Vlad-Florin Dragoi
Vlad-Florin Dragoi
Adresse e-mail validée de
Citée par
Citée par
Algebraic properties of polar codes from a new polynomial formalism
M Bardet, V Dragoi, A Otmani, JP Tillich
2016 IEEE International Symposium on Information Theory (ISIT), 230-234, 2016
Cryptanalysis of the McEliece public key cryptosystem based on polar codes
M Bardet, J Chaulet, V Dragoi, A Otmani, JP Tillich
Post-Quantum Cryptography: 7th International Workshop, PQCrypto 2016 …, 2016
Weak keys for the quasi-cyclic MDPC public key encryption scheme
M Bardet, V Dragoi, JG Luque, A Otmani
Progress in Cryptology–AFRICACRYPT 2016: 8th International Conference on …, 2016
Survey on cryptanalysis of code-based cryptography: From theoretical to physical attacks
V Drăgoi, T Richmond, D Bucerzan, A Legay
2018 7th International Conference on Computers Communications and Control …, 2018
Message-Recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem
PL Cayrel, B Colombier, VF Drăgoi, A Menu, L Bossuet
Annual International Conference on the Theory and Applications of …, 2021
Fast reliability ranking of matchstick minimal networks
VF Drǎgoi, V Beiu
Networks 79 (4), 479-500, 2022
Why reliability for computing needs rethinking
V Beiu, VF Drăgoi, RM Beiu
2020 International Conference on Rebooting Computing (ICRC), 16-25, 2020
How reliable are compositions of series and parallel networks compared with hammocks?
V Dragoi, SR Cowell, V Beiu, S Hoara, P Gaspar
International Journal of Computers Communications & Control 13 (5), 772-791, 2018
Evolution of the McEliece public key encryption scheme
D Bucerzan, V Dragoi, HT Kalachi
Innovative Security Solutions for Information Technology and Communications …, 2017
Cryptanalysis of a public key encryption scheme based on QC-LDPC and QC-MDPC codes
V Dragoi, HT Kalachi
IEEE Communications letters 22 (2), 264-267, 2017
Efficient approximation of two-terminal networks reliability polynomials using cubic splines
G Cristescu, VF Drăgoi
IEEE Transactions on Reliability 70 (3), 1193-1203, 2021
An algebraic approach for the resolution of algorithmic problems raised by cryptography and coding theory
VF Dragoi
Normandie Université, 2017
Improved timing attacks against the secret permutation in the McEliece PKC
D Bucerzan, PL Cayrel, V Dragoi, T Richmond
International Journal of Computers, Communications and Control, 2017
Hammocks versus hammock
V Beiu, SR Cowell, V Drăgoi, S Hoară, P Gaspar
2018 7th International Conference on Computers Communications and Control …, 2018
Can series and parallel compositions improve on hammocks?
V Drăgoi, SR Cowell, S Hoară, P Gaşpar, V Beiu
2018 7th International Conference on Computers Communications and Control …, 2018
Profiled side-channel attack on cryptosystems based on the binary syndrome decoding problem
B Colombier, VF Drăgoi, PL Cayrel, V Grosso
IEEE Transactions on Information Forensics and Security 17, 3407-3420, 2022
Message-recovery Profiled Side-channel Attack on the Classic McEliece Cryptosystem.
B Colombier, VF Dragoi, PL Cayrel, V Grosso
IACR Cryptol. ePrint Arch. 2022, 125, 2022
Vulnerabilities of the McEliece variants based on polar codes
V Drăgoi, V Beiu, D Bucerzan
International Conference on Security for Information Technology and …, 2018
Cubic spline approximation of the reliability polynomials of two dual hammock networks
G Cristescu, VF Drăgoi
arXiv preprint arXiv:1912.03037, 2019
Ordering series and parallel compositions
V Dragoi, SR Cowell, V Beiu
2018 IEEE 18th International Conference on Nanotechnology (IEEE-NANO), 1-4, 2018
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20