Matthieu Finiasz
Matthieu Finiasz
Security Expert
Adresse e-mail validée de olvid.io - Page d'accueil
Titre
Citée par
Citée par
Année
How to achieve a McEliece-based digital signature scheme
N Courtois, M Finiasz, N Sendrier
Advances in Cryptology - ASIACRYPT 2001, 157-174, 2001
4952001
Security bounds for the design of code-based cryptosystems
M Finiasz, N Sendrier
Advances in Cryptology–ASIACRYPT 2009, 88-105, 2009
2582009
A family of fast syndrome based cryptographic hash functions
D Augot, M Finiasz, N Sendrier
Progress in Cryptology–Mycrypt 2005, 64-83, 2005
992005
Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes
D Augot, M Finiasz
FSE 2014, 0
84*
Parallel-CFS
M Finiasz
Selected Areas in Cryptography - SAC 2011, 159-170, 2011
832011
Recovering a code's length and synchronization from a noisy intercepted bitstream
M Cluzeau, M Finiasz
2009 IEEE International Symposium on Information Theory, 2737-2741, 2009
652009
Exhaustive Search for Small Dimension Recursive MDS Diffusion Layers for Block Ciphers and Hash Functions
D Augot, M Finiasz
ISIT 2013, 2013
542013
Reconstruction of punctured convolutional codes
M Cluzeau, M Finiasz
2009 IEEE Information Theory Workshop, 75-79, 2009
522009
A public key encryption scheme based on the polynomial reconstruction problem
D Augot, M Finiasz
Advances in Cryptology—EUROCRYPT 2003, 229-240, 2003
442003
Methods for the reconstruction of parallel turbo codes
M Cluzeau, M Finiasz, JP Tillich
Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on …, 2010
392010
Sha-3 proposal: FSB
D Augot, M Finiasz, P Gaborit, S Manuel, N Sendrier
Submission to NIST, 81-85, 2008
39*2008
A fast provably secure cryptographic hash function
D Augot, M Finiasz, N Sendrier
Cryptology ePrint Archive, Report 2003/230. Available at http://www. iacr …, 2003
35*2003
Nouvelles constructions utilisant des codes correcteurs d’erreurs en cryptographie à clef publique
M Finiasz
These de doctorat, École Polytechnique (October 2004), 2004
332004
Improved fast syndrome based cryptographic hash functions
M Finiasz, P Gaborit, N Sendrier
Proceedings of ECRYPT Hash Workshop 2007, 155, 2007
302007
: A Hardware-Oriented Trapdoor Cipher
JP Aumasson, M Finiasz, W Meier, S Vaudenay
Australasian Conference on Information Security and Privacy, 184-199, 2007
272007
TCHo: a Hardware-Oriented Trapdoor Cipher
S Vaudenay, JP Aumasson, M Finiasz, W Meier
ACISP" 07: the 12th Australasian Conference on Information Security and …, 2007
27*2007
One-way private media search on public databases: The role of signal processing
G Fanti, M Finiasz, K Ramchandran
IEEE Signal Processing Magazine 30 (2), 53-61, 2013
262013
Private stream search at the same communication cost as a regular search: Role of ldpc codes
M Finiasz, K Ramchandran
2012 IEEE International Symposium on Information Theory Proceedings, 2556-2560, 2012
252012
When Stream Cipher Analysis Meets Public-Key Cryptography
S Vaudenay, M Finiasz
SAC 2006, 266-284, 2006
22*2006
Trap Me If You Can--Million Dollar Curve
T Baignères, C Delerablée, M Finiasz, L Goubin, T Lepoint, M Rivain
IACR Cryptology ePrint Archive, 2015: 1249, 2015
202015
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20