Renaud Sirdey's publications
Research Director at Commissariat à l'énergie atomique (CEA), Université Paris-Saclay, France
Habilité à Diriger des Recherches
Main publications:
- M. Checri, R. Sirdey, A. Boudguiga and J.-P. Bultel, "On the practical CPAD security of "exact" and threshold FHE schemes and libraries". CRYPTO, 2024 (preprint: IACR ePrint 2024/116).
- D. Trama, P.-E. Clet, A. Boudguiga and R. Sirdey, "A homomorphic AES evaluation in less than 30 seconds by means of TFHE", Workshop on Applied Homomorphic Cryptography (WAHC@CCS), pp. 79-90, 2023 (doi:10.1145/3605759.3625260).
- A. Grivet Sébert, M. Zuber, O. Stan, R. Sirdey and C. Gouy-Pailler, "A probabilistic design for practical homomorphic majority voting with intrinsic differential privacy", Workshop on Applied Homomorphic Cryptography (WAHC@CCS), pp. 47-58, 2023 (doi:10.1145/3605759.3625258).
- A. Grivet Sébert, M. Checri, O. Stan, R. Sirdey and C. Gouy-Pailler, "Combining homomorphic encryption and differential privacy in federated learning", Privacy, Security and Trust, pp. 1-7, 2023 (doi:10.1109/PST58708.2023.10320195).
- A. Pedrouzo-Ulloa, A. Boudguiga, O. Chakraborty, R. Sirdey, O. Stan and M. Zuber, "Practical multi-key homomorphic encryption for more flexible and efficient secure federated average aggregation", IEEE International Conference on Cyber Security and Resilience, pp. 612-617, 2023 (doi:10.1109/CSR57506.2023.10224979).
- A.-A. Bendoukha, P.-E. Clet, A. Boudguiga and R. Sirdey, "Optimized stream-cipher-based transciphering by means of functional-bootstrapping", DBSEC, pp. 91-109, 2023 (doi:10.1007/978-3-031-37586-6_6).
- P.-E. Clet, A. Boudguiga, R. Sirdey and M. Zuber, "ComBo: a novel functional bootstrapping method for efficient evaluation of nonlinear functions in the encrypted domain", AFRICACRYPT, pp. 317-343, 2023 (doi:10.1007/978-3-031-37679-5_14).
- M. Checri, J.-P. Bultel, R. Sirdey and A. Boudguiga, "Lightweight FHE-based protocols achieving results consistency for data encrypted under different keys", Proceedings of the 20th International Conference on Security and Cryptography, pp. 704-709, 2023 (doi:10.5220/0012085200003555).
- V. Gilbert, S. Louise and R. Sirdey, "TAQOS: a benchmark protocol for quantum optimization systems", Proceedings of the 23rd International Conference on Computational Science, pp. 168-176, 2023 (doi:10.1007/978-3-031-36030-5_13).
- V. Gilbert, J. Rodriguez, R. Sirdey and S. Louise, "Solving higher order binary optimization problems on NISQ devices: experiments and limitations", Proceedings of the 23rd International Conference on Computational Science, pp. 224-232, 2023 (doi:10.1007/978-3-031-36030-5_18).
- L. Phab, S. Louise and R. Sirdey, "First attempts at cryptanalyzing a (toy) block cipher by means of quantum optimization approaches", Journal of Computational Science, 2023 (doi:10.1016/j.jocs.2023.102004).
- D. Trama, P.-E. Clet, A. Boudguiga and R. Sirdey, "Building blocks for LSTM homomorphic evaluation with TFHE", Proceedings of the 7th International Symposium on Cyber Security, Cryptology and Machine Learning, pp. 117-134, 2023 (doi:10.1007/978-3-031-34671-2_9).
- N. Quero, A. Boudguiga, R. Sirdey and N. Karam, "Towards privacy-preserving platooning services by means of homomorphic encryption", Proceedings of the Inaugural ISOC Symposium on Vehicle Security and Privacy, 2023 (doi:10.14722/vehiclesec.2023.23054).
- A. A. Bendoukha, O. Stan, R. Sirdey, N. Quero and L. Freitas, "Practical homomorphic evaluation of block-cipher-based hash functions with applications", Foundations of Privacy & Security (FPS), 88-103, 2022 (doi:10.1007/978-3-031-30122-3_6)
- O. Stan, V. Thouvenot, A. Boudguiga, K. Kapusta, M. Zuber, R. Sirdey, "Secure Federated Learning: analysis of different cryptographic tools", Proceedings of the 19th International Conference on Security and Cryptography (SECRYPT), 669-674, 2022 (doi:10.5220/0011322700003283).
- L. Phab, S. Louise and R. Sirdey, "A first attempt at cryptanalyzing a (toy) block cipher by means of QAOA", Proceedings of the 22nd International Conference on Computational Science, 218–232, 2022 (doi:10.1007/978-3-031-08760-8_19).
- G. Bettonte, V. Gilbert, D. Vert, S. Louise and R. Sirdey, "Quantum approaches for WCET-related optimization problems", Proceedings of the 22nd International Conference on Computational Science, 202-217, 2022 (doi:10.1007/978-3-031-08760-8_18).
- A. Madi, O. Stan, R. Sirdey and C. Gouy-Pailler, "SecTL: secure and verifiable transfer learning-based inference", Proceedings of the 8th International Conference on Information Systems Security and Privacy, 220-229, 2022 (doi:10.5220/0010987700003120).
- A. A. Bendoukha, A. Boudguiga and R. Sirdey, “Revisiting stream-cipher-based homomorphic transciphering in the TFHE era”, Foundations of Privacy & Security (FPS), 19-33, 2021 (doi:10.1007/978-3-031-08147-7_2).
- L. Freitas de Souza, S. Tucci-Piergiovanni, R. Sirdey, O. Stan, P. Kuznetsov, N. Quero, "RandSolomon: optimally resilient multi-party random number generation protocol", Proceedings of the Conference on Principles of Distributed Systems (OPODIS), 23, 2021 (proceedings version).
- G. Bettonte, S. Louise, R. Sirdey, "Towards a Quantum Algorithm for Evaluating WCETs", Q-SET@QCE 2021:66-80 (proceedings).
- A. Madi, O. Stan, A. Mayoue, A. Grivet-Sébert, C. Gouy-Pailler, R. Sirdey, "A secure Federated Learning framework using FHE and Verifiable Computing", Proceedings of the 2nd IEEE International Conference on Reconciling Data Analytics, Automation, Privacy, and Security (RDAAPS), 1-8, 2021 (doi:10.1109/RDAAPS48126.2021.9452005).
- A. Grivet Sébert, R. Pinot, M. Zuber, C. Gouy-Pailler and R. Sirdey, "SPEED: Secure, PrivatE, and Efficient Deep learning", Machine Learning Journal 110, 675–694, 2021 (doi:10.1007/s10994-021-05970-3). Presented at ECML'21.
- Y. Abbar, P. Aubry, T. Barry, S. Carpov, S. Mallick, M. Krichen, D. Ligier, S. Shpak and R. Sirdey, "Cloud-based private querying of databases by means of homomorphic encryption", Proceedings of the 6th International Conference on Internet of Things, Big Data and Security, 123-131, 2021 (doi:10.5220/0010378801230131).
- D. Vert, R. Sirdey and S. Louise, "Benchmarking quantum annealing against "hard" instances of the bipartite matching problem", SN Computer Science 2:106, 2021 (doi:10.1007/s42979-021-00483-1).
- M. Zuber and R. Sirdey, "Efficient homomorphic evaluation of k-NN classifiers ", Proceedings on Privacy Enhancing Technology Symposium 2, 111-129, 2021 (doi:10.2478/popets-2021-0020). Presented at PETS'21.
- S. Canard, S. Carpov, C. Fontaine and R. Sirdey, "Traiter des données multimédia chiffrées grâce au chiffrement homomorphe", chapter in "Sécurité multimédia", pp. 175-217, ISTE Science, 2020 (doi:10.51926/ISTE.9027.ch6).
- A. Madi, O. Stan and R. Sirdey, "Computing neural networks with homomorphic encryption and verifiable computing", Proceedings of the 2nd Workshop on Cloud Security and Privacy, LNCS 12418, pp. 295-317, 2020 (doi:10.1007/978-3-030-61638-0_17).
- M. Zuber, S. Carpov and R. Sirdey, "Towards real-time hidden speaker recognition by means of fully homomorphic encryption", Proceedings of the 22nd International Conference on Information and Communications Security, LNCS 12282, pp. 403-421, 2020 (doi:10.1007/978-3-030-61078-4_23).
- D. Vert, R. Sirdey and S. Louise, "Operational quantum annealers are cursed by their qubits interconnection topologies", Proceedings of the IEEE Computer Society Annual Symposium on VLSI (1st International Workshop on Quantum Computing: Circuits Systems Automation and Applications), pp. 282-287, 2020 (doi:10.1109/ISVLSI49217.2020.00058).
- D. Vert, R. Sirdey and S. Louise, "Revisiting old combinatorial beasts in the quantum age: quantum annealing versus maximal matching", Proceedings of the 20th International Conference on Computational Science (Quantum Computing Workshop), LNCS 12142, pp. 473-487, 2020 (doi:10.1007/978-3-030-50433-5_37).
- P. Aubry, S. Carpov and R. Sirdey, "Faster homomorphic encryption is not enough: improved heuristic for multiplicative depth minimization of boolean circuits", Topics in Cryptology – CT-RSA 2020, LNCS 12006, 345-363 (doi:10.1007/978-3-030-40186-3_15).
- S. Carpov, C. Fontaine, D. Ligier and R. Sirdey, "Illuminating the dark or how to recover what should not be seen in FE-based classifier", Proceedings on Privacy Enhancing Technology Symposium, 2020(2):5-23 (doi:10.2478/popets-2020-0015, PDF). Presented at PETS'20.
- D. Vert, R. Sirdey and S. Louise, "Revisiting old combinatorial beasts in the quantum age: quantum annealing versus maximal matching", preprint arXiv:1910.05129 [quant-ph], 2019.
- M. Izabachène, R. Sirdey and M. Zuber, "Practical fully homomorphic encryption for fully masked neural networks", Proceedings of the 18th International Conference on Cryptology and Network Security, 24-36, LNCS 11829, 2019 (doi:10.1007/978-3-030-31578-8_2).
- A. Boudguiga, J. Letailleur, R. Sirdey and W. Klaudel, "Enhancing CAN security by means of lightweight stream-ciphers and protocols", Proceedings of the 2nd International Workshop on Safety, Security, and Privacy in Automotive Systems (STRIVE), 235-250, LNCS 11699, 2019 (doi:10.1007/978-3-030-26250-1_19).
- O. Stan, M.-H. Zayani, R. Sirdey, A. Ben Hamida, M. Mziou-Sellami and A. Ferreira Leite, "A SaaS implementation of a new generic crypto-classifier service for secure energy efficiency in Smart Cities", In Smart Cities, Green Technologies and Intelligent Transport Systems, pp. 90-115, 2019 (doi:10.1007/978-3-030-26633-2_5).
- D. Vert, R. Sirdey and S. Louise, "On the limitations of the Chimera graph topology in using analog quantum computers", Proceedings of the ACM International Conference on Computing Frontiers, 226-229, 2019 (doi:10.1145/3310273.3322830).
- O. Stan, R. Sirdey, C. Gouy-Pailler, P. Blanchart, A. Ben Hamida and M.-H. Zayani, "Privacy-preserving tax calculations in smart cities by means of Inner-Product Functional Encryption", Proceedings of the 2nd IEEE Cyber Security In Networking Conference, 2018 (doi:10.1109/CSNET.2018.8602714).
- D. Nokam Kuate, S. Canard and R. Sirdey, "Towards video compression in the encrypted domain: a case-study on the H264 and HEVC macroblock processing pipeline", Proceedings of the 17th International Conference on Cryptology and Network Security, LNCS 11124:109-129, 2018 (doi:10.1007/978-3-030-00434-7_6).
- J. Cathébras, A. Carbon, P. Milder, R. Sirdey and N. Ventroux, "Data flow oriented hardware design of RNS-based polynomial multiplication for SHE acceleration", IACR Transactions on Cryptographic Hardware and Embedded Systems, 3:69-88, 2018 (doi:10.13154/tches.v2018.i3.69-88).
- A. Canteaut, S. Carpov, C. Fontaine, T. Lepoint, M. Naya-Plasencia, P. Paillier and R. Sirdey, "Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression" (extended version of our FSE'16 paper), Journal of Cryptology 31:885–916, 2018 (doi:10.1007/s00145-017-9273-9).
- K. Singh, R. Sirdey and S. Carpov, "Practical personalized genomics in the encrypted domain", Proceedings of the 3rd IEEE International Conference on Fog and Edge Mobile Computing, pp. 139-146, 2018 (doi:10.1109/FMEC.2018.8364056).
- B. Lac, A. Canteaut, J. Fournier and R. Sirdey, "Thwarting fault attacks against lightweight cryptography using SIMD instructions", Proceedings of the 50th IEEE International Symposium on Circuits and Systems, 2018 (doi:10.1109/ISCAS.2018.8351693).
- O. Stan, M.-H. Zayani, R. Sirdey, A. Ben Hamida, A. Ferreira Leite and M. Mziou-Sellami, "A new crypto-classifier service for energy efficiency in smart cities", Proceedings of the 7th International Conference on Smart Cities and Green ICT Systems, pp. 78-88, 2018 (doi:10.5220/0006697500780088).
- A. Canteaut, S. Carpov, C. Fontaine, J. Fournier, B. Lac, M. Naya-Plasencia, R. Sirdey and A. Tria, "End-to-end data security for IoT: from a cloud of encryptions to encryption in the cloud", Proceedings of the Computer & Electronics Security Applications Rendez-vous (C&ESAR), 2017 (PDF).
- S. Canard, S. Carpov, D. Nokam Kuate and R. Sirdey, "Running compression algorithms in the encrypted domain: a case-study on the homomorphic execution of RLE", Proceedings of Privacy, Security and Trust, pp. 283-292, 2017 (doi:10.1109/PST.2017.00041).
- D. Ligier, S. Carpov, C. Fontaine and R. Sirdey, "Information leakage analysis of inner-product functional encryption based data classification", Proceedings of Privacy, Security and Trust, pp. 303-308, 2017 (doi:10.1109/PST.2017.00043).
- S. Carpov, S. Aubry and R. Sirdey, "A multi-start heuristic for multiplicative depth minimization of boolean circuits", Proceedings of the 28th International Workshop on Combinatorial Algorithms, LNCS 10765:275-286, 2017 (doi:10.1007/978-3-319-78825-8_23).
- J. Collet, T. Sassolas, Y. Lhuillier, R. Sirdey and J. Carlier, "Exploration of de Brujin graph filtering for de novo assembly using GraphLab", Proceedings of the 7th IEEE Workshop on Parallel / Distributed Computing and Optimization, pp. 530-539, 2017 (doi:10.1109/IPDPSW.2017.102).
- J. Cathébras, A. Carbon, R. Sirdey and N. Ventroux, "An analysis of FV parameters impact towards its hardware acceleration", Proceedings of the 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, LNCS 10323:91-106, 2017 (doi:10.1007/978-3-319-70278-0_6).
- B. Lac, A. Canteaut, J. Fournier and R. Sirdey, "DFA on LS-designs with a practical implementation on SCREAM", Proceedings of the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, LNCS 10348:223-247, 2017 (doi:10.1007/978-3-319-64647-3_14).
- A. Boudguiga, N. Bouzerna, L. Granboulan, A. Olivereau, F. Quesnel, A. Roger and R. Sirdey, "Towards better availability and accountability for IoT updates by means of a blockchain", Proceedings of IEEE Security & Privacy on the Blockchain, pp. 50-58, 2017 (doi:10.1109/EuroSPW.2017.50).
- D. Ligier, S. Carpov, C. Fontaine and R. Sirdey, "Privacy preserving data classification using inner-product functional encryption", Proceedings of the 3rd International Conference on Information Systems Security and Privacy, pp. 325-333, 2017 (doi:10.5220/0006206704230430).
- K. Singh, R. Sirdey, F. Artiguenave, D. Cohen and S. Carpov, "Towards confidentiality-strengthened personalized genomic medicine embedding homomorphic cryptography", Proceedings of the 3rd International Conference on Information Systems Security and Privacy, pp. 423-430, 2017 (doi:10.5220/0006148303250333).
- A. Adomnicai, B. Lac, A. Canteaut, J. Fournier, L. Masson, R. Sirdey and A. Tria, "On the importance of considering physical attacks when implementing lightweight cryptography", Proceedings of the NIST Workshop on Lightweight Cryptography, 2016 (PDF@NIST).
- N. Bouzerna, R. Sirdey, O. Stan, T.-H. Nguyen and P. Wolf, "An architecture for practical confidentiality-strengthened face authentication embedding homomorphic cryptography", Proceedings of the 8th IEEE International Conference on Cloud Computing Technology and Science, pp. 399-406, 2016 (doi:10.1109/CloudCom.2016.0069).
- B. Lac, M. Beunardeau, A. Canteaut, J. Fournier and R. Sirdey, "A first DFA on PRIDE: from theory to practice", Proceedings of the The 11th International Conference on Risks and Security of Internet and Systems, LNCS 10158:214-238, 2016 (doi:10.1007/978-3-319-54876-0_17, preprint).
- D.-P Nugyen, M. Minoux, V.-T. Nguyen, T.-H. Nguyen and R. Sirdey, "Improved compact formulations for a wide class of graph partitioning problems in sparse graphs", Discrete Optimization,25:175-188, 2017 (doi:10.1016/j.disopt.2016.05.003).
- J. Collet, T. Sassolas, Y. Lhuillier, R. Sirdey and J. Carlier, "Leveraging distributed GraphLab for program trace analysis", Proceedings of the 4th International Conference on High Performance Computing & Simulation, pp. 238-245, 2016 (doi:10.1109/HPCSim.2016.7568341)..
- S. Carpov, T.-H. Nguyen, R. Sirdey, G. Constantino and F. Martinelli, "Practical privacy-preserving medical diagnosis using homomorphic encryption", Proceedings of the 9th IEEE Conference on Cloud Computing, pp. 593-599, 2016 (doi:10.1109/CLOUD.2016.0084).
- S. Carpov and R. Sirdey, "Another compression method for homomorphic ciphertexts", Proceedings of the 11th ACM Symposium on Information, Computer and Communications Security (3rd International Workshop on Security in Cloud Computing), pp. 44-50, 2016 (doi:10.1145/2898445.2898452).
- O. Stan, S. Carpov and R. Sirdey, "Dynamic execution of secure queries over homomorphic encrypted databases", Proceedings of the 11th ACM Symposium on Information, Computer and Communications Security (3rd International Workshop on Security in Cloud Computing), pp. 51-58, 2016 (doi:10.1145/2898445.2898454).
- K.-E. Berger, F. Galea B. Lecun and R. Sirdey, "A semi-greedy heuristic for the mapping of large task graphs", Proceeding of the 6th IEEE Workshop on Parallel Computing and Optimization, pp. 817-824, 2016 (doi:10.1109/IPDPSW.2016.179).
- A. Canteaut, S. Carpov, C. Fontaine, T. Lepoint, M. Naya-Plasencia, P. Paillier and R. Sirdey, "Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression", Proceedings of the 23rd International Conference on Fast Software Encryption, LNCS 9783:313-333, 2016 (doi:10.1007/978-3-662-52993-5_16, PDF).
- D.-P Nugyen, M. Minoux, V.-T. Nguyen, T.-H. Nguyen and R. Sirdey, "Stochastic graph partitioning: quadratic versus SOCP formulations", Optimization Letters, 10:1505-1518, 2016 (doi:10.1007/s11590-015-0953-9, PDF).
- S. Carpov and R. Sirdey, "Another compression method for homomorphic ciphertexts", IACR Report 2015/1199.
- O. Stan, R. Sirdey, J. Carlier and D. Nace, "A GRASP metaheuristic for the robust mapping and routing of dataflow process networks on manycore architectures", 4OR, 13:309-334, 2015 (doi:10.1007/s10288-015-0280-0, PDF).
- O. Stan and R. Sirdey, "Introduction to optimization under uncertainty techniques for high performance multicore embedded systems compilation", book chapter in "Computational Intelligence in Electronic Design", pp 97-130, Springer, 2015 (doi:10.1007/978-3-319-20071-2_4, PDF).
- P. Dubrulle, R. Sirdey, P. Doré, M. Aichouch and E. Ohayon, "Blind hypervision to protect virtual machine privacy against hypervisor escape vulnerabilities", Proceedings of 13th IEEE International Conference on Industrial Informatics, Cambridge, U.-K., 2015 (doi:10.1109/INDIN.2015.7281938, PDF).
- S. Carpov, P. Dubrulle, R. Sirdey, "Armadillo: a compilation chain for privacy preserving applications", Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (3rd International Workshop on Security in Cloud Computing), pp. 13-19, 2015 (doi:10.1145/2732516.2732520, PDF, preprint as IACR report 2014/988).
- O. Stan, R. Sirdey, J. Carlier and D. Nace, "The robust binomial approach to chance-constrained optimization problems with application to stochastic partitioning of large process networks", Journal of Heuristics 20:261-290, 2014 (doi:10.1007/s10732-014-9241-6, PDF).
- P. Aubry, M. Benazouz and R. Sirdey, "'An approximate method for throughput evaluation of cyclo-static data flow programs", Proceedings of the 8th International Conference on Complex, Intelligent and Software Intensive Systems, 433-438, 2014 (doi:10.1109/CISIS.2014.61, PDF).
- L. Cudennec, P. Dubrulle, F. Galea, T. Goubier and R. Sirdey, "Generating code and memory buffers to reorganize data on many-core architectures", Procedia Computer Science 29:1123-1133 (Proceedings of the 14th International Conference on Computational Science, Cairns, Australia), 2014 (doi:10.1016/j.procs.2014.05.101, PDF).
- P. Dubrulle, S. Carpov, R. Sirdey, "Automatic bitslicing of algorithms for VLIW architectures", Design Automation Conference, 2014 (PDF).
- K.-E. Berger, F. Galea B. Lecun and R. Sirdey, "Fast generation of large task network mappings", Proceeding of the 4th IEEE Workshop on Parallel Computing and Optimization, 1526-1530, 2014 (doi:10.1109/IPDPSW.2014.170, PDF).
- S. Fau, R. Sirdey, C. Fontaine, C. Aguilar and G. Gogniat, "Towards practical program execution over fully homomorphic encryption schemes", Proceedings of the 8th IEEE International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 284-290, Compiègne, France, 2013 (doi:10.1109/3PGCIC.2013.48, PDF).
- O. Stan, R. Sirdey, J. Carlier and D. Nace, "A GRASP for placement and routing of dataflow process networks on manycore architectures", Proceedings of the 8th IEEE International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 219-226, Compiègne, France, 2013 (doi:10.1109/3PGCIC.2013.39, PDF).
- Best Paper Award of IEEE 3PGCIC'13.
- L. Hubert and R. Sirdey, "Authentication and secured execution for the Infrastructure-as-a-Service layer of the Cloud Computing model", Proceedings of the 8th IEEE International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 291-297, Compiègne, France, 2013 (doi:10.1109/3PGCIC.2013.49, PDF).
- S. Carpov, L. Cudennec and R. Sirdey, "Throughput constrained parallelism reduction in cyclo-static dataflow applications", Procedia Computer Science 18:30-39 (Proceedings of the 13th International Conference on Computational Science, Barcelona, Spain), 2013 (doi:10.1016/j.procs.2013.05.166, PDF).
- P. Aubry, P.-E. Beaucamps, F. Blanc, B. Bodin, S. Carpov, L. Cudennec, V. David, P. Dore, P. Dubrulle, B. Dupont de Dinechin, F. Galea, T. Goubier, M. Harrand, S. Jones, J.-D. Lesage, S. Louise, N. Morey-Chaisemartin, T.-H. Nguyen, X. Raynaud and R. Sirdey (alphabetical order), "Extended cyclostatic dataflow program compilation and execution for an integrated manycore processor", Procedia Computer Science 18:1624-1633 (Proceedings of the 13th International Conference on Computational Science, Barcelona, Spain), 2013 (doi:10.1016/j.procs.2013.05.330, PDF).
- C. Aguilar-Melchor, S. Fau, C. Fontaine, G. Gogniat and R. Sirdey (alphabetical order), "Recent advances in homomorphic encryption", IEEE Signal Processing Magazine 30:108-117, 2013 (doi:10.1109/MSP.2012.2230219, PDF).
- K. Trabelsi, M. Jan and R. Sirdey, "A practical approach towards static DVFS and DPM scheduling in real-time systems", Proceedings of the 1st IEEE Workshop on Power, Energy and Temperature Aware Real-Time Systems, San Juan, Puerto Rico, 2012.
- O. Stan, R. Sirdey, J. Carlier and D. Nace, "A heuristic algorithm for stochastic partitioning of process networks", Proceedings of the 16th IEEE International Conference on System Theory, Control and Computing, Sinaia, Romania, 2012 (IEEE Xplore, PDF).
- P. Dubrulle, S. Louise, R. Sirdey and V. David, "A low-overhead dedicated execution support for stream applications on shared-memory CMP", Proceedings of the 10th ACM International Conference on Embedded Software, 143-152, Tampere, Finland, 2012 (doi:10.1145/2380356.2380383, PDF).
- L. Cudennec and R. Sirdey, "Parallelism reduction based on pattern substitution in dataflow oriented programming languages", Procedia Computer Science 9:146-155 (Proceedings of the 12th International Conference on Computational Science, Omaha, USA), 2012 (doi:10.1016/j.procs.2012.04.016, PDF).
- F. Galea and R. Sirdey, "A parallel simulated annealing approach for the mapping of large process networks", Proceeding of the 2nd IEEE Workshop on Parallel Computing and Optimization, 1787-1792, Shanghai, China, 2012 (doi:10.1109/IPDPSW.2012.221, PDF).
- S. Carpov, J. Carlier, D. Nace and R. Sirdey, "Two-stage hybrid flow shop with precedence constraints and parallel machines at second stage", Computer & Operations Research 39:736-745, 2012 (doi:10.1016/j.cor.2011.05.020, PDF).
- T. Goubier, R. Sirdey, S. Louise and V. David, "Sigma-C: a programming model and language for embedded manycores", LNCS 7016:385-394 (Proceedings of the 11th International Conference on Algorithms and Architectures for Parallel Processing, Melbourne, Australia), 2011 (doi:10.1007/978-3-642-24650-0_33, PDF).
- O. Stan, R. Sirdey, J. Carlier and D. Nace, "L'apport de l'optimisation sous incertitude pour les systèmes temps réel", Ecole d'été Temps Réel, Brest, France, 2011.
- S. Carpov, J. Carlier, D. Nace and R. Sirdey, "Probabilistic parameters of conditional task graphs", Proceedings of the 5th IEEE International Workshop on Advanced Distributed and Parallel Network Applications, 376-381, Tirana, Albania, 2011 (doi:10.1109/NBiS.2011.63, PDF).
- S. Carpov, J. Carlier, D. Nace and R. Sirdey, "Task ordering and memory management problem for degree of parallelism estimation", LNCS 6842:592-603 (Proceedings of the 17th International Computing and Combinatorics Conference, Dallas, USA), 2011 (doi:10.1007/978-3-642-22685-4_51, PDF).
- T. Megel, R. Sirdey and V. David, "Minimizing task preemptions and migrations in multiprocessor optimal real-time schedules", Proceedings of the 31st IEEE Real-Time Systems Symposium, 37-46, San Diego, USA, 2010 (doi:10.1109/RTSS.2010.22, PDF).
- R. Sirdey and P. Aubry, "A linear programming approach to general dataflow process networks verification and dimensioning", Electronic Proceedings in Theoretical Computer Science 38:115-119 (Proceedings of the 3rd Interaction and Concurrency Experience Workshop, Amsterdam, Netherlands), 2010 (doi:10.4204/EPTCS.38.11, PDF).
- S. Carpov, R. Sirdey, J. Carlier and D. Nace, "Memory bandwidth-constrained parallelism dimensioning for embedded many-core microprocessors", in CPAIOR10 workshop on Combinatorial Optimization for Embedded System Design, Bologna, Italy, 2010.
- R. Sirdey, J. Carlier and D. Nace, "A GRASP for a resource-constrained scheduling problem", International Journal of Innovative Computing and Applications 2:143-149 (special issue on Metaheuristics and Real-World Problems), 2010 (doi:10.1504/ijica.2010.033646, PDF).
- S. Carpov, R. Sirdey, J. Carlier and D. Nace, "Speculative data prefetching for branching structures in dataflow programs", Electronic Notes on Discrete Mathematics 36:119-126 (Proceedings of the 1st International Symposium on Combinatorial Optimization, Hammamet, Tunisia), 2010 (doi:10.1016/j.endm.2010.05.016, PDF).
- R.sirdey, J. Carlier and D. Nace, "Approximate resolution of a resource-constrained scheduling problem", Journal of Heuristics 15:1-17, 2009 (doi:10.1007/s10732-007-9052-0, PDF).
- R. Sirdey and F. Maurice, "A linear programming approach to highly precise clock synchronization over a packet network", 4OR 6:393-401, 2008 (doi:10.1007/s10288-007-0060-6, PDF)
- R.Sirdey, "Models and algorithms for the reconfiguration of distributed wireless switching systems", 4OR 6:195-198, 2008 (doi:10.1007/s10288-007-0048-2, PDF).
- R. Sirdey, "Combinatorial optimization problems in wireless switch design", 4OR 5:319-333, 2007 (doi:10.1007/s10288-006-0025-1, PDF).
- R. Sirdey and H. Kerivin, "A branch-and-cut algorithm for a resource-constrained scheduling problem", RAIRO Operations Research 41:235-251 (special issue on Polyhedra and Combinatorial Optimization), 2007 (doi:10.1051/ro:2007021, PDF).
- R.Sirdey, J. Carlier, H. Kerivin and D. Nace, "On a resource-constrained scheduling problem with application to distributed systems reconfiguration", European Journal of Operational Research 183:546-563, 2007 (doi:10.1016/j.ejor.2006.10.011, PDF).
- R. Sirdey and H. Kerivin, "Polyèdres et reconfiguration dynamique d'autocommutateurs répartis", Journées Polyèdres et Optimisation Combinatoire, Avignon, France, 2006 (PDF).
- R. Sirdey and H. Kerivin, "Sur le polytope des sous-tournois sans circuit", Congrès de la Roadéf, Lille, France, 2006 (PDF).
- R. Sirdey, D. Plainfossé and J.-P. Gauthier, "A practical approach to combinatorial optimization problems encountered in the design of a high-availability distributed system", Proceedings of the International Network Optimization Conference, 532-539, Evry, France, 2003.
- M. Combes, A. Coustenis, E. Gendron, O. Lai, L. Vapillon and R. Wittemberg and R. Sirdey, "Spatially resolved images of Titan by means of adaptive optics", Icarus 129:482-497, 1997 (doi:10.1006/icar.1997.5772 PDF).
- M. Combes, A. Coustenis, L. Vapillon, E. Gendron, R. Wittemberg and R. Sirdey, "Images of Titan's surface in the near-IR with ADONIS", Bulletin of the American Astronomical Society 28:1130, 1996.
Patents :
- "Méthode de contrôle d'accès à authentification conditionnée", n° dépôt FR2208881.
- "Procédé et système client-serveur anti-collusion pour données chiffrées en homomorphe", n° dépôt FR2214638.
- "Méthode d'interrogation confidentielle multi-utilisateur de la présence d'un enregistrement dans une base de données", n° dépôt FR2203495.
- "Méthode de vérification dynamique de l'intégrité d'un code machine", n° dépôt FR1914987.
- "Méthode d'apprentissage collaboratif d'un réseau de neurones artificiels sans divulgation des données d'apprentissage", n° dépôt FR1906241.
- "Méthode et système de classification confidentielle de données", n° dépôt FR1904280.
- "Méthode de transchiffrement à faible latence de calcul", n° dépôt FR1859251.
- "Méthode de classification sécurisée utilisant une opération de transchiffrement", FR3060165 A1.
- "Méthode d'interrogation confidentielle d'une base de donnees chiffrée", FR3042625 A1.
- "Méthode d'interrogation confidentielle d'un service géodépendant par cryptographie homomorphe", FR3040842 A1.
- "Système d'exécution de code avec mécanisme d'hypervision en aveugle", FR3020160 A1.
- "Procédé et dispositif d'authentification et d'exécution sécurisée de programmes", FR3011654 A1.
- "Procédé de génération d'un graphe à partir d'un code source écrit en un langage de description de processus flot de données", FR2996654 A1.
- "Système d'ordonnancement de l'exécution de tâches cadencé par un temps logique vectoriel", FR2965946 A1.
- "Segmented cache memory", FR2958765 A1.
- "Method of synchronisation within a base station system", WO/2010/083930, EP2382829 A1.
- "Procédé et dispositif pour sélectionner un des plusieurs flux de données nominalement identiques", EP1587257 A1.
Thesis:
- R. Sirdey, "Contributions à l'optimisation combinatoire pour l'embarqué : des autocommutateurs cellulaires aux microprocesseurs massivement parallèles", thèse d'Habilitation à Diriger des Recherches, Université de Technologie de Compiègne, France (PDF, TEL server).
- Defended on November the 29th, 2011 at the Institut de Physique Théorique, CEA Orme des Merisiers (PDF).
- Supervisors: Pr J. Carlier (UTC) and Pr D. Nace (UTC); referees: Pr. W. Ben-Ameur (Institut Télécom), Pr. Ph. Chrétienne (Université Paris VI) and Pr. M. Sevaux (Université de Bretagne Sud).
- R. Sirdey, "Modèles et algorithmes pour la reconfiguration de systèmes répartis utilisés en téléphonie cellulaire", PhD Thesis, Université de Technologie de Compiègne, France (PDF, TEL server).
- Defended on March the 29th, 2007 at Université de Technologie de Compiègne (PDF).
- Supervisors: Pr J. Carlier (UTC) and Pr D. Nace (UTC); referees: Pr. Ph. Baptiste (École Polytechnique) and Pr. A. R. Mahjoub (Université Paris IX).
- Work honored by the 2008 "Guy Deniélou" PhD Thesis Prize (PDF).
- R. Sirdey, "Image fusion using wavelets", MSc Thesis, Cranfield University, United-Kingdom, 1998 (PDF).
- Work honored by the 1998 Texas Instruments Prize for Digital Signal and Image Processing.
Other publications:
- R. Sirdey, A. Grivet-Sébert et C. Gouy-Pailler, « Cryptographie homomorphe : l’art de partager sans divulguer », Industrie & Technologies 1054:51-56, juin 2022.
- R. Sirdey, « Calculer sur données chiffrées à l’aide de la cryptographie homomorphe », Revue de l’Electricité et de l’Electronique (REE) 1:34-39, 2021.
- R. Sirdey, « Quand Alice rencontre Bob », Clef du CEA 70:39, 2020.
- H. Le Borgne, R. Dupont, A. Mayoue, R. Sirdey, Q.-C. Pham, « Comment doper l’Intelligence Artificielle », Clef du CEA 69:26-29, novembre 2019.
- R. Sirdey, "Se mettre d'accord entre ordinateurs - Informatique théorique", La Recherche 418:82-83, April 2008 (PDF).
- R. Sirdey, "Vérifier des programmes en prouvant des théorèmes - Programmes", La Recherche 412:98-99, October 2007 (PDF).
- R. Sirdey, "Optimiser... En découpant des polyèdres", L'Ouvert 115:51-61, July 2007 (PDF).
- R. Sirdey, "Des solutions pour faire bonne figure - Programmation linéaire", La Recherche 407:82-83, April 2007 (PDF). Reprinted in La Recherche numéro spécial jeux mathématiques:62-64, July-August 2008.
- R. Sirdey, "Sudokus et programmation linéaire", Quadrature 63:9-13, January-March 2007 (PDF).
- R. Sirdey, "Sudokus et algorithmes de recuit", Quadrature 62:7-10, October-December 2006 (PDF).
Links:
LinkedIn profile ;
Google Scholar profile ;
DBLP ;
ORCID ;
GitHub ;
ARCSI ;
mathématiques amusantes ;
relativistic ray tracing.
Last update: May. 2024