A family of fast syndrome based cryptographic hash functions D Augot, M Finiasz, N Sendrier International Conference on Cryptology in Malaysia, 64-83, 2005 | 97 | 2005 |
Direct construction of recursive MDS diffusion layers using shortened BCH codes D Augot, M Finiasz International Workshop on Fast Software Encryption, 3-17, 2014 | 80 | 2014 |
Studying the locator polynomials of minimum weight codewords of BCH codes D Augot, P Charpin, N Sendrier IEEE Transactions on Information Theory 38 (3), 960-973, 1992 | 76 | 1992 |
Secure delivery of images over open networks D Augot, JM Boucqueau, JF Delaigle, C Fontaine, E Goray Proceedings of the IEEE 87 (7), 1251-1266, 1999 | 57 | 1999 |
Exhaustive search for small dimension recursive MDS diffusion layers for block ciphers and hash functions D Augot, M Finiasz 2013 IEEE International Symposium on Information Theory, 1551-1555, 2013 | 52 | 2013 |
A Hensel lifting to replace factorization in list-decoding of algebraic-geometric and Reed-Solomon codes D Augot, L Pecquet IEEE Transactions on Information Theory 46 (7), 2605-2614, 2000 | 49 | 2000 |
An efficient group key agreement protocol for ad hoc networks D Augot, R Bhaskar, V Issarny, D Sacchetti Sixth IEEE International Symposium on a World of Wireless Mobile and …, 2005 | 48 | 2005 |
Initial recommendations of long-term secure post-quantum systems D Augot, L Batina, DJ Bernstein, J Bos, J Buchmann, W Castryck, ... Available at pqcrypto. eu. org/docs/initial-recommendations. pdf, 2015 | 46 | 2015 |
A public key encryption scheme based on the polynomial reconstruction problem D Augot, M Finiasz International Conference on the Theory and Applications of Cryptographic …, 2003 | 43 | 2003 |
Rank metric and Gabidulin codes in characteristic zero D Augot, P Loidreau, G Robert 2013 IEEE International Symposium on Information Theory, 509-513, 2013 | 37 | 2013 |
An interpolation procedure for list decoding Reed–Solomon codes based on generalized key equations A Zeh, C Gentner, D Augot IEEE Transactions on Information Theory 57 (9), 5946-5959, 2011 | 35 | 2011 |
A user-centric system for verified identities on the bitcoin blockchain D Augot, H Chabanne, T Chenevier, W George, L Lambert Data Privacy Management, Cryptocurrencies and Blockchain Technology, 390-407, 2017 | 33 | 2017 |
Idempotents and the BCH bound D Augot, N Sendrier IEEE Transactions on information Theory 40 (1), 204-207, 1994 | 31 | 1994 |
Sha-3 proposal: FSB D Augot, M Finiasz, P Gaborit, S Manuel, N Sendrier Submission to NIST, 81-85, 2008 | 29 | 2008 |
Bounds on the minimum distance of the duals of BCH codes D Augot, F Levy-dit-Vehel IEEE Transactions on Information Theory 42 (4), 1257-1260, 1996 | 28 | 1996 |
A Fast Provably Secure Cryptographic Hash Function. D Augot, M Finiasz, N Sendrier IACR Cryptol. ePrint Arch. 2003, 230, 2003 | 27 | 2003 |
A three round authenticated group key agreement protocol for ad hoc networks D Augot, R Bhaskar, V Issarny, D Sacchetti Pervasive and Mobile Computing 3 (1), 36-52, 2007 | 26 | 2007 |
A storage-efficient and robust private information retrieval scheme allowing few servers D Augot, F Levy-dit-Vehel, A Shikfa International Conference on Cryptology and Network Security, 222-239, 2014 | 25 | 2014 |
Transforming face-to-face identity proofing into anonymous digital identity using the Bitcoin blockchain D Augot, H Chabanne, O Clémot, W George 2017 15th Annual Conference on Privacy, Security and Trust (PST), 25-2509, 2017 | 23 | 2017 |
Generalized Gabidulin codes over fields of any characteristic D Augot, P Loidreau, G Robert Designs, Codes and Cryptography 86 (8), 1807-1848, 2018 | 22 | 2018 |