Publications

Filter by type:
. The build-up construction over a non-unital ring (List of codes up to 12). , 2019.

Odd Even

. Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3. In Transactions on Symmetric Cryptology, IACR, 2017.

Preprint

. On the Construction of the Asymmetric Chudnovsky Multiplication Algorithm in Finite Fields Without Derivated Evaluation. In CC. R. Acad. Sci. Paris, Elsevier, 2017.

PDF

. Arithmetic in Finite Fields Based on the Chudnovsky Multiplication Algorithm. In Mathematics of Computation, AMS, 2017.

Preprint

. Effective Arithmetic in Finite Fields Based on Chudnovsky’s Multiplication Algorithm. In Comptes Rendus de l’Académie des Sciences, Elsevier, 2016.

PDF

. New Models for Efficient Authenticated Dictionaries. In Computers & Security, Elsevier, 2015.

Preprint

. Authenticated Dictionary Based on Frequency. In IFIP International Information Security and Privacy Conference (IFIP SEC 2014), Springer, 2014.

PDF

. AES Side-Channel Coutermeasure using Random Tower Field Constructions. DCC, 2013.

PDF Source Document

. Uniform Generators and Combinatorial Designs. Int. Journal on Advances in Networks and Services, 2011.

PDF

. Efficient Uniform k-out-of-n Generators. ICSNC 2010, Proc of IEEE Computer Society Digital Library, 2011.

PDF

. On Key Distribution in MANETs, . SITIS’09, 2009.

PDF

. Multisignatures as Secure as the Diffie-Hellman Problem in the Plain Public-Key Model. Pairing’09, 2009.

PDF

. Signtiming Scheme based on Aggregate Signatures. ISI’08, 2008.

PDF

. A Secure Round-based Timestamping Scheme. ICISS’08, 2008.

PDF

. Threshold Signature for Distributed Time Stamping Schemes. Annals of Telecommunications, 2007.

Source Document

. Etude des systèmes d'horodatage. TSI, Hermes, 2007.

Source Document

. Secure Time Stamping Schemes: A Distributive Point of View . Annals of Telecommunications, 2006.

PDF Source Document

. A distributed Time Stamping Scheme . IEEE SITIS, 2005.

PDF

. Splitting the shadow. Discrete Mathematics, 2003.

PDF Source Document

. Cubic self-dual binary codes. IEEE Transactions on Information Theory, 2003.

PDF

. 3-Colored 5-Designs and Z4-codes. The Journal of Statistical Planning and Inference, 2000.

PDF Source Document

. Symmetric flows and broadcasting in hypercubes . Annales de l’institut Fourier, 1999.

Source Document

. Strong 4-Colored 5-Designs. AAECC-13, 1999.

PDF

. Niemeier Lattices and Type II Codes over Z4. Discrete Mathematics, 1999.

PDF Source Document

. Jacobi Polynomials, Type II Codes, and Designs. Designs, Codes and Cryptography, 1999.

PDF Source Document

. Decoding Cyclic Codes over F2+uF2 . IEEE Transactions on Information Theory, 1999.

PDF Source Document

. Cyclic Codes and Self-dual Codes over F2+uF2 . IEEE Transactions on Information Theory, 1999.

PDF Source Document

. Cyclic Codes over a Linear Companion of Z4. ISIT, 1998.

PDF Source Document

. Type II Codes over Z4. IEEE Transactions on Information Theory, 1997.

PDF DOI

. Translates of Linear Codes over Z4. IEEE Transactions on Information Theory, 1997.

PDF Source Document DOI

. Quaternary quadratic residue codes and unimodular lattices. IEEE Transactions on Information Theory, 1995.

PDF Source Document DOI