| On quasi-cyclic codes as a generalization of cyclic codes M Barbier, C Chabot, G Quintin Finite Fields and Their Applications 18 (5), 904-919, 2012 | 44 | 2012 |
| On generalized Reed–Solomon codes over commutative and noncommutative rings G Quintin, M Barbier, C Chabot IEEE transactions on information theory 59 (9), 5882-5897, 2013 | 33 | 2013 |
| Key reduction of McEliece's cryptosystem using list decoding M Barbier, PSLM Barreto 2011 IEEE International Symposium on Information Theory Proceedings, 2681-2685, 2011 | 33 | 2011 |
| GREYC-Hashing: Combining biometrics and secret for enhancing the security of protected templates K Atighehchi, L Ghammam, M Barbier, C Rosenberger Future Generation Computer Systems 101, 819-830, 2019 | 25 | 2019 |
| List-decoding of binary Goppa codes up to the binary Johnson bound D Augot, M Barbier, A Couvreur 2011 IEEE Information Theory Workshop, 229-233, 2011 | 25 | 2011 |
| Applied graph theory to security: A qualitative placement of security solutions within IoT networks T Godquin, M Barbier, C Gaber, JL Grimault, JM Le Bars Journal of information security and applications 55, 102640, 2020 | 21 | 2020 |
| Enhancing the security of transformation based biometric template protection schemes L Ghammam, M Barbier, C Rosenberger 2018 International Conference on Cyberworlds (CW), 316-323, 2018 | 21 | 2018 |
| Placement optimization of IoT security solutions for edge computing based on graph theory T Godquin, M Barbier, C Gaber, JL Grimault, JM Le Bars 2019 IEEE 38th International Performance Computing and Communications …, 2019 | 14 | 2019 |
| Ensuring message embedding in wet paper steganography D Augot, M Barbier, C Fontaine IMA International Conference on Cryptography and Coding, 244-258, 2011 | 10 | 2011 |
| Wet paper codes and the dual distance in steganography C Munuera, M Barbier arXiv preprint arXiv:1104.1970, 2011 | 10 | 2011 |
| On the computation of the Möbius transform M Barbier, H Cheballah, JM Le Bars Theoretical Computer Science 809, 171-188, 2020 | 8 | 2020 |
| Memory carving in embedded devices: separate the wheat from the chaff T Gougeon, M Barbier, P Lacharme, G Avoine, C Rosenberger International Conference on Applied Cryptography and Network Security, 592-608, 2016 | 8 | 2016 |
| Image watermarking with biometric data for copyright protection M Barbier, JM Le Bars, C Rosenberger 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 7 | 2015 |
| List-decoding of binary Goppa codes up to the binary Johnson bound D Augot, M Barbier, A Couvreur arXiv preprint arXiv:1012.3439, 2010 | 7 | 2010 |
| Décodage en liste et application à la sécurité de l'information M Barbier Ecole Polytechnique X, 2011 | 5 | 2011 |
| Securing Privacy in Offline Payment for Retail Central Bank Digital Currency: A Comprehensive Framework O Atangana, M Barbier, L Khoukhi, W Royer Edited by Sergey Y. Yurish, 25, 2023 | 4 | 2023 |
| A Side-Channel Attack Against Classic McEliece When Loading the Goppa Polynomial B Seck, PL Cayrel, VF Dragoi, I Diop, M Barbier, JB Klamti, V Grosso, ... International Conference on Cryptology in Africa, 105-125, 2023 | 4 | 2023 |
| Tatouage d'images avec des données biométriques révocables pour la preuve de propriété M Barbier, C Rosenberger Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d …, 2014 | 4 | 2014 |
| On the decoding of quasi-BCH codes M Barbier, C Pernet, G Quintin International Workshop on Coding and Cryptography (WCC) 2013, 2012 | 4 | 2012 |
| New Set of Codes for the Maximum-Likelihood Decoding Problem M Barbier Yet Another Conference on Cryptography (YACC) 2010, 2010 | 4 | 2010 |