Jean-Charles Faugère
According to our database1,
Jean-Charles Faugère
authored at least 131 papers
between 1993 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
2022
J. Symb. Comput., 2022
IACR Cryptol. ePrint Arch., 2022
2021
SIAM J. Appl. Algebra Geom., 2021
Des. Codes Cryptogr., 2021
2020
In-depth comparison of the Berlekamp-Massey-Sakata and the Scalar-FGLM algorithms: The adaptive variants.
J. Symb. Comput., 2020
2019
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
Non-quantum cryptanalysis of the noisy version of Aaronson-Christiano's quantum money scheme.
IET Inf. Secur., 2019
Gr{ö}bner Basis over Semigroup Algebras: Algorithms and Applications for Sparse Polynomial Systems.
CoRR, 2019
Gröbner Basis over Semigroup Algebras: Algorithms and Applications for Sparse Polynomial Systems.
Proceedings of the 2019 on International Symposium on Symbolic and Algebraic Computation, 2019
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019
2018
The point decomposition problem over hyperelliptic curves - Toward efficient computation of discrete logarithms in even characteristic.
Des. Codes Cryptogr., 2018
CoRR, 2018
Proceedings of the 2018 ACM on International Symposium on Symbolic and Algebraic Computation, 2018
Proceedings of the 2018 ACM on International Symposium on Symbolic and Algebraic Computation, 2018
Bilinear Systems with Two Supports: Koszul Resultant Matrices, Eigenvalues, and Eigenvectors.
Proceedings of the 2018 ACM on International Symposium on Symbolic and Algebraic Computation, 2018
Proceedings of the 1st International Conference on Big Data and Cyber-Security Intelligence, 2018
2017
J. Symb. Comput., 2017
Linear algebra for computing Gröbner bases of linear recursive multidimensional sequences.
J. Symb. Comput., 2017
IACR Cryptol. ePrint Arch., 2017
In-depth comparison of the Berlekamp - Massey - Sakata and the Scalar-FGLM algorithms: the non adaptive variants.
CoRR, 2017
2016
IEEE Trans. Inf. Theory, 2016
J. Symb. Comput., 2016
Des. Codes Cryptogr., 2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the ACM on International Symposium on Symbolic and Algebraic Computation, 2016
Proceedings of the ACM on International Symposium on Symbolic and Algebraic Computation, 2016
Determinantal Sets, Singularities and Application to Optimal Control in Medical Imagery.
Proceedings of the ACM on International Symposium on Symbolic and Algebraic Computation, 2016
Guessing Linear Recurrence Relations of Sequence Tuplesand P-recursive Sequences with Linear Algebra.
Proceedings of the ACM on International Symposium on Symbolic and Algebraic Computation, 2016
Proceedings of the ACM on International Symposium on Symbolic and Algebraic Computation, 2016
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016
2015
Polynomial-time algorithms for quadratic isomorphism of polynomials: The regular case.
J. Complex., 2015
IACR Cryptol. ePrint Arch., 2015
ACM Commun. Comput. Algebra, 2015
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
2014
J. Cryptol., 2014
IACR Cryptol. ePrint Arch., 2014
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
CoRR, 2014
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Proceedings of the International Symposium on Symbolic and Algebraic Computation, 2014
Proceedings of the International Symposium on Symbolic and Algebraic Computation, 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Symmetrized Summation Polynomials: Using Small Order Torsion Points to Speed Up Elliptic Curve Index Calculus.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special Form.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
A Variant of Coppersmith's Algorithm with Improved Complexity and Efficient Exhaustive Search.
IACR Cryptol. ePrint Arch., 2013
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions.
IACR Cryptol. ePrint Arch., 2013
Des. Codes Cryptogr., 2013
Proceedings of the International Symposium on Symbolic and Algebraic Computation, 2013
Proceedings of the International Symposium on Symbolic and Algebraic Computation, 2013
2012
J. Symb. Comput., 2012
Finite Fields Their Appl., 2012
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
Solving polynomial systems globally invariant under an action of the symmetric group and application to the equilibria of N vortices in the plane.
Proceedings of the International Symposium on Symbolic and Algebraic Computation, 2012
Proceedings of the International Symposium on Symbolic and Algebraic Computation, 2012
Solving polynomial systems over finite fields: improved analysis of the hybrid approach.
Proceedings of the International Symposium on Symbolic and Algebraic Computation, 2012
Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
2011
Math. Comput. Sci., 2011
J. Symb. Comput., 2011
Gröbner bases of bihomogeneous ideals generated by polynomials of bidegree (1, 1): Algorithms and complexity.
J. Symb. Comput., 2011
IACR Cryptol. ePrint Arch., 2011
On the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gröbner Basis Algorithms.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Fast algorithm for change of ordering of zero-dimensional Gröbner bases with sparse multiplication matrices.
Proceedings of the Symbolic and Algebraic Computation, International Symposium, 2011
Proceedings of the Trusted Systems - Third International Conference, 2011
2010
Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem.
IACR Cryptol. ePrint Arch., 2010
Gröbner Bases of Bihomogeneous Ideals generated by Polynomials of Bidegree (1,1): Algorithms and Complexity
CoRR, 2010
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Progress in Cryptology, 2010
Proceedings of the Symbolic and Algebraic Computation, International Symposium, 2010
Computing loci of rank defects of linear matrices using Gröbner bases and applications to cryptology.
Proceedings of the Symbolic and Algebraic Computation, International Symposium, 2010
Proceedings of the Mathematical Software, 2010
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Proceedings of the 4th International Workshop on Parallel Symbolic Computation, 2010
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010
2009
An efficient algorithm for decomposing multivariate polynomials and its applications to cryptography.
J. Symb. Comput., 2009
J. Symb. Comput., 2009
J. Math. Cryptol., 2009
J. Math. Cryptol., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Symbolic and Algebraic Computation, International Symposium, 2009
Proceedings of the Symbolic and Algebraic Computation, International Symposium, 2009
Proceedings of the Symbolic and Algebraic Computation, International Symposium, 2009
Proceedings of the Computer Algebra in Scientific Computing, 11th International Workshop, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Classification of the perspective-three-point problem, discriminant variety and real solving polynomial systems of inequalities.
Proceedings of the Symbolic and Algebraic Computation, International Symposium, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Proceedings of the Progress in Cryptology, 2008
2007
Proceedings of the IEEE International Symposium on Information Theory, 2007
2006
Comput. Aided Geom. Des., 2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
Proceedings of the Advances in Cryptology, 2006
2005
2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Algorithmic Number Theory, 6th International Symposium, 2004
2003
Proceedings of the Symbolic and Algebraic Computation, 2003
Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases.
Proceedings of the Advances in Cryptology, 2003
1999
Proceedings of the Second Workshop on Computer Algebra in Scientific Computing, 1999
1998
Design of regular nonseparable bidimensional wavelets using Grobner basis techniques.
IEEE Trans. Signal Process., 1998
1994
Parallelization of Gröbner Basis.
Proceedings of the First International Symposium on Parallel Symbolic Computation, 1994
1993
J. Symb. Comput., 1993