On bent and semi-bent quadratic Boolean functions P Charpin, E Pasalic, C Tavernier IEEE Transactions on Information Theory 51 (12), 4286-4298, 2005 | 153 | 2005 |
Information transmission security method C Tavernier, H Aiache US Patent 8,347,084, 2013 | 74 | 2013 |
An improved list decoding algorithm for the second order Reed–Muller codes and its applications R Fourquet, C Tavernier Designs, Codes and Cryptography 49, 323-340, 2008 | 51 | 2008 |
List decoding of Reed-Muller codes up to the Johnson bound with almost linear complexity I Dumer, G Kabatiansky, C Tavernier 2006 IEEE International Symposium on Information Theory, 138-142, 2006 | 49 | 2006 |
List decoding of second order Reed-Muller codes G Kabatiansky, C Tavernier Proc. 8th Intern. Simp. Comm. Theory and Applications, Ambleside, UK, 2005 | 37 | 2005 |
Improving security and performance of an ad hoc network through a multipath routing strategy H Aiache, F Haettel, L Lebrun, C Tavernier Journal in computer virology 4 (4), 267-278, 2008 | 21 | 2008 |
List decoding of Reed-Muller codes G Kabatiansky, C Tavernier algorithms 3, 4, 2004 | 19 | 2004 |
Optimized linear complementary codes implementation for hardware trojan prevention C Carlet, A Daif, JL Danger, S Guilley, Z Najm, XT Ngo, T Porteboeuf, ... 2015 European Conference on Circuit Theory and Design (ECCTD), 1-4, 2015 | 18 | 2015 |
List decoding of second order Reed-Muller codes and its covering radius implications R Fourquet, C Tavernier Workshop on Coding Theory and cryptography WCC, 2007 | 15 | 2007 |
Polynomial direct sum masking to protect against both SCA and FIA C Carlet, A Daif, S Guilley, C Tavernier Journal of Cryptographic Engineering 9, 303-312, 2019 | 13 | 2019 |
A new code-based public-key cryptosystem resistant to quantum computer attacks E Egorova, G Kabatiansky, E Krouk, C Tavernier Journal of Physics: Conference Series 1163 (1), 012061, 2019 | 13 | 2019 |
List decoding of first order Reed-Muller codes II G Kabatiansky, C Tavernier Proc. ACCT-10, Zvenigorod, Russia, 2006 | 12 | 2006 |
Data encoding method C Tavernier, H Aiache US Patent 8,213,615, 2012 | 11 | 2012 |
Finding good linear approximations of block ciphers and its application to cryptanalysis of reduced round des R Fourquet, P Loidreau, C Tavernier Workshop on Coding Theory and Cryptography, Ullensvang, Norvège, 2009 | 11 | 2009 |
Testeurs, problemes de reconstruction univaries et multivaries, et application a la cryptanalyse du DES. C Tavernier Ecole Polytechnique X, 2004 | 8 | 2004 |
On complexity of decoding Reed-Muller codes within their code distance I Dumer, G Kabatiansky, C Tavernier, F Le Plessis Robinson Proc. Eleventh International Workshop on Algebraic and Combinatorial Coding …, 2008 | 7 | 2008 |
On the doubly sparse compressed sensing problem G Kabatiansky, S Vlǎduţ, C Tavernier IMA International Conference on Cryptography and Coding, 184-189, 2015 | 6 | 2015 |
Multi-Linear cryptanalysis in Power Analysis Attacks MLPA T Roche, C Tavernier arXiv preprint arXiv:0906.0237, 2009 | 6 | 2009 |
List decoding of biorthogonal codes and the Hadamard transform with linear complexity I Dumer, G Kabatiansky, C Tavernier IEEE Transactions on Information Theory 54 (10), 4488-4492, 2008 | 6 | 2008 |
A new code-based cryptosystem via pseudorepetition of codes G Kabatiansky, C Tavernier Proceedings of ACCT XVI, 189-191, 2018 | 5 | 2018 |