Improved identification schemes based on error-correcting codes P Véron Applicable Algebra in Engineering, Communication and Computing 8, 57-69, 1997 | 153 | 1997 |
A zero-knowledge identification scheme based on the q-ary syndrome decoding problem PL Cayrel, P Véron, SM El Yousfi Alaoui International Workshop on Selected Areas in Cryptography, 171-186, 2010 | 152 | 2010 |
Hqc CA Melchor, N Aragon, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ... Tech. Rep., 2019 | 48 | 2019 |
Extended security arguments for signature schemes SM El Yousfi Alaoui, Ö Dagdelen, P Véron, D Galindo, PL Cayrel Progress in Cryptology-AFRICACRYPT 2012: 5th International Conference on …, 2012 | 33 | 2012 |
Cryptographie: principes et mises en œuvre/2ème édition revue et augmentée B Pierre, R Robert, V Pascal Lavoisier, 2012 | 21 | 2012 |
An improved threshold ring signature scheme based on error correcting codes PL Cayrel, SM El Yousfi Alaoui, G Hoffmann, P Véron International Workshop on the Arithmetic of Finite Fields, 45-63, 2012 | 20 | 2012 |
Extended security arguments for signature schemes Ö Dagdelen, D Galindo, P Véron, SM El Yousfi Alaoui, PL Cayrel Designs, Codes and Cryptography 78 (2), 441-461, 2016 | 19 | 2016 |
On the non-linearity of power functions P Langevin, P Véron Designs, Codes and Cryptography 37, 31-43, 2005 | 19 | 2005 |
HQC C Aguilar Melchor, N Aragon, S Bettaieb, L Bidoux, O Blazy, ... NIST PQC Submission, 2020 | 18 | 2020 |
Goppa codes and trace operator P Véron IEEE Transactions on Information Theory 44 (1), 290-294, 1998 | 18 | 1998 |
Code based cryptography and steganography P Véron International Conference on Algebraic Informatics, 9-46, 2013 | 17 | 2013 |
Efficient modular operations using the adapted modular number system LS Didier, FY Dosso, P Véron Journal of Cryptographic Engineering 10 (2), 111-133, 2020 | 16 | 2020 |
On the number of bent functions with 8 variables P Langevin, P Rabizzoni, P Véron, JP Zanotti Proceedings of First International Workshop BFCA 5, 125-135, 2005 | 16 | 2005 |
Proof of conjectures on the true dimension of some binary Goppa codes P Véron Designs, Codes and Cryptography 36, 317-325, 2005 | 15 | 2005 |
True dimension of some binary quadratic trace Goppa codes P Véron Designs, Codes and Cryptography 24 (1), 81-97, 2001 | 15 | 2001 |
Randomization of arithmetic over polynomial modular number system LS Didier, FY Dosso, N El Mrabet, J Marrez, P Véron 2019 IEEE 26th Symposium on Computer Arithmetic (ARITH), 199-206, 2019 | 13 | 2019 |
Improved code-based identification scheme PL Cayrel, P Véron arXiv preprint arXiv:1001.3017, 2010 | 13 | 2010 |
Random euclidean addition chain generation and its application to point multiplication F Herbaut, PY Liardet, N Méloni, Y Téglia, P Véron Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010 | 13 | 2010 |
Cryptanalysis of Harari's identification scheme P Véron Cryptography and Coding: 5th IMA Conference Cirencester, UK, December 18–20 …, 1995 | 13 | 1995 |
Problème SD, Opérateur Trace, schémas d'identification et codes de Goppa P Véron Toulon, 1995 | 11 | 1995 |