Follow
Daniel Augot
Daniel Augot
INRIA et LIX
Verified email at inria.fr
Title
Cited by
Cited by
Year
A family of fast syndrome based cryptographic hash functions
D Augot, M Finiasz, N Sendrier
Progress in Cryptology–Mycrypt 2005: First International Conference on …, 2005
1412005
Studying the locator polynomials of minimum weight codewords of BCH codes
D Augot, P Charpin, N Sendrier
IEEE Transactions on Information Theory 38 (3), 960-973, 1992
1181992
Direct construction of recursive MDS diffusion layers using shortened BCH codes
D Augot, M Finiasz
Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK …, 2015
1102015
Initial recommendations of long-term secure post-quantum systems
A Daniel, B Lejla
PQCRYPTO. EU. Horizon 2020, 2015
872015
Exhaustive search for small dimension recursive MDS diffusion layers for block ciphers and hash functions
D Augot, M Finiasz
2013 IEEE International Symposium on Information Theory, 1551-1555, 2013
712013
A user-centric system for verified identities on the bitcoin blockchain
D Augot, H Chabanne, T Chenevier, W George, L Lambert
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2017
702017
Idempotents and the BCH bound
D Augot, N Sendrier
IEEE Transactions on information Theory 40 (1), 204-207, 1994
651994
A fast provably secure cryptographic hash function
D Augot, M Finiasz, N Sendrier
Cryptology ePrint Archive, 2003
612003
Secure delivery of images over open networks
D Augot, JM Boucqueau, JF Delaigle, C Fontaine, E Goray
Proceedings of the IEEE 87 (7), 1251-1266, 1999
601999
A public key encryption scheme based on the polynomial reconstruction problem
D Augot, M Finiasz
International Conference on the Theory and Applications of Cryptographic …, 2003
572003
Transforming face-to-face identity proofing into anonymous digital identity using the bitcoin blockchain
D Augot, H Chabanne, O Clémot, W George
2017 15th Annual Conference on Privacy, Security and Trust (PST), 25-2509, 2017
542017
A Hensel lifting to replace factorization in list-decoding of algebraic-geometric and Reed-Solomon codes
D Augot, L Pecquet
IEEE Transactions on Information Theory 46 (7), 2605-2614, 2000
542000
An efficient group key agreement protocol for ad hoc networks
D Augot, R Bhaskar, V Issarny, D Sacchetti
Sixth IEEE International Symposium on a World of Wireless Mobile and …, 2005
502005
Rank metric and Gabidulin codes in characteristic zero
D Augot, P Loidreau, G Robert
2013 IEEE International Symposium on Information Theory, 509-513, 2013
452013
Generalized Gabidulin codes over fields of any characteristic
D Augot, P Loidreau, G Robert
Designs, Codes and Cryptography 86, 1807-1848, 2018
442018
A storage-efficient and robust private information retrieval scheme allowing few servers
D Augot, F Levy-dit-Vehel, A Shikfa
Cryptology and Network Security: 13th International Conference, CANS 2014 …, 2014
352014
Bounds on the minimum distance of the duals of BCH codes
D Augot, F Levy-dit-Vehel
IEEE transactions on information theory 42 (4), 1257-1260, 1996
351996
An interpolation procedure for list decoding Reed–Solomon codes based on generalized key equations
A Zeh, C Gentner, D Augot
IEEE Transactions on Information Theory 57 (9), 5946-5959, 2011
342011
Sha-3 proposal: FSB
D Augot, M Finiasz, P Gaborit, S Manuel, N Sendrier
Submission to NIST, 81-85, 2008
322008
On constructing homomorphic encryption schemes from coding theory
F Armknecht, D Augot, L Perret, AR Sadeghi
IMA International Conference on Cryptography and Coding, 23-40, 2011
312011
The system can't perform the operation now. Try again later.
Articles 1–20