Distinguisher-based attacks on public-key cryptosystems using Reed–Solomon codes A Couvreur, P Gaborit, V Gauthier-Umaña, A Otmani, JP Tillich Designs, Codes and Cryptography 73 (2), 641-666, 2014 | 156 | 2014 |
Polynomial time attack on wild McEliece over quadratic extensions A Couvreur, A Otmani, JP Tillich IEEE Transactions on Information Theory 63 (1), 404-427, 2016 | 138 | 2016 |
Cryptanalysis of McEliece cryptosystem based on algebraic geometry codes and their subcodes A Couvreur, I Márquez-Corbella, R Pellikaan IEEE Transactions on Information Theory 63 (8), 5404-5418, 2017 | 71 | 2017 |
A polynomial time attack against algebraic geometry code based public key cryptosystems A Couvreur, I Márquez-Corbella, R Pellikaan 2014 IEEE International Symposium on Information Theory, 1446-1450, 2014 | 70 | 2014 |
The dual minimum distance of arbitrary-dimensional algebraic–geometric codes A Couvreur Journal of Algebra 350 (1), 84-107, 2012 | 56 | 2012 |
A polynomial-time attack on the BBCRS scheme A Couvreur, A Otmani, JP Tillich, V Gauthier–Umana IACR International Workshop on Public Key Cryptography, 175-193, 2015 | 50 | 2015 |
A construction of quantum LDPC codes from Cayley graphs A Couvreur, N Delfosse, G Zémor IEEE transactions on information theory 59 (9), 6087-6098, 2013 | 46 | 2013 |
On the security of a Loidreau rank metric code based encryption scheme D Coggia, A Couvreur Designs, Codes and Cryptography 88, 1941-1957, 2020 | 37 | 2020 |
An efficient structural attack on NIST submission DAGS É Barelli, A Couvreur Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018 | 33 | 2018 |
Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes A Couvreur, I Márquez-Corbella, R Pellikaan Coding Theory and Applications: 4th International Castle Meeting, Palmela …, 2015 | 32 | 2015 |
Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes A Couvreur, P Gaborit, V Gauthier-Umana, A Otmani, JP Tillich arXiv preprint arXiv:1307.6458, 2013 | 32 | 2013 |
Performance analysis of a header compression protocol: The ROHC unidirectional mode A Couvreur, LML Ny, A Minaburo, G Rubino, B Sericola, L Toutain Telecommunication systems 31, 85-98, 2006 | 31 | 2006 |
New identities relating wild Goppa codes A Couvreur, A Otmani, JP Tillich Finite Fields and Their Applications 29, 178-197, 2014 | 30 | 2014 |
Evaluation codes from smooth quadric surfaces and twisted Segre varieties A Couvreur, I Duursma Designs, codes and cryptography 66, 291-303, 2013 | 25 | 2013 |
Rank quasi cyclic (RQC) C Aguilar Melchor, N Aragon, S Bettaieb, L Bidoux, O Blazy, ... Second Round submission to NIST Post-Quantum Cryptography call, 2020 | 24 | 2020 |
On tensor products of CSS codes B Audoux, A Couvreur Annales de l’Institut Henri Poincaré D 6 (2), 239-287, 2019 | 24 | 2019 |
Recovering short secret keys of RLCE in polynomial time A Couvreur, M Lequesne, JP Tillich Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019 …, 2019 | 21 | 2019 |
An upper bound on the number of rational points of arbitrary projective varieties over finite fields A Couvreur Proceedings of the American Mathematical Society 144 (9), 3671-3685, 2016 | 21 | 2016 |
List-decoding of binary Goppa codes up to the binary Johnson bound D Augot, M Barbier, A Couvreur 2011 IEEE Information Theory Workshop, 229-233, 2011 | 21 | 2011 |
Recovering or testing extended-affine equivalence A Canteaut, A Couvreur, L Perrin IEEE Transactions on Information Theory 68 (9), 6187-6206, 2022 | 19 | 2022 |