Philippe Gaborit

From MaRDI portal
(Redirected from Person:398978)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A variant of the Bravyi-Terhal bound for arbitrary boundary conditions
IEEE Transactions on Information Theory
2026-03-18Paper
Efficient error-correcting codes for the HQC post-quantum cryptosystem
Designs, Codes and Cryptography
2024-12-11Paper
Injective rank metric trapdoor functions with homogeneous errors2024-10-16Paper
On the construction of balanced Boolean functions with a good algebraic immunity2024-09-18Paper
Improved algorithm to find equations for algebraic attacks for combiners with memory2024-09-18Paper
PERK: compact signature scheme based on a new variant of the permuted kernel problem
Designs, Codes and Cryptography
2024-08-13Paper
Generalized low-rank parity-check codes
IEEE Transactions on Information Theory
2024-07-23Paper
RQC revisited and more cryptanalysis for rank-based cryptography
IEEE Transactions on Information Theory
2024-07-22Paper
LowMS: a new rank metric code-based KEM without ideal structure
Designs, Codes and Cryptography
2024-04-22Paper
Analysis of the security of the PSSI problem and cryptanalysis of the Durandal signature scheme
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Revisiting algebraic attacks on MinRank and on the rank decoding problem
Designs, Codes and Cryptography
2023-11-07Paper
Compact post-quantum signatures from proofs of knowledge leveraging structure for the \textsf{PKP, SD} and \textsf{RSD} problems
Codes, Cryptology and Information Security
2023-10-04Paper
LRPC codes with multiple syndromes: near ideal-size KEMs without ideals
Post-Quantum Cryptography
2023-07-07Paper
A new key recovery side-channel attack on HQC with chosen ciphertext
Post-Quantum Cryptography
2023-07-07Paper
Code-based signatures from new proofs of knowledge for the syndrome decoding problem
Designs, Codes and Cryptography
2023-04-21Paper
Enhancing Code Based Zero-Knowledge Proofs Using Rank Metric2023-03-22Paper
Improvements of algebraic attacks for solving the rank decoding and MinRank problems
(available as arXiv preprint)
2023-03-21Paper
A gapless code-based hash proof system based on RQC and its applications
Designs, Codes and Cryptography
2022-11-23Paper
Ouroboros: An Efficient and Provably Secure KEM Family
IEEE Transactions on Information Theory
2022-10-11Paper
A correction to a code-based blind signature scheme2022-08-11Paper
A rank metric code-based group signature scheme2022-08-11Paper
The rank-based cryptography library2022-08-11Paper
A practicable timing attack against HQC and its countermeasure
Advances in Mathematics of Communications
2022-07-26Paper
Cryptanalysis of the rank preserving signature2022-06-29Paper
An algebraic attack on rank metric code-based cryptosystems
(available as arXiv preprint)
2021-12-01Paper
Code-based cryptography2021-11-26Paper
On the hardness of code equivalence problems in rank metric2020-11-09Paper
Cryptanalysis of a code-based one-time signature
Designs, Codes and Cryptography
2020-09-22Paper
Dual-Ouroboros: an improvement of the McNie scheme
Advances in Mathematics of Communications
2020-05-04Paper
Cryptanalysis of a rank-based signature with short public keys
Designs, Codes and Cryptography
2020-03-27Paper
Preventing timing attacks against RQC using constant time decoding of Gabidulin codes2020-02-25Paper
Improvements of Algebraic Attacks for solving the Rank Decoding and MinRank problems
(available as arXiv preprint)
2020-02-14Paper
Durandal: a rank metric based signature scheme2020-02-04Paper
Low Rank Parity Check Codes: New Decoding Algorithms and Applications to Cryptography
IEEE Transactions on Information Theory
2020-01-28Paper
Efficient Encryption From Random Quasi-Cyclic Codes
IEEE Transactions on Information Theory
2018-09-14Paper
Ouroboros: a simple, secure and efficient key exchange protocol based on coding theory2018-09-12Paper
Polynomial-time key recovery attack on the Faure-Loidreau scheme based on Gabidulin codes
Designs, Codes and Cryptography
2018-06-26Paper
Gabidulin matrix codes and their application to small ciphertext size cryptosystems2018-04-26Paper
Identity-based encryption from codes with rank metric2017-10-27Paper
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
IEEE Transactions on Information Theory
2017-07-12Paper
Classification of Extremal and $s$-Extremal Binary Self-Dual Codes of Length 38
IEEE Transactions on Information Theory
2017-07-12Paper
A practical group signature scheme based on rank metric
Arithmetic of Finite Fields
2017-06-13Paper
A New Class of Codes for Boolean Masking of Cryptographic Computations
IEEE Transactions on Information Theory
2017-06-08Paper
On the Complexity of the Rank Syndrome Decoding Problem
IEEE Transactions on Information Theory
2017-04-28Paper
On the Hardness of the Decoding and the Minimum Distance Problems for Rank Codes
IEEE Transactions on Information Theory
2017-04-28Paper
A code-based group signature scheme
Designs, Codes and Cryptography
2017-02-10Paper
RankSynd and PRNG based on rank metric
Post-Quantum Cryptography
2016-04-26Paper
Ranksign: an efficient signature algorithm based on the rank metric
Post-Quantum Cryptography
2015-01-14Paper
Sealing the leak on classical NTRU signatures
Post-Quantum Cryptography
2015-01-14Paper
Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes
Designs, Codes and Cryptography
2014-08-18Paper
New Results for Rank-Based Cryptography
Progress in Cryptology – AFRICACRYPT 2014
2014-06-24Paper
A code-based undeniable signature scheme
Cryptography and Coding
2014-01-17Paper
Adapting Lyubashevsky's signature schemes to the ring signature setting
Progress in Cryptology – AFRICACRYPT 2013
2013-06-07Paper
Full cryptanalysis of the Chen identification protocol
Post-Quantum Cryptography
2011-11-25Paper
There is no Euclidean self-dual quaternary [18,9,7 code]
International Journal of Information and Coding Theory
2011-02-04Paper
Additively homomorphic encryption with \(d\)-operand multiplications
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials
Post-Quantum Cryptography
2010-06-17Paper
Reducing Key Length of the McEliece Cryptosystem
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
Identity-based identification and signature schemes using error correcting codes2009-03-24Paper
On the Classification of Extremal $[36,18,8$ Binary Self-Dual Codes]
IEEE Transactions on Information Theory
2009-02-24Paper
Asymptotic Improvement of the Gilbert–Varshamov Bound for Linear Codes
IEEE Transactions on Information Theory
2009-02-24Paper
On the Weight Enumerators of Duadic and Quadratic Residue Codes
IEEE Transactions on Information Theory
2008-12-21Paper
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
Post-Quantum Cryptography
2008-11-11Paper
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
A bound for certain \(s\)-extremal lattices and codes
Archiv der Mathematik
2007-09-06Paper
On the construction of dense lattices with a given automorphisms group
Annales de l’institut Fourier
2007-08-01Paper
On the construction of dense lattices with a given automorphisms group
Annales de l’institut Fourier
2007-08-01Paper
On the construction of dense lattices with a given automorphisms group
Annales de l’institut Fourier
2007-08-01Paper
On the construction of dense lattices with a given automorphisms group
Annales de l’institut Fourier
2007-08-01Paper
Binary templates for comma-free DNA codes
Discrete Applied Mathematics
2007-04-18Paper
\(s\)-extremal additive \(\mathbb F_4\) codes
Advances in Mathematics of Communications
2007-04-05Paper
EISENSTEIN LATTICES, GALOIS RINGS AND QUATERNARY CODES
International Journal of Number Theory
2006-08-14Paper
Construction of bent functions via Niho power functions
Journal of Combinatorial Theory. Series A
2006-08-04Paper
Hyper-bent functions and cyclic codes
Journal of Combinatorial Theory. Series A
2006-04-28Paper
Linear constructions for DNA codes
Theoretical Computer Science
2005-06-01Paper
Construction of new extremal unimodular lattices
European Journal of Combinatorics
2004-08-06Paper
Designs and self-dual codes with long shadows.
Journal of Combinatorial Theory. Series A
2004-03-14Paper
Construction of extremal Type II codes over \(\mathbb{Z}_4\).
Designs, Codes and Cryptography
2003-12-18Paper
Experimental constructions of self-dual codes
Finite Fields and their Applications
2003-08-17Paper
2-modular lattices from ternary codes.
Journal de Théorie des Nombres de Bordeaux
2003-06-30Paper
2-modular lattices from ternary codes.
Journal de Théorie des Nombres de Bordeaux
2003-06-30Paper
Decoding binary \(R\)(2,5) by hand
Discrete Mathematics
2003-04-09Paper
Type II codes over \(\mathbb F_4\)
Finite Fields and their Applications
2002-08-15Paper
Quadratic double circulant codes over fields
Journal of Combinatorial Theory. Series A
2002-07-04Paper
On quadratic double circulant codes over fields2001-10-15Paper
On extremal additive \(\mathbb F_4\) codes of length 10 to 182001-10-14Paper
On additive GF(4) codes2001-09-18Paper
On extremal additive \({\mathbb{F}}_4\) codes of length 10 to 18
Journal de Théorie des Nombres de Bordeaux
2001-07-30Paper
On extremal additive \({\mathbb{F}}_4\) codes of length 10 to 18
Journal de Théorie des Nombres de Bordeaux
2001-07-30Paper
On the classification of extremal even formally self-dual codes of lengths 20 and 22
Discrete Applied Mathematics
2001-07-29Paper
On the classification of extremal even formally self-dual codes
Designs, Codes and Cryptography
2001-01-01Paper
scientific article; zbMATH DE number 1488859 (Why is no real title available?)2000-11-21Paper
Type IV self-dual codes over rings
IEEE Transactions on Information Theory
2000-09-07Paper
On the covering radius of Z/sub 4/-codes and their lattices
IEEE Transactions on Information Theory
2000-09-07Paper
Niemeier lattices and Type II codes over \(\mathbb{Z}_4\)
Discrete Mathematics
2000-03-02Paper
Type II codes over F/sub 2/+uF/sub 2/
IEEE Transactions on Information Theory
1999-11-21Paper
On the non Z/sub 4/-linearity of certain good binary codes
IEEE Transactions on Information Theory
1999-11-21Paper
All self-dual Z/sub 4/ codes of length 15 or less are known
IEEE Transactions on Information Theory
1998-11-17Paper
Mass formulas for self-dual codes over Z/sub 4/ and F/sub q/+uF/sub q/ rings
IEEE Transactions on Information Theory
1996-07-28Paper


Research outcomes over time


This page was built for person: Philippe Gaborit