Skip to Main content Skip to Navigation
Help


...
inria-00633205v1  Journal articles
Alexander ZehChristian GentnerDaniel Augot. An Interpolation Procedure for List Decoding Reed--Solomon codes Based on Generalized Key Equations
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2011, 57, pp.5946-5959. ⟨10.1109/TIT.2011.2162160⟩
...
inria-00509188v2  Conference papers
Daniel AugotMatthieu FiniaszNicolas Sendrier. A Family of Fast Syndrome Based Cryptographic Hash Functions
MYCRYPT 2005 : First International Conference on Cryptology in Malaysia, Sep 2005, Kuala Lumpur, Malaysia. pp.64-83, ⟨10.1007/11554868_6⟩
...
hal-01188935v1  Conference papers
Daniel AugotFrançoise Levy-Dit-VehelMan Cuong Ngô. Information Sets of Multiplicity Codes
Information Theory (ISIT), 2015 IEEE International Symposium on , Jun 2015, Hong-Kong, China. pp.2401 - 2405, ⟨10.1109/ISIT.2015.7282886⟩
...
inria-00543322v1  Conference papers
Daniel Augot. Les codes algébriques principaux et leur décodage
Journées Nationales de Calcul Formel, Jean-Guillaume Dumas, Grégoire Lecerf, Delphine Boucher et Thomas Cluzeau, May 2010, Luminy, France. pp.31-74
hal-01503212v1  Journal articles
Daniel AugotPierre LoidreauGwezheneg Robert. Generalized Gabidulin codes over fields of any characteristic
Designs, Codes and Cryptography, Springer Verlag, 2018, 86 (8), pp.1807-1848. ⟨10.1007/s10623-017-0425-6⟩
...
tel-00723227v1  Theses
Daniel Augot. Étude algèbrique des mots de poids minimum des codes cycliques, méthodes d'algèbre linéaire sur les corps finis.
Théorie de l'information [cs.IT]. Université Pierre et Marie Curie - Paris VI, 1993. Français
...
hal-01216856v1  Conference papers
Daniel AugotPascale CharpinNicolas Sendrier. ON THE MINIMUM WEIGHT CODEWORDS OF SOME BINARY BCH CODES
ISIT 2991, Jun 1991, Budapest, Hungary. pp.7-7
...
inria-00550061v1  Book sections
Daniel AugotEmmanuela OrsiniEmanuele Betti. An introduction to linear and cyclic codes
Sala, Massimiliano and Mora, Teo and Perret, Ludovic and Sakata, Shojiro and Traverso, Carlo. Gröbner Bases, Coding, and Cryptography, Springer-Verlag, pp.47-68, 2009, Gröbner Bases, Coding, and Cryptography, ⟨10.1007/978-3-540-93806-4_4⟩
...
inria-00123312v1  Conference papers
Daniel AugotMagali BardetJean-Charles Faugère. On formulas for decoding binary cyclic codes
IEEE International Symposium on Information Theory, 2007 (ISIT 2007), Jun 2007, Nice, France. pp.2646-2650, ⟨10.1109/ISIT.2007.4557618⟩
inria-00509213v1  Directions of work or proceedings
Daniel AugotJean-Charles FaugèreLudovic Perret. Gröbner Bases in Cryptography, Coding Theory, and Algebraic Combinatorics
Augot, Daniel; Faugère, Jean-Charles; Perret, Ludovic. France. 44 (12), Elsevier, pp.1605-1724, 2009, Journal of Symbolic Computation, ⟨10.1016/j.jsc.2008.11.004⟩
hal-00931522v1  Directions of work or proceedings
Daniel AugotAnne CanteautGohar KyureghyanFaina Solov'EvaØyvind Ytrehus. Designs, Codes and Cryptography (Special Issue in Coding and Cryptography)
Daniel Augot and Anne Canteaut and Gohar Kyureghyan and Faina Solov'Eva and Øyvind Ytrehus. 66, Springer, pp.399, 2013, 0925-1022
...
tel-00159149v1  Habilitation à diriger des recherches
Daniel Augot. Décodage des codes algébriques et cryptographie
Génie logiciel [cs.SE]. Université Pierre et Marie Curie - Paris VI, 2007
...
hal-00643794v1  Conference papers
Daniel AugotMorgan BarbierAlain Couvreur. List-Decoding of Binary Goppa Codes up to the Binary Johnson Bound
IEEE Information Theory Workshop, Oct 2011, Paraty, Brazil. pp.229 - 233, ⟨10.1109/ITW.2011.6089384⟩
...
hal-00723837v1  Conference papers
Daniel AugotJean-François DelaigleCaroline Fontaine. DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System
ESORICS 98 : 5th European Symposium on Research in Computer Security, Sep 1998, Louvain-la-Neuve, Belgium. pp.241-255, ⟨10.1007/BFb0055867⟩
...
inria-00509219v1  Journal articles
Daniel AugotMagali BardetJean-Charles Faugère. On the decoding of binary cyclic codes with the Newton's identities
Journal of Symbolic Computation, Elsevier, 2009, Gröbner Bases in Cryptography, Coding Theory, and Algebraic Combinatorics, 44 (12), pp.1608-1625. ⟨10.1016/j.jsc.2008.02.006⟩
...
hal-01094843v1  Conference papers
Daniel Augot. Generalization of Gabidulin Codes over Fields of Rational Functions
21st International Symposium on Mathematical Theory of Networks and Systems (MTNS 2014), Jul 2014, Groningen, Netherlands
...
hal-01044597v2  Conference papers
Daniel AugotMatthieu Finiasz. Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes
21st International Workshop on Fast Software Encryption, FSE 2014, London, UK, March 3-5, Mar 2014, London, United Kingdom. pp.3-17, ⟨10.1007/978-3-662-46706-0_1⟩
...
hal-01094807v1  Conference papers
Daniel AugotFrançoise Levy-Dit-VehelAbdullatif Shikfa. A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers
13th International Conference, Cryptology and Network Security (CANS), Oct 2014, Heraklion, Greece. pp.222 - 239, ⟨10.1007/978-3-319-12280-9_15⟩
inria-00564022v1  Book sections
Daniel AugotMichael Stepanov. A note on the generalisation of the Guruswami-Sudan list decoding algorithm to Reed-Muller codes
Massimiliano Sala and Teo Mora and Ludovic Perret and Shojiro Sakata and Carlo Traverso. Gröbner Bases, Coding, and Cryptography, 2, Springer, pp.395-398, 2009, ⟨10.1007/978-3-540-93806-4_27⟩
hal-00741923v1  Directions of work or proceedings
Daniel AugotAnne CanteautGohar KyureghyanFaina Solov'EvaØyvind Ytrehus. Editorial
Daniel Augot and Anne Canteaut and Gohar Kyureghyan and Faina Solov'eva and Øyvind Ytrehus. Springer, pp.2, 2012, Designs, Codes and Cryptography, ⟨10.1007/s10623-012-9731-1⟩
...
hal-00723737v1  Journal articles
Daniel AugotJean-Marc BoucqueauJean-François DelaigleCaroline FontaineEddy Goray. Secure Delivery of Images over Open Networks
Proceedings of the IEEE, Institute of Electrical and Electronics Engineers, 1999, 87 (7), pp.1251 - 1266. ⟨10.1109/5.771076⟩
...
inria-00509468v1  Conference papers
Daniel Augot. Algebraic Solutions of Newton's identities for cyclic codes
1998 Information Theory Workshop, Aug 1998, Killarney, Ireland. pp.49, ⟨10.1109/ITW.1998.706411⟩
...
inria-00509482v1  Conference papers
Daniel AugotFrançoise Levy-Dit-Vehel. Bounds on the minimum distance of the duals of BCH codes
1994 IEEE International Symposium on Information Theory, Jun 1994, Trondheim, Norway. pp.43, ⟨10.1109/ISIT.1994.394928⟩
...
inria-00509424v1  Conference papers
Daniel Augot. Newton's identities for minimum codewords of a family of alternant codes
1995 IEEE International Symposium on Information Theory, Sep 1995, Whistler, Canada. pp.349, ⟨10.1109/ISIT.1995.550336⟩
...
inria-00509269v1  Conference papers
Daniel AugotMagali BardetJean-Charles Faugère. Efficient decoding of (binary) cyclic codes above the correction capacity of the code using Grobner bases
IEEE International Symposium on Information Theory - ISIT'2003, Jun 2003, Yokohama, Japan. pp.362 - 362, ⟨10.1109/ISIT.2003.1228378⟩
...
inria-00509209v1  Conference papers
Daniel AugotAlexander Zeh. On the Roth and Ruckenstein equations for the Guruswami-Sudan algorithm
Information Theory, 2008. ISIT 2008. IEEE International Symposium on, Jul 2008, Toronto, Canada. pp.2620-2624, ⟨10.1109/ISIT.2008.4595466⟩
...
hal-00723500v1  Journal articles
Daniel Augot. Description of minimum weight codewords of cyclic codes by algebraic systems
Finite Fields and Their Applications, Elsevier, 1996, pp.138-152. ⟨10.1006/ffta.1996.0009⟩
...
inria-00547445v1  Conference papers
Daniel Augot. Problématique des bons codes sur le corps à deux éléments
Journées de la Société Mathémarique de France, Jun 2010, Paris, France
hal-02347238v1  Conference papers
Daniel AugotHervé ChabanneWilliam George. Practical Solutions to Save Bitcoins Applied to an Identity System Proposal
ICISSP 2019 - 5th International Conference on Information Systems Security and Privacy, Feb 2019, Prague, Czech Republic. pp.511-518, ⟨10.5220/0007443905110518⟩
...
hal-01611251v1  Conference papers
Daniel AugotHervé ChabanneThomas ChenevierWilliam GeorgeLaurent Lamber. A User-Centric System for Verified Identities on the Bitcoin Blockchain
International Workshop on Cryptocurrencies and Blockchain Technology - CBT'17, Sep 2017, Oslo, Norway
...
hal-00723735v1  Journal articles
Daniel AugotNicolas Sendrier. Idempotents and the BCH bound
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 1994, 40 (1), pp.204-207. ⟨10.1109/18.272483⟩
...
hal-00723733v1  Journal articles
Daniel AugotPascale CharpinNicolas Sendrier. Studying the Locator Polynomials of Minimum Weight Codewords of BCH Codes
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 1992, 38 (3), pp.960-973. ⟨10.1109/18.135638⟩
...
inria-00509339v1  Journal articles
Daniel AugotLancelot Pecquet. A Hensel Lifting to Replace Factorization in List-Decoding of Algebraic-Geometric and Reed-Solomon Codes
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2000, 46 (7), pp.2605 - 2614. ⟨10.1109/18.887868⟩
...
inria-00509478v1  Journal articles
Daniel AugotFrançoise Levy-Dit-Vehel. Bounds on the minimum distance of the duals of BCH codes
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 1996, 42 (4), pp.1257 - 1260. ⟨10.1109/18.508853⟩
...
hal-00823535v1  Conference papers
Daniel AugotPierre LoidreauGwezheneg Robert. Rank metric and Gabidulin codes in characteristic zero
ISIT 2013 IEEE International Symposium on Information Theory, Amos Lapidoth and Igal Sason and Jossy Sayir and Emre Telatar, Jul 2013, Istanbul, Turkey
hal-00823082v1  Conference papers
Daniel AugotMatthieu Finiasz. Exhaustive Search for Small Dimension Recursive MDS Diffusion Layers for Block Ciphers and Hash Functions
International Symposium on Information Theory (ISIT), 2013, Istambul, Turkey
...
inria-00414950v1  Conference papers
Daniel AugotRaghav BhaskarValérie IssarnyDaniele Sacchetti. An Efficient Group Key Agreement Protocol for Ad Hoc Networks
International Conference on a World of Wireless, Mobile and Multimedia Networks : WOWMOM 2005, 2005, Taormina, Italy. pp.576-580
...
hal-01611297v1  Conference papers
Daniel AugotHervé ChabanneOlivier ClémotWilliam George. Transforming face-to-face identity proofing into anonymous digital identity using the Bitcoin blockchain
PST 2017 - International Conference on Privacy, Security and Trust, Aug 2017, Calgary, Canada. pp.1-10
...
hal-00643774v1  Conference papers
Frederik ArmknechtDaniel AugotLudovic PerretAhmad-Reza Sadeghi. On Constructing Homomorphic Encryption Schemes from Coding Theory
13th IMA International Conference on Cryptography and Coding, Institute of Mathematics and its Applications (IMA), Dec 2011, Oxford, United Kingdom. pp.23-40, ⟨10.1007/978-3-642-25516-8_3⟩