Filtrer vos résultats
- 16
- 16
- 17
- 12
- 2
- 1
- 32
- 12
- 2
- 3
- 2
- 4
- 3
- 4
- 2
- 3
- 2
- 2
- 1
- 2
- 2
- 30
- 2
- 18
- 15
- 11
- 8
- 8
- 5
- 5
- 5
- 3
- 2
- 1
- 1
- 1
- 32
- 17
- 7
- 5
- 5
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
32 résultats
|
|
triés par
|
|
Folding Alternant and Goppa Codes with Non-Trivial Automorphism GroupsIEEE Transactions on Information Theory, 2016, 62 (1), pp.184-198. ⟨10.1109/TIT.2015.2493539⟩
Article dans une revue
hal-00992389v1
|
||
|
Polynomial Time Attack on Wild McEliece Over Quadratic ExtensionsIEEE Transactions on Information Theory, 2017, 63 (1), pp.404--427. ⟨10.1109/TIT.2016.2574841⟩
Article dans une revue
hal-01661935v1
|
||
|
Algebraic Cryptanalysis of McEliece Variants with Compact KeysEurocrypt 2010 - 29th International Conference on Cryptology, May 2010, Monaco, Monaco. pp.279-298, ⟨10.1007/978-3-642-13190-5_14⟩
Communication dans un congrès
inria-00596632v1
|
||
|
Structural Cryptanalysis of McEliece Schemes with Compact KeysDesigns, Codes and Cryptography, 2016, 79 (1), pp.87-112. ⟨10.1007/s10623-015-0036-z⟩
Article dans une revue
hal-00964265v1
|
||
|
Low Complexity Tail-Biting Trellises for Some Extremal Self-Dual CodesEighth Algebraic and Combinatorial Coding Theory (ACCT VIII), Sep 2002, St.Petersburg, Russia. pp.214-218
Communication dans un congrès
hal-00921851v1
|
||
Experimental constructions of codes over rings and construction of an optimal unimodular lattice in dimensionACCT, 2002, France. pp.128-131
Communication dans un congrès
hal-00110493v1
|
|||
|
Polynomial Time Attack on Wild McEliece Over Quadratic ExtensionsAdvances in Cryptology - Eurocrypt 2014, May 2014, Copenhagen, Denmark. pp.17-39, ⟨10.1007/978-3-642-55220-5_2⟩
Communication dans un congrès
hal-00931774v1
|
||
|
Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codesDesigns, Codes and Cryptography, 2014, 73 (2), pp.641-666. ⟨10.1007/s10623-014-9967-z⟩
Article dans une revue
hal-01096172v1
|
||
|
An Efficient Attack on All Concrete KKS ProposalsPost-Quantum Cryptography - PQCrypto 2011, Nov 2011, Taipei, Taiwan. pp.98-116, ⟨10.1007/978-3-642-25405-5_7⟩
Communication dans un congrès
hal-00913500v1
|
||
|
Distinguisher-Based Attacks on Public-Key Cryptosystems Using Reed-Solomon CodesInternational Workshop on Coding and Cryptography - WCC 2013, Apr 2013, Bergen, Norway. pp.181-193
Communication dans un congrès
hal-00830594v1
|
||
|
On Kabatianskii-Krouk-Smeets SignaturesLecture Notes in Computer Science, 2007, pp.237-251
Article dans une revue
hal-00259021v1
|
||
|
A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon CodesDesigns, Codes and Cryptography, 2012, 11 p. ⟨10.48550/arXiv.1203.6686⟩
Article dans une revue
hal-01085871v1
|
||
|
Permutation Code Equivalence is Not Harder Than Graph Isomorphism When Hulls Are Trivial2019 IEEE International Symposium on Information Theory (ISIT), Jul 2019, Paris, France. pp.2464-2468, ⟨10.1109/ISIT.2019.8849855⟩
Communication dans un congrès
hal-02310495v1
|
||
|
Contribution à la cryptanalyse de primitives cryptographiques fondées sur la théorie des codesInformatique [cs]. Université de Caen Basse Normandie, 2011
HDR
tel-01138792v1
|
||
|
On the Minimum Distance of Generalized LDPC Codes2007 IEEE International Symposium on Information Theory, Jun 2007, Nice, France. pp.751-755
Communication dans un congrès
hal-00259015v1
|
||
|
A Distinguisher-Based Attack on a Variant of McEliece's Cryptosystem Based on Reed-Solomon Codes2012
Autre publication scientifique
hal-01085881v1
|
||
|
Polynomial-time key recovery attack on the Faure–Loidreau scheme based on Gabidulin codesDesigns, Codes and Cryptography, 2018, 86 (7), pp.1391-1403. ⟨10.1007/s10623-017-0402-0⟩
Article dans une revue
hal-02088213v1
|
||
|
New identities relating wild Goppa codesFinite Fields and Their Applications, 2014, 29, pp.178-197. ⟨10.1016/j.ffa.2014.04.007⟩
Article dans une revue
hal-00880994v1
|
||
Etude d'un système de chiffrement de type McEliece à base de codes polairesJournées Codage et Cryptographie 2015, Oct 2015, La Londe-les-Maures, France
Communication dans un congrès
hal-01240843v1
|
|||
|
Cryptanalysis of the McEliece Public Key Cryptosystem based on Polar CodesPost-Quantum Cryptography - PQCrypto 2016, Feb 2016, Fukuoka, Japan. ⟨10.1007/978-3-319-29360-8_9⟩
Communication dans un congrès
hal-01240856v1
|
||
|
Practical Algebraic Attack on DAGSCBC 2019 - 7th Code-Based Cryptography Workshop, May 2019, Darmstadt, Germany. pp.86-101, ⟨10.1007/978-3-030-25922-8_5⟩
Communication dans un congrès
hal-02125330v1
|
||
|
Improved cryptanalysis of rank metric schemes based on Gabidulin codesDesigns, Codes and Cryptography, 2018, 86 (9), pp.1983-1996. ⟨10.1007/s10623-017-0434-5⟩
Article dans une revue
hal-02189601v1
|
||
|
A Distinguisher for High Rate McEliece CryptosystemsIEEE Transactions on Information Theory, 2013, 59 (10), pp.6830-6844. ⟨10.1109/TIT.2013.2272036⟩
Article dans une revue
hal-00776068v1
|
||
|
Reducing Key Length of the McEliece CryptosystemProceedings of Second International Conference on Cryptology - AFRICACRYPT 2009, Jun 2009, Gammarth, Tunisia. pp.77 - 97, ⟨10.1007/978-3-642-02384-2_6⟩
Communication dans un congrès
hal-01081727v1
|
||
|
Cryptanalysis of an identity-based authenticated key exchange protocolInternational Journal of Communication Systems, 2018, 31 (3), pp.e3477. ⟨10.1002/dac.3477⟩
Article dans une revue
hal-02310479v1
|
||
|
BIG QUAKE BInary Goppa QUAsi–cyclic Key Encapsulation2017
Autre publication scientifique
hal-01671866v1
|
||
Structural weakness of compact variants of the McEliece cryptosystemIEEE International Symposium on Information Theory - ISIT 2014, Jun 2014, Honolulu, United States. pp.1717-1721
Communication dans un congrès
hal-01096180v1
|
|||
Weak Keys for the Quasi-Cyclic MDPC Public Key Encryption SchemeAFRICACRYPT 2016 (8th International Conference on Cryptology in Africa), Apr 2016, Fes, Morocco. pp.346-367, ⟨10.1007/978-3-319-31517-1_18⟩
Communication dans un congrès
hal-02087520v1
|
|||
|
Algebraic properties of polar codes from a new polynomial formalismInternational Symposium on Information Theory ISIT 2016, Jul 2016, Barcelona, Spain. pp.230 - 234, ⟨10.1109/ISIT.2016.7541295⟩
Communication dans un congrès
hal-01410210v1
|
||
|
A Polynomial-Time Attack on the BBCRS SchemePractice and Theory in Public-Key Cryptography - PKC 2015, Mar 2015, Washington, United States
Communication dans un congrès
hal-01104078v1
|
- 1
- 2