Reducing Key Length of the McEliece Cryptosystem, Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology, AFRICACRYPT '09, pp.77-97, 2009. ,
DOI : 10.1007/BFb0019850
URL : https://hal.archives-ouvertes.fr/hal-01081727
On quasi-cyclic codes as a generalization of cyclic codes. Finite Fields and Their Applications, pp.904-919, 2012. ,
URL : https://hal.archives-ouvertes.fr/inria-00615276
Decoding interleaved Reed???Solomon codes over noisy channels, Automata, Languages and Programming, pp.348-360, 2007. ,
DOI : 10.1016/j.tcs.2007.02.043
URL : http://doi.org/10.1016/j.tcs.2007.02.043
Quasi-cyclic codes as codes over rings of matrices. Finite Fields and Their Applications, pp.100-115, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00637617
Factorisation in M (F q )[X]. Construction of quasi-cyclic codes, WCC 2011 -Workshop on coding and cryptography, pp.209-218, 2011. ,
Algebraic Cryptanalysis of McEliece Variants with Compact Keys, Advances in Cryptology EUROCRYPT 2010, pp.279-298, 2010. ,
DOI : 10.1007/978-3-642-13190-5_14
Bounds on the minimum distance of linear codes and quantum codes, pp.2011-2015, 2007. ,
On the equivalence of McEliece's and Niederreiter's public-key cryptosystems, IEEE Trans. Inform. Theory, vol.40, issue.1, pp.271-273, 1994. ,
Algebraic structure of quasicyclic codes, Discrete Applied Mathematics, vol.111, issue.1-2, pp.157-175, 2001. ,
DOI : 10.1016/S0166-218X(00)00350-4
On the algebraic structure of quasi-cyclic codes .I. Finite fields, IEEE Trans. Inform. Theory, issue.7, pp.472751-2760, 2001. ,
Good self-dual quasi-cyclic codes exist, IEEE Transactions on Information Theory, vol.49, issue.4, pp.1052-1053, 2003. ,
DOI : 10.1109/TIT.2003.809501
A Public-Key Cryptosystem Based On Algebraic Coding Theory, Deep Space Network Progress Report, vol.44, pp.114-116, 1978. ,
The theory of error-correcting codes. North-Holland mathematical library, 1986. ,
Knapsack-type cryptosystems and algebraic coding theory. Problems of Control and Information Theory, pp.159-166, 1986. ,
Error and Erasure Correction of Interleaved Reed???Solomon Codes, Coding and Cryptography, pp.22-35, 2006. ,
DOI : 10.1007/11779360_3
Practical Key Recovery Attacks On Two McEliece Variants, Proceedings of the Second International Conference on Symbolic Computation and Cryptography, pp.27-44, 2010. ,