Team, Visitors, External Collaborators
Overall Objectives
Research Program
Application Domains
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Publications of the year

Doctoral Dissertations and Habilitation Theses

[1]
A. Couvreur.
Codes algébriques et géométriques, applications à la cryptographie et à l'information quantique, Université Paris Diderot, December 2019, Habilitation à diriger des recherches.
https://hal.archives-ouvertes.fr/tel-02438668

Articles in International Peer-Reviewed Journals

[2]
B. Audoux, A. Couvreur.
On tensor products of CSS Codes, in: Annales de l’Institut Henri Poincaré (D) Combinatorics, Physics and their Interactions, 2019, vol. 6, no 2, pp. 239–287, https://arxiv.org/abs/1512.07081. [ DOI : 10.4171/AIHPD/71 ]
https://hal.archives-ouvertes.fr/hal-01248760
[3]
N. Coxon.
Fast Hermite interpolation and evaluation over finite fields of characteristic two, in: Journal of Symbolic Computation, July 2019, https://arxiv.org/abs/1807.00645. [ DOI : 10.1016/j.jsc.2019.07.014 ]
https://hal.archives-ouvertes.fr/hal-01827583
[4]
J. Lavauzelle.
Private Information Retrieval from Transversal Designs, in: IEEE Transactions on Information Theory, 2019, vol. 65, no 2, pp. 1189-1205, https://arxiv.org/abs/1709.07952. [ DOI : 10.1109/TIT.2018.2861747 ]
https://hal.archives-ouvertes.fr/hal-01901014
[5]
J. Lavauzelle, F. Levy-Dit-Vehel.
Generic constructions of PoRs from codes and instantiations, in: Journal of Mathematical Cryptology, February 2019, vol. 13, no 2, pp. 81–106, forthcoming. [ DOI : 10.1515/jmc-2018-0018 ]
https://hal.archives-ouvertes.fr/hal-02053948
[6]
R. Lercier, C. Ritzenthaler, F. Rovetta, J. Sijsling, B. Smith.
Distributions of traces of Frobenius for smooth plane curves over finite fields, in: Experimental Mathematics, January 2019, vol. 28, no 1, pp. 39-48, https://arxiv.org/abs/1510.05601. [ DOI : 10.1080/10586458.2017.1328321 ]
https://hal.inria.fr/hal-01217995

International Conferences with Proceedings

[7]
M. Bardet, M. Bertin, A. Couvreur, A. Otmani.
Practical Algebraic Attack on DAGS, in: CBC 2019 - 7th Code-Based Cryptography Workshop, Darmstadt, Germany, LNCS, July 2019, vol. 11666, pp. 86-101, https://arxiv.org/abs/1905.03635 - 16 pages, accepted for publication in the 7th Code-Based Cryptography Workshop 2019. [ DOI : 10.1007/978-3-030-25922-8_5 ]
https://hal.archives-ouvertes.fr/hal-02125330
[8]
D. Cervantes-Vázquez, M. Chenu, J.-J. Chi-Domínguez, L. De Feo, F. Rodríguez-Henríquez, B. Smith.
Stronger and Faster Side-Channel Protections for CSIDH, in: Latincrypt 2019 - 6th International Conference on Cryptology and Information Security in Latin, Santiago de Chile, Chile, P. Schwabe, N. Thériault (editors), LNCS - Lecture Notes in Computer Science, Springer, October 2019, vol. 11774, https://arxiv.org/abs/1907.08704 - This work has been accepted in LATINCRYPT-2019. [ DOI : 10.1007/978-3-030-30530-7_9 ]
https://hal.inria.fr/hal-02190863
[9]
A. Couvreur, M. Lequesne, J.-P. Tillich.
Recovering short secret keys of RLCE encryption scheme in polynomial time, in: PQCrypto 2019 - International Conference on Post-Quantum Cryptography, Chongqing, China, May 2019, https://arxiv.org/abs/1805.11489. [ DOI : 10.1007/978-3-030-25510-7_8 ]
https://hal.inria.fr/hal-01959617

Conferences without Proceedings

[10]
D. Augot, H. Chabanne, W. George.
Practical Solutions to Save Bitcoins Applied to an Identity System Proposal, in: 5th International Conference on Information Systems Security and Privacy, Prague, France, SCITEPRESS - Science and Technology Publications, February 2019, pp. 511-518. [ DOI : 10.5220/0007443905110518 ]
https://hal.telecom-paristech.fr/hal-02347238
[11]
D. Coggia, A. Couvreur.
On the security of a Loidreau's rank metric code based encryption scheme, in: WCC 2019 - The Eleventh International Workshop on Coding and Cryptography, Saint Jacut de la mer, France, March 2019.
https://hal.archives-ouvertes.fr/hal-02064465

Scientific Books (or Scientific Book chapters)

[12]
D. Augot, F. Solov'Eva, M. Minier, V. A. Zinoviev, T. Johansson.
Editorial: Special issue on coding and cryptography, Springer, March 2019, vol. 87, no 2-3. [ DOI : 10.1007/s10623-018-00601-w ]
https://hal.inria.fr/hal-02373772

Other Publications

[13]
W. Castryck, T. Decru, B. Smith.
Hash functions from superspecial genus-2 curves using Richelot isogenies, June 2019, https://arxiv.org/abs/1903.06451 - working paper or preprint.
https://hal.inria.fr/hal-02067885
[14]
C. Costello, B. Smith.
The supersingular isogeny problem in genus 2 and beyond, December 2019, https://arxiv.org/abs/1912.00701 - working paper or preprint.
https://hal.inria.fr/hal-02389073
[15]
A. Couvreur, I. Panaccione.
Power Error Locating Pairs, July 2019, https://arxiv.org/abs/1907.11658 - working paper or preprint.
https://hal.archives-ouvertes.fr/hal-02196650
[16]
N. Coxon.
Fast transforms over finite fields of characteristic two, September 2019, https://arxiv.org/abs/1807.07785 - working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01845238
[17]
J. Lavauzelle, P. Loidreau, B.-D. Pham.
RAMESSES, a Rank Metric Encryption Scheme with Short Keys, January 2020, working paper or preprint.
https://hal.archives-ouvertes.fr/hal-02426624
References in notes
[18]
F. Morain, G. Renault, B. Smith.
Deterministic factoring with oracles, February 2018, https://arxiv.org/abs/1802.08444 - working paper or preprint.
https://hal.inria.fr/hal-01715832