Author of the publication

Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes.

, , , , and . PQCrypto, volume 9606 of Lecture Notes in Computer Science, page 118-143. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Statistical decoding., and . ISIT, page 1798-1802. IEEE, (2017)Attaining capacity with iterated (U|U + V) codes based on AG codes and Koetter-Vardy soft decoding., and . ISIT, page 6-10. IEEE, (2017)The Quantum Decoding Problem., and . IACR Cryptol. ePrint Arch., (2023)Faster Dual Lattice Attacks by Using Coding Theory., , and . IACR Cryptol. ePrint Arch., (2022)Decoding Reed-Solomon codes by solving a bilinear system with a Gröbner basis approach., , and . ISIT, page 872-877. IEEE, (2021)Polynomial Time Attack on Wild McEliece over Quadratic Extensions., , and . EUROCRYPT, volume 8441 of Lecture Notes in Computer Science, page 17-39. Springer, (2014)Automatic Detection of a Watermarked Document Using a Private Key., and . Information Hiding, volume 2137 of Lecture Notes in Computer Science, page 258-272. Springer, (2001)Algebraic attacks for solving the Rank Decoding and MinRank problems without Gröbner basis., , , , , , , and . CoRR, (2020)Reduction from Sparse LPN to LPN, Dual Attack 3.0., , , and . EUROCRYPT (6), volume 14656 of Lecture Notes in Computer Science, page 286-315. Springer, (2024)Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups., , , , and . IACR Cryptology ePrint Archive, (2014)