Philippe Gaborit

According to our database1, Philippe Gaborit authored at least 115 papers between 1996 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Application of rank metric codes in digital image watermarking.
Sig. Proc.: Image Comm., 2019

A Practicable Timing Attack Against HQC and its Countermeasure.
IACR Cryptology ePrint Archive, 2019

An Algebraic Attack on Rank Metric Code-Based Cryptosystems.
CoRR, 2019

Low Rank Parity Check Codes: New Decoding Algorithms and Applications to Cryptography.
CoRR, 2019

Improved Veron Identification and Signature Schemes in the Rank Metric.
CoRR, 2019

Preventing Timing Attacks Against RQC Using Constant Time Decoding of Gabidulin Codes.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019

Improved Veron Identification and Signature Schemes in the Rank Metric.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Durandal: A Rank Metric Based Signature Scheme.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

2018
Efficient Encryption From Random Quasi-Cyclic Codes.
IEEE Trans. Information Theory, 2018

Cryptanalysis of a code-based one-time signature.
IACR Cryptology ePrint Archive, 2018

Durandal: a rank metric based signature scheme.
IACR Cryptology ePrint Archive, 2018

Polynomial-time key recovery attack on the Faure-Loidreau scheme based on Gabidulin codes.
Des. Codes Cryptogr., 2018

Ouroboros-E: An Efficient Lattice-based Key-Exchange Protocol.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

The Learning with Rank Errors problem and an application to symmetric authentication.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

A New Algorithm for Solving the Rank Syndrome Decoding Problem.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Watermarking and Rank Metric Codes.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Delegating Elliptic-Curve Operations with Homomorphic Encryption.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Pseudoentropic Isometries: A New Framework for Fuzzy Extractor Reusability.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Identity-based Encryption from Codes with Rank Metric.
IACR Cryptology ePrint Archive, 2017

A code-based group signature scheme.
Des. Codes Cryptogr., 2017

Ouroboros: A Simple, Secure and Efficient Key Exchange Protocol Based on Coding Theory.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

A code-based blind signature.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Gabidulin Matrix Codes and Their Application to Small Ciphertext Size Cryptosystems.
Proceedings of the Progress in Cryptology - INDOCRYPT 2017, 2017

A new blind color image watermarking based on a psychovisual model and quantization approaches.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

Identity-Based Encryption from Codes with Rank Metric.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
On the Hardness of the Decoding and the Minimum Distance Problems for Rank Codes.
IEEE Trans. Information Theory, 2016

On the Complexity of the Rank Syndrome Decoding Problem.
IEEE Trans. Information Theory, 2016

Efficient Encryption from Random Quasi-Cyclic Codes.
IACR Cryptology ePrint Archive, 2016

A Code-Based Group Signature Scheme.
IACR Cryptology ePrint Archive, 2016

Practical Reusable Fuzzy Extractors for the Set Difference Metric and Adaptive Fuzzy Extractors.
IACR Cryptology ePrint Archive, 2016

Efficient Encryption from Random Quasi-Cyclic Codes.
CoRR, 2016

RankSign : an efficient signature algorithm based on the rank metric.
CoRR, 2016

Polynomial-Time Key Recovery Attack on the Faure-Loidreau Scheme based on Gabidulin Codes.
CoRR, 2016

RankSynd a PRNG Based on Rank Metric.
CoRR, 2016

A Practical Group Signature Scheme Based on Rank Metric.
Proceedings of the Arithmetic of Finite Fields - 6th International Workshop, 2016

RankSynd a PRNG Based on Rank Metric.
Proceedings of the Post-Quantum Cryptography - 7th International Workshop, 2016

2015
Performance of Gabidulin codes for narrowband PLC smart grid networks.
Proceedings of the IEEE International Symposium on Power Line Communications and Its Applications, 2015

2014
Sealing the Leak on Classical NTRU signatures.
IACR Cryptology ePrint Archive, 2014

Improved Secure Implementation of Code-Based Signature Schemes on Embedded Devices.
IACR Cryptology ePrint Archive, 2014

Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes.
Des. Codes Cryptogr., 2014

On the hardness of the decoding and the minimum distance problems for rank codes.
CoRR, 2014

Sealing the Leak on Classical NTRU Signatures.
Proceedings of the Post-Quantum Cryptography - 6th International Workshop, 2014

RankSign: An Efficient Signature Algorithm Based on the Rank Metric.
Proceedings of the Post-Quantum Cryptography - 6th International Workshop, 2014

New Results for Rank-Based Cryptography.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting.
IACR Cryptology ePrint Archive, 2013

RankSign : an efficient signature algorithm based on the rank metric.
IACR Cryptology ePrint Archive, 2013

Error correcting codes for robust color wavelet watermarking.
EURASIP J. Information Security, 2013

On the complexity of the Rank Syndrome Decoding problem
CoRR, 2013

Distinguisher-Based Attacks on Public-Key Cryptosystems Using Reed-Solomon Codes.
CoRR, 2013

A Code-Based Undeniable Signature Scheme.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting.
Proceedings of the Progress in Cryptology, 2013

2012
Classification of Extremal and s-Extremal Binary Self-Dual Codes of Length 38.
IEEE Trans. Information Theory, 2012

A New Class of Codes for Boolean Masking of Cryptographic Computations.
IEEE Trans. Information Theory, 2012

Efficient code-based one-time signature from automorphism groups with syndrome compatibility.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

2011
Digital Signature Schemes from Codes.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

A New Efficient Threshold Ring Signature Scheme Based on Coding Theory.
IEEE Trans. Information Theory, 2011

Improving Additive and Multiplicative Homomorphic Encryption Schemes Based on Worst-Case Hardness Assumptions}.
IACR Cryptology ePrint Archive, 2011

A new zero-knowledge code based identification scheme with reduced communication
CoRR, 2011

Classification of extremal and $s$-extremal binary self-dual codes of length 38
CoRR, 2011

A new class of codes for Boolean masking of cryptographic computations
CoRR, 2011

Full Cryptanalysis of the Chen Identification Protocol.
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011

A new zero-knowledge code based identification scheme with reduced communication.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

2010
There is no Euclidean self-dual quaternary [18, 9, 7] code.
IJICoT, 2010

Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials.
Proceedings of the Post-Quantum Cryptography, Third International Workshop, 2010

Human visual system-based color image steganography using the contourlet transform.
Proceedings of the Media Forensics and Security II, 2010

Watermarking using multiple visual channels for perceptual color spaces.
Proceedings of the International Conference on Image Processing, 2010

Additively Homomorphic Encryption with d-Operand Multiplications.
Proceedings of the Advances in Cryptology, 2010

2009
Identity-Based Identification and Signature Schemes using Error Correcting Codes.
Proceedings of the Identity-Based Cryptography, 2009

Improved identity-based identification using correcting codes
CoRR, 2009

A Collusion-Resistant Distributed Scalar Product Protocol with Application to Privacy-Preserving Computation of Trust.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

List decoding of Reed Solomon codes for wavelet based colour image watermarking scheme.
Proceedings of the International Conference on Image Processing, 2009

Reducing Key Length of the McEliece Cryptosystem.
Proceedings of the Progress in Cryptology, 2009

2008
On the Classification of Extremal [36, 18, 8] Binary Self-Dual Codes.
IEEE Trans. Information Theory, 2008

Asymptotic Improvement of the Gilbert-Varshamov Bound for Linear Codes.
IEEE Trans. Information Theory, 2008

Additively Homomorphic Encryption with d-Operand Multiplications.
IACR Cryptology ePrint Archive, 2008

High-Speed Private Information Retrieval Computation on GPU.
Proceedings of the Second International Conference on Emerging Security Information, 2008

A New Efficient Threshold Ring Signature Scheme Based on Coding Theory.
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008

A fast private information retrieval protocol.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Lattice-based homomorphic encryption of vector spaces.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2008

AntTrust: A Novel Ant Routing Protocol for Wireless Ad-hoc Network Based on Trust between Nodes.
Proceedings of the The Third International Conference on Availability, 2008

2007
A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol.
IACR Cryptology ePrint Archive, 2007

Binary templates for comma-free DNA codes.
Discrete Applied Mathematics, 2007

Asymptotic improvement of the Gilbert-Varshamov bound for linear codes
CoRR, 2007

s-extremal additive F4 codes.
Adv. in Math. of Comm., 2007

SYND: a Fast Code-Based Stream Cipher with a Security Reduction.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Lightweight code-based identification and signature.
Proceedings of the IEEE International Symposium on Information Theory, 2007

2006
Construction of bent functions via Niho power functions.
J. Comb. Theory, Ser. A, 2006

Hyper-bent functions and cyclic codes.
J. Comb. Theory, Ser. A, 2006

Asymptotic improvement of the Gilbert-Varshamov bound for binary linear codes.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Efficient erasure list-decoding of Reed-Muller codes.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Improved Hermite multivariate polynomial interpolation.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

s-Extremal Additive Codes over GF(4).
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

2005
On the weight enumerators of duadic and quadratic residue codes.
IEEE Trans. Information Theory, 2005

Linear constructions for DNA codes.
Theor. Comput. Sci., 2005

On the construction of balanced boolean functions with a good algebraic immunity.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

2004
Designs and self-dual codes with long shadows.
J. Comb. Theory, Ser. A, 2004

Construction of new extremal unimodular lattices.
Eur. J. Comb., 2004

Weight enumerators of duadic and quadratic residue codes.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

2003
Decoding Binary ItR(25) by Hand.
Discrete Mathematics, 2003

2002
Quadratic Double Circulant Codes over Fields.
J. Comb. Theory, Ser. A, 2002

2001
On Quadratic Double Circulant Codes over Fields.
Electronic Notes in Discrete Mathematics, 2001

On Extremal Additive I4 Codes of Length 10 to 18.
Electronic Notes in Discrete Mathematics, 2001

On the classification of extremal even formally self-dual codes of lengths 20 and 22.
Discrete Applied Mathematics, 2001

1999
On the non Z4-linearity of certain good binary codes.
IEEE Trans. Information Theory, 1999

Type II Codes Over F2 + u F2.
IEEE Trans. Information Theory, 1999

Type IV self-dual codes over rings.
IEEE Trans. Information Theory, 1999

On the covering radius of Z4-codes and their lattices.
IEEE Trans. Information Theory, 1999

Niemeier lattices and Type II codes over Z4.
Discrete Mathematics, 1999

Construction of Extremal Type II Codes over Z.
Des. Codes Cryptogr., 1999

On the Classification of Extremal Even Formally Self-Dual Codes.
Des. Codes Cryptogr., 1999

On additive GF(4) codes.
Proceedings of the Codes and Association Schemes, 1999

1998
All Self-Dual Z4 Codes of Length 15 or Less Are Known.
IEEE Trans. Information Theory, 1998

1996
Mass formulas for self-dual codes over Z4 and Fq+uFq rings.
IEEE Trans. Information Theory, 1996


  Loading...