Skip to Main content Skip to Navigation


...
hal-03345605v1  Conference papers
Lucas BenmouffokKalpana SinghNicolas HeulotDaniel Augot. Privacy-Preserving Initial Public Offering using SCALE-MAMBA and Hyperledger Fabric
ChainTech’2021 is a track of WETICE : the 31st IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, Oct 2021, Basque Coast, Bayonne, France
hal-02882019v1  Journal articles
Daniel AugotAlain CouvreurJulien LavauzelleAlessandro Neri. Rank-metric codes over arbitrary Galois extensions and rank analogues of Reed-Muller codes
SIAM Journal on Applied Algebra and Geometry, Society for Industrial and Applied Mathematics 2021, 5 (2), pp.165-199. ⟨10.1137/20M1348583⟩
hal-02347238v1  Conference papers
Daniel AugotHervé ChabanneWilliam George. Practical Solutions to Save Bitcoins Applied to an Identity System Proposal
ICISSP 2019 - 5th International Conference on Information Systems Security and Privacy, Feb 2019, Prague, Czech Republic. pp.511-518, ⟨10.5220/0007443905110518⟩
hal-01503212v1  Journal articles
Daniel AugotPierre LoidreauGwezheneg Robert. Generalized Gabidulin codes over fields of any characteristic
Designs, Codes and Cryptography, Springer Verlag, 2018, 86 (8), pp.1807-1848. ⟨10.1007/s10623-017-0425-6⟩
...
hal-01611251v1  Conference papers
Daniel AugotHervé ChabanneThomas ChenevierWilliam GeorgeLaurent Lamber. A User-Centric System for Verified Identities on the Bitcoin Blockchain
International Workshop on Cryptocurrencies and Blockchain Technology - CBT'17, Sep 2017, Oslo, Norway
...
hal-01611297v1  Conference papers
Daniel AugotHervé ChabanneOlivier ClémotWilliam George. Transforming face-to-face identity proofing into anonymous digital identity using the Bitcoin blockchain
PST 2017 - International Conference on Privacy, Security and Trust, Aug 2017, Calgary, Canada. pp.1-10
...
hal-01188935v1  Conference papers
Daniel AugotFrançoise Levy-Dit-VehelMan Cuong Ngô. Information Sets of Multiplicity Codes
Information Theory (ISIT), 2015 IEEE International Symposium on , Jun 2015, Hong-Kong, China. pp.2401 - 2405, ⟨10.1109/ISIT.2015.7282886⟩
...
hal-01094807v1  Conference papers
Daniel AugotFrançoise Levy-Dit-VehelAbdullatif Shikfa. A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers
13th International Conference, Cryptology and Network Security (CANS), Oct 2014, Heraklion, Greece. pp.222 - 239, ⟨10.1007/978-3-319-12280-9_15⟩
...
hal-01094843v1  Conference papers
Daniel Augot. Generalization of Gabidulin Codes over Fields of Rational Functions
21st International Symposium on Mathematical Theory of Networks and Systems (MTNS 2014), Jul 2014, Groningen, Netherlands
...
hal-01044597v2  Conference papers
Daniel AugotMatthieu Finiasz. Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes
21st International Workshop on Fast Software Encryption, FSE 2014, London, UK, March 3-5, Mar 2014, London, United Kingdom. pp.3-17, ⟨10.1007/978-3-662-46706-0_1⟩
...
hal-00823535v1  Conference papers
Daniel AugotPierre LoidreauGwezheneg Robert. Rank metric and Gabidulin codes in characteristic zero
ISIT 2013 IEEE International Symposium on Information Theory, Amos Lapidoth and Igal Sason and Jossy Sayir and Emre Telatar, Jul 2013, Istanbul, Turkey
hal-00823082v1  Conference papers
Daniel AugotMatthieu Finiasz. Exhaustive Search for Small Dimension Recursive MDS Diffusion Layers for Block Ciphers and Hash Functions
International Symposium on Information Theory (ISIT), 2013, Istambul, Turkey
hal-00931522v1  Directions of work or proceedings
Daniel AugotAnne CanteautGohar KyureghyanFaina Solov'EvaØyvind Ytrehus. Designs, Codes and Cryptography (Special Issue in Coding and Cryptography)
Daniel Augot and Anne Canteaut and Gohar Kyureghyan and Faina Solov'Eva and Øyvind Ytrehus. 66, Springer, pp.399, 2013, 0925-1022
hal-00741923v1  Directions of work or proceedings
Daniel AugotAnne CanteautGohar KyureghyanFaina Solov'EvaØyvind Ytrehus. Editorial
Daniel Augot and Anne Canteaut and Gohar Kyureghyan and Faina Solov'eva and Øyvind Ytrehus. Springer, pp.2, 2012, Designs, Codes and Cryptography, ⟨10.1007/s10623-012-9731-1⟩
...
hal-00643774v1  Conference papers
Frederik ArmknechtDaniel AugotLudovic PerretAhmad-Reza Sadeghi. On Constructing Homomorphic Encryption Schemes from Coding Theory
13th IMA International Conference on Cryptography and Coding, Institute of Mathematics and its Applications (IMA), Dec 2011, Oxford, United Kingdom. pp.23-40, ⟨10.1007/978-3-642-25516-8_3⟩
...
hal-00643794v1  Conference papers
Daniel AugotMorgan BarbierAlain Couvreur. List-Decoding of Binary Goppa Codes up to the Binary Johnson Bound
IEEE Information Theory Workshop, Oct 2011, Paraty, Brazil. pp.229 - 233, ⟨10.1109/ITW.2011.6089384⟩
...
inria-00633205v1  Journal articles
Alexander ZehChristian GentnerDaniel Augot. An Interpolation Procedure for List Decoding Reed--Solomon codes Based on Generalized Key Equations
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2011, 57, pp.5946-5959. ⟨10.1109/TIT.2011.2162160⟩
...
inria-00547445v1  Conference papers
Daniel Augot. Problématique des bons codes sur le corps à deux éléments
Journées de la Société Mathémarique de France, Jun 2010, Paris, France
...
inria-00543322v1  Conference papers
Daniel Augot. Les codes algébriques principaux et leur décodage
Journées Nationales de Calcul Formel, Jean-Guillaume Dumas, Grégoire Lecerf, Delphine Boucher et Thomas Cluzeau, May 2010, Luminy, France. pp.31-74
inria-00564022v1  Book sections
Daniel AugotMichael Stepanov. A note on the generalisation of the Guruswami-Sudan list decoding algorithm to Reed-Muller codes
Massimiliano Sala and Teo Mora and Ludovic Perret and Shojiro Sakata and Carlo Traverso. Gröbner Bases, Coding, and Cryptography, 2, Springer, pp.395-398, 2009, ⟨10.1007/978-3-540-93806-4_27⟩