Philippe Gaborit

According to our database1, Philippe Gaborit authored at least 133 papers between 1996 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
RQC Revisited and More Cryptanalysis for Rank-Based Cryptography.
IEEE Trans. Inf. Theory, 2024

2023
Revisiting algebraic attacks on MinRank and on the rank decoding problem.
Des. Codes Cryptogr., November, 2023

Code-based signatures from new proofs of knowledge for the syndrome decoding problem.
Des. Codes Cryptogr., February, 2023

Somewhat Homomorphic Encryption based on Random Codes.
IACR Cryptol. ePrint Arch., 2023

Single trace HQC shared key recovery with SASCA.
IACR Cryptol. ePrint Arch., 2023

Analysis of the security of the PSSI problem and cryptanalysis of the Durandal signature scheme.
IACR Cryptol. ePrint Arch., 2023

The Blockwise Rank Syndrome Learning problem and its applications to cryptography.
IACR Cryptol. ePrint Arch., 2023

Injective Rank Metric Trapdoor Functions with Homogeneous Errors.
CoRR, 2023

RYDE: A Digital Signature Scheme based on Rank-Syndrome-Decoding Problem with MPCitH Paradigm.
CoRR, 2023

MIRA: a Digital Signature Scheme based on the MinRank problem and the MPC-in-the-Head paradigm.
CoRR, 2023

Generalized LRPC codes.
CoRR, 2023

Generalized low rank parity check codes.
Proceedings of the IEEE Information Theory Workshop, 2023

Compact Post-quantum Signatures from Proofs of Knowledge Leveraging Structure for the sfPKP, sfSD and sfRSD Problems.
Proceedings of the Codes, Cryptology and Information Security, 2023

2022
Ouroboros: An Efficient and Provably Secure KEM Family.
IEEE Trans. Inf. Theory, 2022

Efficient image tampering localization using semi-fragile watermarking and error control codes.
Signal Process., 2022

LowMS: a new rank metric code-based KEM without ideal structure.
IACR Cryptol. ePrint Arch., 2022

A gapless code-based hash proof system based on RQC and its applications.
Des. Codes Cryptogr., 2022

Shorter Signatures from Proofs of Knowledge for the SD, MQ, PKP and RSD Problems.
CoRR, 2022

A practicable timing attack against HQC and its countermeasure.
Adv. Math. Commun., 2022

LRPC Codes with Multiple Syndromes: Near Ideal-Size KEMs Without Ideals.
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022

A New Key Recovery Side-Channel Attack on HQC with Chosen Ciphertext.
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022

Quasi-Cyclic Stern Proof of Knowledge.
Proceedings of the IEEE International Symposium on Information Theory, 2022

2021
Quasi-Cyclic Stern Proof of Knowledge.
CoRR, 2021

Fast and Secure Key Generation for Low Rank Parity Check Codes Cryptosystems.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Zero-Knowledge Reparation of the Véron and AGS Code-based Identification Schemes.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Cryptanalysis of the Rank Preserving Signature.
Proceedings of the Cryptography and Coding - 18th IMA International Conference, 2021

A Correction to a Code-Based Blind Signature Scheme.
Proceedings of the Code-Based Cryptography - 9th International Workshop, 2021

A Rank Metric Code-Based Group Signature Scheme.
Proceedings of the Code-Based Cryptography - 9th International Workshop, 2021

The Rank-Based Cryptography Library.
Proceedings of the Code-Based Cryptography - 9th International Workshop, 2021

2020
Enhancing Code Based Zero-knowledge Proofs using Rank Metric.
IACR Cryptol. ePrint Arch., 2020

Another code-based adaptation of Lyubashevsky's signature cryptanalysed.
IACR Cryptol. ePrint Arch., 2020

Cryptanalysis of a code-based one-time signature.
Des. Codes Cryptogr., 2020

Cryptanalysis of a rank-based signature with short public keys.
Des. Codes Cryptogr., 2020

On the hardness of code equivalence problems in rank metric.
CoRR, 2020

HQC-RMRS, an instantiation of the HQC encryption framework with a more efficient auxiliary error-correcting code.
CoRR, 2020

Algebraic attacks for solving the Rank Decoding and MinRank problems without Gröbner basis.
CoRR, 2020

Dual-Ouroboros: An improvement of the McNie scheme.
Adv. Math. Commun., 2020

CROOT: Code-based Round-Optimal Oblivious Transfer.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

An Algebraic Attack on Rank Metric Code-Based Cryptosystems.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Low Rank Parity Check Codes: New Decoding Algorithms and Applications to Cryptography.
IEEE Trans. Inf. Theory, 2019

Application of rank metric codes in digital image watermarking.
Signal Process. Image Commun., 2019

A Practicable Timing Attack Against HQC and its Countermeasure.
IACR Cryptol. ePrint Arch., 2019

Extended Low Rank Parity Check Codes and Their Efficient Decoding for Multisource Wireless Sensor Networks.
Proceedings of the Ubiquitous Networking - 5th International Symposium, 2019

Preventing Timing Attacks Against RQC Using Constant Time Decoding of Gabidulin Codes.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019

Improved Veron Identification and Signature Schemes in the Rank Metric.
Proceedings of the IEEE International Symposium on Information Theory, 2019

2018
Efficient Encryption From Random Quasi-Cyclic Codes.
IEEE Trans. Inf. Theory, 2018

Durandal: a rank metric based signature scheme.
IACR Cryptol. ePrint Arch., 2018

Polynomial-time key recovery attack on the Faure-Loidreau scheme based on Gabidulin codes.
Des. Codes Cryptogr., 2018

Ouroboros-E: An Efficient Lattice-based Key-Exchange Protocol.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

The Learning with Rank Errors problem and an application to symmetric authentication.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

A New Algorithm for Solving the Rank Syndrome Decoding Problem.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Watermarking and Rank Metric Codes.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Delegating Elliptic-Curve Operations with Homomorphic Encryption.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Pseudoentropic Isometries: A New Framework for Fuzzy Extractor Reusability.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Identity-based Encryption from Codes with Rank Metric.
IACR Cryptol. ePrint Arch., 2017

A code-based group signature scheme.
Des. Codes Cryptogr., 2017

Ouroboros: A Simple, Secure and Efficient Key Exchange Protocol Based on Coding Theory.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

A code-based blind signature.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Gabidulin Matrix Codes and Their Application to Small Ciphertext Size Cryptosystems.
Proceedings of the Progress in Cryptology - INDOCRYPT 2017, 2017

A new blind color image watermarking based on a psychovisual model and quantization approaches.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

2016
On the Hardness of the Decoding and the Minimum Distance Problems for Rank Codes.
IEEE Trans. Inf. Theory, 2016

On the Complexity of the Rank Syndrome Decoding Problem.
IEEE Trans. Inf. Theory, 2016

Practical Reusable Fuzzy Extractors for the Set Difference Metric and Adaptive Fuzzy Extractors.
IACR Cryptol. ePrint Arch., 2016

A Practical Group Signature Scheme Based on Rank Metric.
Proceedings of the Arithmetic of Finite Fields - 6th International Workshop, 2016

RankSynd a PRNG Based on Rank Metric.
Proceedings of the Post-Quantum Cryptography - 7th International Workshop, 2016

2015
Performance of Gabidulin codes for narrowband PLC smart grid networks.
Proceedings of the IEEE International Symposium on Power Line Communications and Its Applications, 2015

2014
Sealing the Leak on Classical NTRU signatures.
IACR Cryptol. ePrint Arch., 2014

Improved Secure Implementation of Code-Based Signature Schemes on Embedded Devices.
IACR Cryptol. ePrint Arch., 2014

Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes.
Des. Codes Cryptogr., 2014

New Results for Rank-Based Cryptography.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting.
IACR Cryptol. ePrint Arch., 2013

RankSign : an efficient signature algorithm based on the rank metric.
IACR Cryptol. ePrint Arch., 2013

Error correcting codes for robust color wavelet watermarking.
EURASIP J. Inf. Secur., 2013

A Code-Based Undeniable Signature Scheme.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

2012
Classification of Extremal and s-Extremal Binary Self-Dual Codes of Length 38.
IEEE Trans. Inf. Theory, 2012

A New Class of Codes for Boolean Masking of Cryptographic Computations.
IEEE Trans. Inf. Theory, 2012

Efficient code-based one-time signature from automorphism groups with syndrome compatibility.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

2011
Digital Signature Schemes from Codes.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

A New Efficient Threshold Ring Signature Scheme Based on Coding Theory.
IEEE Trans. Inf. Theory, 2011

Improving Additive and Multiplicative Homomorphic Encryption Schemes Based on Worst-Case Hardness Assumptions}.
IACR Cryptol. ePrint Arch., 2011

Full Cryptanalysis of the Chen Identification Protocol.
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011

A new zero-knowledge code based identification scheme with reduced communication.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

2010
There is no Euclidean self-dual quaternary [18, 9, 7] code.
Int. J. Inf. Coding Theory, 2010

Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials.
Proceedings of the Post-Quantum Cryptography, Third International Workshop, 2010

Human visual system-based color image steganography using the contourlet transform.
Proceedings of the Media Forensics and Security II, 2010

Watermarking using multiple visual channels for perceptual color spaces.
Proceedings of the International Conference on Image Processing, 2010

Additively Homomorphic Encryption with <i>d</i>-Operand Multiplications.
Proceedings of the Advances in Cryptology, 2010

2009
Identity-Based Identification and Signature Schemes using Error Correcting Codes.
Proceedings of the Identity-Based Cryptography, 2009

Improved identity-based identification using correcting codes
CoRR, 2009

A Collusion-Resistant Distributed Scalar Product Protocol with Application to Privacy-Preserving Computation of Trust.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

List decoding of Reed Solomon codes for wavelet based colour image watermarking scheme.
Proceedings of the International Conference on Image Processing, 2009

Reducing Key Length of the McEliece Cryptosystem.
Proceedings of the Progress in Cryptology, 2009

2008
On the Classification of Extremal [36, 18, 8] Binary Self-Dual Codes.
IEEE Trans. Inf. Theory, 2008

Asymptotic Improvement of the Gilbert-Varshamov Bound for Linear Codes.
IEEE Trans. Inf. Theory, 2008

Additively Homomorphic Encryption with d-Operand Multiplications.
IACR Cryptol. ePrint Arch., 2008

High-Speed Private Information Retrieval Computation on GPU.
Proceedings of the Second International Conference on Emerging Security Information, 2008

A New Efficient Threshold Ring Signature Scheme Based on Coding Theory.
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008

A fast private information retrieval protocol.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Lattice-based homomorphic encryption of vector spaces.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2008

AntTrust: A Novel Ant Routing Protocol for Wireless Ad-hoc Network Based on Trust between Nodes.
Proceedings of the The Third International Conference on Availability, 2008

2007
A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol.
IACR Cryptol. ePrint Arch., 2007

Binary templates for comma-free DNA codes.
Discret. Appl. Math., 2007

s-extremal additive F<sub>4</sub> codes.
Adv. Math. Commun., 2007

SYND: a Fast Code-Based Stream Cipher with a Security Reduction.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Lightweight code-based identification and signature.
Proceedings of the IEEE International Symposium on Information Theory, 2007

2006
Construction of bent functions via Niho power functions.
J. Comb. Theory, Ser. A, 2006

Hyper-bent functions and cyclic codes.
J. Comb. Theory, Ser. A, 2006

Asymptotic improvement of the Gilbert-Varshamov bound for binary linear codes.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Efficient erasure list-decoding of Reed-Muller codes.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Improved Hermite multivariate polynomial interpolation.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

s-Extremal Additive Codes over GF(4).
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

2005
On the weight enumerators of duadic and quadratic residue codes.
IEEE Trans. Inf. Theory, 2005

Linear constructions for DNA codes.
Theor. Comput. Sci., 2005

On the construction of balanced boolean functions with a good algebraic immunity.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

2004
Designs and self-dual codes with long shadows.
J. Comb. Theory, Ser. A, 2004

Construction of new extremal unimodular lattices.
Eur. J. Comb., 2004

2003
Decoding Binary ItR(25) by Hand.
Discret. Math., 2003

2001
On Quadratic Double Circulant Codes over Fields.
Electron. Notes Discret. Math., 2001

On Extremal Additive <i>I</i><sub>4</sub> Codes of Length 10 to 18.
Electron. Notes Discret. Math., 2001

On the classification of extremal even formally self-dual codes of lengths 20 and 22.
Discret. Appl. Math., 2001

1999
On the non Z<sub>4</sub>-linearity of certain good binary codes.
IEEE Trans. Inf. Theory, 1999

Type II Codes Over F<sub>2</sub> + u F<sub>2</sub>.
IEEE Trans. Inf. Theory, 1999

Type IV self-dual codes over rings.
IEEE Trans. Inf. Theory, 1999

On the covering radius of Z<sub>4</sub>-codes and their lattices.
IEEE Trans. Inf. Theory, 1999

Niemeier lattices and Type II codes over Z<sub>4</sub>.
Discret. Math., 1999

Construction of Extremal Type II Codes over Z.
Des. Codes Cryptogr., 1999

On the Classification of Extremal Even Formally Self-Dual Codes.
Des. Codes Cryptogr., 1999

On additive <i>GF</i>(4) codes.
Proceedings of the Codes and Association Schemes, 1999

1998
All Self-Dual Z<sub>4</sub> Codes of Length 15 or Less Are Known.
IEEE Trans. Inf. Theory, 1998

1996
Mass formulas for self-dual codes over Z<sub>4</sub> and F<sub>q</sub>+uF<sub>q</sub> rings.
IEEE Trans. Inf. Theory, 1996


  Loading...