Bibliography
Publications of the year
Doctoral Dissertations and Habilitation Theses
-
1E. Barelli.
Étude de la sécurité de certaines clés compactes pour le schéma de McEliece utilisant des codes géométriques, Université Paris-Saclay, December 2018.
https://pastel.archives-ouvertes.fr/tel-01982502 -
2J. Lavauzelle.
Codes with locality : constructions and applications to cryptographic protocols, Université Paris-Saclay, November 2018.
https://pastel.archives-ouvertes.fr/tel-01951078
Articles in International Peer-Reviewed Journals
-
3B. Audoux, A. Couvreur.
On tensor products of CSS Codes, in: Annales de l’Institut Henri Poincaré (D) Combinatorics, Physics and their Interactions, 2018, https://arxiv.org/abs/1512.07081.
https://hal.archives-ouvertes.fr/hal-01248760 -
4D. Augot, P. Loidreau, G. Robert.
Generalized Gabidulin codes over fields of any characteristic, in: Designs, Codes and Cryptography, 2018, vol. 86, no 8, pp. 1807-1848, https://arxiv.org/abs/1703.09125. [ DOI : 10.1007/s10623-017-0425-6 ]
https://hal.archives-ouvertes.fr/hal-01503212 -
5C. Bachoc, A. Couvreur, G. Zémor.
Towards a function field version of Freiman's Theorem, in: Algebraic Combinatorics, 2018, vol. 1, no 4, pp. 501-521, https://arxiv.org/abs/1709.00087. [ DOI : 10.5802/alco.19 ]
https://hal.archives-ouvertes.fr/hal-01584034 -
6E. Barelli, P. Beelen, M. Datta, V. Neiger, J. Rosenkilde.
Two-Point Codes for the Generalized GK Curve, in: IEEE Transactions on Information Theory, 2018. [ DOI : 10.1109/TIT.2017.2763165 ]
https://hal.archives-ouvertes.fr/hal-01535513 -
7J. Lavauzelle.
Lifted projective Reed–Solomon codes, in: Designs, Codes and Cryptography, 2018, https://arxiv.org/abs/1809.00931. [ DOI : 10.1007/s10623-018-0552-8 ]
https://hal.archives-ouvertes.fr/hal-01901147 -
8J. Lavauzelle.
Private Information Retrieval from Transversal Designs, in: IEEE Transactions on Information Theory, 2018, 1 p, https://arxiv.org/abs/1709.07952. [ DOI : 10.1109/TIT.2018.2861747 ]
https://hal.archives-ouvertes.fr/hal-01901014
International Conferences with Proceedings
-
9E. Barelli, A. Couvreur.
An efficient structural attack on NIST submission DAGS, in: ASIACRYPT 2018, Brisbane, Australia, Advances in Cryptology – ASIACRYPT 2018, December 2018, vol. 11272, https://arxiv.org/abs/1805.05429. [ DOI : 10.1007/978-3-030-03326-2_4 ]
https://hal.archives-ouvertes.fr/hal-01796338 -
10L. De Feo, J. Kieffer, B. Smith.
Towards practical key exchange from ordinary isogeny graphs, in: ASIACRYPT 2018, Brisbane, Australia, December 2018, https://arxiv.org/abs/1809.07543.
https://hal.inria.fr/hal-01872817
Other Publications
-
11A. Couvreur, M. Lequesne, J.-P. Tillich.
Recovering short secret keys of RLCE encryption scheme in polynomial time, October 2018, JC2 2018 - Journées Codage et Cryptographie.
https://hal.inria.fr/hal-01959617 -
12A. Couvreur, M. Lequesne, J.-P. Tillich.
Recovering short secret keys of RLCE in polynomial time, May 2018, https://arxiv.org/abs/1805.11489 - working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01803440 -
13N. Coxon.
Fast Hermite interpolation and evaluation over finite fields of characteristic two, July 2018, https://arxiv.org/abs/1807.00645 - working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01827583 -
14N. Coxon.
Fast transforms over finite fields of characteristic two, July 2018, https://arxiv.org/abs/1807.07785 - working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01845238 -
15S. Galbraith, L. Panny, B. Smith, F. Vercauteren.
Quantum Equivalence of the DLP and CDHP for Group Actions, December 2018, https://arxiv.org/abs/1812.09116 - working paper or preprint.
https://hal.inria.fr/hal-01963660 -
16J. Lavauzelle, R. Tajeddine, R. Freij-Hollanti, C. Hollanti.
Private Information Retrieval Schemes with Regenerating Codes, November 2018, https://arxiv.org/abs/1811.02898 - working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01951956 -
17F. Morain, G. Renault, B. Smith.
Deterministic factoring with oracles, February 2018, https://arxiv.org/abs/1802.08444 - working paper or preprint.
https://hal.inria.fr/hal-01715832 -
18B. Smith.
Pre- and post-quantum Diffie-Hellman from groups, actions, and isogenies, September 2018, https://arxiv.org/abs/1809.04803 - working paper or preprint.
https://hal.inria.fr/hal-01872825
-
19W. Castryck, T. Lange, C. Martindale, L. Panny, J. Renes.
CSIDH: An Efficient Post-Quantum Commutative Group Action, in: Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III, T. Peyrin, S. D. Galbraith (editors), Lecture Notes in Computer Science, Springer, 2018, vol. 11274, pp. 395–427.
https://doi.org/10.1007/978-3-030-03332-3_15