Ludovic Perret

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Biscuit: new MPCitH signature scheme from structured multivariate polynomials
 
2024-05-31Paper
SPDH-Sign: Towards Efficient, Post-quantum Group-Based Signatures
 
2024-04-26Paper
Cryptanalysis of protocols using (Simultaneous) Conjugacy Search Problem in certain Metabelian Platform Groups
 
2023-09-25Paper
A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem
 
2022-09-06Paper
Cryptanalysis of the extension field cancellation cryptosystem
Designs, Codes and Cryptography
2021-06-23Paper
A nearly optimal algorithm to decompose binary forms
Journal of Symbolic Computation
2021-02-18Paper
PKP-based signature scheme
 
2020-05-12Paper
A Distinguisher for High-Rate McEliece Cryptosystems
IEEE Transactions on Information Theory
2017-06-08Paper
A superfast randomized algorithm to decompose binary forms
Proceedings of the ACM on International Symposium on Symbolic and Algebraic Computation
2017-05-10Paper
Folding Alternant and Goppa Codes With Non-Trivial Automorphism Groups
IEEE Transactions on Information Theory
2017-04-28Paper
Polly cracker, revisited
Designs, Codes and Cryptography
2016-05-19Paper
Structural cryptanalysis of McEliece schemes with compact keys
Designs, Codes and Cryptography
2016-04-05Paper
Decomposition of generic multivariate polynomials
Proceedings of the 2010 International Symposium on Symbolic and Algebraic Computation
2015-09-17Paper
A polynomial-time key-recovery attack on MQQ cryptosystems
Lecture Notes in Computer Science
2015-08-27Paper
Algebraic cryptanalysis of a quantum money scheme: the noise-free case
Lecture Notes in Computer Science
2015-08-27Paper
Polynomial-time algorithms for quadratic isomorphism of polynomials: the regular case
Journal of Complexity
2015-06-16Paper
Hardness of learning problems over Burnside groups of exponent 3
Designs, Codes and Cryptography
2015-03-30Paper
Solving polynomial systems over finite fields: improved analysis of the hybrid approach
Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation
2015-03-27Paper
On the complexity of the BKW algorithm on LWE
Designs, Codes and Cryptography
2015-02-19Paper
Algebraic attack against variants of McEliece with Goppa polynomial of a special form
Lecture Notes in Computer Science
2015-01-16Paper
Lazy modulus switching for the BKW algorithm on LWE
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Practical cryptanalysis of a public-key encryption scheme based on new multivariate quadratic assumptions
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic
Designs, Codes and Cryptography
2013-07-26Paper
Improving the complexity of index calculus algorithms in elliptic curves over binary fields
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
High order derivatives and decomposition of multivariate polynomials
Proceedings of the 2009 international symposium on Symbolic and algebraic computation
2012-05-13Paper
On the relation between the MXL family of algorithms and Gröbner basis algorithms
Journal of Symbolic Computation
2012-05-11Paper
On enumeration of polynomial equivalence classes and their application to MPKC
Finite Fields and their Applications
2012-03-22Paper
On constructing homomorphic encryption schemes from coding theory
Cryptography and Coding
2011-12-16Paper
Polly cracker, revisited
Lecture Notes in Computer Science
2011-12-02Paper
Algebraic precomputations in differential and integral cryptanalysis
Information Security and Cryptology
2011-07-29Paper
Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants
Public Key Cryptography – PKC 2011
2011-03-15Paper
Practical cryptanalysis of the identification scheme based on the isomorphism of polynomial with one secret problem
Public Key Cryptography – PKC 2011
2011-03-15Paper
Analysis of the MQQ public key cryptosystem
Cryptology and Network Security
2010-12-07Paper
Algebraic cryptanalysis of curry and flurry using correlated messages
Information Security and Cryptology
2010-11-23Paper
Cryptanalysis of the hidden matrix cryptosystem
Lecture Notes in Computer Science
2010-08-31Paper
Algebraic cryptanalysis of McEliece variants with compact keys
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Security analysis of word problem-based cryptosystems
Designs, Codes and Cryptography
2010-02-25Paper
Hybrid approach for solving multivariate systems over finite fields
Journal of Mathematical Cryptology
2010-02-05Paper
A survey on Polly Cracker systems
Gröbner Bases, Coding, and Cryptography
2009-12-16Paper
An efficient algorithm for decomposing multivariate polynomials and its applications to cryptography
Journal of Symbolic Computation
2009-10-16Paper
Security Analysis of Multivariate Polynomials for Hashing
Information Security and Cryptology
2009-04-29Paper
Cryptanalysis of MinRank
Lecture Notes in Computer Science
2009-02-10Paper
Algebraic Cryptanalysis of 58-Round SHA-1
Fast Software Encryption
2008-09-16Paper
Cryptanalysis of the TRMS Signature Scheme of PKC’05
Progress in Cryptology – AFRICACRYPT 2008
2008-06-13Paper
A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem
Lecture Notes in Computer Science
2008-05-06Paper
Total Break of the ℓ-IC Signature Scheme
Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings
2008-03-05Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Cryptanalysis of 2R− Schemes
Lecture Notes in Computer Science
2007-09-04Paper
Coding and Cryptography
Lecture Notes in Computer Science
2007-05-02Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
scientific article; zbMATH DE number 2127871 (Why is no real title available?)
 
2005-01-14Paper


Research outcomes over time


This page was built for person: Ludovic Perret