Skip to Main content Skip to Navigation

inria-00509188v2  Conference papers
Daniel AugotMatthieu FiniaszNicolas Sendrier. A Family of Fast Syndrome Based Cryptographic Hash Functions
MYCRYPT 2005 : First International Conference on Cryptology in Malaysia, Sep 2005, Kuala Lumpur, Malaysia. pp.64-83, ⟨10.1007/11554868_6⟩
hal-01188935v1  Conference papers
Daniel AugotFrançoise Levy-Dit-VehelMan Cuong Ngô. Information Sets of Multiplicity Codes
Information Theory (ISIT), 2015 IEEE International Symposium on , Jun 2015, Hong-Kong, China. pp.2401 - 2405, ⟨10.1109/ISIT.2015.7282886⟩
hal-00741923v1  Directions of work or proceedings
Daniel AugotAnne CanteautGohar KyureghyanFaina Solov'EvaØyvind Ytrehus. Editorial
Daniel Augot and Anne Canteaut and Gohar Kyureghyan and Faina Solov'eva and Øyvind Ytrehus. Springer, pp.2, 2012, Designs, Codes and Cryptography, ⟨10.1007/s10623-012-9731-1⟩
hal-00931522v1  Directions of work or proceedings
Daniel AugotAnne CanteautGohar KyureghyanFaina Solov'EvaØyvind Ytrehus. Designs, Codes and Cryptography (Special Issue in Coding and Cryptography)
Daniel Augot and Anne Canteaut and Gohar Kyureghyan and Faina Solov'Eva and Øyvind Ytrehus. 66, Springer, pp.399, 2013, 0925-1022
inria-00550061v1  Book sections
Daniel AugotEmmanuela OrsiniEmanuele Betti. An introduction to linear and cyclic codes
Sala, Massimiliano and Mora, Teo and Perret, Ludovic and Sakata, Shojiro and Traverso, Carlo. Gröbner Bases, Coding, and Cryptography, Springer-Verlag, pp.47-68, 2009, Gröbner Bases, Coding, and Cryptography, ⟨10.1007/978-3-540-93806-4_4⟩
inria-00123312v1  Conference papers
Daniel AugotMagali BardetJean-Charles Faugère. On formulas for decoding binary cyclic codes
IEEE International Symposium on Information Theory, 2007 (ISIT 2007), Jun 2007, Nice, France. pp.2646-2650, ⟨10.1109/ISIT.2007.4557618⟩
inria-00543322v1  Conference papers
Daniel Augot. Les codes algébriques principaux et leur décodage
Journées Nationales de Calcul Formel, Jean-Guillaume Dumas, Grégoire Lecerf, Delphine Boucher et Thomas Cluzeau, May 2010, Luminy, France. pp.31-74
hal-00723837v1  Conference papers
Daniel AugotJean-François DelaigleCaroline Fontaine. DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System
ESORICS 98 : 5th European Symposium on Research in Computer Security, Sep 1998, Louvain-la-Neuve, Belgium. pp.241-255, ⟨10.1007/BFb0055867⟩
hal-00643794v1  Conference papers
Daniel AugotMorgan BarbierAlain Couvreur. List-Decoding of Binary Goppa Codes up to the Binary Johnson Bound
IEEE Information Theory Workshop, Oct 2011, Paraty, Brazil. pp.229 - 233, ⟨10.1109/ITW.2011.6089384⟩
hal-01216856v1  Conference papers
ISIT 2991, Jun 1991, Budapest, Hungary. pp.7-7
hal-00823082v1  Conference papers
Daniel AugotMatthieu Finiasz. Exhaustive Search for Small Dimension Recursive MDS Diffusion Layers for Block Ciphers and Hash Functions
International Symposium on Information Theory (ISIT), 2013, Istambul, Turkey
inria-00414950v1  Conference papers
Daniel AugotRaghav BhaskarValérie IssarnyDaniele Sacchetti. An Efficient Group Key Agreement Protocol for Ad Hoc Networks
International Conference on a World of Wireless, Mobile and Multimedia Networks : WOWMOM 2005, 2005, Taormina, Italy. pp.576-580
hal-01611297v1  Conference papers
Daniel AugotHervé ChabanneOlivier ClémotWilliam George. Transforming face-to-face identity proofing into anonymous digital identity using the Bitcoin blockchain
PST 2017 - International Conference on Privacy, Security and Trust, Aug 2017, Calgary, Canada. pp.1-10
hal-01094843v1  Conference papers
Daniel Augot. Generalization of Gabidulin Codes over Fields of Rational Functions
21st International Symposium on Mathematical Theory of Networks and Systems (MTNS 2014), Jul 2014, Groningen, Netherlands
hal-01094807v1  Conference papers
Daniel AugotFrançoise Levy-Dit-VehelAbdullatif Shikfa. A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers
13th International Conference, Cryptology and Network Security (CANS), Oct 2014, Heraklion, Greece. pp.222 - 239, ⟨10.1007/978-3-319-12280-9_15⟩
inria-00564022v1  Book sections
Daniel AugotMichael Stepanov. A note on the generalisation of the Guruswami-Sudan list decoding algorithm to Reed-Muller codes
Massimiliano Sala and Teo Mora and Ludovic Perret and Shojiro Sakata and Carlo Traverso. Gröbner Bases, Coding, and Cryptography, 2, Springer, pp.395-398, 2009, ⟨10.1007/978-3-540-93806-4_27⟩
inria-00633205v1  Journal articles
Alexander ZehChristian GentnerDaniel Augot. An Interpolation Procedure for List Decoding Reed--Solomon codes Based on Generalized Key Equations
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2011, 57, pp.5946-5959. ⟨10.1109/TIT.2011.2162160⟩
hal-00723735v1  Journal articles
Daniel AugotNicolas Sendrier. Idempotents and the BCH bound
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 1994, 40 (1), pp.204-207. ⟨10.1109/18.272483⟩