Olivier Ruatta

According to our database1, Olivier Ruatta authored at least 25 papers between 2001 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Polynômes : du discret (codes correcteurs et cryptographie basée sur les codes) et du continu (autour des trajectoires optimales). (Polynomials : driscrete (error correcting codes and code based cryptography) and continuous (around optimal trajectorties)).
, 2022

2021
Security Analysis of a Cryptosystem Based on Subspace Subcodes.
Proceedings of the Code-Based Cryptography - 9th International Workshop, 2021

2020
An Algebraic Attack on Rank Metric Code-Based Cryptosystems.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

2019
Low Rank Parity Check Codes: New Decoding Algorithms and Applications to Cryptography.
IEEE Trans. Inf. Theory, 2019

2017
Gabidulin Matrix Codes and Their Application to Small Ciphertext Size Cryptosystems.
Proceedings of the Progress in Cryptology - INDOCRYPT 2017, 2017

2016
On the Complexity of the Rank Syndrome Decoding Problem.
IEEE Trans. Inf. Theory, 2016

Free Form based active contours for image segmentation and free space perception.
CoRR, 2016

2015
Overdetermined Weierstrass iteration and the nearest consistent system.
Theor. Comput. Sci., 2015

Performance of Gabidulin codes for narrowband PLC smart grid networks.
Proceedings of the IEEE International Symposium on Power Line Communications and Its Applications, 2015

2014
Over-constrained Weierstrass iteration and the nearest consistent system.
CoRR, 2014

New Results for Rank-Based Cryptography.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
RankSign : an efficient signature algorithm based on the rank metric.
IACR Cryptol. ePrint Arch., 2013

On the Geometry and the Deformation of Shapes Represented by Piecewise Continuous Bézier Curves with Application to Shape Optimization.
Proceedings of the Geometric Science of Information - First International Conference, 2013

2012
On the isotopic meshing of an algebraic implicit surface.
J. Symb. Comput., 2012

2011
Generalized companion matrix for approximate GCD
CoRR, 2011

Extended companion matrix for approximate GCD.
Proceedings of the SNC 2011, 2011

2010
Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials.
Proceedings of the Post-Quantum Cryptography, Third International Workshop, 2010

2008
On the computation of the topology of a non-reduced implicit space curve.
Proceedings of the Symbolic and Algebraic Computation, International Symposium, 2008

2006
Efficient erasure list-decoding of Reed-Muller codes.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Improved Hermite multivariate polynomial interpolation.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

2003
Accelerated Solution of Multivariate Polynomial Systems of Equations.
SIAM J. Comput., 2003

2002
Dualité algébrique, structures et applications.
PhD thesis, 2002

Relations Between Roots and Coefficients, Interpolation and Application to System Solving.
J. Symb. Comput., 2002

2001
A multivariate Weierstrass iterative rootfinder.
Proceedings of the 2001 International Symposium on Symbolic and Algebraic Computation, 2001


  Loading...