Ousmane Ndiaye

Orcid: 0000-0001-8397-7842

According to our database1, Ousmane Ndiaye authored at least 13 papers between 2014 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
SEMAPHORO-2D : Design of a 2 degrees of freedom haptic interface to study communication through forces.
Proceedings of the IEEE International Conference on Real-time Computing and Robotics, 2025

2024
Study of the Influence of a Force Bias on a Robotic Partner During Kinesthetic Communication.
Proceedings of the 21st International Conference on Informatics in Control, 2024

2023
Rank Generalized Subsapce subcode.
CoRR, 2023

Moderate Classical McEliece Keys from Quasi-Centrosymmetric Goppa Codes.
Proceedings of the Codes, Cryptology and Information Security, 2023

2022
Software Implementation of a Code-Based Key Encapsulation Mechanism from Binary QD Generalized Srivastava Codes.
Proceedings of the Code-Based Cryptography - 10th International Workshop, 2022

2019

2018
On the Performance and Security of Multiplication in <i>GF</i>(2<sup><i>N</i></sup>).
Cryptogr., 2018

2017
DAGS: Key Encapsulation using Dyadic GS Codes.
IACR Cryptol. ePrint Arch., 2017

A pseudorandom number generator based on worst-case lattice problems.
Appl. Algebra Eng. Commun. Comput., 2017

Efficient Implementation of Hybrid Encryption from Coding Theory.
Proceedings of the Codes, Cryptology and Information Security, 2017

2015
Critical attacks in code-based cryptography.
Int. J. Inf. Coding Theory, 2015

One Cyclic Codes over $\mathbb{F}_{p^k} + v\mathbb{F}_{p^k} + v^2\mathbb{F}_{p^k} + ... + v^r\mathbb{F}_{p^k}$.
CoRR, 2015

2014
Efficient Software Implementations of Code-Based Hash Functions and Stream-Ciphers.
Proceedings of the Arithmetic of Finite Fields - 5th International Workshop, 2014


  Loading...