| Publication | Date of Publication | Type |
|---|
Integer syndrome decoding in the presence of noise Cryptography and Communications | 2024-11-26 | Paper |
Improved algorithm to find equations for algebraic attacks for combiners with memory | 2024-09-18 | Paper |
DAGS: reloaded revisiting dyadic key encapsulation Code-Based Cryptography | 2024-02-23 | Paper |
A side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomial Progress in Cryptology - AFRICACRYPT 2023 | 2024-02-02 | Paper |
Punctured syndrome decoding problem. Efficient side-channel attacks against \textit{Classic McEliece} Constructive Side-Channel Analysis and Secure Design | 2023-11-16 | Paper |
Key-recovery by side-channel information on the matrix-vector product in code-based cryptosystems Lecture Notes in Computer Science | 2023-08-21 | Paper |
Software implementation of a code-based key encapsulation mechanism from binary QD generalized Srivastava codes Code-Based Cryptography | 2023-08-17 | Paper |
A novel Niederreiter-like cryptosystem based on the \((u|u + \upsilon)\)-construction codes RAIRO - Theoretical Informatics and Applications | 2022-01-12 | Paper |
Message-recovery laser fault injection attack on the \textit{classic McEliece} cryptosystem | 2021-12-08 | Paper |
Optimized and secure implementation of ROLLO-I | 2021-01-26 | Paper |
Improvement of binary and non binary statistical decoding algorithm | 2020-07-08 | Paper |
DAGS: key encapsulation using dyadic GS codes Journal of Mathematical Cryptology | 2019-01-11 | Paper |
\(\mathcal{NP}\)-completeness of the Goppa parameterised random binary quasi-dyadic syndrome decoding problem International Journal of Information and Coding Theory | 2018-08-02 | Paper |
A pseudorandom number generator based on worst-case lattice problems Applicable Algebra in Engineering, Communication and Computing | 2017-10-27 | Paper |
On lower bounds for information set decoding over \(\mathbb F_q\) and on the effect of partial knowledge International Journal of Information and Coding Theory | 2017-07-26 | Paper |
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Efficient implementation of hybrid encryption from coding theory Codes, Cryptology and Information Security | 2017-06-01 | Paper |
NP-completeness of the random binary quasi-dyadic coset weight problem and the random binary quasi-dyadic subspace weight problem | 2017-03-03 | Paper |
Critical attacks in code-based cryptography International Journal of Information and Coding Theory | 2016-04-22 | Paper |
Extended security arguments for signature schemes Designs, Codes and Cryptography | 2016-02-19 | Paper |
Efficient software implementations of code-based hash functions and stream-ciphers Arithmetic of Finite Fields | 2015-10-01 | Paper |
Weaknesses in two RFID authentication protocols Lecture Notes in Computer Science | 2015-09-21 | Paper |
Polynomial structures in code-based cryptography Lecture Notes in Computer Science | 2014-01-14 | Paper |
Improved Zero-Knowledge Identification with Lattices Tatra Mountains Mathematical Publications | 2013-02-11 | Paper |
An improved threshold ring signature scheme based on error correcting codes Arithmetic of Finite Fields | 2012-11-01 | Paper |
Broadcast attacks against code-based schemes Research in Cryptology | 2012-10-16 | Paper |
Improving the performance of the SYND stream cipher Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
Extended security arguments for signature schemes Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Post-quantum cryptography: lattice identification schemes Publicationes Mathematicae Debrecen | 2012-07-12 | Paper |
Quasi-dyadic CFS signatures Information Security and Cryptology | 2011-07-29 | Paper |
A zero-knowledge identification scheme based on the \(q\)-ary syndrome decoding problem Selected Areas in Cryptography | 2011-03-15 | Paper |
New results on the Stern identification and signature scheme | 2010-11-05 | Paper |
Improved Zero-Knowledge Identification with Lattices Provable Security | 2010-10-12 | Paper |
A lattice-based threshold ring signature scheme Lecture Notes in Computer Science | 2010-08-31 | Paper |
Post-quantum cryptography: Code-based signatures Advances in Computer Science and Information Technology | 2010-07-13 | Paper |
Quasi-cyclic codes as codes over rings of matrices Finite Fields and their Applications | 2010-04-15 | Paper |
Reducing Key Length of the McEliece Cryptosystem Progress in Cryptology – AFRICACRYPT 2009 | 2009-07-07 | Paper |
Identity-based identification and signature schemes using error correcting codes | 2009-03-24 | Paper |
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory Post-Quantum Cryptography | 2008-11-11 | Paper |
On Kabatianskii-Krouk-Smeets Signatures Arithmetic of Finite Fields | 2007-11-15 | Paper |