Matthieu Finiasz
Matthieu Finiasz
Security Expert
Adresse e-mail validée de olvid.io - Page d'accueil
Titre
Citée par
Citée par
Année
How to achieve a McEliece-based digital signature scheme
N Courtois, M Finiasz, N Sendrier
Advances in Cryptology - ASIACRYPT 2001, 157-174, 2001
4682001
Security bounds for the design of code-based cryptosystems
M Finiasz, N Sendrier
Advances in Cryptology–ASIACRYPT 2009, 88-105, 2009
2392009
A family of fast syndrome based cryptographic hash functions
D Augot, M Finiasz, N Sendrier
Progress in Cryptology–Mycrypt 2005, 64-83, 2005
942005
Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes
D Augot, M Finiasz
FSE 2014, 0
79*
Parallel-CFS
M Finiasz
Selected Areas in Cryptography - SAC 2011, 159-170, 2011
762011
Recovering a code's length and synchronization from a noisy intercepted bitstream
M Cluzeau, M Finiasz
2009 IEEE International Symposium on Information Theory, 2737-2741, 2009
572009
Exhaustive Search for Small Dimension Recursive MDS Diffusion Layers for Block Ciphers and Hash Functions
D Augot, M Finiasz
ISIT 2013, 2013
502013
Reconstruction of punctured convolutional codes
M Cluzeau, M Finiasz
2009 IEEE Information Theory Workshop, 75-79, 2009
482009
A public key encryption scheme based on the polynomial reconstruction problem
D Augot, M Finiasz
Advances in Cryptology—EUROCRYPT 2003, 229-240, 2003
422003
Sha-3 proposal: FSB
D Augot, M Finiasz, P Gaborit, S Manuel, N Sendrier
Submission to NIST, 81-85, 2008
38*2008
Methods for the reconstruction of parallel turbo codes
M Cluzeau, M Finiasz, JP Tillich
Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on …, 2010
352010
Nouvelles constructions utilisant des codes correcteurs d’erreurs en cryptographie à clef publique
M Finiasz
These de doctorat, École Polytechnique (October 2004), 2004
332004
A fast provably secure cryptographic hash function
D Augot, M Finiasz, N Sendrier
Cryptology ePrint Archive, Report 2003/230. Available at http://www. iacr …, 2003
31*2003
Improved fast syndrome based cryptographic hash functions
M Finiasz, P Gaborit, N Sendrier
Proceedings of ECRYPT Hash Workshop 2007, 155, 2007
302007
TCHo: a Hardware-Oriented Trapdoor Cipher
S Vaudenay, JP Aumasson, M Finiasz, W Meier
ACISP" 07: the 12th Australasian Conference on Information Security and …, 2007
27*2007
: A Hardware-Oriented Trapdoor Cipher
JP Aumasson, M Finiasz, W Meier, S Vaudenay
Information Security and Privacy, 0
27
One-way private media search on public databases: The role of signal processing
G Fanti, M Finiasz, K Ramchandran
IEEE Signal Processing Magazine 30 (2), 53-61, 2013
252013
Private stream search at the same communication cost as a regular search: Role of ldpc codes
M Finiasz, K Ramchandran
2012 IEEE International Symposium on Information Theory Proceedings, 2556-2560, 2012
242012
When Stream Cipher Analysis Meets Public-Key Cryptography
S Vaudenay, M Finiasz
SAC 2006, 266-284, 2006
22*2006
Trap Me If You Can--Million Dollar Curve
T Baignères, C Delerablée, M Finiasz, L Goubin, T Lepoint, M Rivain
IACR Cryptology ePrint Archive, 2015: 1249, 2015
192015
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20