Some links

Mémoires

[1] M. Minier. Quelques résultats en cryptographie symétrique, pour les modèles de confiance dans les réseaux ambiants et la sécurité dans les réseaux de capteurs sans fil. Habilitation à Diriger des Recherches, Université Claude Bernard Lyon 1 et INSA de Lyon, France, mai 2012. [ bib, pdf ]
[2] M. Minier. Preuves d'Analyses et de Sécurité en Cryptologie à Clé Secrète. PhD thesis, Université de Limoges, France, 2002. [ bib, pdf ]

Book chapters

[1] YuanYuan Zhang, Marine Minier, and Wassim Znaidi. Security FOR Network Coding. In Khaldoun Al Agha, editor, Network Coding, Chapitre de livre. ISTE Ltd and Wiley, 2012. [ bib ]
[2] C. Berbain, O. Billet, A. Canteaut, N. Courtois, B. Debraize, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier, T. Pornin, and H. Sibert. Decimv2. In M. Robshaw and O. Billet, editors, New Stream Cipher Designs, volume 4986 of Lecture Notes in Computer Science, pages 140-151. Springer, 2008. [ bib ]
[3] C. Berbain, O. Billet, A. Canteaut, N. Courtois, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier, T. Pornin, and H. Sibert. Sosemanuk: a fast oriented software-oriented stream cipher. In M. Robshaw and O. Billet, editors, New Stream Cipher Designs, volume 4986 of Lecture Notes in Computer Science, pages 98-118. Springer, 2008. [ bib ]

Patents

[1] Apostolos KOUNTOURIS, Ochirkhand ERDENE-OCHIR, Marine MINIER, and Fabrice VALOIS. Invention : Méthode résiliente à la présence des noeuds compromis pour la détermination des routes par un protocole de routage dans un réseau. brevet français N° FR-11 58 828, Septembre 2011. [ bib ]

Journal articles

[1] Marine Minier and María Naya-Plasencia. A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock. Inf. Process. Lett., 112(16):624-629, 2012. [ bib ]
[2] Marine Minier, Raphael C.-W. Phan, and Benjamin Pousse. On Integral Distinguishers of Rijndael Family of Ciphers. Cryptologia, 36(2):104-118, 2012. [ bib ]
[3] Anya Apavatjrut, Wassim Znaidi, Antoine Fraboulet, Claire Goursaud, Katia Jaffrès-Runser, Cédric Lauradoux, and Marine Minier. Energy efficient authentication strategies for network coding. Concurrency and Computation: Practice and Experience, 24(10):1086-1107, 2012. [ bib ]
[4] Wassim Znaidi and Marine Minier. Key establishment and management for wsns. Telecommunication Systems, 50(2):113-125, 2012. [ bib ]
[5] Ochirkhand Erdene-Ochir, Apostolos A. Kountouris, Marine Minier, and Fabrice Valois. A new metric to quantify resiliency in networking. IEEE Communications Letters, 16(10):1699-1702, 2012. [ bib ]
[6] YuanYuan Zhang and Marine Minier. Selective Forwarding Attacks Against Data and ACK Flows in Network Coding and Countermeasures. Journal of Computer Networks and Communications, à paraître, accepté en Août 2012, 2012. [ bib ]
[7] YuanYuan Zhang and Marine Minier. How Network Coding System Constrains Packet Pollution Attacks in Wireless Sensor Networks. International Journal of Grid and Utility Computing, à paraître, accepté en Août 2012, 2012. [ bib ]
[8] François Arnault, Thierry P. Berger, Marine Minier, and Benjamin Pousse. Revisiting LFSRs for Cryptographic Applications. IEEE Transactions on Information Theory, 57(12):8095-8113, 2011. [ bib ]
[9] Ochirkhand Erdene-Ochir, Marine Minier, Fabirce Valois, and Apostolos Kountouris. Enhancing Resiliency Against Routing Layer Attacks in Wireless Sensor Networks: Gradient-based Routing in Focus. IARIA on-line journals, International Journal on Advances in Networks and Services, 4(1&2):38-54, 2011. disponible en ligne http://www.iariajournals.org/networks_and_services/. [ bib ]
[10] F. Arnault, T. P. Berger, and M. Minier. Some Results on FCSR Automata with applications to the security of FCSR-based pseudorandom generators. IEEE Trans. on Inf. Theory, 54(2):836-841, 2008. [ bib ]
[11] Samuel Galice, Marine Minier, and Stéphane Ubéda. The KAA Framework : A History-Based Trust Establishment in Ambient Networks. IJICS - International Journal of Intelligent Control and Systems, Special Issue on Information Assurance, 12(4):331-340, 2007. [ bib ]

Conference papers

[1] Thierry P. Berger, Joffrey D'Hayer, Kevin Marquet, Marine Minier, and Gaël Thomas. The GLUON Family: A Lightweight Hash Function Family Based on FCSRs. In Progress in Cryptology - AFRICACRYPT 2012, volume 7374 of Lecture Notes in Computer Science, pages 306-323. Springer, 2012. [ bib ]
[2] Marine Minier and Raphael C.-W. Phan. Energy-Efficient Cryptographic Engineering Paradigm. In Open Problems in Network Security - IFIP WG 11.4 International Workshop, iNetSec 2011, volume 7039 of Lecture Notes in Computer Science, pages 78-88. Springer, 2011. [ bib ]
[3] Yuanyuan Zhang, Wassim Znaidi, Cédric Lauradoux, and Marine Minier. Flooding attacks against network coding and countermeasures. In 5th International Conference on Network and System Security, NSS 2011, pages 305-309. IEEE, 2011. [ bib ]
[4] Marine Minier, María Naya-Plasencia, and Thomas Peyrin. Analysis of Reduced-SHAvite-3-256 v2. In Fast Software Encryption - FSE 2011, volume 6733 of Lecture Notes in Computer Science, pages 68-87. Springer, 2011. [ bib ]
[5] Chérifa Boucetta, Mohamed Ali Kâafar, and Marine Minier. How Secure are Secure Localization Protocols in WSNs? In Sensor Systems and Software - Second International ICST Conference, S-Cube 2010, volume 57 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pages 164-178. Springer, 2010. [ bib ]
[6] Anya Apavatjrut, Wassim Znaidi, Antoine Fraboulet, Claire Goursaud, Cédric Lauradoux, and Marine Minier. Energy Friendly Integrity for Network Coding in Wireless Sensor Networks. In Fourth International Conference on Network and System Security, NSS 2010, pages 223-230. IEEE Computer Society, 2010. [ bib ]
[7] Marine Minier, Raphael C.-W. Phan, and Benjamin Pousse. Integral Distinguishers of Some SHA-3 Candidates. In Cryptology and Network Security - CANS 2010, volume 6467 of Lecture Notes in Computer Science, pages 106-123. Springer, 2010. [ bib ]
[8] Ochirkhand Erdene-Ochir, Marine Minier, Fabirce Valois, and Apostolos Kountouris. Resiliency of wireless sensor networks: Definitions and analyses. In Telecommunications (ICT), 2010 IEEE 17th International Conference on, pages 828-835. IEEE, april 2010. [ bib ]
[9] Ochirkhand Erdene-Ochir, Marine Minier, Fabirce Valois, and Apostolos Kountouris. Toward Resilient Routing in Wireless Sensor Networks: Gradient-Based Routing in Focus. In Sensor Technologies and Applications (SENSORCOMM), 2010 Fourth International Conference on, pages 478-483. IEEE, july 2010. [ bib ]
[10] Wassim Znaidi, Marine Minier, and Stéphane Ubéda. Hierarchical node replication attacks detection in wireless sensors networks. In Proceedings of the IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2009, pages 82-86. IEEE, 2009. [ bib ]
[11] Thierry Berger, Marine Minier, and Benjamin Pousse. Software oriented stream ciphers based upon FCSRs in diversified mode. In Progress in Cryptology - INDOCRYPT 2009, volume 5922 of Lecture Notes in Computer Science, pages 119-135. Springer, 2009. [ bib ]
[12] Gérald Gavin and Marine Minier. Oblivious Multi-variate Polynomial Evaluation. In Progress in Cryptology - INDOCRYPT 2009, volume 5922 of Lecture Notes in Computer Science, pages 430-442. Springer, 2009. [ bib ]
[13] Wassim Znaidi, Cédric Lauradoux, and Marine Minier. Aggregated authentification (AMAC) using universal hash functions. In International ICST Conference on Security and Privacy in Communication Networks - SecureComm 2009, volume 19 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pages 248-264. Springer, 2009. [ bib ]
[14] François Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier, and Benjamin Pousse. A New Approach for FCSRs. In Selected Areas in Cryptography - SAC 2009, volume 5867 of Lecture Notes in Computer Science, pages 433-448. Springer, 2009. [ bib ]
[15] Marine Minier, Raphael C.-W. Phan, and Benjamin Pousse. Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks. In Progress in Cryptology - AFRICACRYPT 2009, volume 5580 of Lecture Notes in Computer Science, pages 60-76. Springer, 2009. [ bib ]
[16] Wassim Znaidi, Marine Minier, and Jean-Philippe Babau. Detecting wormhole attacks in wireless networks using local neighborhood information. In Proceedings of the IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2008, pages 1-5. IEEE, 2008. [ bib ]
[17] Samuel Galice and Marine Minier. Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds. In Progress in Cryptology - AFRICACRYPT 2008, volume 5023 of Lecture Notes in Computer Science, pages 1-15. Springer, 2008. [ bib ]
[18] François Arnault, Thierry P. Berger, Cédric Lauradoux, and Marine Minier. X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs. In Progress in Cryptology - INDOCRYPT 2007, volume 4859 of Lecture Notes in Computer Science, pages 341-350. Springer, 2007. [ bib ]
[19] Samuel Galice, Marine Minier, and Stéphane Ubéda. A trust protocol for community collaboration. In Joint iTrust and PST Conferences on Privacy, Trust Management and Security - IFIPTM 2007, volume 238 of IFIP Advances in Information and Communication Technology, pages 169-184. Springer, 2007. [ bib ]
[20] Nicolas Fournel, Marine Minier, and Stéphane Ubéda. Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks. In Information Security Theory and Practices - WISTP 2007, volume 4462 of Lecture Notes in Computer Science, pages 202-214. Springer, 2007. [ bib ]
[21] Samuel Galice, Véronique Legrand, Marine Minier, John Mullins, and Stéphane Ubéda. A History-Based Framework to Build Trust Management Systems. In Second International Conference on Security and Privacy in Communication Networks and the Workshops - SecureComm 2006, pages 1-7. IEEE, 2006. [ bib ]
[22] Samuel Galice, Marine Minier, John Mullins, and Stéphane Ubéda. Cryptographic Protocol to Establish Trusted History of Interactions. In Security and Privacy in Ad-Hoc and Sensor Networks - ESAS 2006, volume 4357 of Lecture Notes in Computer Science, pages 136-149. Springer, 2006. [ bib ]
[23] Thierry P. Berger and Marine Minier. Two Algebraic Attacks Against the F-FCSRs Using the IV Mode. In Progress in Cryptology - INDOCRYPT 2005, volume 3797 of Lecture Notes in Computer Science, pages 143-154. Springer, 2005. [ bib ]
[24] Marine Minier. A Three Rounds Property of the AES. In Advanced Encryption Standard - AES 2004, 4th International Conference, volume 3373 of Lecture Notes in Computer Science, pages 16-26. Springer, 2004. [ bib ]
[25] Henri Gilbert and Marine Minier. Cryptanalysis of SFLASH. In Advances in Cryptology - EUROCRYPT 2002, volume 2332 of Lecture Notes in Computer Science, pages 288-298. Springer, 2002. [ bib ]
[26] Henri Gilbert and Marine Minier. New Results on the Pseudorandomness of Some Blockcipher Constructions. In Fast Software Encryption - FSE 2001, volume 2355 of Lecture Notes in Computer Science, pages 248-266. Springer, 2002. [ bib ]
[27] Henri Gilbert and Marine Minier. A Collision Attack on 7 Rounds of Rijndael. In AES Candidate Conference, pages 230-241, 2000. [ bib ]
[28] Marine Minier and Henri Gilbert. Stochastic Cryptanalysis of Crypton. In Fast Software Encryption - FSE 2000, volume 1978 of Lecture Notes in Computer Science, pages 121-133. Springer, 2001. [ bib ]

Workshops

[1] Marine Minier and María Naya-Plasencia. Some Preliminary Studies on the Differential Behavior of the Lightweight Block Cipher LBlock. Workshop on Lightweight Cryptogrpahy 2011, November 2011. Louvain, Belgique. [ bib ]
[2] Benjamin Pousse and Marine Minier. Construction of FCSR algebraic equations and empirical analysis. SASC 2008 - Stream Ciphers Revisited, February 2008. Special Workshop hosted by the ECRYPT Network of Excellence. [ bib ]
[3] François Arnault, Thierry P. Berger, and Marine Minier. On the security of FCSR-based pseudorandom generators. SASC 2007 - Stream Ciphers Revisited, February 2007. Special Workshop hosted by the ECRYPT Network of Excellence. [ bib ]
[4] C. Bryce, M. Dekker, S. Etalle, D. Le Métayer, M. Minier, and S. Ubéda. Ubiquitous Privacy Protection. In Fifth Workshop on Privacy in Ubicomp, 2007. [ bib ]
[5] C. Berbain, O. Billet, A. Canteaut, N. Courtois, B. Debraize, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier, T. Pornin, and H. Sibert. Decimv2. SASC 2006 - Stream Ciphers Revisited, February 2006. Special Workshop hosted by the ECRYPT Network of Excellence. [ bib ]
[6] Samuel Galice, Véronique Legrand, Marine Minier, John Mullins, and Stéphane Ubéda. Modelization and trust establishment in ambient networks. International Symposium on Intelligent Environment, Cambridge, April 2006. poster, 5 pages. [ bib ]
[7] C. Berbain, O. Billet, A. Canteaut, N. Courtois, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier, T. Pornin, and H. Sibert. Sosemanuk: a fast oriented software-oriented stream cipher. http://www.ecrypt.eu.org/stream/, 2005. Call for Stream Cipher Primitives, Network of Excellence in Cryptology ECRYPT. [ bib ]
[8] C. Berbain, O. Billet, A. Canteaut, N. Courtois, B. Debraize, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier, T. Pornin, and H. Sibert. Decim: a new stream cipher for hardware applications. http://www.ecrypt.eu.org/stream/, 2005. Call for Stream Cipher Primitives, Network of Excellence in Cryptology ECRYPT. [ bib ]
[9] C. Berbain, O. Billet, A. Canteaut, N. Courtois, B. Debraize, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier, T. Pornin, and H. Sibert. Decim: a new stream cipher for hardware applications. In Proceedings of SKEW - Symmetric Key Encryption Workshop, Network of Excellence in Cryptology ECRYPT, mai 2005. http://www2.mat.dtu.dk/people/Lars.R.Knudsen/stvl/. [ bib ]
[10] C. Berbain, O. Billet, A. Canteaut, N. Courtois, H. Gilbert, L. Goubin, A. Gouget, L. Granboulan, C. Lauradoux, M. Minier, T. Pornin, and H. Sibert. Sosemanuk: a fast oriented software-oriented stream cipher. In Proceedings of SKEW - Symmetric Key Encryption Workshop, Network of Excellence in Cryptology ECRYPT, mai 2005. http://www2.mat.dtu.dk/people/Lars.R.Knudsen/stvl/. [ bib ]

Research Reports

[1] Ochirkhand Erdene-Ochir, Marine Minier, Fabrice Valois, and Apostolos A. Kountouris. Resilient networking in wireless sensor networks. Technical report, INRIA, 2010. [ bib ]
[2] Marine Minier and Benjamin Pousse. Improving Integral Cryptanalysis against Rijndael with Large Blocks. Technical report, INRIA, 2009. [ bib ]
[3] Cédric Lauradoux and Marine Minier. A Mathematical Analysis of Prophet Dynamic Address Allocation. Research Report RR-7085, INRIA, 2009. [ bib | http ]
[4] Wassim Znaidi, Marine Minier, and Jean-Philippe Babau. An ontology for attacks in wireless sensor networks. Technical report, INRIA, 2008. [ bib ]
[5] Samuel Galice, Véronique Legrand, Marine Minier, John Mullins, and Stéphane Ubéda. The KAA project: a trust policy point of view. Technical report, INRIA, 2006. [ bib ]
[6] M. Minier. A Bottleneck Attack on Crypton. INRIA research report, number 5324, october 2004. 12 pages. [ bib ]