Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups., , , , and . IACR Cryptology ePrint Archive, (2014)Attaining Capacity with Algebraic Geometry Codes through the (U|U+V) Construction and Koetter-Vardy Soft Decoding., and . CoRR, (2017)An Efficient Attack of a McEliece Cryptosystem Variant Based on Convolutional Codes., and . PQCrypto, volume 7932 of Lecture Notes in Computer Science, page 102-117. Springer, (2013)Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes., , , , and . Des. Codes Cryptogr., 73 (2): 641-666 (2014)Algebraic attacks for solving the Rank Decoding and MinRank problems without Gröbner basis., , , , , , , and . CoRR, (2020)An Algebraic Attack on Rank Metric Code-Based Cryptosystems., , , , , , and . CoRR, (2019)Two Attacks on Rank Metric Code-Based Schemes: RankSign and an IBE Scheme., and . ASIACRYPT (1), volume 11272 of Lecture Notes in Computer Science, page 62-92. Springer, (2018)Statistical decoding., and . ISIT, page 1798-1802. IEEE, (2017)Attaining capacity with iterated (U|U + V) codes based on AG codes and Koetter-Vardy soft decoding., and . ISIT, page 6-10. IEEE, (2017)The Quantum Decoding Problem., and . IACR Cryptol. ePrint Arch., (2023)