How to achieve a McEliece-based digital signature scheme NT Courtois, M Finiasz, N Sendrier Advances in Cryptology—ASIACRYPT 2001: 7th International Conference on the …, 2001 | 645 | 2001 |
MDPC-McEliece: New McEliece variants from moderate density parity-check codes R Misoczki, JP Tillich, N Sendrier, PSLM Barreto 2013 IEEE international symposium on information theory, 2069-2073, 2013 | 527 | 2013 |
On correlation-immune functions P Camion, C Carlet, P Charpin, N Sendrier Advances in Cryptology—CRYPTO’91: Proceedings 11, 86-100, 1992 | 368 | 1992 |
Security bounds for the design of code-based cryptosystems M Finiasz, N Sendrier Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009 | 340 | 2009 |
Finding the permutation between equivalent linear codes: The support splitting algorithm N Sendrier IEEE Transactions on Information Theory 46 (4), 1193-1203, 2000 | 287 | 2000 |
Code-based cryptography R Overbeck, N Sendrier Post-quantum cryptography, 95-145, 2009 | 252 | 2009 |
Cryptanalysis of the original McEliece cryptosystem A Canteaut, N Sendrier Advances in Cryptology—ASIACRYPT’98: International Conference on the Theory …, 1998 | 185 | 1998 |
Decoding one out of many N Sendrier International Workshop on Post-Quantum Cryptography, 51-67, 2011 | 178 | 2011 |
Linear codes with complementary duals meet the Gilbert–Varshamov bound N Sendrier Discrete mathematics 285 (1-3), 345-347, 2004 | 149 | 2004 |
Linear codes with complementary duals meet the Gilbert–Varshamov bound N Sendrier Discrete mathematics 285 (1-3), 345-347, 2004 | 149 | 2004 |
Classic McEliece: conservative code-based cryptography DJ Bernstein, T Chou, T Lange, I von Maurich, R Misoczki, ... NIST submissions 1 (1), 1-25, 2017 | 145 | 2017 |
McEliece cryptosystem implementation: Theory and practice B Biswas, N Sendrier Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008 …, 2008 | 143 | 2008 |
Analysis of information set decoding for a sub-linear error weight R Canto Torres, N Sendrier International Workshop on Post-Quantum Cryptography, 144-161, 2016 | 130 | 2016 |
A family of fast syndrome based cryptographic hash functions D Augot, M Finiasz, N Sendrier Progress in Cryptology–Mycrypt 2005: First International Conference on …, 2005 | 130 | 2005 |
Weak keys in the McEliece public-key cryptosystem P Loidreau, N Sendrier IEEE Transactions on Information Theory 47 (3), 1207-1211, 2001 | 126 | 2001 |
BIKE: bit flipping key encapsulation N Aragon, P Barreto, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ... | 115 | 2022 |
Wave: A new family of trapdoor one-way preimage sampleable functions based on codes T Debris-Alazard, N Sendrier, JP Tillich International Conference on the Theory and Application of Cryptology and …, 2019 | 110 | 2019 |
Studying the locator polynomials of minimum weight codewords of BCH codes D Augot, P Charpin, N Sendrier IEEE Transactions on Information Theory 38 (3), 960-973, 1992 | 110 | 1992 |
Studying the locator polynomials of minimum weight codewords of BCH codes D Augot, P Charpin, N Sendrier IEEE Transactions on Information Theory 38 (3), 960-973, 1992 | 110 | 1992 |
On the dimension of the hull N Sendrier SIAM Journal on Discrete Mathematics 10 (2), 282-293, 1997 | 100 | 1997 |