{"id":334,"date":"2023-09-28T16:01:02","date_gmt":"2023-09-28T14:01:02","guid":{"rendered":"https:\/\/members.loria.fr\/ARodriguezCordero\/?p=334"},"modified":"2023-09-28T16:47:50","modified_gmt":"2023-09-28T14:47:50","slug":"margarita-cordero","status":"publish","type":"post","link":"https:\/\/members.loria.fr\/ARodriguezCordero\/margarita-cordero\/","title":{"rendered":"Margarita Cordero"},"content":{"rendered":"<h1>About me<\/h1>\n<p>I am a Ph.D. student at <a href=\"http:\/\/loria.fr\">LORIA<\/a> Nancy. I work at the <a href=\"http:\/\/inria.fr\">INRIA<\/a> and LORIA&rsquo;s team <a href=\"https:\/\/caramba.loria.fr\/index.en.html\">CARAMBA<\/a>, under the supervision of <a href=\"http:\/\/members.loria.fr\/VLallemand\">Virginie Lallemand<\/a> and <a href=\"http:\/\/members.loria.fr\/MMinier\/static\">Marine Minier.<\/a><\/p>\n<p>My Ph.D. <span class=\"ILfuVd\" lang=\"fr\"><span class=\"hgKElc\">dissertation<\/span><\/span> focuses on the cryptanalysis of symmetric key primitives, mainly block ciphers<\/p>\n<h1>Talks<\/h1>\n<ul>\n<li><span dir=\"ltr\" role=\"presentation\">On Impossible Boomerang <\/span><span dir=\"ltr\" role=\"presentation\">Attacks. Journ\u00e9es C2 2023. [Slides]<br \/>\n<\/span><\/li>\n<li>T-wise independence for block ciphers. Journ\u00e9es de Departament 2023. [Slides]<\/li>\n<li><span dir=\"ltr\" role=\"presentation\">Semi-automatic tool for test case <\/span><span dir=\"ltr\" role=\"presentation\">generation on X.509 parser. REDOCS 2022. [<a href=\"https:\/\/members.loria.fr\/ARodriguezCordero\/files\/REDOCS'22.pdf\">Slides<\/a>]<br \/>\n<\/span><\/li>\n<li>Cluster Search and MILP Modeling for Differential Attacks. Team Seminar 2022. [<a href=\"https:\/\/members.loria.fr\/ARodriguezCordero\/files\/202210271030.pdf\">Slides<\/a>]<\/li>\n<li>Differential cryptanalysis and cluster search. Journ\u00e9es de Departament 2022. [Slides]<\/li>\n<li><span dir=\"ltr\" role=\"presentation\">Tool for Automatically Generation of Abstraction-based <\/span><span dir=\"ltr\" role=\"presentation\">Differential Attacks. Journ\u00e9es C2 2022. [<a href=\"https:\/\/members.loria.fr\/ARodriguezCordero\/files\/JC22022.pdf\">Slides<\/a>]<br \/>\n<\/span><\/li>\n<\/ul>\n<h1>Teaching<\/h1>\n<ul>\n<li>2024 spring semester. Operational research, first-year \u00c9cole des Mines, Nancy.<\/li>\n<li>2023 fall semester. Machine learning, second-year \u00c9cole des Mines, Nancy.<\/li>\n<li>2023 fall semester. Algorithms and complexity, first-year \u00c9cole des Mines, Nancy.<\/li>\n<li>2023 spring semester. Algorithms and complexity, first-year \u00c9cole des Mines, Nancy.<\/li>\n<li>2023 spring semester. Operational research, first-year \u00c9cole des Mines, Nancy.<\/li>\n<li>2022 fall semester. Programming and data structures, first-year \u00c9cole des Mines, Nancy.<\/li>\n<\/ul>\n<h1>Education<\/h1>\n<ul>\n<li>Currently &#8211; <strong>Ph.D. in Computer Science. <\/strong>Design and Cryptanalysis of New Symmetric Key Cryptographic Primitives. Universit\u00e9 de Lorraine, Nancy, France.<\/li>\n<li>2021 &#8211; <strong>Master in Cybersecurity.<\/strong> ENSIMAG &#8211; UGA, Grenoble, France.<\/li>\n<li>2020 &#8211; <strong>Degree in Mathematics. <\/strong>Universidad de Valladolid, Valladolid, Spain.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>About me<\/p>\n<p>I am a Ph.D. student at <a href=\"http:\/\/loria.fr\">LORIA<\/a> Nancy. I work at the <a href=\"http:\/\/inria.fr\">INRIA<\/a> and LORIA&rsquo;s team <a href=\"https:\/\/caramba.loria.fr\/index.en.html\">CARAMBA<\/a>, under the supervision of <a href=\"http:\/\/members.loria.fr\/VLallemand\">Virginie Lallemand<\/a> and <a href=\"http:\/\/members.loria.fr\/MMinier\/static\">Marine Minier.<\/a><\/p>\n<p>My Ph.D. dissertation focuses on the cryptanalysis of symmetric key primitives, mainly block ciphers<\/p>\n<p>Talks<\/p>\n<ul>\n<li>On Impossible Boomerang Attacks. Journ\u00e9es C2 2023. [Slides]\n<\/li>\n<li>T-wise independence for block ciphers. Journ\u00e9es de Departament 2023. [Slides]<\/li>\n<li>Semi-automatic tool for test case generation on X.509 parser. REDOCS 2022. [<a href=\"https:\/\/members.loria.fr\/ARodriguezCordero\/files\/REDOCS'22.pdf\">Slides<\/a>]\n<\/li>\n<li>Cluster Search and MILP Modeling for Differential Attacks.<\/li>\n<\/ul>\n","protected":false},"author":228,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-334","post","type-post","status-publish","format-standard","hentry","category-non-classe"],"_links":{"self":[{"href":"https:\/\/members.loria.fr\/ARodriguezCordero\/wp-json\/wp\/v2\/posts\/334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/members.loria.fr\/ARodriguezCordero\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/members.loria.fr\/ARodriguezCordero\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/ARodriguezCordero\/wp-json\/wp\/v2\/users\/228"}],"replies":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/ARodriguezCordero\/wp-json\/wp\/v2\/comments?post=334"}],"version-history":[{"count":5,"href":"https:\/\/members.loria.fr\/ARodriguezCordero\/wp-json\/wp\/v2\/posts\/334\/revisions"}],"predecessor-version":[{"id":351,"href":"https:\/\/members.loria.fr\/ARodriguezCordero\/wp-json\/wp\/v2\/posts\/334\/revisions\/351"}],"wp:attachment":[{"href":"https:\/\/members.loria.fr\/ARodriguezCordero\/wp-json\/wp\/v2\/media?parent=334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/members.loria.fr\/ARodriguezCordero\/wp-json\/wp\/v2\/categories?post=334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/members.loria.fr\/ARodriguezCordero\/wp-json\/wp\/v2\/tags?post=334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}