Παρακολούθηση
Nicolas Sendrier
Nicolas Sendrier
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα inria.fr
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
How to achieve a McEliece-based digital signature scheme
NT Courtois, M Finiasz, N Sendrier
International Conference on the Theory and Application of Cryptology and …, 2001
5842001
MDPC-McEliece: New McEliece variants from moderate density parity-check codes
R Misoczki, JP Tillich, N Sendrier, PSLM Barreto
2013 IEEE international symposium on information theory, 2069-2073, 2013
4582013
On correlation-immune functions
P Camion, C Carlet, P Charpin, N Sendrier
Annual International Cryptology Conference, 86-100, 1991
3461991
Security bounds for the design of code-based cryptosystems
M Finiasz, N Sendrier
International conference on the theory and application of cryptology and …, 2009
3062009
Finding the permutation between equivalent linear codes: The support splitting algorithm
N Sendrier
IEEE Transactions on Information Theory 46 (4), 1193-1203, 2000
2412000
Code-based cryptography
R Overbeck, N Sendrier
Post-quantum cryptography, 95-145, 2009
2202009
Cryptanalysis of the original McEliece cryptosystem
A Canteaut, N Sendrier
International conference on the theory and application of cryptology and …, 1998
1651998
Decoding one out of many
N Sendrier
International Workshop on Post-Quantum Cryptography, 51-67, 2011
1492011
Linear codes with complementary duals meet the Gilbert–Varshamov bound
N Sendrier
Discrete mathematics 285 (1-3), 345-347, 2004
1372004
Linear codes with complementary duals meet the Gilbert–Varshamov bound
N Sendrier
Discrete mathematics 285 (1-3), 345-347, 2004
1372004
McEliece cryptosystem implementation: Theory and practice
B Biswas, N Sendrier
International Workshop on Post-Quantum Cryptography, 47-62, 2008
1292008
A family of fast syndrome based cryptographic hash functions
D Augot, M Finiasz, N Sendrier
International Conference on Cryptology in Malaysia, 64-83, 2005
1212005
Weak keys in the McEliece public-key cryptosystem
P Loidreau, N Sendrier
IEEE Transactions on Information Theory 47 (3), 1207-1211, 2001
1182001
Classic McEliece: conservative code-based cryptography
DJ Bernstein, T Chou, T Lange, I von Maurich, R Misoczki, ...
NIST submissions, 2017
1092017
Analysis of information set decoding for a sub-linear error weight
R Canto Torres, N Sendrier
Post-Quantum Cryptography, 144-161, 2016
1032016
Studying the locator polynomials of minimum weight codewords of BCH codes
D Augot, P Charpin, N Sendrier
IEEE Transactions on Information Theory 38 (3), 960-973, 1992
951992
Studying the locator polynomials of minimum weight codewords of BCH codes
D Augot, P Charpin, N Sendrier
IEEE Transactions on Information Theory 38 (3), 960-973, 1992
951992
BIKE: bit flipping key encapsulation
N Aragon, PSLM Barreto, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ...
852017
On the dimension of the hull
N Sendrier
SIAM Journal on Discrete Mathematics 10 (2), 282-293, 1997
851997
Initial recommendations of long-term secure post-quantum systems
A Daniel, B Lejla
PQCRYPTO. EU. Horizon 2020, 2015
762015
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20