• Home
  • Articles
  • Software
  • Students
  • Teaching
  • Misc.
  • Contact
  • Since the 1st, September 2013, I have been working as an Associate Professor at ENSICAEN. I am part of the SAFE team in the GREYC laboratory.

    Interests:

    • Coding theory
    • Steganography
    • Privacy
    Articles

    Publications

    Preprint

    • M. Barbier, and C. Munuera. Improving success probability and embedding efficiency in code based steganography. Preprint, February, 2013.
      arxiv bibtex PDF PS

    Journals

    • T. Godquin, M. Barbier, C. Gaber, J.-L. Grimault, and J.-M. Le Bars. Applied graph theory to security: A qualitative placement of security solutions within IoT networks. Journal of Information Security and Applications. Vol. 55, pp. 102640, December, 2020.
      elsevier HAL bibtex
    • M. Barbier, H. Cheballah, and J.M. Le Bars. On the computation of the Möbius transform. Theoretical Computer Science. Vol. 809, pp. 171 - 188, February, 2020.
      elsevier HAL bibtex
    • K. Atighehchi, L. Ghammam, M. Barbier, and C. Rosenberger. GREYCHashing: Combining Biometrics and Secret for Enhancing the Security of Protected Templates. Future Generation Computer Systems. Vol. 101, pp. 819 - 830, December, 2019.
      elsevier HAL bibtex
    • G. Quintin, M. Barbier, and C. Chabot. On Generalized Reed-Solomon Codes Over Commutative and Noncommutative Rings. IEEE Transactions on Information Theory. Vol. 59, number 9, pp. 5882 - 5897, September, 2013.
      IEEE HAL bibtex
    • M. Barbier, C. Chabot, and G. Quintin. On Quasi-Cyclic Codes as a Generalization of Cyclic Codes. Finite Fields and Their Applications. Vol. 18, issue 5, pp. 904 - 919, September, 2012.
      elsevier arxiv bibtex PDF PS
    • C. Munuera, and M. Barbier. Wet paper codes and the dual distance in steganography. Advances in Mathematics of Communications. Vol. 6, number 3, pp. 237 - 285, August, 2012.
      AIMS arxiv bibtex

    International conferences

    • B. Seck, P.-L. Cayrel, V.-F. Dragoi, I. Diop, M. Barbier, J. Belo Klamti, V. Grosso, and B. Colombier. A Side-Channel Attack against Classic McEliece when loading the Goppa Polynomial. Africacrypt, July, 2023.
      HAL bibtex
    • B. Seck, P.-L. Cayrel, I. Diop, and M. Barbier. Cryptanalysis of a code-based identification scheme presented in CANS 2018. I4CS, pp. 3 - 19, November, 2022.
      springer HAL bibtex
    • B. Seck, P.-L. Cayrel, I. Diop, M. Barbier, J. B. Klamti, V. F. Dragoi, and E. M. Benhani. Reducing the Goppa polynomial search complexity using a Template Attack on Classic McEliece. Poster at Africacrypt, July, 2022.
      HAL bibtex
    • T. Godquin, M. Barbier, C. Gaber, J.-L. Grimault, and J.-M. Le Bars. A semantic approach for comparing Fog ServicePlacement Problems. IEEE International Symposium on Integrated Network Management, pp. 4, May, 2021.
      HAL bibtex
    • T. Godquin, M. Barbier, C. Gaber, J.-L. Grimault, and J.-M. Le Bars. Placement optimization of IoT security solutions for edge computing based on graph theory. International Performance Computing and Communications Conference, October, 2019.
      IEEE HAL bibtex
    • L. Ghammam, M. Barbier, and C. Rosenberger. Enhancing the Security of Transformation Based Biometric Template Protection Schemes. CYBERWORLDS, pp. 316 - 323, October, 2018.
      IEEE HAL bibtex
    • K. Atighehchi, and M. Barbier. Signature Renewal for Low Entropy Data. IEEE TrustCom 18, pp. 873 - 884, July, 2018.
      IEEE HAL bibtex
    • T. Gougeon, M. Barbier, P. Larcharme, G. Avoine, and C. Rosenberger. Retrieving Dates in Smart Card Dumps is as Hard as Finding a Needle in a Haystack. IEEE WIFS, December, 2017.
      IEEE HAL bibtex
    • T. Gougeon, M. Barbier, P. Larcharme, G. Avoine, and C. Rosenberger. Memory carving can finally unveil your embedded personal data. ARES, pp. 9, August, 2017.
      ACM HAL bibtex
    • T. Gougeon, M. Barbier, P. Larcharme, G. Avoine, and C. Rosenberger. Memory Carving in Embedded Devices: Separate the Wheat from the Chaff. Applied Cryptography and Network Security, ACNS 16, pp. 592 - 608, June, 2016.
      springer HAL bibtex
    • M. Barbier, J.M. Le Bars, and C. Rosenberger. Image Watermarking With Biometric Data For Copyright Protection . ARES - MFSec, pp. 618 - 625, August, 2015.
      IEEE HAL bibtex PDF PS
    • M. Barbier. Re-encoding reformulation and application to Welch-Berlekamp algorithm. IEEE, ISIT'14, pp. 1782 - 1786, July, 2014.
      IEEE arxiv bibtex PDF PS
    • M. Barbier, C. Pernet, and G. Quintin. On the decoding of quasi-BCH codes. International Workshop on Coding and Cryptography, WCC 2013, April, 2013.
      arxiv bibtex PDF PS
    • D. Augot, M. Barbier, and C. Fontaine. Ensuring message embedding in wet paper steganography. Institute of Mathematics and its Applications International Conference - IMACC11, LNCS Vol. 7089, pp. 244 - 258, December, 2011.
      springer arxiv bibtex
    • D. Augot, M. Barbier, and A. Couvreur. List-decoding of binary Goppa codes up to the binary Johnson bound. IEEE, ITW'11, pp. 229 - 233, October, 2011.
      IEEE arxiv bibtex PDF PS
    • M. Barbier, and P. Barreto. Key Reduction of McEliece's Cryptosystem Using List Decoding. IEEE, ISIT'11, pp. 2681 - 2685, August, 2011.
      IEEE arxiv bibtex
    • M. Barbier. New Set of Codes for the Maximum-Likelihood Decoding Problem. YACC'10, October, 2010.
      arxiv bibtex PDF PS

    National conferences

    • T. Godquin, M. Barbier, C. Gaber, J.L. Grimault, and J.M. Le Bars. IoT : Vers un contrôle des fonctionnalités au vu des menaces liées. RESSI, May, 2018.
      HAL bibtex
    • M. Barbier, and C. Rosenberger. Tatouage d'images avec des données biométriques révocables pour la preuve de propriété. SAR-SSI 14, May, 2014.
      HAL bibtex
    • M. Barbier, and P-L Cayrel. Attaques algébriques. MajecSTIC'08, November, 2008.
      bibtex PDF PS

    Miscellaneous

    • M. Barbier. Décodage en liste et application à la sécurité de l'information. PhD Thesis at École Polytechnique, December, 2011.
      HAL HAL bibtex PDF
    • D. Augot, M. Barbier, and A. Couvreur. List-decoding of binary Goppa codes up to the binary Johnson bound. Technical report, December, 2010.
      arxiv bibtex PDF PS
    Software

    stegocurve

    Description

    The primary goal of stegocurve is to provide a simple tool for plotting curve from code based steganography. This is a standalone ANSI-C tool. It can be used for Unix and Windows computers. Any feedback is appreciated. stegocurve is under the GPLv3 licence.

    All remarks or suggestions are useful, let me know by e-mail.

    Download

    You can download all the releases:

    Documentation

    You can find the full documentation generated by Doxygen in the archive, or for the lastest release in online documentation.

    Students
    • Currents
    • Formers
      • Post-doc positions:
        • 2018: 8 months Loubna Ghammam
        • 2017-2018: 1 year Kévin Atighehchi (associate professor at LIMOS)
      • PhD:
        • 2020-2023: Boly Seck (currently Research engineer at Alstom)
        • 2017-2020: Tanguy Godquin (currently Director R&D at MailSPEC)
        • 2014-2017: Thomas Gougeon (currently Research engineer at Thalès)
      • Master degree:
        • 2021: Sara Majbour (PhD)
        • 2020: Sarah Grib
        • 2018: Soufien Jabeur
        • 2014: Thomas Gougeon
        • 2011: Tania Richmond (Associate Professor -- ISEA)
    Teaching

    Since the 1st, September 2019, I am in charge of the Majeure "E-paiement & cybersecurity".

    I contribute to different courses:

    Miscellaneaous
    Contact
    morgan.barbier{AT}unicaen.fr
    ENSICAEN - GREYC
    6, Boulevard Maréchal Juin
    14 000 Caen CEDEX
    France
    +33 (0)2 31 45 81 79
    FB - room 330