Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Magali Bardet"'
Autor:
Magali Bardet, Manon Bertin
Publikováno v:
Post-Quantum Cryptography ISBN: 9783031172335
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e1589ce362f45f6b632086ae06f09a1e
https://doi.org/10.1007/978-3-031-17234-2_6
https://doi.org/10.1007/978-3-031-17234-2_6
Publikováno v:
ISIT 2021-IEEE International Symposium on Information Theory
ISIT 2021-IEEE International Symposium on Information Theory, Jul 2021, Melbourne, Australia. pp.872-877, ⟨10.1109/ISIT45174.2021.9517838⟩
ISIT
ISIT 2021-IEEE International Symposium on Information Theory, Jul 2021, Melbourne, Australia. pp.872-877, ⟨10.1109/ISIT45174.2021.9517838⟩
ISIT
Decoding a Reed-Solomon code can be modeled by a bilinear system which can be solved by Gr\"obner basis techniques. We will show that in this particular case, these techniques are much more efficient than for generic bilinear systems with the same nu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ed753ca78d8d2b44aa310c1d9b1a0347
https://inria.hal.science/hal-03133484
https://inria.hal.science/hal-03133484
Autor:
Daniel Cabarcas, Maxime Bros, Javier A. Verbel, Philippe Gaborit, Ray A. Perlner, Daniel Smith-Tone, Magali Bardet, Jean-Pierre Tillich
Publikováno v:
Advances in Cryptology-ASIACRYPT 2020-26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}
ASIACRYPT 2020-26th International Conference on the Theory and Application of Cryptology and Information Security
ASIACRYPT 2020-26th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2020, Daejeon / Virtual, South Korea. pp.507--536, ⟨10.1007/978-3-030-64837-4_17⟩
Advances in Cryptology – ASIACRYPT 2020 ISBN: 9783030648367
ASIACRYPT (1)
ASIACRYPT 2020-26th International Conference on the Theory and Application of Cryptology and Information Security
ASIACRYPT 2020-26th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2020, Daejeon / Virtual, South Korea. pp.507--536, ⟨10.1007/978-3-030-64837-4_17⟩
Advances in Cryptology – ASIACRYPT 2020 ISBN: 9783030648367
ASIACRYPT (1)
Rank Decoding (RD) is the main underlying problem in rank-based cryptography. Based on this problem and quasi-cyclic versions of it, very efficient schemes have been proposed recently, such as those in the ROLLO and RQC submissions, which have reache
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f3204392965d4c779f708f06aa51a13a
https://hal.inria.fr/hal-03133479
https://hal.inria.fr/hal-03133479
Publikováno v:
CBC 2019-7th Code-Based Cryptography Workshop
CBC 2019-7th Code-Based Cryptography Workshop, May 2019, Darmstadt, Germany. pp.86-101, ⟨10.1007/978-3-030-25922-8_5⟩
Code-Based Cryptography ISBN: 9783030259211
CBC
CBC 2019-7th Code-Based Cryptography Workshop, May 2019, Darmstadt, Germany. pp.86-101, ⟨10.1007/978-3-030-25922-8_5⟩
Code-Based Cryptography ISBN: 9783030259211
CBC
DAGS scheme is a key encapsulation mechanism (KEM) based on quasi-dyadic alternant codes that was submitted to NIST standardization process for a quantum resistant public key algorithm. Recently an algebraic attack was devised by Barelli and Couvreur
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::966cb7976704a2caf839bbf597f7fcf4
https://hal.archives-ouvertes.fr/hal-02125330
https://hal.archives-ouvertes.fr/hal-02125330
Publikováno v:
2019 IEEE International Symposium on Information Theory (ISIT)
2019 IEEE International Symposium on Information Theory (ISIT), Jul 2019, Paris, France. pp.2464-2468, ⟨10.1109/ISIT.2019.8849855⟩
ISIT
2019 IEEE International Symposium on Information Theory (ISIT), Jul 2019, Paris, France. pp.2464-2468, ⟨10.1109/ISIT.2019.8849855⟩
ISIT
The paper deals with the problem of deciding if two finite-dimensional linear subspaces over an arbitrary field are identical up to a permutation of the coordinates. This problem is referred to as the permutation code equivalence. We show that given
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e90c4fff6a43b370a2c892f08ace0d04
http://arxiv.org/abs/1905.00073
http://arxiv.org/abs/1905.00073
Autor:
Vincent Neiger, Olivier Ruatta, Maxime Bros, Jean-Pierre Tillich, Pierre Briaud, Magali Bardet, Philippe Gaborit
Publikováno v:
EUROCRYPT 2020-39th Annual International Conference on the Theory and Applications of Cryptographic Techniques
EUROCRYPT 2020-39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2020, Zagreb / Virtual, Croatia. pp.64--93, ⟨10.1007/978-3-030-45727-3_3⟩
Advances in Cryptology – EUROCRYPT 2020 ISBN: 9783030457266
EUROCRYPT (3)
EUROCRYPT 2020-39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2020, Zagreb / Virtual, Croatia. pp.64--93, ⟨10.1007/978-3-030-45727-3_3⟩
Advances in Cryptology – EUROCRYPT 2020 ISBN: 9783030457266
EUROCRYPT (3)
The Rank metric decoding problem is the main problem considered in cryptography based on codes in the rank metric. Very efficient schemes based on this problem or quasi-cyclic versions of it have been proposed recently, such as those in the submissio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4868a2f0ac7bda62e319c85b5a865b23
Publikováno v:
AFRICACRYPT 2016 (8th International Conference on Cryptology in Africa)
AFRICACRYPT 2016 (8th International Conference on Cryptology in Africa), Apr 2016, Fes, Morocco. pp.346-367, ⟨10.1007/978-3-319-31517-1_18⟩
Progress in Cryptology – AFRICACRYPT 2016 ISBN: 9783319315164
AFRICACRYPT
AFRICACRYPT 2016 (8th International Conference on Cryptology in Africa), Apr 2016, Fes, Morocco. pp.346-367, ⟨10.1007/978-3-319-31517-1_18⟩
Progress in Cryptology – AFRICACRYPT 2016 ISBN: 9783319315164
AFRICACRYPT
International audience; We analyze a new key recovery attack against the Quasi-Cyclic MDPC McEliece scheme. Retrieving the secret key from the public data is usually tackled down using exponential time algorithms aiming to recover minimum weight code
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c4e204f3e131418673023bd2f5b4af1c
https://hal-normandie-univ.archives-ouvertes.fr/hal-02087520
https://hal-normandie-univ.archives-ouvertes.fr/hal-02087520
Publikováno v:
Post-Quantum Cryptography-PQCrypto 2016
Post-Quantum Cryptography-PQCrypto 2016, Feb 2016, Fukuoka, Japan. ⟨10.1007/978-3-319-29360-8_9⟩
Post-Quantum Cryptography
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Post-Quantum Cryptography
Post-Quantum Cryptography ISBN: 9783319293592
PQCrypto
Post-Quantum Cryptography-PQCrypto 2016, Feb 2016, Fukuoka, Japan. ⟨10.1007/978-3-319-29360-8_9⟩
Post-Quantum Cryptography
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Post-Quantum Cryptography
Post-Quantum Cryptography ISBN: 9783319293592
PQCrypto
International audience; Polar codes discovered by Arikan form a very powerful family of codes attaining many information theoretic limits in the fields of error correction and source coding. They have in particular much better decoding capabilities t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9fd91e82bbe41a88acc3aa7879722b4a
https://inria.hal.science/hal-01240856
https://inria.hal.science/hal-01240856
Publikováno v:
ISIT
International Symposium on Information Theory ISIT 2016
International Symposium on Information Theory ISIT 2016, Jul 2016, Barcelona, Spain. pp.230-234, ⟨10.1109/ISIT.2016.7541295⟩
International Symposium on Information Theory ISIT 2016
International Symposium on Information Theory ISIT 2016, Jul 2016, Barcelona, Spain. pp.230-234, ⟨10.1109/ISIT.2016.7541295⟩
Polar codes form a very powerful family of codes with a low complexity decoding algorithm that attain many information theoretic limits in error correction and source coding. These codes are closely related to Reed-Muller codes because both can be de
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c92b24bbd6d1877d13ee74e53666ac83
Autor:
Magali Bardet, Islam Boussaada
Publikováno v:
Applied Mathematics and Computation
Applied Mathematics and Computation, Elsevier, 2011, 217 (17), pp.7318-7323. ⟨10.1016/j.amc.2011.02.023⟩
Applied Mathematics and Computation, Elsevier, 2011, 217 (17), pp.7318-7323. ⟨10.1016/j.amc.2011.02.023⟩
International audience; The C-Algorithm introduced in [Chouikha2007] is designed to determine isochronous centers for Lienard-type differential systems, in the general real analytic case. However, it has a large complexity that prevents computations,