| Publication | Date of Publication | Type |
|---|
| Integer syndrome decoding in the presence of noise | 2024-11-26 | Paper |
| Improved algorithm to find equations for algebraic attacks for combiners with memory | 2024-09-18 | Paper |
| DAGS: reloaded revisiting dyadic key encapsulation | 2024-02-23 | Paper |
| A side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomial | 2024-02-02 | Paper |
| Punctured syndrome decoding problem. Efficient side-channel attacks against \textit{Classic McEliece} | 2023-11-16 | Paper |
| Key-recovery by side-channel information on the matrix-vector product in code-based cryptosystems | 2023-08-21 | Paper |
| Software implementation of a code-based key encapsulation mechanism from binary QD generalized Srivastava codes | 2023-08-17 | Paper |
| A novel Niederreiter-like cryptosystem based on the \((u|u + \upsilon)\)-construction codes | 2022-01-12 | Paper |
| Message-recovery laser fault injection attack on the \textit{classic McEliece} cryptosystem | 2021-12-08 | Paper |
| Optimized and secure implementation of ROLLO-I | 2021-01-26 | Paper |
| Improvement of binary and non binary statistical decoding algorithm | 2020-07-08 | Paper |
| DAGS: key encapsulation using dyadic GS codes | 2019-01-11 | Paper |
| \(\mathcal{NP}\)-completeness of the Goppa parameterised random binary quasi-dyadic syndrome decoding problem | 2018-08-02 | Paper |
| A pseudorandom number generator based on worst-case lattice problems | 2017-10-27 | Paper |
| On lower bounds for information set decoding over \(\mathbb F_q\) and on the effect of partial knowledge | 2017-07-26 | Paper |
| A New Efficient Threshold Ring Signature Scheme Based on Coding Theory | 2017-07-12 | Paper |
| Efficient implementation of hybrid encryption from coding theory | 2017-06-01 | Paper |
| NP-completeness of the random binary quasi-dyadic coset weight problem and the random binary quasi-dyadic subspace weight problem | 2017-03-03 | Paper |
| Critical attacks in code-based cryptography | 2016-04-22 | Paper |
| Extended security arguments for signature schemes | 2016-02-19 | Paper |
| Efficient software implementations of code-based hash functions and stream-ciphers | 2015-10-01 | Paper |
| Weaknesses in two RFID authentication protocols | 2015-09-21 | Paper |
| Polynomial structures in code-based cryptography | 2014-01-14 | Paper |
| Improved Zero-Knowledge Identification with Lattices | 2013-02-11 | Paper |
| An improved threshold ring signature scheme based on error correcting codes | 2012-11-01 | Paper |
| Broadcast attacks against code-based schemes | 2012-10-16 | Paper |
| Improving the performance of the SYND stream cipher | 2012-07-23 | Paper |
| Extended security arguments for signature schemes | 2012-07-23 | Paper |
| Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes | 2012-07-20 | Paper |
| Post-quantum cryptography: lattice identification schemes | 2012-07-12 | Paper |
| Quasi-dyadic CFS signatures | 2011-07-29 | Paper |
| A zero-knowledge identification scheme based on the \(q\)-ary syndrome decoding problem | 2011-03-15 | Paper |
| New results on the Stern identification and signature scheme | 2010-11-05 | Paper |
| Improved Zero-Knowledge Identification with Lattices | 2010-10-12 | Paper |
| A lattice-based threshold ring signature scheme | 2010-08-31 | Paper |
| Post-quantum cryptography: Code-based signatures | 2010-07-13 | Paper |
| Quasi-cyclic codes as codes over rings of matrices | 2010-04-15 | Paper |
| Reducing Key Length of the McEliece Cryptosystem | 2009-07-07 | Paper |
| Identity-based identification and signature schemes using error correcting codes | 2009-03-24 | Paper |
| A New Efficient Threshold Ring Signature Scheme Based on Coding Theory | 2008-11-11 | Paper |
| On Kabatianskii-Krouk-Smeets Signatures | 2007-11-15 | Paper |