Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reducing Key Length of the McEliece Cryptosystem., , , and . AFRICACRYPT, volume 5580 of Lecture Notes in Computer Science, page 77-97. Springer, (2009)Two Algebraic Attacks Against the F-FCSRs Using the IV Mode., and . INDOCRYPT, volume 3797 of Lecture Notes in Computer Science, page 143-154. Springer, (2005)Cryptanalysis of Pseudo-random Generators Based on Vectorial FCSRs., and . INDOCRYPT, volume 7668 of Lecture Notes in Computer Science, page 209-224. Springer, (2012)Codes over finite quotients of polynomial rings., and . Finite Fields Their Appl., (2014)Feedback with carry shift registers synthesis with the Euclidean algorithm., , and . IEEE Trans. Inf. Theory, 50 (5): 910-917 (2004)Revisiting LFSRs for Cryptographic Applications., , , and . IEEE Trans. Inf. Theory, 57 (12): 8095-8113 (2011)New Classes of Cyclic Extended Goppa Codes.. IEEE Trans. Inf. Theory, 45 (4): 1264-1266 (1999)Goppa and related codes invariant under a prescribed permutation.. IEEE Trans. Inf. Theory, 46 (7): 2628-2633 (2000)Security Analysis of a Cryptosystem Based on Subspace Subcodes., , , , , , , and . CBCrypto, volume 13150 of Lecture Notes in Computer Science, page 42-59. Springer, (2021)On Almost Perfect Nonlinear Functions Over F2n., , , and . IEEE Trans. Inf. Theory, 52 (9): 4160-4170 (2006)