<?xml version="1.0"?>
<dblpperson name="Matthieu Finiasz" pid="f/MatthieuFiniasz" n="30">
<person key="homepages/f/MatthieuFiniasz" mdate="2016-02-09">
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<note type="affiliation">Swiss Federal Institute of Technology in Lausanne, Switzerland</note>
<url>http://lasecwww.epfl.ch/finiasz.shtml</url>
</person>
<r><article publtype="informal" key="journals/iacr/BaigneresDFGLR15" mdate="2020-05-11">
<author pid="b/ThomasBaigneres">Thomas Baign&#232;res</author>
<author pid="23/514">C&#233;cile Delerabl&#233;e</author>
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<author pid="64/5615">Louis Goubin</author>
<author pid="08/11136">Tancr&#232;de Lepoint</author>
<author pid="33/2627">Matthieu Rivain</author>
<title>Trap Me If You Can - Million Dollar Curve.</title>
<pages>1249</pages>
<year>2015</year>
<volume>2015</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2015/1249</ee>
<url>db/journals/iacr/iacr2015.html#BaigneresDFGLR15</url>
</article>
</r>
<r><inproceedings key="conf/fse/AugotF14" mdate="2019-08-20">
<author pid="85/3827">Daniel Augot</author>
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<title>Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes.</title>
<pages>3-17</pages>
<year>2014</year>
<booktitle>FSE</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-662-46706-0_1</ee>
<crossref>conf/fse/2014</crossref>
<url>db/conf/fse/fse2014.html#AugotF14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mir/FantiFFR14" mdate="2022-04-20">
<author pid="141/9910">Giulia Fanti</author>
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<author pid="f/GeraldFriedland">Gerald Friedland</author>
<author pid="53/5765">Kannan Ramchandran</author>
<title>Toward efficient, privacy-aware media classification on public databases.</title>
<pages>49</pages>
<year>2014</year>
<booktitle>ICMR</booktitle>
<ee>https://doi.org/10.1145/2578726.2578733</ee>
<crossref>conf/mir/2014</crossref>
<url>db/conf/mir/icmr2014.html#FantiFFR14</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/AugotF14" mdate="2018-08-13">
<author pid="85/3827">Daniel Augot</author>
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<title>Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes.</title>
<year>2014</year>
<volume>abs/1412.4626</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1412.4626</ee>
<url>db/journals/corr/corr1412.html#AugotF14</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/AugotF14" mdate="2020-05-11">
<author pid="85/3827">Daniel Augot</author>
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<title>Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes.</title>
<pages>566</pages>
<year>2014</year>
<volume>2014</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2014/566</ee>
<url>db/journals/iacr/iacr2014.html#AugotF14</url>
</article>
</r>
<r><article key="journals/spm/FantiFR13" mdate="2022-04-20">
<author pid="141/9910">Giulia Fanti</author>
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<author pid="53/5765">Kannan Ramchandran</author>
<title>One-Way Private Media Search on Public Databases: The Role of Signal Processing.</title>
<pages>53-61</pages>
<year>2013</year>
<volume>30</volume>
<journal>IEEE Signal Process. Mag.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/MSP.2012.2229783</ee>
<url>db/journals/spm/spm30.html#FantiFR13</url>
</article>
</r>
<r><inproceedings key="conf/isit/AugotF13" mdate="2017-05-24">
<author pid="85/3827">Daniel Augot</author>
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<title>Exhaustive search for small dimension recursive MDS diffusion layers for block ciphers and hash functions.</title>
<pages>1551-1555</pages>
<year>2013</year>
<booktitle>ISIT</booktitle>
<ee>https://doi.org/10.1109/ISIT.2013.6620487</ee>
<crossref>conf/isit/2013</crossref>
<url>db/conf/isit/isit2013.html#AugotF13</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1305-3396" mdate="2018-08-13">
<author pid="85/3827">Daniel Augot</author>
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<title>Exhaustive Search for Small Dimension Recursive MDS Diffusion Layers for Block Ciphers and Hash Functions</title>
<ee type="oa">http://arxiv.org/abs/1305.3396</ee>
<year>2013</year>
<journal>CoRR</journal>
<volume>abs/1305.3396</volume>
<url>db/journals/corr/corr1305.html#abs-1305-3396</url>
</article>
</r>
<r><inproceedings key="conf/isit/FiniaszR12" mdate="2017-05-24">
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<author pid="53/5765">Kannan Ramchandran</author>
<title>Private Stream Search at the same communication cost as a regular search: Role of LDPC codes.</title>
<pages>2556-2560</pages>
<year>2012</year>
<booktitle>ISIT</booktitle>
<ee>https://doi.org/10.1109/ISIT.2012.6283979</ee>
<crossref>conf/isit/2012</crossref>
<url>db/conf/isit/isit2012.html#FiniaszR12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacrypt/FiniaszR12" mdate="2017-05-21">
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<author pid="53/5765">Kannan Ramchandran</author>
<title>Private Stream Search at Almost the Same Communication Cost as a Regular Search.</title>
<pages>372-389</pages>
<year>2012</year>
<booktitle>Selected Areas in Cryptography</booktitle>
<ee>https://doi.org/10.1007/978-3-642-35999-6_24</ee>
<crossref>conf/sacrypt/2012</crossref>
<url>db/conf/sacrypt/sacrypt2012.html#FiniaszR12</url>
</inproceedings>
</r>
<r><incollection publtype="encyclopedia" key="reference/crypt/FiniaszS11" mdate="2017-07-12">
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<author pid="46/5390">Nicolas Sendrier</author>
<title>Digital Signature Scheme Based on McEliece.</title>
<pages>342-343</pages>
<year>2011</year>
<booktitle>Encyclopedia of Cryptography and Security (2nd Ed.)</booktitle>
<ee>https://doi.org/10.1007/978-1-4419-5906-5_380</ee>
<crossref>reference/crypt/2011</crossref>
<url>db/reference/crypt/crypt2011.html#FiniaszS11</url>
</incollection>
</r>
<r><inproceedings key="conf/isit/CluzeauFT10" mdate="2017-05-24">
<author pid="67/5903">Mathieu Cluzeau</author>
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<author pid="53/7044">Jean-Pierre Tillich</author>
<title>Methods for the reconstruction of parallel turbo codes.</title>
<pages>2008-2012</pages>
<year>2010</year>
<booktitle>ISIT</booktitle>
<ee>https://doi.org/10.1109/ISIT.2010.5513365</ee>
<crossref>conf/isit/2010</crossref>
<url>db/conf/isit/isit2010.html#CluzeauFT10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacrypt/Finiasz10" mdate="2018-06-26">
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<title>Parallel-CFS - Strengthening the CFS McEliece-Based Signature Scheme.</title>
<pages>159-170</pages>
<year>2010</year>
<booktitle>Selected Areas in Cryptography</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-19574-7_11</ee>
<crossref>conf/sacrypt/2010</crossref>
<url>db/conf/sacrypt/sacrypt2010.html#Finiasz10</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1006-0259" mdate="2018-08-13">
<author pid="67/5903">Mathieu Cluzeau</author>
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<author pid="53/7044">Jean-Pierre Tillich</author>
<title>Methods for the Reconstruction of Parallel Turbo Codes</title>
<ee type="oa">http://arxiv.org/abs/1006.0259</ee>
<year>2010</year>
<journal>CoRR</journal>
<volume>abs/1006.0259</volume>
<url>db/journals/corr/corr1006.html#abs-1006-0259</url>
</article>
</r>
<r><inproceedings key="conf/asiacrypt/FiniaszS09" mdate="2017-05-19">
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<author pid="46/5390">Nicolas Sendrier</author>
<title>Security Bounds for the Design of Code-Based Cryptosystems.</title>
<pages>88-105</pages>
<year>2009</year>
<booktitle>ASIACRYPT</booktitle>
<ee>https://doi.org/10.1007/978-3-642-10366-7_6</ee>
<crossref>conf/asiacrypt/2009</crossref>
<url>db/conf/asiacrypt/asiacrypt2009.html#FiniaszS09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isit/CluzeauF09" mdate="2017-05-24">
<author pid="67/5903">Mathieu Cluzeau</author>
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<title>Recovering a code's length and synchronization from a noisy intercepted bitstream.</title>
<pages>2737-2741</pages>
<year>2009</year>
<booktitle>ISIT</booktitle>
<ee>https://doi.org/10.1109/ISIT.2009.5205843</ee>
<crossref>conf/isit/2009</crossref>
<url>db/conf/isit/isit2009.html#CluzeauF09</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-0912-0453" mdate="2018-08-13">
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<title>NP-completeness of Certain Sub-classes of the Syndrome Decoding Problem</title>
<ee type="oa">http://arxiv.org/abs/0912.0453</ee>
<year>2009</year>
<journal>CoRR</journal>
<volume>abs/0912.0453</volume>
<url>db/journals/corr/corr0912.html#abs-0912-0453</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/FiniaszS09" mdate="2020-05-11">
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<author pid="46/5390">Nicolas Sendrier</author>
<title>Security Bounds for the Design of Code-based Cryptosystems.</title>
<pages>414</pages>
<year>2009</year>
<volume>2009</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2009/414</ee>
<url>db/journals/iacr/iacr2009.html#FiniaszS09</url>
</article>
</r>
<r><inproceedings key="conf/pqcrypto/Finiasz08" mdate="2017-05-26">
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<title>Syndrome Based Collision Resistant Hashing.</title>
<pages>137-147</pages>
<year>2008</year>
<booktitle>PQCrypto</booktitle>
<ee>https://doi.org/10.1007/978-3-540-88403-3_10</ee>
<crossref>conf/pqcrypto/2008</crossref>
<url>db/conf/pqcrypto/pqcrypto2008.html#Finiasz08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acisp/AumassonFMV07" mdate="2017-05-25">
<author pid="65/3314">Jean-Philippe Aumasson</author>
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<author pid="47/6600">Willi Meier</author>
<author pid="v/SergeVaudenay">Serge Vaudenay</author>
<title><i>TCH</i><i>o</i>: A Hardware-Oriented Trapdoor Cipher.</title>
<pages>184-199</pages>
<year>2007</year>
<crossref>conf/acisp/2007</crossref>
<booktitle>ACISP</booktitle>
<ee>https://doi.org/10.1007/978-3-540-73458-1_15</ee>
<url>db/conf/acisp/acisp2007.html#AumassonFMV07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/asiacrypt/BaigneresF06" mdate="2017-05-19">
<author pid="b/ThomasBaigneres">Thomas Baign&#232;res</author>
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<title>KFC - The Krazy Feistel Cipher.</title>
<pages>380-395</pages>
<year>2006</year>
<crossref>conf/asiacrypt/2006</crossref>
<booktitle>ASIACRYPT</booktitle>
<ee>https://doi.org/10.1007/11935230_25</ee>
<url>db/conf/asiacrypt/asiacrypt2006.html#BaigneresF06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacrypt/BaigneresF06" mdate="2018-06-26">
<author pid="b/ThomasBaigneres">Thomas Baign&#232;res</author>
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<title>Dial C for Cipher.</title>
<pages>76-95</pages>
<year>2006</year>
<crossref>conf/sacrypt/2006</crossref>
<booktitle>Selected Areas in Cryptography</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-540-74462-7_7</ee>
<url>db/conf/sacrypt/sacrypt2006.html#BaigneresF06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacrypt/FiniaszV06" mdate="2018-06-26">
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<author pid="v/SergeVaudenay">Serge Vaudenay</author>
<title>When Stream Cipher Analysis Meets Public-Key Cryptography.</title>
<pages>266-284</pages>
<year>2006</year>
<crossref>conf/sacrypt/2006</crossref>
<booktitle>Selected Areas in Cryptography</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-540-74462-7_19</ee>
<url>db/conf/sacrypt/sacrypt2006.html#FiniaszV06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mycrypt/AugotFS05" mdate="2017-05-24">
<author pid="85/3827">Daniel Augot</author>
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<author pid="46/5390">Nicolas Sendrier</author>
<title>A Family of Fast Syndrome Based Cryptographic Hash Functions.</title>
<pages>64-83</pages>
<year>2005</year>
<crossref>conf/mycrypt/2005</crossref>
<booktitle>Mycrypt</booktitle>
<ee>https://doi.org/10.1007/11554868_6</ee>
<url>db/conf/mycrypt/mycrypt2005.html#AugotFS05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/AugotF03" mdate="2017-05-24">
<author pid="85/3827">Daniel Augot</author>
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<title>A Public Key Encryption Scheme Based on the Polynomial Reconstruction Problem.</title>
<pages>229-240</pages>
<year>2003</year>
<crossref>conf/eurocrypt/2003</crossref>
<booktitle>EUROCRYPT</booktitle>
<ee>https://doi.org/10.1007/3-540-39200-9_14</ee>
<url>db/conf/eurocrypt/eurocrypt2003.html#AugotF03</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/AugotFL03" mdate="2020-05-11">
<author pid="85/3827">Daniel Augot</author>
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<author pid="73/2683">Pierre Loidreau</author>
<title>Using the Trace Operator to repair the Polynomial Reconstruction based Cryptosystem presented at Eurocrypt 2003.</title>
<pages>209</pages>
<year>2003</year>
<volume>2003</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2003/209</ee>
<url>db/journals/iacr/iacr2003.html#AugotFL03</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/AugotFS03" mdate="2020-05-11">
<author pid="85/3827">Daniel Augot</author>
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<author pid="46/5390">Nicolas Sendrier</author>
<title>A Fast Provably Secure Cryptographic Hash Function.</title>
<pages>230</pages>
<year>2003</year>
<volume>2003</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2003/230</ee>
<url>db/journals/iacr/iacr2003.html#AugotFS03</url>
</article>
</r>
<r><inproceedings key="conf/smi/VerroustF02" mdate="2023-03-24">
<author orcid="0000-0002-3365-5463" pid="v/AnneVerroust">Anne Verroust</author>
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<title>A Control of Smooth Deformations with Topological Change on Polyhedral Mesh Based on Curves and Loops.</title>
<pages>191-200</pages>
<year>2002</year>
<crossref>conf/smi/2002</crossref>
<booktitle>Shape Modeling International</booktitle>
<ee>https://doi.org/10.1109/SMI.2002.1003545</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SMA.2002.1003545</ee>
<url>db/conf/smi/smi2002.html#VerroustF02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/asiacrypt/CourtoisFS01" mdate="2020-07-17">
<author pid="89/381">Nicolas T. Courtois</author>
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<author pid="46/5390">Nicolas Sendrier</author>
<title>How to Achieve a McEliece-Based Digital Signature Scheme.</title>
<pages>157-174</pages>
<year>2001</year>
<crossref>conf/asiacrypt/2001</crossref>
<booktitle>ASIACRYPT</booktitle>
<ee>https://doi.org/10.1007/3-540-45682-1_10</ee>
<url>db/conf/asiacrypt/asiacrypt2001.html#CourtoisFS01</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/CourtoisFS01" mdate="2020-07-17">
<author pid="89/381">Nicolas T. Courtois</author>
<author pid="f/MatthieuFiniasz">Matthieu Finiasz</author>
<author pid="46/5390">Nicolas Sendrier</author>
<title>How to achieve a McEliece-based Digital Signature Scheme.</title>
<pages>10</pages>
<year>2001</year>
<volume>2001</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2001/010</ee>
<url>db/journals/iacr/iacr2001.html#CourtoisFS01</url>
</article>
</r>
<coauthors n="18" nc="2">
<co c="0"><na f="a/Augot:Daniel" pid="85/3827">Daniel Augot</na></co>
<co c="0"><na f="a/Aumasson:Jean=Philippe" pid="65/3314">Jean-Philippe Aumasson</na></co>
<co c="0"><na f="b/Baign=egrave=res:Thomas" pid="b/ThomasBaigneres">Thomas Baign&#232;res</na></co>
<co c="0"><na f="c/Cluzeau:Mathieu" pid="67/5903">Mathieu Cluzeau</na></co>
<co c="0"><na f="c/Courtois:Nicolas_T=" pid="89/381">Nicolas T. Courtois</na></co>
<co c="0"><na f="d/Delerabl=eacute=e:C=eacute=cile" pid="23/514">C&#233;cile Delerabl&#233;e</na></co>
<co c="1"><na f="f/Fanti:Giulia" pid="141/9910">Giulia Fanti</na></co>
<co c="1"><na f="f/Friedland:Gerald" pid="f/GeraldFriedland">Gerald Friedland</na></co>
<co c="0"><na f="g/Goubin:Louis" pid="64/5615">Louis Goubin</na></co>
<co c="0"><na f="l/Lepoint:Tancr=egrave=de" pid="08/11136">Tancr&#232;de Lepoint</na></co>
<co c="0"><na f="l/Loidreau:Pierre" pid="73/2683">Pierre Loidreau</na></co>
<co c="0"><na f="m/Meier:Willi" pid="47/6600">Willi Meier</na></co>
<co c="1"><na f="r/Ramchandran:Kannan" pid="53/5765">Kannan Ramchandran</na></co>
<co c="0"><na f="r/Rivain:Matthieu" pid="33/2627">Matthieu Rivain</na></co>
<co c="0"><na f="s/Sendrier:Nicolas" pid="46/5390">Nicolas Sendrier</na></co>
<co c="0"><na f="t/Tillich:Jean=Pierre" pid="53/7044">Jean-Pierre Tillich</na></co>
<co c="0"><na f="v/Vaudenay:Serge" pid="v/SergeVaudenay">Serge Vaudenay</na></co>
<co c="-1" n="2"><na f="v/Verroust=Blondet:Anne" pid="v/AnneVerroust">Anne Verroust-Blondet</na><na>Anne Verroust</na></co>
</coauthors>
</dblpperson>

