| Publication | Date of Publication | Type |
|---|
Efficient error-correcting codes for the HQC post-quantum cryptosystem Designs, Codes and Cryptography | 2024-12-11 | Paper |
Injective rank metric trapdoor functions with homogeneous errors | 2024-10-16 | Paper |
On the construction of balanced Boolean functions with a good algebraic immunity | 2024-09-18 | Paper |
Improved algorithm to find equations for algebraic attacks for combiners with memory | 2024-09-18 | Paper |
PERK: compact signature scheme based on a new variant of the permuted kernel problem Designs, Codes and Cryptography | 2024-08-13 | Paper |
Generalized low-rank parity-check codes IEEE Transactions on Information Theory | 2024-07-23 | Paper |
RQC revisited and more cryptanalysis for rank-based cryptography IEEE Transactions on Information Theory | 2024-07-22 | Paper |
LowMS: a new rank metric code-based KEM without ideal structure Designs, Codes and Cryptography | 2024-04-22 | Paper |
Analysis of the security of the PSSI problem and cryptanalysis of the Durandal signature scheme Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Revisiting algebraic attacks on MinRank and on the rank decoding problem Designs, Codes and Cryptography | 2023-11-07 | Paper |
Compact post-quantum signatures from proofs of knowledge leveraging structure for the \textsf{PKP, SD} and \textsf{RSD} problems Codes, Cryptology and Information Security | 2023-10-04 | Paper |
LRPC codes with multiple syndromes: near ideal-size KEMs without ideals Post-Quantum Cryptography | 2023-07-07 | Paper |
A new key recovery side-channel attack on HQC with chosen ciphertext Post-Quantum Cryptography | 2023-07-07 | Paper |
Code-based signatures from new proofs of knowledge for the syndrome decoding problem Designs, Codes and Cryptography | 2023-04-21 | Paper |
Enhancing Code Based Zero-Knowledge Proofs Using Rank Metric | 2023-03-22 | Paper |
Improvements of algebraic attacks for solving the rank decoding and MinRank problems | 2023-03-21 | Paper |
A gapless code-based hash proof system based on RQC and its applications Designs, Codes and Cryptography | 2022-11-23 | Paper |
Ouroboros: An Efficient and Provably Secure KEM Family IEEE Transactions on Information Theory | 2022-10-11 | Paper |
A correction to a code-based blind signature scheme | 2022-08-11 | Paper |
A rank metric code-based group signature scheme | 2022-08-11 | Paper |
The rank-based cryptography library | 2022-08-11 | Paper |
A practicable timing attack against HQC and its countermeasure Advances in Mathematics of Communications | 2022-07-26 | Paper |
Cryptanalysis of the rank preserving signature | 2022-06-29 | Paper |
An algebraic attack on rank metric code-based cryptosystems | 2021-12-01 | Paper |
Code-based cryptography | 2021-11-26 | Paper |
On the hardness of code equivalence problems in rank metric | 2020-11-09 | Paper |
Cryptanalysis of a code-based one-time signature Designs, Codes and Cryptography | 2020-09-22 | Paper |
Dual-Ouroboros: an improvement of the McNie scheme Advances in Mathematics of Communications | 2020-05-04 | Paper |
Cryptanalysis of a rank-based signature with short public keys Designs, Codes and Cryptography | 2020-03-27 | Paper |
Preventing timing attacks against RQC using constant time decoding of Gabidulin codes | 2020-02-25 | Paper |
Improvements of Algebraic Attacks for solving the Rank Decoding and MinRank problems | 2020-02-14 | Paper |
Durandal: a rank metric based signature scheme | 2020-02-04 | Paper |
Low Rank Parity Check Codes: New Decoding Algorithms and Applications to Cryptography IEEE Transactions on Information Theory | 2020-01-28 | Paper |
Efficient Encryption From Random Quasi-Cyclic Codes IEEE Transactions on Information Theory | 2018-09-14 | Paper |
Ouroboros: a simple, secure and efficient key exchange protocol based on coding theory | 2018-09-12 | Paper |
Polynomial-time key recovery attack on the Faure-Loidreau scheme based on Gabidulin codes Designs, Codes and Cryptography | 2018-06-26 | Paper |
Gabidulin matrix codes and their application to small ciphertext size cryptosystems | 2018-04-26 | Paper |
Identity-based encryption from codes with rank metric | 2017-10-27 | Paper |
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Classification of Extremal and $s$-Extremal Binary Self-Dual Codes of Length 38 IEEE Transactions on Information Theory | 2017-07-12 | Paper |
A practical group signature scheme based on rank metric Arithmetic of Finite Fields | 2017-06-13 | Paper |
A New Class of Codes for Boolean Masking of Cryptographic Computations IEEE Transactions on Information Theory | 2017-06-08 | Paper |
On the Complexity of the Rank Syndrome Decoding Problem IEEE Transactions on Information Theory | 2017-04-28 | Paper |
On the Hardness of the Decoding and the Minimum Distance Problems for Rank Codes IEEE Transactions on Information Theory | 2017-04-28 | Paper |
A code-based group signature scheme Designs, Codes and Cryptography | 2017-02-10 | Paper |
RankSynd and PRNG based on rank metric Post-Quantum Cryptography | 2016-04-26 | Paper |
Ranksign: an efficient signature algorithm based on the rank metric Post-Quantum Cryptography | 2015-01-14 | Paper |
Sealing the leak on classical NTRU signatures Post-Quantum Cryptography | 2015-01-14 | Paper |
Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes Designs, Codes and Cryptography | 2014-08-18 | Paper |
New Results for Rank-Based Cryptography Progress in Cryptology – AFRICACRYPT 2014 | 2014-06-24 | Paper |
A code-based undeniable signature scheme Cryptography and Coding | 2014-01-17 | Paper |
Adapting Lyubashevsky's signature schemes to the ring signature setting Progress in Cryptology – AFRICACRYPT 2013 | 2013-06-07 | Paper |
Full cryptanalysis of the Chen identification protocol Post-Quantum Cryptography | 2011-11-25 | Paper |
There is no Euclidean self-dual quaternary [18,9,7 code] International Journal of Information and Coding Theory | 2011-02-04 | Paper |
Additively homomorphic encryption with \(d\)-operand multiplications Advances in Cryptology – CRYPTO 2010 | 2010-08-24 | Paper |
Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials Post-Quantum Cryptography | 2010-06-17 | Paper |
Reducing Key Length of the McEliece Cryptosystem Progress in Cryptology – AFRICACRYPT 2009 | 2009-07-07 | Paper |
Identity-based identification and signature schemes using error correcting codes | 2009-03-24 | Paper |
On the Classification of Extremal $[36,18,8$ Binary Self-Dual Codes] IEEE Transactions on Information Theory | 2009-02-24 | Paper |
Asymptotic Improvement of the Gilbert–Varshamov Bound for Linear Codes IEEE Transactions on Information Theory | 2009-02-24 | Paper |
On the Weight Enumerators of Duadic and Quadratic Residue Codes IEEE Transactions on Information Theory | 2008-12-21 | Paper |
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory Post-Quantum Cryptography | 2008-11-11 | Paper |
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
A bound for certain \(s\)-extremal lattices and codes Archiv der Mathematik | 2007-09-06 | Paper |
On the construction of dense lattices with a given automorphisms group Annales de l’institut Fourier | 2007-08-01 | Paper |
Binary templates for comma-free DNA codes Discrete Applied Mathematics | 2007-04-18 | Paper |
\(s\)-extremal additive \(\mathbb F_4\) codes Advances in Mathematics of Communications | 2007-04-05 | Paper |
EISENSTEIN LATTICES, GALOIS RINGS AND QUATERNARY CODES International Journal of Number Theory | 2006-08-14 | Paper |
Construction of bent functions via Niho power functions Journal of Combinatorial Theory. Series A | 2006-08-04 | Paper |
Hyper-bent functions and cyclic codes Journal of Combinatorial Theory. Series A | 2006-04-28 | Paper |
Linear constructions for DNA codes Theoretical Computer Science | 2005-06-01 | Paper |
Construction of new extremal unimodular lattices European Journal of Combinatorics | 2004-08-06 | Paper |
Designs and self-dual codes with long shadows. Journal of Combinatorial Theory. Series A | 2004-03-14 | Paper |
Construction of extremal Type II codes over \(\mathbb{Z}_4\). Designs, Codes and Cryptography | 2003-12-18 | Paper |
Experimental constructions of self-dual codes Finite Fields and their Applications | 2003-08-17 | Paper |
2-modular lattices from ternary codes. Journal de Théorie des Nombres de Bordeaux | 2003-06-30 | Paper |
Decoding binary \(R\)(2,5) by hand Discrete Mathematics | 2003-04-09 | Paper |
Type II codes over \(\mathbb F_4\) Finite Fields and their Applications | 2002-08-15 | Paper |
Quadratic double circulant codes over fields Journal of Combinatorial Theory. Series A | 2002-07-04 | Paper |
On quadratic double circulant codes over fields | 2001-10-15 | Paper |
On extremal additive \(\mathbb F_4\) codes of length 10 to 18 | 2001-10-14 | Paper |
On additive GF(4) codes | 2001-09-18 | Paper |
On extremal additive \({\mathbb{F}}_4\) codes of length 10 to 18 Journal de Théorie des Nombres de Bordeaux | 2001-07-30 | Paper |
On the classification of extremal even formally self-dual codes of lengths 20 and 22 Discrete Applied Mathematics | 2001-07-29 | Paper |
On the classification of extremal even formally self-dual codes Designs, Codes and Cryptography | 2001-01-01 | Paper |
scientific article; zbMATH DE number 1488859 (Why is no real title available?) | 2000-11-21 | Paper |
Type IV self-dual codes over rings IEEE Transactions on Information Theory | 2000-09-07 | Paper |
On the covering radius of Z/sub 4/-codes and their lattices IEEE Transactions on Information Theory | 2000-09-07 | Paper |
Niemeier lattices and Type II codes over \(\mathbb{Z}_4\) Discrete Mathematics | 2000-03-02 | Paper |
Type II codes over F/sub 2/+uF/sub 2/ IEEE Transactions on Information Theory | 1999-11-21 | Paper |
On the non Z/sub 4/-linearity of certain good binary codes IEEE Transactions on Information Theory | 1999-11-21 | Paper |
All self-dual Z/sub 4/ codes of length 15 or less are known IEEE Transactions on Information Theory | 1998-11-17 | Paper |
Mass formulas for self-dual codes over Z/sub 4/ and F/sub q/+uF/sub q/ rings IEEE Transactions on Information Theory | 1996-07-28 | Paper |