Daniel Augot
Daniel Augot
INRIA et LIX
Verified email at inria.fr
Title
Cited by
Cited by
Year
A family of fast syndrome based cryptographic hash functions
D Augot, M Finiasz, N Sendrier
International Conference on Cryptology in Malaysia, 64-83, 2005
1012005
Direct construction of recursive MDS diffusion layers using shortened BCH codes
D Augot, M Finiasz
International Workshop on Fast Software Encryption, 3-17, 2014
852014
Studying the locator polynomials of minimum weight codewords of BCH codes
D Augot, P Charpin, N Sendrier
IEEE Transactions on Information Theory 38 (3), 960-973, 1992
811992
Initial recommendations of long-term secure post-quantum systems
A Daniel, B Lejla
PQCRYPTO. EU. Horizon 2020, 2015
672015
Secure delivery of images over open networks
D Augot, JM Boucqueau, JF Delaigle, C Fontaine, E Goray
Proceedings of the IEEE 87 (7), 1251-1266, 1999
591999
Exhaustive search for small dimension recursive MDS diffusion layers for block ciphers and hash functions
D Augot, M Finiasz
2013 IEEE International Symposium on Information Theory, 1551-1555, 2013
542013
An efficient group key agreement protocol for ad hoc networks
D Augot, R Bhaskar, V Issarny, D Sacchetti
Sixth IEEE International Symposium on a World of Wireless Mobile and …, 2005
502005
A Hensel lifting to replace factorization in list-decoding of algebraic-geometric and Reed-Solomon codes
D Augot, L Pecquet
IEEE Transactions on Information Theory 46 (7), 2605-2614, 2000
502000
A public key encryption scheme based on the polynomial reconstruction problem
D Augot, M Finiasz
International Conference on the Theory and Applications of Cryptographic …, 2003
462003
A user-centric system for verified identities on the bitcoin blockchain
D Augot, H Chabanne, T Chenevier, W George, L Lambert
Data Privacy Management, Cryptocurrencies and Blockchain Technology, 390-407, 2017
402017
Rank metric and Gabidulin codes in characteristic zero
D Augot, P Loidreau, G Robert
2013 IEEE International Symposium on Information Theory, 509-513, 2013
382013
An interpolation procedure for list decoding Reed–Solomon codes based on generalized key equations
A Zeh, C Gentner, D Augot
IEEE Transactions on Information Theory 57 (9), 5946-5959, 2011
342011
Idempotents and the BCH bound
D Augot, N Sendrier
IEEE Transactions on information Theory 40 (1), 204-207, 1994
341994
A Fast Provably Secure Cryptographic Hash Function.
D Augot, M Finiasz, N Sendrier
IACR Cryptol. ePrint Arch. 2003, 230, 2003
312003
Sha-3 proposal: FSB
D Augot, M Finiasz, P Gaborit, S Manuel, N Sendrier
Submission to NIST, 81-85, 2008
302008
A three round authenticated group key agreement protocol for ad hoc networks
D Augot, R Bhaskar, V Issarny, D Sacchetti
Pervasive and Mobile Computing 3 (1), 36-52, 2007
292007
Bounds on the minimum distance of the duals of BCH codes
D Augot, F Levy-dit-Vehel
IEEE Transactions on Information Theory 42 (4), 1257-1260, 1996
291996
Transforming face-to-face identity proofing into anonymous digital identity using the Bitcoin blockchain
D Augot, H Chabanne, O Clémot, W George
2017 15th Annual Conference on Privacy, Security and Trust (PST), 25-2509, 2017
262017
Generalized Gabidulin codes over fields of any characteristic
D Augot, P Loidreau, G Robert
Designs, Codes and Cryptography 86 (8), 1807-1848, 2018
252018
A storage-efficient and robust private information retrieval scheme allowing few servers
D Augot, F Levy-dit-Vehel, A Shikfa
International Conference on Cryptology and Network Security, 222-239, 2014
252014
The system can't perform the operation now. Try again later.
Articles 1–20