Seuraa
Matthieu Finiasz
Matthieu Finiasz
Security Expert
Vahvistettu sähköpostiosoite verkkotunnuksessa olvid.io - Kotisivu
Nimike
Viittaukset
Viittaukset
Vuosi
How to achieve a McEliece-based digital signature scheme
N Courtois, M Finiasz, N Sendrier
Advances in Cryptology - ASIACRYPT 2001, 157-174, 2001
6482001
Security bounds for the design of code-based cryptosystems
M Finiasz, N Sendrier
Advances in Cryptology–ASIACRYPT 2009, 88-105, 2009
3402009
A family of fast syndrome based cryptographic hash functions
D Augot, M Finiasz, N Sendrier
Progress in Cryptology–Mycrypt 2005, 64-83, 2005
1382005
Parallel-CFS
M Finiasz
Selected Areas in Cryptography - SAC 2011, 159-170, 2011
103*2011
Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes
D Augot, M Finiasz
FSE 2014, 0
103*
Recovering a code's length and synchronization from a noisy intercepted bitstream
M Cluzeau, M Finiasz
2009 IEEE International Symposium on Information Theory, 2737-2741, 2009
842009
Exhaustive Search for Small Dimension Recursive MDS Diffusion Layers for Block Ciphers and Hash Functions
D Augot, M Finiasz
ISIT 2013, 2013
652013
Reconstruction of punctured convolutional codes
M Cluzeau, M Finiasz
2009 IEEE Information Theory Workshop, 75-79, 2009
582009
A public key encryption scheme based on the polynomial reconstruction problem
D Augot, M Finiasz
Advances in Cryptology—EUROCRYPT 2003, 229-240, 2003
562003
A fast provably secure cryptographic hash function
D Augot, M Finiasz, N Sendrier
Cryptology ePrint Archive, Report 2003/230. Available at http://www. iacr …, 2003
552003
Methods for the reconstruction of parallel turbo codes
M Cluzeau, M Finiasz, JP Tillich
Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on …, 2010
512010
Sha-3 proposal: FSB
D Augot, M Finiasz, P Gaborit, S Manuel, N Sendrier
Submission to NIST, 81-85, 2008
42*2008
Improved fast syndrome based cryptographic hash functions
M Finiasz, P Gaborit, N Sendrier
Proceedings of ECRYPT Hash Workshop 2007, 155, 2007
402007
Nouvelles constructions utilisant des codes correcteurs d’erreurs en cryptographie à clef publique
M Finiasz
These de doctorat, École Polytechnique (October 2004), 2004
372004
Trap Me If You Can--Million Dollar Curve
T Baignères, C Delerablée, M Finiasz, L Goubin, T Lepoint, M Rivain
IACR Cryptology ePrint Archive, 2015: 1249, 2015
352015
One-way private media search on public databases: The role of signal processing
G Fanti, M Finiasz, K Ramchandran
IEEE Signal Processing Magazine 30 (2), 53-61, 2013
282013
: A Hardware-Oriented Trapdoor Cipher
JP Aumasson, M Finiasz, W Meier, S Vaudenay
Australasian Conference on Information Security and Privacy, 184-199, 2007
272007
Private stream search at the same communication cost as a regular search: Role of ldpc codes
M Finiasz, K Ramchandran
2012 IEEE International Symposium on Information Theory Proceedings, 2556-2560, 2012
262012
When Stream Cipher Analysis Meets Public-Key Cryptography
S Vaudenay, M Finiasz
SAC 2006, 266-284, 2006
23*2006
Dial C for cipher
T Baigneres, M Finiasz
Selected Areas in Cryptography, 76-95, 2007
182007
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20