Daniel Augot
Daniel Augot
INRIA et LIX
Adresse e-mail validée de inria.fr
Titre
Citée par
Citée par
Année
A family of fast syndrome based cryptographic hash functions
D Augot, M Finiasz, N Sendrier
International Conference on Cryptology in Malaysia, 64-83, 2005
932005
Direct construction of recursive MDS diffusion layers using shortened BCH codes
D Augot, M Finiasz
International Workshop on Fast Software Encryption, 3-17, 2014
772014
Studying the locator polynomials of minimum weight codewords of BCH codes
D Augot, P Charpin, N Sendrier
IEEE Transactions on Information Theory 38 (3), 960-973, 1992
741992
Secure delivery of images over open networks
D Augot, JM Boucqueau, JF Delaigle, C Fontaine, E Goray
Proceedings of the IEEE 87 (7), 1251-1266, 1999
571999
A Hensel lifting to replace factorization in list-decoding of algebraic-geometric and Reed-Solomon codes
D Augot, L Pecquet
IEEE Transactions on Information Theory 46 (7), 2605-2614, 2000
492000
Exhaustive search for small dimension recursive MDS diffusion layers for block ciphers and hash functions
D Augot, M Finiasz
2013 IEEE International Symposium on Information Theory, 1551-1555, 2013
482013
An efficient group key agreement protocol for ad hoc networks
D Augot, R Bhaskar, V Issarny, D Sacchetti
Sixth IEEE International Symposium on a World of Wireless Mobile and …, 2005
462005
Initial recommendations of long-term secure post-quantum systems
D Augot, L Batina, DJ Bernstein, J Bos, J Buchmann, W Castryck, ...
Available at pqcrypto. eu. org/docs/initial-recommendations. pdf, 2015
422015
A public key encryption scheme based on the polynomial reconstruction problem
D Augot, M Finiasz
International Conference on the Theory and Applications of Cryptographic …, 2003
382003
Rank metric and Gabidulin codes in characteristic zero
D Augot, P Loidreau, G Robert
2013 IEEE International Symposium on Information Theory, 509-513, 2013
352013
An interpolation procedure for list decoding Reed–Solomon codes based on generalized key equations
A Zeh, C Gentner, D Augot
IEEE Transactions on Information Theory 57 (9), 5946-5959, 2011
332011
Sha-3 proposal: FSB
D Augot, M Finiasz, P Gaborit, S Manuel, N Sendrier
Submission to NIST, 81-85, 2008
292008
Idempotents and the BCH bound
D Augot, N Sendrier
IEEE Transactions on information Theory 40 (1), 204-207, 1994
291994
Bounds on the minimum distance of the duals of BCH codes
D Augot, F Levy-dit-Vehel
IEEE Transactions on Information Theory 42 (4), 1257-1260, 1996
281996
A user-centric system for verified identities on the bitcoin blockchain
D Augot, H Chabanne, T Chenevier, W George, L Lambert
Data Privacy Management, Cryptocurrencies and Blockchain Technology, 390-407, 2017
272017
A Fast Provably Secure Cryptographic Hash Function.
D Augot, M Finiasz, N Sendrier
IACR Cryptology ePrint Archive 2003, 230, 2003
272003
A three round authenticated group key agreement protocol for ad hoc networks
D Augot, R Bhaskar, V Issarny, D Sacchetti
Pervasive and Mobile Computing 3 (1), 36-52, 2007
262007
A storage-efficient and robust private information retrieval scheme allowing few servers
D Augot, F Levy-dit-Vehel, A Shikfa
International Conference on Cryptology and Network Security, 222-239, 2014
242014
On constructing homomorphic encryption schemes from coding theory
F Armknecht, D Augot, L Perret, AR Sadeghi
IMA International Conference on Cryptography and Coding, 23-40, 2011
222011
On the Roth and Ruckenstein equations for the Guruswami-Sudan algorithm
D Augot, A Zeh
2008 IEEE International Symposium on Information Theory, 2620-2624, 2008
222008
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20