Algebraic properties of polar codes from a new polynomial formalism M Bardet, V Dragoi, A Otmani, JP Tillich 2016 IEEE International Symposium on Information Theory (ISIT), 230-234, 2016 | 157 | 2016 |
Cryptanalysis of the McEliece public key cryptosystem based on polar codes M Bardet, J Chaulet, V Dragoi, A Otmani, JP Tillich Post-Quantum Cryptography: 7th International Workshop, PQCrypto 2016 …, 2016 | 83 | 2016 |
Message-Recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem PL Cayrel, B Colombier, VF Drăgoi, A Menu, L Bossuet Annual International Conference on the Theory and Applications of …, 2021 | 34* | 2021 |
Survey on cryptanalysis of code-based cryptography: From theoretical to physical attacks V Drăgoi, T Richmond, D Bucerzan, A Legay 2018 7th international conference on computers communications and control …, 2018 | 29 | 2018 |
Weak keys for the quasi-cyclic MDPC public key encryption scheme M Bardet, V Dragoi, JG Luque, A Otmani Progress in Cryptology–AFRICACRYPT 2016: 8th International Conference on …, 2016 | 26 | 2016 |
Fast reliability ranking of matchstick minimal networks VF Drǎgoi, V Beiu Networks 79 (4), 479-500, 2022 | 21 | 2022 |
Why reliability for computing needs rethinking V Beiu, VF Drăgoi, RM Beiu 2020 International Conference on Rebooting Computing (ICRC), 16-25, 2020 | 18 | 2020 |
Evolution of the McEliece public key encryption scheme D Bucerzan, V Dragoi, HT Kalachi Innovative Security Solutions for Information Technology and Communications …, 2017 | 17 | 2017 |
Profiled side-channel attack on cryptosystems based on the binary syndrome decoding problem B Colombier, VF Drăgoi, PL Cayrel, V Grosso IEEE Transactions on Information Forensics and Security 17, 3407-3420, 2022 | 15 | 2022 |
How reliable are compositions of series and parallel networks compared with hammocks? V Dragoi, SR Cowell, V Beiu, S Hoara, P Gaspar International Journal of Computers Communications & Control 13 (5), 772-791, 2018 | 15 | 2018 |
An algebraic approach for the resolution of algorithmic problems raised by cryptography and coding theory VF Dragoi Normandie Université, 2017 | 14* | 2017 |
Improved timing attacks against the secret permutation in the McEliece PKC D Bucerzan, PL Cayrel, V Dragoi, T Richmond International Journal of Computers, Communications and Control, 2017 | 14 | 2017 |
Efficient approximation of two-terminal networks reliability polynomials using cubic splines G Cristescu, VF Drăgoi IEEE Transactions on Reliability 70 (3), 1193-1203, 2021 | 13 | 2021 |
Cryptanalysis of a public key encryption scheme based on QC-LDPC and QC-MDPC codes V Dragoi, HT Kalachi IEEE Communications letters 22 (2), 264-267, 2017 | 13 | 2017 |
On the Closed-form Weight Enumeration of Polar Codes: 1.5d-weight Codewords VF Drăgoi, M Rowshan, J Yuan IEEE Transactions on Communications, 2024 | 11* | 2024 |
Message-recovery Profiled Side-channel Attack on the Classic McEliece Cryptosystem. B Colombier, VF Dragoi, PL Cayrel, V Grosso IACR Cryptol. ePrint Arch. 2022, 125, 2022 | 11 | 2022 |
Vulnerabilities of the McEliece variants based on polar codes V Drăgoi, V Beiu, D Bucerzan International Conference on Security for Information Technology and …, 2018 | 9 | 2018 |
Hammocks versus hammock V Beiu, SR Cowell, V Drăgoi, S Hoară, P Gaspar 2018 7th International Conference on Computers Communications and Control …, 2018 | 9 | 2018 |
Can series and parallel compositions improve on hammocks? V Drăgoi, SR Cowell, S Hoară, P Gaşpar, V Beiu 2018 7th International Conference on Computers Communications and Control …, 2018 | 8 | 2018 |
Generalized inverse based decoding FL Ţiplea, VF Drăgoi 2022 IEEE International Symposium on Information Theory (ISIT), 2791-2796, 2022 | 6 | 2022 |