Skip to Main content Skip to Navigation


...
inria-00509478v1  Journal articles
Daniel AugotFrançoise Levy-Dit-Vehel. Bounds on the minimum distance of the duals of BCH codes
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 1996, 42 (4), pp.1257 - 1260. ⟨10.1109/18.508853⟩
...
hal-01094807v1  Conference papers
Daniel AugotFrançoise Levy-Dit-VehelAbdullatif Shikfa. A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers
13th International Conference, Cryptology and Network Security (CANS), Oct 2014, Heraklion, Greece. pp.222 - 239, ⟨10.1007/978-3-319-12280-9_15⟩
...
inria-00509482v1  Conference papers
Daniel AugotFrançoise Levy-Dit-Vehel. Bounds on the minimum distance of the duals of BCH codes
1994 IEEE International Symposium on Information Theory, Jun 1994, Trondheim, Norway. pp.43, ⟨10.1109/ISIT.1994.394928⟩
...
hal-01188935v1  Conference papers
Daniel AugotFrançoise Levy-Dit-VehelMan Cuong Ngô. Information Sets of Multiplicity Codes
Information Theory (ISIT), 2015 IEEE International Symposium on , Jun 2015, Hong-Kong, China. pp.2401 - 2405, ⟨10.1109/ISIT.2015.7282886⟩
...
hal-01413159v1  Conference papers
Julien LavauzelleFrançoise Levy-Dit-Vehel. New proofs of retrievability using locally decodable codes
International Symposium on Information Theory ISIT 2016, Jul 2016, Barcelona, Spain. pp.1809 - 1813, ⟨10.1109/ISIT.2016.7541611⟩
...
hal-02053948v1  Journal articles
Julien LavauzelleFrançoise Levy-Dit-Vehel. Generic constructions of PoRs from codes and instantiations
Journal of Mathematical Cryptology, De Gruyter, In press, 13 (2), pp.81--106. ⟨10.1515/jmc-2018-0018⟩
hal-00976374v1  Conference papers
Jean-Charles FaugèreFrançoise Levy-Dit-VehelLudovic Perret. Cryptanalysis of MinRank
CRYPTO 2008 - 28th Annual International Cryptology Conference, Aug 2008, Santa Barbara, CA, United States. pp.280-296, ⟨10.1007/978-3-540-85174-5_16⟩
hal-00974889v1  Journal articles
Françoise Levy-Dit-VehelLudovic Perret. Security Analysis of Word Problem-Based Cryptosystems
Designs, Codes and Cryptography, Springer Verlag, 2010, 54 (1), pp.29-41. ⟨10.1007/s10623-009-9307-x⟩