Recherche - INRIA - Institut National de Recherche en Informatique et en Automatique Accéder directement au contenu

Filtrer vos résultats

117 résultats
Image document

D.STVL.7 - Algebraic cryptanalysis of symmetric primitives

Carlos Cid , Martin Albrecht , Daniel Augot , Anne Canteaut , Ralf-Philipp Weinmann
2008
Pré-publication, Document de travail hal-00328626v1
Image document

Polynomial equivalence problems and applications to multivariate cryptosystems

Françoise Levy-Dit-Vehel , Ludovic Perret
[Research Report] RR-5119, INRIA. 2004
Rapport inria-00071464v1
Image document

Tools for Coset Weight Enumerators of some Codes

Pascale Charpin
[Research Report] RR-2640, INRIA. 1995
Rapport inria-00074050v1
Image document

A further improvement of the work factor in an attempt at breaking McEliece's cryptosystem

Anne Canteaut , Hervé Chabanne
[Research Report] RR-2227, INRIA. 1994
Rapport inria-00074443v1
Image document

Applied Cryptanalysis of Cryptosystems and Computer Attacks Through Hidden Ciphertexts Computer Viruses

Eric Filiol
[Research Report] RR-4359, INRIA. 2002
Rapport inria-00072229v1
Image document

Product of linear codes

Nicolas Sendrier
RR-1286, INRIA. 1990
Rapport inria-00075273v1
Image document

Cryptanalysis of block ciphers and weight divisibility of some binary codes

Anne Canteaut , Pascale Charpin , Marion Videau
Blaum, Mario and Farrell, Patrick G. and van Tilborg, Henk C.A. Information, coding, and mathematics: proceedings of the workshop honoring Prof. Bob McEliece on his 60th birthday, 687, Kluwer, pp.75-97, 2002, The Kluwer International Series in Engineering and Computer Science, 978-1-4020-7079-2
Chapitre d'ouvrage hal-00675327v1
Image document

Higher order differential attacks on iterated block ciphers using almost bent round functions

Anne Canteaut , Marion Videau
ISIT 2002 : IEEE International Symposium on Information Theory, Jun 2002, Lausanne, Switzerland. pp.209, ⟨10.1109/ISIT.2002.1023481⟩
Communication dans un congrès hal-00675354v1
Image document

Secure Delivery of Images over Open Networks

Daniel Augot , Jean-Marc Boucqueau , Jean-François Delaigle , Caroline Fontaine , Eddy Goray
Proceedings of the IEEE, 1999, 87 (7), pp.1251 - 1266. ⟨10.1109/5.771076⟩
Article dans une revue hal-00723737v1
Image document

Cryptanalysis of Achterbahn-128/80

Maria Naya Plasencia
[Research Report] RR-6014, INRIA. 2006, pp.14
Rapport inria-00111964v2
Image document

A Family of Fast Syndrome Based Cryptographic Hash Functions

Daniel Augot , Matthieu Finiasz , Nicolas Sendrier
MYCRYPT 2005 : First International Conference on Cryptology in Malaysia, Sep 2005, Kuala Lumpur, Malaysia. pp.64-83, ⟨10.1007/11554868_6⟩
Communication dans un congrès inria-00509188v2
Image document

On propagation characteristics of resilient functions

Pascale Charpin , Enes Pasalic
[Research Report] RR-4537, INRIA. 2002
Rapport inria-00072051v1
Image document

Groupe d'automorphismes des codes de Reed-Muller P-aires

Thierry Pierre Berger
[Rapport de recherche] RR-1630, INRIA. 1992
Rapport inria-00074931v1
Image document

A Polly Cracker system based on Satisfiability

Françoise Levy-Dit-Vehel , Ludovic Perret
[Research Report] RR-4698, INRIA. 2003
Rapport inria-00071888v1
Image document

Self-dual codes which are principal ideals of the group algebra "F2[{F2m,+}]

Pascale Charpin
[Research Report] RR-2325, INRIA. 1994
Rapport inria-00074349v1
Image document

On the Solution of Equations of Degree

Victor Zinoviev
[Research Report] RR-2829, INRIA. 1996
Rapport inria-00073862v1
Image document

Ciphertext only Reconstruction of LFSR-based Stream Ciphers

Anne Canteaut , Eric Filiol
[Research Report] RR-3887, INRIA. 2000
Rapport inria-00072766v1
Image document

The Support Splitting Algorithm

Nicolas Sendrier
[Research Report] RR-3637, INRIA. 1999
Rapport inria-00073037v1
Image document

Efficient and Dynamic Group Key Agreement in Ad hoc Networks

Raghav Bhaskar , Paul Mühlethaler , Daniel Augot , Cédric Adjih , Saadi Boudjit , et al.
[Research Report] RR-5915, INRIA. 2006
Rapport inria-00071348v2
Image document

Algebraic Solutions of Newton's identities for cyclic codes

Daniel Augot
1998 Information Theory Workshop, Aug 1998, Killarney, Ireland. pp.49, ⟨10.1109/ITW.1998.706411⟩
Communication dans un congrès inria-00509468v1
Image document

Efficient decoding of (binary) cyclic codes above the correction capacity of the code using Grobner bases

Daniel Augot , Magali Bardet , Jean-Charles Faugère
IEEE International Symposium on Information Theory - ISIT'2003, Jun 2003, Yokohama, Japan. pp.362 - 362, ⟨10.1109/ISIT.2003.1228378⟩
Communication dans un congrès inria-00509269v1
Image document

A Bottleneck Attack on Crypton

Marine Minier
[Research Report] RR-5324, INRIA. 2004, pp.14
Rapport inria-00070676v1
Image document

Strong Cryptography Armoured Computer Viruses Forbidding Code Analysis: the bradley virus

Eric Filiol
[Research Report] RR-5250, INRIA. 2004, pp.10
Rapport inria-00070748v1
Image document

Understanding cache attacks

Anne Canteaut , Cédric Lauradoux , André Seznec
[Research Report] RR-5881, INRIA. 2006
Rapport inria-00071387v1
Image document

A New Algorithm for Finding Minimum-Weight Words in a Linear Code: Application to Primitive Narrow-Sense BCH Codes of Length~511

Anne Canteaut , Florent Chabaud
[Research Report] RR-2685, INRIA. 1995
Rapport inria-00074006v1
Image document

Construction of Resilient Functions over a Finite Alphabet

Paul Camion , Anne Canteaut
[Research Report] RR-2789, INRIA. 1996
Rapport inria-00073902v1
Image document

Newton's identities for minimum codewords of a family of alternant codes

Daniel Augot
1995 IEEE International Symposium on Information Theory, Sep 1995, Whistler, Canada. pp.349, ⟨10.1109/ISIT.1995.550336⟩
Communication dans un congrès inria-00509424v1
Image document

Etude cryptographique de solution de sécurité pour les environnements distribués sans fil. Application au projet azone.

Raghav Bhaskar
Cryptographie et sécurité [cs.CR]. Ecole Polytechnique X, 2006. Français. ⟨NNT : 2006EPXX0010⟩
Thèse pastel-00001906v1
Image document

Description of minimum weight codewords of cyclic codes by algebraic systems

Daniel Augot
Finite Fields and Their Applications, 1996, 2, pp.138-152. ⟨10.1006/ffta.1996.0009⟩
Article dans une revue hal-00723500v1
Image document

Symmetric Boolean functions

Anne Canteaut , Marion Videau
IEEE Transactions on Information Theory, 2005, 51 (8), pp.2791- 2811. ⟨10.1109/TIT.2005.851743⟩
Article dans une revue inria-00001148v1