Matthieu Finiasz

According to our database1, Matthieu Finiasz authored at least 30 papers between 2001 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2015
Trap Me If You Can - Million Dollar Curve.
IACR Cryptology ePrint Archive, 2015

2014
Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes.
IACR Cryptology ePrint Archive, 2014

Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes.
CoRR, 2014

Toward efficient, privacy-aware media classification on public databases.
Proceedings of the International Conference on Multimedia Retrieval, 2014

Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

2013
One-Way Private Media Search on Public Databases: The Role of Signal Processing.
IEEE Signal Process. Mag., 2013

Exhaustive Search for Small Dimension Recursive MDS Diffusion Layers for Block Ciphers and Hash Functions
CoRR, 2013

Exhaustive search for small dimension recursive MDS diffusion layers for block ciphers and hash functions.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

2012
Private Stream Search at Almost the Same Communication Cost as a Regular Search.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

Private Stream Search at the same communication cost as a regular search: Role of LDPC codes.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

2011
Digital Signature Scheme Based on McEliece.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2010
Methods for the Reconstruction of Parallel Turbo Codes
CoRR, 2010

Parallel-CFS - Strengthening the CFS McEliece-Based Signature Scheme.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Methods for the reconstruction of parallel turbo codes.
Proceedings of the IEEE International Symposium on Information Theory, 2010

2009
Security Bounds for the Design of Code-based Cryptosystems.
IACR Cryptology ePrint Archive, 2009

NP-completeness of Certain Sub-classes of the Syndrome Decoding Problem
CoRR, 2009

Recovering a code's length and synchronization from a noisy intercepted bitstream.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Security Bounds for the Design of Code-Based Cryptosystems.
Proceedings of the Advances in Cryptology, 2009

2008
Syndrome Based Collision Resistant Hashing.
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008

2007
TCHo: A Hardware-Oriented Trapdoor Cipher.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
When Stream Cipher Analysis Meets Public-Key Cryptography.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006

Dial C for Cipher.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006

KFC - The Krazy Feistel Cipher.
Proceedings of the Advances in Cryptology, 2006

2005
A Family of Fast Syndrome Based Cryptographic Hash Functions.
Proceedings of the Progress in Cryptology, 2005

2003
A Fast Provably Secure Cryptographic Hash Function.
IACR Cryptology ePrint Archive, 2003

Using the Trace Operator to repair the Polynomial Reconstruction based Cryptosystem presented at Eurocrypt 2003.
IACR Cryptology ePrint Archive, 2003

A Public Key Encryption Scheme Based on the Polynomial Reconstruction Problem.
Proceedings of the Advances in Cryptology, 2003

2002
A Control of Smooth Deformations with Topological Change on Polyhedral Mesh Based on Curves and Loops.
Proceedings of the 2002 International Conference on Shape Modeling and Applications (SMI 2002), 2002

2001
How to achieve a McEliece-based Digital Signature Scheme.
IACR Cryptology ePrint Archive, 2001

How to Achieve a McEliece-Based Digital Signature Scheme.
Proceedings of the Advances in Cryptology, 2001


  Loading...