Pierre-Louis Cayrel

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Integer syndrome decoding in the presence of noise
Cryptography and Communications
2024-11-26Paper
Improved algorithm to find equations for algebraic attacks for combiners with memory
 
2024-09-18Paper
DAGS: reloaded revisiting dyadic key encapsulation
Code-Based Cryptography
2024-02-23Paper
A side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomial
Progress in Cryptology - AFRICACRYPT 2023
2024-02-02Paper
Punctured syndrome decoding problem. Efficient side-channel attacks against \textit{Classic McEliece}
Constructive Side-Channel Analysis and Secure Design
2023-11-16Paper
Key-recovery by side-channel information on the matrix-vector product in code-based cryptosystems
Lecture Notes in Computer Science
2023-08-21Paper
Software implementation of a code-based key encapsulation mechanism from binary QD generalized Srivastava codes
Code-Based Cryptography
2023-08-17Paper
A novel Niederreiter-like cryptosystem based on the \((u|u + \upsilon)\)-construction codes
RAIRO - Theoretical Informatics and Applications
2022-01-12Paper
Message-recovery laser fault injection attack on the \textit{classic McEliece} cryptosystem
 
2021-12-08Paper
Optimized and secure implementation of ROLLO-I
 
2021-01-26Paper
Improvement of binary and non binary statistical decoding algorithm
 
2020-07-08Paper
DAGS: key encapsulation using dyadic GS codes
Journal of Mathematical Cryptology
2019-01-11Paper
\(\mathcal{NP}\)-completeness of the Goppa parameterised random binary quasi-dyadic syndrome decoding problem
International Journal of Information and Coding Theory
2018-08-02Paper
A pseudorandom number generator based on worst-case lattice problems
Applicable Algebra in Engineering, Communication and Computing
2017-10-27Paper
On lower bounds for information set decoding over \(\mathbb F_q\) and on the effect of partial knowledge
International Journal of Information and Coding Theory
2017-07-26Paper
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
IEEE Transactions on Information Theory
2017-07-12Paper
Efficient implementation of hybrid encryption from coding theory
Codes, Cryptology and Information Security
2017-06-01Paper
NP-completeness of the random binary quasi-dyadic coset weight problem and the random binary quasi-dyadic subspace weight problem
 
2017-03-03Paper
Critical attacks in code-based cryptography
International Journal of Information and Coding Theory
2016-04-22Paper
Extended security arguments for signature schemes
Designs, Codes and Cryptography
2016-02-19Paper
Efficient software implementations of code-based hash functions and stream-ciphers
Arithmetic of Finite Fields
2015-10-01Paper
Weaknesses in two RFID authentication protocols
Lecture Notes in Computer Science
2015-09-21Paper
Polynomial structures in code-based cryptography
Lecture Notes in Computer Science
2014-01-14Paper
Improved Zero-Knowledge Identification with Lattices
Tatra Mountains Mathematical Publications
2013-02-11Paper
An improved threshold ring signature scheme based on error correcting codes
Arithmetic of Finite Fields
2012-11-01Paper
Broadcast attacks against code-based schemes
Research in Cryptology
2012-10-16Paper
Improving the performance of the SYND stream cipher
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
Extended security arguments for signature schemes
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes
Public Key Cryptography – PKC 2012
2012-07-20Paper
Post-quantum cryptography: lattice identification schemes
Publicationes Mathematicae Debrecen
2012-07-12Paper
Quasi-dyadic CFS signatures
Information Security and Cryptology
2011-07-29Paper
A zero-knowledge identification scheme based on the \(q\)-ary syndrome decoding problem
Selected Areas in Cryptography
2011-03-15Paper
New results on the Stern identification and signature scheme
 
2010-11-05Paper
Improved Zero-Knowledge Identification with Lattices
Provable Security
2010-10-12Paper
A lattice-based threshold ring signature scheme
Lecture Notes in Computer Science
2010-08-31Paper
Post-quantum cryptography: Code-based signatures
Advances in Computer Science and Information Technology
2010-07-13Paper
Quasi-cyclic codes as codes over rings of matrices
Finite Fields and their Applications
2010-04-15Paper
Reducing Key Length of the McEliece Cryptosystem
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
Identity-based identification and signature schemes using error correcting codes
 
2009-03-24Paper
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
Post-Quantum Cryptography
2008-11-11Paper
On Kabatianskii-Krouk-Smeets Signatures
Arithmetic of Finite Fields
2007-11-15Paper


Research outcomes over time


This page was built for person: Pierre-Louis Cayrel