|
||
---|---|---|
hal-02882019v1
Preprints, Working Papers, ...
Rank-metric codes over arbitrary Galois extensions and rank analogues of Reed-Muller codes 2020 ![]() |
||
hal-02373772v1
Directions of work or proceedings
Editorial: Special issue on coding and cryptography 87 (2-3), Springer, 2019, 0925-1022. ⟨10.1007/s10623-018-00601-w⟩ ![]() |
||
hal-02347238v1
Conference papers
Practical Solutions to Save Bitcoins Applied to an Identity System Proposal ICISSP 2019 - 5th International Conference on Information Systems Security and Privacy, Feb 2019, Prague, Czech Republic. pp.511-518, ⟨10.5220/0007443905110518⟩ ![]() |
||
hal-01503212v1
Journal articles
Generalized Gabidulin codes over fields of any characteristic Designs, Codes and Cryptography, Springer Verlag, 2018, 86 (8), pp.1807-1848. ⟨10.1007/s10623-017-0425-6⟩ ![]() |
||
hal-01611251v1
Conference papers
A User-Centric System for Verified Identities on the Bitcoin Blockchain International Workshop on Cryptocurrencies and Blockchain Technology - CBT'17, Sep 2017, Oslo, Norway |
||
hal-01611297v1
Conference papers
Transforming face-to-face identity proofing into anonymous digital identity using the Bitcoin blockchain PST 2017 - International Conference on Privacy, Security and Trust, Aug 2017, Calgary, Canada. pp.1-10 |
||
hal-01188935v1
Conference papers
Information Sets of Multiplicity Codes Information Theory (ISIT), 2015 IEEE International Symposium on , Jun 2015, Hong-Kong, China. pp.2401 - 2405, ⟨10.1109/ISIT.2015.7282886⟩ |
||
hal-01094807v1
Conference papers
A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers 13th International Conference, Cryptology and Network Security (CANS), Oct 2014, Heraklion, Greece. pp.222 - 239, ⟨10.1007/978-3-319-12280-9_15⟩ |
||
hal-01111694v1
Patents
Storage efficient and unconditionnally secure private information retrieval France, Patent n° : 14305549.9. 2014 |
||
hal-01094085v1
Conference papers
Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation Selected Areas in Cryptology - SAC 2014, Aug 2014, Montreal, Canada. pp.243-260, ⟨10.1007/978-3-319-13051-4_15⟩ |
||
hal-01094843v1
Conference papers
Generalization of Gabidulin Codes over Fields of Rational Functions 21st International Symposium on Mathematical Theory of Networks and Systems (MTNS 2014), Jul 2014, Groningen, Netherlands |
||
|
||
hal-01044597v2
Conference papers
Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes 21st International Workshop on Fast Software Encryption, FSE 2014, London, UK, March 3-5, Mar 2014, London, United Kingdom. pp.3-17, ⟨10.1007/978-3-662-46706-0_1⟩ |
||
hal-00823535v1
Conference papers
Rank metric and Gabidulin codes in characteristic zero ISIT 2013 IEEE International Symposium on Information Theory, Amos Lapidoth and Igal Sason and Jossy Sayir and Emre Telatar, Jul 2013, Istanbul, Turkey |
||
hal-00931522v1
Directions of work or proceedings
Designs, Codes and Cryptography (Special Issue in Coding and Cryptography) Daniel Augot and Anne Canteaut and Gohar Kyureghyan and Faina Solov'Eva and Øyvind Ytrehus. 66, Springer, pp.399, 2013, 0925-1022 |
||
hal-00823082v1
Conference papers
Exhaustive Search for Small Dimension Recursive MDS Diffusion Layers for Block Ciphers and Hash Functions International Symposium on Information Theory (ISIT), 2013, Istambul, Turkey ![]() |
||
hal-00741923v1
Directions of work or proceedings
Editorial Daniel Augot and Anne Canteaut and Gohar Kyureghyan and Faina Solov'eva and Øyvind Ytrehus. Springer, pp.2, 2012, Designs, Codes and Cryptography, ⟨10.1007/s10623-012-9731-1⟩ ![]() |
||
hal-00672050v1
Preprints, Working Papers, ...
Discrete logarithm computations over finite fields using Reed-Solomon codes 2012 |
||
hal-00639551v1
Conference papers
Ensuring message embedding in wet paper steganography IMACC 2011, Dec 2011, Oxford, United Kingdom. pp.244-258, ⟨10.1007/978-3-642-25516-8_15⟩ |
||
hal-00643774v1
Conference papers
On Constructing Homomorphic Encryption Schemes from Coding Theory 13th IMA International Conference on Cryptography and Coding, Institute of Mathematics and its Applications (IMA), Dec 2011, Oxford, United Kingdom. pp.23-40, ⟨10.1007/978-3-642-25516-8_3⟩ |
||
hal-00643794v1
Conference papers
List-Decoding of Binary Goppa Codes up to the Binary Johnson Bound IEEE Information Theory Workshop, Oct 2011, Paraty, Brazil. pp.229 - 233, ⟨10.1109/ITW.2011.6089384⟩ |
||
inria-00633205v1
Journal articles
An Interpolation Procedure for List Decoding Reed--Solomon codes Based on Generalized Key Equations IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2011, 57, pp.5946-5959. ⟨10.1109/TIT.2011.2162160⟩ |
||
inria-00547106v1
Reports
List-decoding of binary Goppa codes up to the binary Johnson bound [Research Report] RR-7490, INRIA. 2010, pp.23 |
||
inria-00547445v1
Conference papers
Problématique des bons codes sur le corps à deux éléments Journées de la Société Mathémarique de France, Jun 2010, Paris, France |
||
inria-00543322v1
Conference papers
Les codes algébriques principaux et leur décodage Journées Nationales de Calcul Formel, Jean-Guillaume Dumas, Grégoire Lecerf, Delphine Boucher et Thomas Cluzeau, May 2010, Luminy, France. pp.31-74 |
||
inria-00564022v1
Book sections
A note on the generalisation of the Guruswami-Sudan list decoding algorithm to Reed-Muller codes Massimiliano Sala and Teo Mora and Ludovic Perret and Shojiro Sakata and Carlo Traverso. Gröbner Bases, Coding, and Cryptography, 2, Springer, pp.395-398, 2009, ⟨10.1007/978-3-540-93806-4_27⟩ ![]() |
||
|