| Publication | Date of Publication | Type |
|---|
| Injective rank metric trapdoor functions with homogeneous errors | 2024-10-16 | Paper |
| An upper-bound on the decoding failure probability of the LRPC decoder | 2024-08-30 | Paper |
Practical algebraic attack on DAGS Code-Based Cryptography | 2024-02-23 | Paper |
Improved cryptanalysis of rank metric schemes based on Gabidulin codes Designs, Codes and Cryptography | 2018-07-13 | Paper |
Polynomial-time key recovery attack on the Faure-Loidreau scheme based on Gabidulin codes Designs, Codes and Cryptography | 2018-06-26 | Paper |
A Distinguisher for High-Rate McEliece Cryptosystems IEEE Transactions on Information Theory | 2017-06-08 | Paper |
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions IEEE Transactions on Information Theory | 2017-05-02 | Paper |
Folding Alternant and Goppa Codes With Non-Trivial Automorphism Groups IEEE Transactions on Information Theory | 2017-04-28 | Paper |
Weak keys for the quasi-cyclic MDPC public key encryption scheme Progress in Cryptology – AFRICACRYPT 2016 | 2016-06-22 | Paper |
Cryptanalysis of the McEliece public key cryptosystem based on polar codes Post-Quantum Cryptography | 2016-04-26 | Paper |
Structural cryptanalysis of McEliece schemes with compact keys Designs, Codes and Cryptography | 2016-04-05 | Paper |
Square code attack on a modified Sidelnikov cryptosystem Lecture Notes in Computer Science | 2015-09-21 | Paper |
A Polynomial-Time Attack on the BBCRS Scheme Lecture Notes in Computer Science | 2015-08-27 | Paper |
New identities relating wild Goppa codes Finite Fields and their Applications | 2014-09-02 | Paper |
Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes Designs, Codes and Cryptography | 2014-08-18 | Paper |
Polynomial time attack on wild McEliece over quadratic extensions Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
An efficient attack on all concrete KKS proposals Post-Quantum Cryptography | 2011-11-25 | Paper |
Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes Mathematics in Computer Science | 2011-02-19 | Paper |
Algebraic cryptanalysis of McEliece variants with compact keys Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Reducing Key Length of the McEliece Cryptosystem Progress in Cryptology – AFRICACRYPT 2009 | 2009-07-07 | Paper |
A systematic construction of self-dual codes IEEE Transactions on Information Theory | 2008-12-21 | Paper |
On Kabatianskii-Krouk-Smeets Signatures Arithmetic of Finite Fields | 2007-11-15 | Paper |
| scientific article; zbMATH DE number 2154141 (Why is no real title available?) | 2005-04-08 | Paper |
| scientific article; zbMATH DE number 2081122 (Why is no real title available?) | 2004-08-04 | Paper |
Characterization of binary type II codes from the \([8,4,4\) extended Hamming code] Comptes Rendus. Mathématique. Académie des Sciences, Paris | 2003-09-15 | Paper |
Experimental constructions of self-dual codes Finite Fields and their Applications | 2003-08-17 | Paper |