|
||
---|---|---|
hal-00937476v1
Conference papers
A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems Information Theory (ISIT), 2014 IEEE International Symposium on, Jun 2014, Honolulu, United States. pp.1446-1450, ⟨10.1109/ISIT.2014.6875072⟩ ![]() |
||
|
||
hal-00710451v2
Journal articles
Codes and the Cartier Operator Proceedings of the American Mathematical Society, American Mathematical Society, 2014, 142, pp.1983-1996 |
||
hal-01069272v1
Conference papers
Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes 4th ICMCTA - Fourth International Castle Meeting on Coding Theory and Applications, Sep 2014, Palmela, Portugal |
||
hal-01096172v1
Journal articles
Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes Designs, Codes and Cryptography, Springer Verlag, 2014, 73 (2), pp.641-666. ⟨10.1007/s10623-014-9967-z⟩ ![]() |
||
hal-00880994v1
Journal articles
New identities relating wild Goppa codes Finite Fields and Their Applications, Elsevier, 2014, 29, pp.178-197. ⟨10.1016/j.ffa.2014.04.007⟩ |
||
hal-00931774v1
Conference papers
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions Advances in Cryptology - Eurocrypt 2014, May 2014, Copenhagen, Denmark. pp.17-39, ⟨10.1007/978-3-642-55220-5_2⟩ ![]() |
||
|