A. and Gong, G. and Stinson, D.},
volume = {6544},
series = LNCS,
publisher = {Springer},
url = {http://finiasz.net/research/2010/finiasz-sac10.pdf},
slides = {http://finiasz.net/research/2010/finiasz-sac10-slides.pdf},
}
@PhdThesis{finiasz-these04,
author = {Finiasz, Matthieu},
title = {Nouvelles constructions utilisant des codes correcteurs d'erreurs
en cryptographie à clef publique},
school = {INRIA -- Ecole Polytechnique},
year = 2004,
month = oct,
url = {http://finiasz.net/research/2004/finiasz-these.pdf},
slides = {http://finiasz.net/research/2004/finiasz-these-slides.pdf},
}
@InProceedings{finiasz-gaborit-sendrier-ecrypt-hash-workshop07,
author = {Finiasz, Matthieu and Gaborit, Philippe and Sendrier, Nicolas},
title = {Improved Fast Syndrome Based Cryptographic Hash Functions},
booktitle = {ECRYPT Hash Workshop 2007},
year = 2007,
editor = {Rijmen, V.},
url = {http://finiasz.net/research/2007/finiasz-gaborit-sendrier-ecrypt-hash-workshop07.pdf},
slides = {http://finiasz.net/research/2007/finiasz-gaborit-sendrier-ecrypt-hash-workshop07-slides.pdf}
}
@InProceedings{finiasz-ramchandran-isit12,
author = {Finiasz, Matthieu and Ramchandran, Kannan},
title = {Private Stream Search at the Same Communication Cost as a Regular Search: Role of LDPC Codes},
booktitle = {Proceedings of the 2012 IEEE International Symposium on
Information Theory},
pages = {2566--2570},
year = 2012,
publisher = {IEEE},
url = {http://finiasz.net/research/2012/finiasz-ramchandran-isit12.pdf},
slides = {http://finiasz.net/research/2012/finiasz-ramchandran-isit12-slides.pdf},
}
@InProceedings{finiasz-ramchandran-sac12,
author = {Finiasz, Matthieu and Ramchandran, Kannan},
title = {Private Stream Search at Almost the Same Communication Cost as a Regular Search},
booktitle = {SAC 2012},
pages = {372--389},
year = 2012,
editor = {Knudsen, Lars R. and Wu, Huapeng},
volume = {7707},
series = LNCS,
publisher = {Springer},
url = {http://finiasz.net/research/2012/finiasz-ramchandran-sac12.pdf},
slides = {http://finiasz.net/research/2012/finiasz-ramchandran-sac12-slides.pdf},
}
@InProceedings{finiasz-sendrier-asiacrypt09,
author = {Finiasz, Matthieu and Sendrier, Nicolas},
title = {Security Bounds for the Design of Code-based Cryptosystems},
booktitle = {Asiacrypt 2009},
pages = {88--105},
year = 2009,
editor = {Matsui, M.},
volume = {5912},
series = LNCS,
publisher = {Springer},
url = {http://finiasz.net/research/2009/finiasz-sendrier-asiacrypt09.pdf},
slides = {http://finiasz.net/research/2009/finiasz-sendrier-asiacrypt09-slides.pdf}
}
@InProceedings{finiasz-vaudenay-sac06,
author = {Finiasz, Matthieu and Vaudenay, Serge},
title = {When Stream Cipher Analysis Meets Public-Key Cryptography},
booktitle = {SAC 2006},
pages = {266--284},
year = 2006,
editor = {Biham, E. and Youssef, A.},
volume = 4356,
series = LNCS,
publisher = {Springer},
url = {http://finiasz.net/research/2006/finiasz-vaudenay-sac06.pdf}
}
@InProceedings{verroust-finiasz-smi02,
author = {Verroust, Anne and Finiasz, Matthieu},
title = {A Control of Smooth Deformations with Topological Change on
Polyhedral Mesh Based on Curves and Loops},
booktitle = {Shape Modeling International, 2002 International Conference on
Shape Modeling and Applications},
pages = {191--200},
year = {2002},
publisher = {IEEE Computer Society},
url = {http://finiasz.net/research/2002/verroust-finiasz-smi02.ps.gz}
}