A family of fast syndrome based cryptographic hash functions D Augot, M Finiasz, N Sendrier Progress in Cryptology–Mycrypt 2005: First International Conference on …, 2005 | 140 | 2005 |
Studying the locator polynomials of minimum weight codewords of BCH codes D Augot, P Charpin, N Sendrier IEEE Transactions on Information Theory 38 (3), 960-973, 1992 | 117 | 1992 |
Direct construction of recursive MDS diffusion layers using shortened BCH codes D Augot, M Finiasz Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK …, 2015 | 110 | 2015 |
Initial recommendations of long-term secure post-quantum systems A Daniel, B Lejla PQCRYPTO. EU. Horizon 2020, 2015 | 87 | 2015 |
A user-centric system for verified identities on the bitcoin blockchain D Augot, H Chabanne, T Chenevier, W George, L Lambert Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2017 | 70 | 2017 |
Exhaustive search for small dimension recursive MDS diffusion layers for block ciphers and hash functions D Augot, M Finiasz 2013 IEEE International Symposium on Information Theory, 1551-1555, 2013 | 70 | 2013 |
Idempotents and the BCH bound D Augot, N Sendrier IEEE Transactions on information Theory 40 (1), 204-207, 1994 | 64 | 1994 |
Secure delivery of images over open networks D Augot, JM Boucqueau, JF Delaigle, C Fontaine, E Goray Proceedings of the IEEE 87 (7), 1251-1266, 1999 | 60 | 1999 |
A fast provably secure cryptographic hash function D Augot, M Finiasz, N Sendrier Cryptology ePrint Archive, 2003 | 58 | 2003 |
A public key encryption scheme based on the polynomial reconstruction problem D Augot, M Finiasz International Conference on the Theory and Applications of Cryptographic …, 2003 | 56 | 2003 |
A Hensel lifting to replace factorization in list-decoding of algebraic-geometric and Reed-Solomon codes D Augot, L Pecquet IEEE Transactions on Information Theory 46 (7), 2605-2614, 2000 | 54 | 2000 |
Transforming face-to-face identity proofing into anonymous digital identity using the bitcoin blockchain D Augot, H Chabanne, O Clémot, W George 2017 15th Annual Conference on Privacy, Security and Trust (PST), 25-2509, 2017 | 52 | 2017 |
An efficient group key agreement protocol for ad hoc networks D Augot, R Bhaskar, V Issarny, D Sacchetti Sixth IEEE International Symposium on a World of Wireless Mobile and …, 2005 | 49 | 2005 |
Rank metric and Gabidulin codes in characteristic zero D Augot, P Loidreau, G Robert 2013 IEEE International Symposium on Information Theory, 509-513, 2013 | 45 | 2013 |
Generalized Gabidulin codes over fields of any characteristic D Augot, P Loidreau, G Robert Designs, Codes and Cryptography 86, 1807-1848, 2018 | 44 | 2018 |
A storage-efficient and robust private information retrieval scheme allowing few servers D Augot, F Levy-dit-Vehel, A Shikfa Cryptology and Network Security: 13th International Conference, CANS 2014 …, 2014 | 35 | 2014 |
An interpolation procedure for list decoding Reed–Solomon codes based on generalized key equations A Zeh, C Gentner, D Augot IEEE Transactions on Information Theory 57 (9), 5946-5959, 2011 | 34 | 2011 |
Bounds on the minimum distance of the duals of BCH codes D Augot, F Levy-dit-Vehel IEEE transactions on information theory 42 (4), 1257-1260, 1996 | 34 | 1996 |
Sha-3 proposal: FSB D Augot, M Finiasz, P Gaborit, S Manuel, N Sendrier Submission to NIST, 81-85, 2008 | 32 | 2008 |
On constructing homomorphic encryption schemes from coding theory F Armknecht, D Augot, L Perret, AR Sadeghi IMA International Conference on Cryptography and Coding, 23-40, 2011 | 31 | 2011 |