Web Page of Matthieu Finiasz Research
My Publications [ bib file ]
Year 2014
- G. Fanti, M. Finiasz, G. Friedland, and K. Ramchandran.
Toward efficient, privacy-aware media classification on public databases.
In M. S. Kankanhalli, S. Rueger, R. Manmatha, J. M. Jose, and K. van Rijsbergen, editors, ICMR'14. ACM, 2014.
[ bib | .pdf ]
- D. Augot and M. Finiasz.
Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes.
In C. Cid and C. Rechberger, editors, FSE 2014, volume 8540 of LNCS, pages 3-17. Springer, 2014.
[ bib | .pdf | slides ]
Year 2013
- D. Augot and M. Finiasz.
Exhaustive Search for Small Dimension Recursive MDS Diffusion Layers for Block Ciphers and Hash Functions.
In Proceedings of ISIT 2013. IEEE, 2013.
[ bib | .pdf ]
- G. Fanti, M. Finiasz, and K. Ramchandran.
One-Way Private Media Search on Public Databases: The Role of Signal Processing.
Signal Processing Magazine, IEEE, 30(2):53-61, march 2013.
[ bib | .pdf ]
Year 2012
- M. Finiasz and K. Ramchandran.
Private Stream Search at Almost the Same Communication Cost as a Regular Search.
In Proceedings of SAC 2012, volume 7707 of LNCS, pages 372-389. Springer, 2012.
[ bib | slides | .pdf ]
- M. Finiasz and K. Ramchandran.
Private Stream Search at the Same Communication Cost as a Regular Search: Role of LDPC Codes.
In Proceedings of ISIT 2012. IEEE, 2012.
[ bib | slides | .pdf ]
Year 2010
- M. Cluzeau, M. Finiasz, and J.-P. Tillich.
Methods for the Reconstruction of Parallel Turbo Codes.
In Proceedings of ISIT 2010. IEEE, 2010.
[ bib | slides | .pdf ]
-
M. Finiasz.
Parallel-CFS: Strengthening the CFS Mc-Eliece-Based Signature Scheme.
In A. Biryukov, G. Gong, and D. Stinson, editors, SAC 2010, volume 6544 of LNCS, pages 161-172. Springer, 2010.
[ bib | slides | .pdf ]
Year 2009
-
M. Finiasz and N. Sendrier.
Security Bounds for the Design of Code-based Cryptosystems.
In M. Matsui, editor, Asiacrypt 2009, volume 5912 of LNCS, pages 88-105. Springer, 2009.
[ bib | eprint | slides | .pdf ]
- M. Cluzeau and M. Finiasz.
Reconstruction of Punctured Convolutional Codes.
In Proceedings of ITW 2009, pages 75-79. IEEE, 2009.
[ bib | poster | .pdf ]
- M. Cluzeau and M. Finiasz.
Recovering a Code's Length and Synchronization from a Noisy Intercepted Bitstream.
In Proceedings of ISIT 2009. IEEE, 2009.
[ bib | slides | .pdf ]
Year 2008
- D. Augot, M. Finiasz, P. Gaborit, S. Manuel, and N. Sendrier.
SHA-3 Proposal: FSB.
Submission to the NIST SHA-3 competition, 2008.
[ bib | slides | .pdf ]
-
M. Finiasz
Syndrome Based Collision Resistant Hashing.
In J. Buchmann and J. Ding, editors, PQCrypto 2008, volume 5299 of LNCS, pages 137-147. Springer, 2008.
[ bib | slides | .pdf ]
Year 2007
-
M. Finiasz, P. Gaborit, and N. Sendrier.
Improved Fast Syndrome Based Cryptographic Hash Functions.
In V. Rijmen editor, ECRYPT Hash Workshop 2007.
[ bib | slides | .pdf ]
-
J.-P. Aumasson, M. Finiasz, W. Meier, and S. Vaudenay.
TCHo: a Hardware-Oriented Trapdoor Cipher.
In J. Pieprzyk, H. Ghodosi, and E. Dawson, editors, ACISP 2007, volume 4586 of LNCS, pages 184-199. Springer, 2007.
[ bib | .pdf ]
Year 2006
-
T. Baignères and M. Finiasz.
KFC: the Krazy Feistel Cipher.
In X. Lai and K. Chen, editors, Asiacrypt 2006, volume 4284 of LNCS, pages 380-395. Springer, 2006.
[ bib | slides | .pdf ]
-
T. Baignères and M. Finiasz.
Dial C for Cipher.
In E. Biham and A. Youssef, editors, SAC 2006, volume 4356 of LNCS, pages 76-95. Springer, 2006.
[ bib | slides | .pdf ]
-
M. Finiasz and S. Vaudenay.
When stream cipher analysis meets public-key cryptography.
In E. Biham and A. Youssef, editors, SAC 2006, volume 4356 of LNCS, pages 266-284. Springer, 2006.
[ bib | .pdf ]
Year 2005
-
D. Augot, M. Finiasz, and N. Sendrier.
A family of fast syndrome based cryptographic hash functions.
In E. Dawson and S. Vaudenay, editors, Mycrypt 2005, volume 3715 of LNCS, pages 64-83. Springer, 2005.
[ bib | slides | .pdf ]
Year 2004
-
M. Finiasz.
Nouvelles constructions utilisant des codes correcteurs d'erreurs en cryptographie à clef publique.
PhD thesis, INRIA - Ecole Polytechnique, 2004.
[ bib | slides | .pdf ]
Year 2003
-
M. Finiasz.
Words of minimal weight and weight distribution of binary Goppa codes.
In Proceedings of ISIT 2003. IEEE, 2003.
[ bib | extended | slides | .pdf ]
-
D. Augot and M. Finiasz.
A public key encryption scheme based on the polynomial reconstruction problem.
In E. Biham, editor, Eurocrypt 2003, volume 2656 of LNCS, pages 229-240. Springer, 2003.
[ bib | slides | .pdf ]
Year 2002
-
A. Verroust and M. Finiasz.
A control of smooth deformations with topological change on polyhedral mesh based on curves and loops.
In SMI 2002, pages 191-200. IEEE Computer Society, 2002.
[ bib | .ps.gz ]
-
N. Courtois, M. Finiasz, and N. Sendrier.
Short McEliece-based digital signatures.
In Proceedings of ISIT 2002. IEEE, 2002.
[ bib | slides | .pdf ]
Year 2001
-
N. Courtois, M. Finiasz, and N. Sendrier.
How to achieve a McEliece-based digital signature scheme.
In C. Boyd, editor, Asiacrypt 2001, volume 2248 of LNCS, pages 157-174. Springer, 2001.
[ bib | slides | .pdf ]
Other Works
Various Presentations
- Vulgarization slides on Prevision and Random Generators (in French) for the TIPE 2012 on the topic of Prevision [ slides ]
- Vulgarization slides on Information Theory (in French) for the TIPE 2008 on the topic of Information [ slides ]
- Slides on Practical Decorrelation (in French) [ slides ]
- A brief introduction to the various uses of Codes in Cryptography [ slides ]
Program Committee Participations
- WCC 2015, in Paris, France
- IMA CC 2013, in Oxford, UK
- SAC 2013 in Burnaby, Canada
- MoCrySen 2013 in Regensburg, Germany
- Indocrypt 2011 in Chennai, India
- Africacrypt 2010 in Cape Town, South Africa
- PQCrypto 2010 in Darmstadt, Germany
- Indocrypt 2009 in New Delhi, India
|