{"id":194,"date":"2023-03-19T08:44:35","date_gmt":"2023-03-19T07:44:35","guid":{"rendered":"https:\/\/franckleprevost.com\/?page_id=194"},"modified":"2026-02-11T12:59:36","modified_gmt":"2026-02-11T11:59:36","slug":"articles-in-computer-science","status":"publish","type":"page","link":"https:\/\/franckleprevost.com\/en\/articles-in-computer-science\/","title":{"rendered":"Articles in Computer Science"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"194\" class=\"elementor elementor-194\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-da97cdc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"da97cdc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2180b92\" data-id=\"2180b92\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3395af9f elementor-widget elementor-widget-text-editor\" data-id=\"3395af9f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 08-05-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<!-- wp:list {\"ordered\":true} -->\n<ol><!-- wp:list-item -->\n<li>Speech-EA: Evolutionary Algorithm-based Attack on Automatic Speech Recognition Systems.<br \/>With Elmir Avdusinovic, Ali Osman Topal, Enea Mancellari, Volker M\u00fcller, Faraz Mogal<br \/><em>The 18th Asian Conference on Intelligent Information and Database Systems (ACIIDS)<\/em>, Kaohsiung, Taiwan, 2026 (To appear)<\/li>\n<li>Speech-GAN: Black-Box Attack Against Automatic Speech Recognition Systems.<br \/>With Faraz Mogal, Ali Osman Topal, Enea Mancellari, Volker M\u00fcller, Elmir Avdusinovic<br \/><em>The 22nd International Joint Conference on Computer Science and Software Engineering (JCSSE)<\/em>, Chiang Mai, Thailand, 2025, p. 225-232.<br \/><a href=\"https:\/\/doi.org\/10.1109\/JCSSE67377.2025.11297954\">https:\/\/doi.org\/10.1109\/JCSSE67377.2025.11297954<\/a><\/li>\n<li>R\u00e9seaux neuronaux convolutionnels et reconnaissance d&rsquo;images : \u00e9valuation des risques.<br \/>With Ali Osman Topal and Enea Mancellari<br \/><em>Bulletin de la Soci\u00e9t\u00e9 Informatique de France,<\/em> N\u00b0 25, juin 2025, p. 121-138.<br \/><a href=\"https:\/\/doi.org\/10.48556\/SIF.1024.25.121\">https:\/\/doi.org\/10.48556\/SIF.1024.25.121<\/a><\/li>\n<li>PoI+NBU: A Feasibility Study in Generating High-Resolution Adversarial Images with a Black Box Evolutional Algorithm based Attack.<br \/>With E. Mancellari and A. O. Topal.<br \/><em>ADI Avances en Ciencias e Ingener\u00edas<\/em>, Vol. 17, N\u00b0 2, August 2025.<br \/><a href=\"https:\/\/doi.org\/10.18272\/aci.vi.3699\">https:\/\/doi.org\/10.18272\/aci.vi.3699<\/a><\/li>\n<li>The Noise-Blowing-Up Strategy Creates High-Quality, High-Resolution Adversarial Images against Convolutional Neural Networks.<br \/>With A. O. Topal, E. Mancellari, E. Avdusinovic and T. Gillet.<br \/><em>Appl. Sci.<\/em> 2024, 14, 3493. Special Issue Adversarial Attacks and Cyber Security: Trends and Challenges.<br \/><a href=\"https:\/\/doi.org\/10.3390\/app14083493\">https:\/\/doi.org\/10.3390\/app14083493<\/a><br \/><a href=\"https:\/\/www.mdpi.com\/2076-3417\/14\/8\/3493\">https:\/\/www.mdpi.com\/2076-3417\/14\/8\/3493<\/a><\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Round-Based Mechanism and Job Packing with Model-Similarity-Based Policy of Scheduling DL Training in GPU Cluster.<br \/>With P. Thanapol, K. Lavangnananda, A. Glad, J. Schleich and P. Bouvry.<br \/><em>Appl. Sci.<\/em> 2024, 14, 2349. Section Computation and Artificial Intelligence. Special Issue Technologies, Algorithms and Applications for Planning, Scheduling and Optimization.<br \/><a href=\"https:\/\/doi.org\/10.3390\/app14062349\">https:\/\/doi.org\/10.3390\/app14062349<\/a><br \/><a href=\"https:\/\/www.mdpi.com\/2076-3417\/14\/6\/2349\">https:\/\/www.mdpi.com\/2076-3417\/14\/6\/2349<\/a><br \/><a href=\"https:\/\/www.mdpi.com\/journal\/applsci\/special_issues\/50MHSDAQR9\">https:\/\/www.mdpi.com\/journal\/applsci\/special_issues\/50MHSDAQR9<\/a><\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Zone-of-Interest Strategy for the creation of High-Resolution Adversarial Images against Convolutional Neural Networks.<br \/>With A. O. Topal, E. Mancellari and K. Lavangnananda. <br \/><em>15th International Conference on Information Technology and Electrical Engineering (ICITEE)<\/em>, Chiang Mai, Thailand, 2023, pp. 127-132. <br \/><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10317668\">https:\/\/ieeexplore.ieee.org\/document\/10317668<\/a>, <br \/><a href=\"https:\/\/doi.org\/10.1109\/ICITEE59582.2023.10317668\">https:\/\/doi.org\/10.1109\/ICITEE59582.2023.10317668<\/a><\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Creating High-Resolution Adversarial Images against Convolutional Neural Networks with the Noise Blowing-Up Method.<br \/>With A. O. Topal and E. Mancellari. \u00a0<br \/>In Nguyen, N.T., <em>et al.<\/em> Intelligent Information and Database Systems. <em>ACIIDS 2023<\/em>. Lecture Notes in Computer Science, (LNAI, vol 13995), p. 121-134. Springer, Singapore. <br \/><a href=\"https:\/\/doi.org\/10.1007\/978-981-99-5834-4_10\">https:\/\/doi.org\/10.1007\/978-981-99-5834-4_10<\/a><\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Scheduling Deep Learning Traning in GPU Cluster Using the Model-Similarity-Based Policy.<br \/>With P. Thanapol, K. Lavangnananda, J. Schleich and P. Bouvry. <br \/>In Nguyen, N.T., <em>et al.<\/em> Intelligent Information and Database Systems. <em>ACIIDS 2023<\/em>. Lecture Notes in Computer Science, (LNAI, vol 13996), p. 363-374. Springer, Singapore. <br \/><a href=\"https:\/\/doi.org\/10.1007\/978-981-99-5837-5_30\">https:\/\/doi.org\/10.1007\/978-981-99-5837-5_30<\/a> <strong>(short-listed for the Best Paper Award)<\/strong><\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Toward Understanding Efficient Privacy-Preserving Homomorphic Comparison.<br \/>With B. Pulido-Gaytan, A. Tchernykh, P. Bouvry and A. Goldman. <br \/><em>IEEE Access<\/em>, Vol. 11, pp. 102189 &#8211; 102206 (2023). <br \/><a href=\"https:\/\/doi.org\/10.1109\/ACCESS.2023.3315655\">https:\/\/doi.org\/10.1109\/ACCESS.2023.3315655<\/a><\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>One evolutionary algorithm deceives humans and ten convolutional neural networks trained on ImageNet at image recognition. <br \/>With A. O. Topal and R. Chitic. <br \/><em>Applied Soft Computing<\/em>, Vol. 143, p. 110397 (2023)<br \/><a href=\"https:\/\/doi.org\/10.1016\/j.asoc.2023.110397\">https:\/\/doi.org\/10.1016\/j.asoc.2023.110397<\/a> <br \/><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1568494623004155\">https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1568494623004155<\/a><\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Sur quelques \u00e9volutions r\u00e9centes en cryptologie post-quantique. 1024 \u2013 <em>Bulletin de la Soci\u00e9t\u00e9 informatique de France<\/em>, n\u00b0 21, avril 2023, p. 3-15.<br \/><a href=\"https:\/\/doi.org\/10.48556\/SIF.1024.21.185\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/doi.org\/10.48556\/SIF.1024.21.185<\/a><\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>ShuffleDetect: Detecting Adversarial Images against Convolutional Neural Networks.<br \/>With R. Chitic and A. O. Topal. <br \/><em>Appl. Sci.<\/em> 2023, 13 (6), 4068, Computing and Artificial Intelligence. <br \/><a href=\"https:\/\/doi.org\/10.3390\/app13064068\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/doi.org\/10.3390\/app13064068<\/a><br \/><a href=\"https:\/\/www.mdpi.com\/2076-3417\/13\/6\/4068\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.mdpi.com\/2076-3417\/13\/6\/4068<\/a><\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>A Strategy creating High Resolution Adversarial Images against Convolutional Neural Networks, and a Feasibility Study on 10 CNNs.<br \/>With E. Avdusinovic, R. Chitic and A. O. Topal. <br \/><em>Journal of Information and Telecommunication<\/em>, Vol. 7, Issue 1, p. 89-119 (2022). <br \/><a href=\"https:\/\/doi.org\/10.1080\/24751839.2022.2132586\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/doi.org\/10.1080\/24751839.2022.2132586<\/a><br \/><a href=\"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/24751839.2022.2132586\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/24751839.2022.2132586<\/a><\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Empirical perturbation Analysis of Two Adversarial Attacks: Black-Box versus White-Box.<br \/>With R. Chitic and A. O. Topal. <br \/><em>Appl. Sci. 2022<\/em>, 12, 7339, <em>Computing and Artificial Intelligence, Special Issue \u00ab\u00a0Explainable Artificial Intelligence\u00a0\u00bb<\/em>.<br \/><a href=\"https:\/\/doi.org\/10.3390\/app12147339\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/doi.org\/10.3390\/app12147339<\/a> <br \/><a href=\"https:\/\/www.mdpi.com\/2076-3417\/12\/14\/7339\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.mdpi.com\/2076-3417\/12\/14\/7339<\/a><\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Strategy and Feasibility Study for the Construction of High-Resolution Images Adversarial against Convolutional Neural Networks.<br \/>With A. O. Topal, E. Avdusinovic and R. Chitic. <br \/><em>Intelligent Information and Database Systems \u2013 14th Asian Conference, ACIIDS 2022, Ho Chi Minh City, Vietnam, November 28-30, 2022<\/em>, Proceedings Part I, p. 285-298. LNAI 13757, Springer (2022).<br \/><a href=\"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21743-2_23?pdf=chapter%20toc\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21743-2_23?pdf=chapter%20toc<\/a><\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Evolutionary algorithm-based images, humanly indistinguishable and adversarial against Convolutional Neural Networks: efficiency and filter robustness.<br \/>With R. Chitic and A. O. Topal. <br \/><em>IEEE Access<\/em>, Vol 9, pp. 160758 &#8211; 160778 (2021).<br \/><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9627925\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/ieeexplore.ieee.org\/document\/9627925<\/a><\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Robustness of Adversarial Images against Filters.<br \/>With R. Chitic, N. Deridder and N. Bernard. <br \/><em>Proceedings of OLA\u20192021<\/em>, CCIS 1443, pp. 1-14, Springer (2021).<br \/><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-85672-4_8\">https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-85672-4_8<\/a><\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Privacy-preserving logistic regression as a cloud service based on residue number system.<br \/>With J. Cort\u00e9s-Mendoza, A. Tchernykh, M. Babenko, L. Bernardo Pulido-Gaytan, G. Radchenko, X. Wang, A. Avetisyan. <br \/><em>Proc. of the 6th. Russian Supercomputing Days (RusSCD&rsquo;2020)<\/em>, 21-22 September 2020, Moscow, Russia, p. 598-610.<br \/><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-64616-5_51\">https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-64616-5_51<\/a><\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Reducing Overfitting and Improving Generalization in Training Convolutional Neural Network (CNN) under Limited Sample Sizes in Image Recognition.<br \/>With P. Thanapol, K. Lavangnananda, F. Pinel, P. Bouvry. <br \/><em>Proc. of the 5th. Inter. Conf. on Information Technology<\/em> (InCIT 2020), 21st \u2013 22nd October 2020, Bangsaen, Thailand, p. 300-305.<br \/><a href=\"http:\/\/dx.doi.org\/10.1109\/InCIT50588.2020.9310787\">http:\/\/dx.doi.org\/10.1109\/InCIT50588.2020.9310787<\/a><br \/><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9310787\">https:\/\/ieeexplore.ieee.org\/document\/9310787<\/a><\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Evolutionary algorithms deceive humans and machines at image classification: An extended proof of concept on two scenarios.<br \/>With R. Chitic and N. Bernard. <br \/><em>Journal of Information and Telecommunication<\/em>, 5:1, 121-143 (2020)<br \/><a href=\"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/24751839.2020.1829388\">https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/24751839.2020.1829388<\/a><br \/><a href=\"https:\/\/doi.org\/10.1080\/24751839.2020.1829388\">https:\/\/doi.org\/10.1080\/24751839.2020.1829388<\/a><\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>A proof of concept to deceive humans and machines at image classification with evolutionary algorithms.<br \/>With R. Chitic and N. Bernard. <br \/><em>Intelligent Information and Database Systems \u2013 12th Asian Conference, ACIIDS 2020 Phuket, Thailand, March 23-26, 2020<\/em>, Proceedings Part II, p. 467-480. LNAI 12034, Springer (2020).<br \/>(<strong>Best Paper Award<\/strong>).<br \/><a href=\"https:\/\/doi.org\/10.1007\/978-3-030-42058-1_39\">https:\/\/doi.org\/10.1007\/978-3-030-42058-1_39<\/a><br \/><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-42058-1_39\">https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-42058-1_39<\/a><\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>How Evolutionary Algorithms and Information Hiding deceive machines and humans for image recognition: A research program.<br \/>With N. Bernard. <br \/><em>Proceedings of the International Workshop on Optimization and Learning (OLA-2019), Bangkok Thailand, Jan. 29-31, 2019; <\/em>p. 12-15, Springer (2019)<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>James Bond\u2019s Most Secret Weapon<br \/><em>Proceedings of the 3rd International Conference on Applications in Information Technology (ICAIT-2018), hosted by the University of Aizu (November 1-3, 2018, Aizu-Wakamatsu, Japan). Publisher ACM, New York, NY USA (ISBN 978-1-4503-6516-1<\/em>); p. 1-2.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Elliptic Curves Discrete Logarithm Problem over a Finite Prime Field and p-adic Approximations.<br \/>With P. Bouvry and N. Bernard. <br \/><em>Proceedings of the 3rd International Conference on Applications in Information Technology (ICAIT-2018), hosted by the University of Aizu (November 1-3, 2018, Aizu-Wakamatsu, Japan). <\/em>Publisher ACM, New York, NY USA (ISBN 978-1-4503-6516-1); p. 9-15.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Evolutionary Algorithms for Convolutional Neural Network Visualization.<br \/>With N. Bernard. <br \/><em>Proceedings of the Latin American Conference on High Performance Computing CARLA 2018, hosted by the University of Bucaramanga (26-28 September 2018, Bucaramanga, Colombia),<\/em> High Performance Computing, Springer, Communications in Computer and Information Science 979, 18-32 (2019)<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Hardened Bloom Filters for Security, with an Application to Unobservability.<br \/>With N. Bernard.<br \/><em>Annales Universitatis Mariae Curie-Sklodowska. Sectio AI: Informatica, <\/em>12(4), 11-22 (2012)<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Beyond TOR: the TrueNyms protocol.<br \/>With N. Bernard. <br \/><em>LNCS Vol 7053: Security and Intelligent Information Systems<\/em>: <em>International Joint Conference, SIIS 2011, Warsaw, Poland, June 13-14, 2011, <\/em>Revised Selected Papers (2012)<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Applicative solutions for safe computations in distributed environments.<br \/>With S. Varrette, J.-L. Roch. <br \/><em>In: Workshop \u00ab\u00a0Trustworthy Software\u00a0\u00bb,<\/em> Saarbr\u00fccken, Germany (2006)<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Architectures PKI.<br \/>With J.-G. Dumas, J.-L. Roch, S. Varrette. <br \/>Chapter 4, 187-210. In <em>Cryptographie et s\u00e9curit\u00e9 des syst\u00e8mes et r\u00e9seaux <\/em>(2006)<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Cryptographie \u00e0 clef publique.<br \/>With J.-G. Dumas, J.-L. Roch, V. Savin, S. Varrette. <br \/>Chapter 3, 103-186. In <em>Cryptographie et s\u00e9curit\u00e9 des syst\u00e8mes et r\u00e9seaux <\/em>(2006)<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>R\u00e9alit\u00e9s de l\u2019espionnage \u00e9lectronique.<br \/>With T. Ebrahimi, B. Warusfel. <br \/>Chapter 2, 25-28. In <em>Enjeux de la s\u00e9curit\u00e9 multimedia<\/em> (2006)<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Public-key cryptography: An overview of some algorithms.<br \/>Chapter of the book <em>Optical and digital Techniques<\/em>. Ed. Bahram Javidi, Springer-Verlag, 337-352 (2005)<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Distributed Authentication in GRID5000.<br \/>With S. Varrette, S. Georget, J. Montagnat, J.-L. Roch. <br \/><em>LNCS Vol 3762 In: Proc. of OTM Confederated Int. Workshops on Grid Computing and its Application to Data Analysis (GADA\u201905), <\/em>414-326 (2005)<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Authentification distribu\u00e9e sur grille de grappes bas\u00e9e sur LDAP.<br \/>With S. Varrette, S. Georget, J.-L. Roch. <br \/><em>In: Proc. des 16\u00e8mes rencontres francophones du parall\u00e9lisme (RenPar&rsquo;16<\/em>), (2005).<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>FlowCert: Probabilistic certification for peer-to-peer computations.<br \/>With S. Varrette , J.-L- Roch. <br \/><em>In: Proc. of the 16th Symposium on Computer Architecture and High Performance Computing (SBAC-PAD 2004),<\/em> 108-115, IEEE Computer Society publishing (2004).<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Secure architectures for clusters and grids.<br \/>With S. Varrette, J.-L. Roch, Y. Denneulin. <br \/><em>In: Proc.<\/em> <em>of the 2nd Int. Conf. on Critical Infrastructures (CRIS 2004),<\/em> IEEE publishing (2004).<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Utilisation des modules elliptiques de Drinfeld en cryptologie.<br \/>With R. Gillard, A. Pantchichkine, X. Roblot. <br \/><span class=\"notion-enable-hover\" style=\"font-style: italic;\" data-token-index=\"1\">C.R. Acad. Sci. Paris, <\/span><span class=\"notion-enable-hover\" style=\"font-weight: 600;\" data-token-index=\"2\">336<\/span>, S\u00e9rie 11, 879-882 (2003)<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>An Overview Of Public-Key Cryptology.<br \/><em>In Proc. DPP 2003: International Conference on Digital Production Printing and Industrial Applications, <\/em>127-129 (2003)<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>How to bypass the Wassenaar Arrangement: A new application for watermarking.<br \/>With Touradj Ebrahimi, Raphael Erard, Martin Kutter, Diego Santa Cruz. <br \/><em>In Proc. of the 2000 ACM workshops on Multimedia, <\/em>161-164 (2000)<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Les standards cryptographiques du XXI\u00e8me si\u00e8cle\u00a0: AES et IEEE-P1363.<br \/><em>La Gazette des Math\u00e9maticiens, <\/em>9-23 (2000)<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>AES: Round 2<br \/><em>PricewaterhouseCoopers Cryptography Centre of Excellence Quaterly Journal<\/em>, Issue 3 (1999)<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>The end of public-key cryptography or does God play dices?<br \/><em>PricewaterhouseCoopers Cryptography Centre of Excellence Quaterly Journal<\/em>, Issue 3 (1999)<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Peter Shor, prix Nevanlinna 1998.<br \/><em>La Gazette des Math\u00e9maticiens, <\/em>81 (1999)<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>AES und IEEE-P1363, die kryptographischen Standards des 21. Jahrhunderts.<br \/><em>Tagungsband des 6. Deutschen IT-Sicherheutskongresses des BSI<\/em>, 485-491 (1999)<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Symbiose von Kryptographie und digitalen Wasserzeichen\u00a0: effizienter Schutz des Urheberrechtes digitaler Medien.<br \/>With Martin Kutter. <br \/><em>Tagungsverband des 6. Deutschen IT-Sicherheitskongresses des BSI<\/em>, 479-484 (1999)<\/li>\n<!-- \/wp:list-item --><\/ol>\n<!-- \/wp:list -->\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-194","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/franckleprevost.com\/en\/wp-json\/wp\/v2\/pages\/194","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/franckleprevost.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/franckleprevost.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/franckleprevost.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/franckleprevost.com\/en\/wp-json\/wp\/v2\/comments?post=194"}],"version-history":[{"count":50,"href":"https:\/\/franckleprevost.com\/en\/wp-json\/wp\/v2\/pages\/194\/revisions"}],"predecessor-version":[{"id":1749,"href":"https:\/\/franckleprevost.com\/en\/wp-json\/wp\/v2\/pages\/194\/revisions\/1749"}],"wp:attachment":[{"href":"https:\/\/franckleprevost.com\/en\/wp-json\/wp\/v2\/media?parent=194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}