Reducing key length of the McEliece cryptosystem TP Berger, PL Cayrel, P Gaborit, A Otmani International Conference on Cryptology in Africa, 77-97, 2009 | 292 | 2009 |
Type II codes over F/sub 2/+ uF/sub 2 ST Dougherty, P Gaborit, M Harada, P Solé IEEE Transactions on Information Theory 45 (1), 32-45, 1999 | 279 | 1999 |
Shorter keys for code based cryptography P Gaborit Proceedings of the 2005 International Workshop on Coding and Cryptography …, 2005 | 211 | 2005 |
BIKE: bit flipping key encapsulation N Aragon, P Barreto, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ... | 195* | 2022 |
Low rank parity check codes and their application to cryptography P Gaborit, G Murat, O Ruatta, G Zémor Proceedings of the Workshop on Coding and Cryptography WCC 2013, 2013 | 190 | 2013 |
A fast private information retrieval protocol CA Melchor, P Gaborit 2008 IEEE international symposium on information theory, 1848-1852, 2008 | 188* | 2008 |
On the complexity of the rank syndrome decoding problem P Gaborit, O Ruatta, J Schrek IEEE Transactions on Information Theory 62 (2), 1006-1019, 2015 | 184 | 2015 |
Distinguisher-based attacks on public-key cryptosystems using Reed–Solomon codes A Couvreur, P Gaborit, V Gauthier-Umaña, A Otmani, JP Tillich Designs, Codes and Cryptography 73, 641-666, 2014 | 182 | 2014 |
Linear constructions for DNA codes P Gaborit, OD King Theoretical Computer Science 334 (1-3), 99-113, 2005 | 179 | 2005 |
Efficient computation of algebraic immunity for algebraic and fast algebraic attacks F Armknecht, C Carlet, P Gaborit, S Künzli, W Meier, O Ruatta Annual International Conference on the Theory and Applications of …, 2006 | 175 | 2006 |
Construction of bent functions via Niho power functions H Dobbertin, G Leander, A Canteaut, C Carlet, P Felke, P Gaborit Journal of Combinatorial Theory, Series A 113 (5), 779-798, 2006 | 173 | 2006 |
Improvements of algebraic attacks for solving the rank decoding and MinRank problems M Bardet, M Bros, D Cabarcas, P Gaborit, R Perlner, D Smith-Tone, ... Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020 | 172 | 2020 |
Additively Homomorphic Encryption with d-Operand Multiplications CA Melchor, P Gaborit, J Herranz Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010 | 156 | 2010 |
Efficient encryption from random quasi-cyclic codes C Aguilar-Melchor, O Blazy, JC Deneuville, P Gaborit, G Zémor IEEE Transactions on Information Theory 64 (5), 3927-3943, 2018 | 154* | 2018 |
On the hardness of the decoding and the minimum distance problems for rank codes P Gaborit, G Zémor IEEE Transactions on Information Theory 62 (12), 7245-7252, 2016 | 148 | 2016 |
A new efficient threshold ring signature scheme based on coding theory CA Melchor, PL Cayrel, P Gaborit, F Laguillaumie IEEE Transactions on Information Theory 57 (7), 4833-4842, 2011 | 148 | 2011 |
Hamming quasi-cyclic (HQC) CA Melchor, N Aragon, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ... NIST PQC Round 2 (4), 13, 2018 | 123 | 2018 |
A new algorithm for solving the rank syndrome decoding problem N Aragon, P Gaborit, A Hauteville, JP Tillich 2018 IEEE International Symposium on Information Theory (ISIT), 2421-2425, 2018 | 119* | 2018 |
Lightweight code-based identification and signature P Gaborit, M Girault 2007 IEEE International Symposium on Information Theory, 191-195, 2007 | 117 | 2007 |
Type IV self-dual codes over rings ST Dougherty, P Gaborit, M Harada, A Munemasa, P Solé IEEE transactions on information theory 45 (7), 2345-2360, 1999 | 116 | 1999 |