Filtrer vos résultats
- 190
- 59
- 108
- 77
- 32
- 16
- 4
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 2
- 218
- 129
- 6
- 1
- 1
- 5
- 32
- 47
- 32
- 13
- 15
- 10
- 16
- 11
- 17
- 21
- 15
- 14
- 1
- 242
- 7
- 249
- 249
- 22
- 16
- 13
- 10
- 10
- 10
- 9
- 8
- 8
- 8
- 8
- 7
- 6
- 5
- 5
- 5
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 23
- 19
- 18
- 18
- 15
- 14
- 12
- 12
- 11
- 10
- 9
- 9
- 9
- 8
- 8
- 8
- 7
- 7
- 7
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
249 résultats
|
Improving NFS for the Discrete Logarithm Problem in Non-prime Finite FieldsEUROCRYPT 2015, Proceedings, Part {I}, Apr 2015, Sofia, Bulgaria. pp.129-155, ⟨10.1007/978-3-662-46800-5_6⟩
Communication dans un congrès
hal-01112879v2
|
||
|
Factoring Safe Semiprimes with a Single Quantum Query2016
Pré-publication, Document de travail
hal-01229587v1
|
||
|
An upper bound on the number of rational points of arbitrary projective varieties over finite fieldsProceedings of the American Mathematical Society, 2016, 144 (9), pp.3671-3685. ⟨10.1090/proc/13015⟩
Article dans une revue
hal-01069510v1
|
||
|
A survey of elliptic curves for proof systemsDesigns, Codes and Cryptography, 2022, Special Issue: Mathematics of Zero-Knowledge, 91 (11), pp.3333-3378. ⟨10.1007/s10623-022-01135-y⟩
Article dans une revue
hal-03667798v2
|
||
|
Efficient supersingularity testing over F_p and CSIDH key validationMathematical Cryptology, 2022, 2 (1), pp.21-35
Article dans une revue
hal-03739021v1
|
||
|
How arithmetic and geometry make error correcting codes better2021
Pré-publication, Document de travail
hal-03400779v1
|
||
|
On the security of a Loidreau rank metric code based encryption schemeDesigns, Codes and Cryptography, 2020, 88 (9), pp.1941-1957. ⟨10.1007/s10623-020-00781-4⟩
Article dans une revue
hal-03049694v1
|
||
|
Computing Riemann-Roch spaces via Puiseux expansionsJournal of Complexity, 2022, ⟨10.1016/j.jco.2022.101666⟩
Article dans une revue
hal-03281757v2
|
||
|
Codes algébriques et géométriques, applications à la cryptographie et à l'information quantiqueMathématiques [math]. Université Paris Diderot, 2019
HDR
tel-02438668v1
|
||
|
Modeling and construction of interactive cryptographic protocols for outsourced storageCryptography and Security [cs.CR]. Institut Polytechnique de Paris, 2022. English. ⟨NNT : 2022IPPAX086⟩
Thèse
tel-03887128v2
|
||
|
Classical and Quantum Algorithms for Generic Syndrome Decoding Problems and Applications to the Lee MetricPQCrypto 2021 - Post-Quantum Cryptography 12th International Workshop, Jul 2021, Daejeon, South Korea. pp.44-62, ⟨10.1007/978-3-030-81293-5_3⟩
Communication dans un congrès
hal-03529777v1
|
||
|
Pseudorandomness of Decoding, Revisited: Adapting OHCP to Code-Based CryptographyASIACRYPT 2023 - International Conference on the Theory and Application of Cryptology and Information Security, Dec 2023, Guang Zhou, China
Communication dans un congrès
hal-04308091v1
|
||
|
Safe-Error Analysis of Post-Quantum Cryptography MechanismsFDTC 2021 - Fault Diagnosis and Tolerance in Cryptographie, Sep 2021, Virtual event, France
Communication dans un congrès
hal-03330189v1
|
||
|
Optimized and secure pairing-friendly elliptic curves suitable for one layer proof compositionCANS 2020 - 19th International Conference on Cryptology and Network Security, Dec 2020, Vienna / Virtual, Austria. pp.259-279, ⟨10.1007/978-3-030-65411-5_13⟩
Communication dans un congrès
hal-02962800v1
|
||
|
Pre- and post-quantum Diffie-Hellman from groups, actions, and isogeniesArithmetic of Finite Fields - WAIFI 2018, Jun 2018, Bergen, Norway. pp.36, ⟨10.1007/978-3-030-05153-2_1⟩
Communication dans un congrès
hal-01872825v3
|
||
|
Algebraic geometry codes and some applicationsW. Cary Huffman, Jon-Lark Kim, Patrick Solé. A Concise Encyclopedia of Coding Theory, Chapman and Hall/CRC, pp.998, 2021, A Concise Encyclopedia of Coding Theory, 9781138551992
Chapitre d'ouvrage
hal-02931167v1
|
||
|
Algebraic Soft- and Hard-Decision Decoding of Generalized Reed--Solomon and Cyclic CodesComputational Complexity [cs.CC]. Ecole Polytechnique X, 2013. English. ⟨NNT : ⟩
Thèse
pastel-00866134v1
|
||
|
Codes Structurés pour la Cryptographie: des Fondations Théoriques de la Sécurité aux ApplicationsCryptographie et sécurité [cs.CR]. École Polytechnique, 2023. Français. ⟨NNT : 2023IPPAX109⟩
Thèse
tel-04386153v1
|
||
|
Exercice de style2016
Pré-publication, Document de travail
hal-01263735v1
|
||
|
Polynomial Time Attack on Wild McEliece Over Quadratic ExtensionsIEEE Transactions on Information Theory, 2017, 63 (1), pp.404--427. ⟨10.1109/TIT.2016.2574841⟩
Article dans une revue
hal-01661935v1
|
||
|
Fast transforms over finite fields of characteristic twoJournal of Symbolic Computation, 2021, 104, pp.824-854. ⟨10.1016/j.jsc.2020.10.002⟩
Article dans une revue
hal-01845238v3
|
||
A gapless code-based hash proof system based on RQC and its applicationsDesigns, Codes and Cryptography, 2022, ⟨10.1007/s10623-022-01075-7⟩
Article dans une revue
hal-03815797v1
|
|||
|
(Augmented) Broadcast Encryption from Identity Based Encryption with WildcardCANS 2022 - 21st International Conference on Cryptology and Network Security, Nov 2022, Dubai, United Arab Emirates. pp.143-164, ⟨10.1007/978-3-031-20974-1_7⟩
Communication dans un congrès
hal-03856239v1
|
||
|
Statistical Decoding 2.0: Reducing Decoding to LPNASIACRYPT 2022 - 28th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2022, Taipei, Taiwan. pp.477--507, ⟨10.1007/978-3-031-22972-5_17⟩
Communication dans un congrès
hal-03919778v1
|
||
|
Information Sets of Multiplicity CodesInformation Theory (ISIT), 2015 IEEE International Symposium on , Jun 2015, Hong-Kong, China. pp.2401 - 2405, ⟨10.1109/ISIT.2015.7282886⟩
Communication dans un congrès
hal-01188935v1
|
||
|
Generic constructions of PoRs from codes and instantiationsJournal of Mathematical Cryptology, In press, 13 (2), pp.81--106. ⟨10.1515/jmc-2018-0018⟩
Article dans une revue
hal-02053948v1
|
||
|
Shimura modular curves and asymptotic symmetric tensor rank of multiplication in any finite fieldConference on Algebraic Informatics, Sep 2013, Porquerolles Island, France. pp.160-172, ⟨10.1007/978-3-642-40663-8_16⟩
Communication dans un congrès
hal-00828070v1
|
||
|
Sub-quadratic Decoding of One-point Hermitian CodesIEEE Transactions on Information Theory, 2015, 61 (6), pp.3225-3240 ⟨10.1109/TIT.2015.2424415⟩
Article dans une revue
hal-01245062v1
|
||
|
Recovering short secret keys of RLCE encryption scheme in polynomial timePQCrypto 2019 - International Conference on Post-Quantum Cryptography, May 2019, Chongqing, China. pp.133--152, ⟨10.1007/978-3-030-25510-7_8⟩
Communication dans un congrès
hal-01959617v1
|
||
|
An Algorithmic Reduction Theory for Binary Codes: LLL and moreIEEE Transactions on Information Theory, In press, ⟨10.1109/TIT.2022.3143620⟩
Article dans une revue
hal-03529739v1
|