Philippe Gaborit

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Efficient error-correcting codes for the HQC post-quantum cryptosystem
Designs, Codes and Cryptography
2024-12-11Paper
Injective rank metric trapdoor functions with homogeneous errors
 
2024-10-16Paper
On the construction of balanced Boolean functions with a good algebraic immunity
 
2024-09-18Paper
Improved algorithm to find equations for algebraic attacks for combiners with memory
 
2024-09-18Paper
PERK: compact signature scheme based on a new variant of the permuted kernel problem
Designs, Codes and Cryptography
2024-08-13Paper
Generalized low-rank parity-check codes
IEEE Transactions on Information Theory
2024-07-23Paper
RQC revisited and more cryptanalysis for rank-based cryptography
IEEE Transactions on Information Theory
2024-07-22Paper
LowMS: a new rank metric code-based KEM without ideal structure
Designs, Codes and Cryptography
2024-04-22Paper
Analysis of the security of the PSSI problem and cryptanalysis of the Durandal signature scheme
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Revisiting algebraic attacks on MinRank and on the rank decoding problem
Designs, Codes and Cryptography
2023-11-07Paper
Compact post-quantum signatures from proofs of knowledge leveraging structure for the \textsf{PKP, SD} and \textsf{RSD} problems
Codes, Cryptology and Information Security
2023-10-04Paper
LRPC codes with multiple syndromes: near ideal-size KEMs without ideals
Post-Quantum Cryptography
2023-07-07Paper
A new key recovery side-channel attack on HQC with chosen ciphertext
Post-Quantum Cryptography
2023-07-07Paper
Code-based signatures from new proofs of knowledge for the syndrome decoding problem
Designs, Codes and Cryptography
2023-04-21Paper
Enhancing Code Based Zero-Knowledge Proofs Using Rank Metric
 
2023-03-22Paper
Improvements of algebraic attacks for solving the rank decoding and MinRank problems
 
2023-03-21Paper
A gapless code-based hash proof system based on RQC and its applications
Designs, Codes and Cryptography
2022-11-23Paper
Ouroboros: An Efficient and Provably Secure KEM Family
IEEE Transactions on Information Theory
2022-10-11Paper
A correction to a code-based blind signature scheme
 
2022-08-11Paper
A rank metric code-based group signature scheme
 
2022-08-11Paper
The rank-based cryptography library
 
2022-08-11Paper
A practicable timing attack against HQC and its countermeasure
Advances in Mathematics of Communications
2022-07-26Paper
Cryptanalysis of the rank preserving signature
 
2022-06-29Paper
An algebraic attack on rank metric code-based cryptosystems
 
2021-12-01Paper
Code-based cryptography
 
2021-11-26Paper
On the hardness of code equivalence problems in rank metric
 
2020-11-09Paper
Cryptanalysis of a code-based one-time signature
Designs, Codes and Cryptography
2020-09-22Paper
Dual-Ouroboros: an improvement of the McNie scheme
Advances in Mathematics of Communications
2020-05-04Paper
Cryptanalysis of a rank-based signature with short public keys
Designs, Codes and Cryptography
2020-03-27Paper
Preventing timing attacks against RQC using constant time decoding of Gabidulin codes
 
2020-02-25Paper
Improvements of Algebraic Attacks for solving the Rank Decoding and MinRank problems
 
2020-02-14Paper
Durandal: a rank metric based signature scheme
 
2020-02-04Paper
Low Rank Parity Check Codes: New Decoding Algorithms and Applications to Cryptography
IEEE Transactions on Information Theory
2020-01-28Paper
Efficient Encryption From Random Quasi-Cyclic Codes
IEEE Transactions on Information Theory
2018-09-14Paper
Ouroboros: a simple, secure and efficient key exchange protocol based on coding theory
 
2018-09-12Paper
Polynomial-time key recovery attack on the Faure-Loidreau scheme based on Gabidulin codes
Designs, Codes and Cryptography
2018-06-26Paper
Gabidulin matrix codes and their application to small ciphertext size cryptosystems
 
2018-04-26Paper
Identity-based encryption from codes with rank metric
 
2017-10-27Paper
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
IEEE Transactions on Information Theory
2017-07-12Paper
Classification of Extremal and $s$-Extremal Binary Self-Dual Codes of Length 38
IEEE Transactions on Information Theory
2017-07-12Paper
A practical group signature scheme based on rank metric
Arithmetic of Finite Fields
2017-06-13Paper
A New Class of Codes for Boolean Masking of Cryptographic Computations
IEEE Transactions on Information Theory
2017-06-08Paper
On the Complexity of the Rank Syndrome Decoding Problem
IEEE Transactions on Information Theory
2017-04-28Paper
On the Hardness of the Decoding and the Minimum Distance Problems for Rank Codes
IEEE Transactions on Information Theory
2017-04-28Paper
A code-based group signature scheme
Designs, Codes and Cryptography
2017-02-10Paper
RankSynd and PRNG based on rank metric
Post-Quantum Cryptography
2016-04-26Paper
Ranksign: an efficient signature algorithm based on the rank metric
Post-Quantum Cryptography
2015-01-14Paper
Sealing the leak on classical NTRU signatures
Post-Quantum Cryptography
2015-01-14Paper
Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes
Designs, Codes and Cryptography
2014-08-18Paper
New Results for Rank-Based Cryptography
Progress in Cryptology – AFRICACRYPT 2014
2014-06-24Paper
A code-based undeniable signature scheme
Cryptography and Coding
2014-01-17Paper
Adapting Lyubashevsky's signature schemes to the ring signature setting
Progress in Cryptology – AFRICACRYPT 2013
2013-06-07Paper
Full cryptanalysis of the Chen identification protocol
Post-Quantum Cryptography
2011-11-25Paper
There is no Euclidean self-dual quaternary [18,9,7 code]
International Journal of Information and Coding Theory
2011-02-04Paper
Additively homomorphic encryption with \(d\)-operand multiplications
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials
Post-Quantum Cryptography
2010-06-17Paper
Reducing Key Length of the McEliece Cryptosystem
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
Identity-based identification and signature schemes using error correcting codes
 
2009-03-24Paper
On the Classification of Extremal $[36,18,8$ Binary Self-Dual Codes]
IEEE Transactions on Information Theory
2009-02-24Paper
Asymptotic Improvement of the Gilbert–Varshamov Bound for Linear Codes
IEEE Transactions on Information Theory
2009-02-24Paper
On the Weight Enumerators of Duadic and Quadratic Residue Codes
IEEE Transactions on Information Theory
2008-12-21Paper
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
Post-Quantum Cryptography
2008-11-11Paper
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
A bound for certain \(s\)-extremal lattices and codes
Archiv der Mathematik
2007-09-06Paper
On the construction of dense lattices with a given automorphisms group
Annales de l’institut Fourier
2007-08-01Paper
Binary templates for comma-free DNA codes
Discrete Applied Mathematics
2007-04-18Paper
\(s\)-extremal additive \(\mathbb F_4\) codes
Advances in Mathematics of Communications
2007-04-05Paper
EISENSTEIN LATTICES, GALOIS RINGS AND QUATERNARY CODES
International Journal of Number Theory
2006-08-14Paper
Construction of bent functions via Niho power functions
Journal of Combinatorial Theory. Series A
2006-08-04Paper
Hyper-bent functions and cyclic codes
Journal of Combinatorial Theory. Series A
2006-04-28Paper
Linear constructions for DNA codes
Theoretical Computer Science
2005-06-01Paper
Construction of new extremal unimodular lattices
European Journal of Combinatorics
2004-08-06Paper
Designs and self-dual codes with long shadows.
Journal of Combinatorial Theory. Series A
2004-03-14Paper
Construction of extremal Type II codes over \(\mathbb{Z}_4\).
Designs, Codes and Cryptography
2003-12-18Paper
Experimental constructions of self-dual codes
Finite Fields and their Applications
2003-08-17Paper
2-modular lattices from ternary codes.
Journal de Théorie des Nombres de Bordeaux
2003-06-30Paper
Decoding binary \(R\)(2,5) by hand
Discrete Mathematics
2003-04-09Paper
Type II codes over \(\mathbb F_4\)
Finite Fields and their Applications
2002-08-15Paper
Quadratic double circulant codes over fields
Journal of Combinatorial Theory. Series A
2002-07-04Paper
On quadratic double circulant codes over fields
 
2001-10-15Paper
On extremal additive \(\mathbb F_4\) codes of length 10 to 18
 
2001-10-14Paper
On additive GF(4) codes
 
2001-09-18Paper
On extremal additive \({\mathbb{F}}_4\) codes of length 10 to 18
Journal de Théorie des Nombres de Bordeaux
2001-07-30Paper
On the classification of extremal even formally self-dual codes of lengths 20 and 22
Discrete Applied Mathematics
2001-07-29Paper
On the classification of extremal even formally self-dual codes
Designs, Codes and Cryptography
2001-01-01Paper
scientific article; zbMATH DE number 1488859 (Why is no real title available?)
 
2000-11-21Paper
Type IV self-dual codes over rings
IEEE Transactions on Information Theory
2000-09-07Paper
On the covering radius of Z/sub 4/-codes and their lattices
IEEE Transactions on Information Theory
2000-09-07Paper
Niemeier lattices and Type II codes over \(\mathbb{Z}_4\)
Discrete Mathematics
2000-03-02Paper
Type II codes over F/sub 2/+uF/sub 2/
IEEE Transactions on Information Theory
1999-11-21Paper
On the non Z/sub 4/-linearity of certain good binary codes
IEEE Transactions on Information Theory
1999-11-21Paper
All self-dual Z/sub 4/ codes of length 15 or less are known
IEEE Transactions on Information Theory
1998-11-17Paper
Mass formulas for self-dual codes over Z/sub 4/ and F/sub q/+uF/sub q/ rings
IEEE Transactions on Information Theory
1996-07-28Paper


Research outcomes over time


This page was built for person: Philippe Gaborit