Follow
Matthieu Finiasz
Matthieu Finiasz
Security Expert
Verified email at olvid.io - Homepage
Title
Cited by
Cited by
Year
How to achieve a McEliece-based digital signature scheme
N Courtois, M Finiasz, N Sendrier
Advances in Cryptology - ASIACRYPT 2001, 157-174, 2001
5872001
Security bounds for the design of code-based cryptosystems
M Finiasz, N Sendrier
Advances in Cryptology–ASIACRYPT 2009, 88-105, 2009
3092009
A family of fast syndrome based cryptographic hash functions
D Augot, M Finiasz, N Sendrier
Progress in Cryptology–Mycrypt 2005, 64-83, 2005
1212005
Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes
D Augot, M Finiasz
FSE 2014, 0
95*
Parallel-CFS
M Finiasz
Selected Areas in Cryptography - SAC 2011, 159-170, 2011
93*2011
Recovering a code's length and synchronization from a noisy intercepted bitstream
M Cluzeau, M Finiasz
2009 IEEE International Symposium on Information Theory, 2737-2741, 2009
782009
Exhaustive Search for Small Dimension Recursive MDS Diffusion Layers for Block Ciphers and Hash Functions
D Augot, M Finiasz
ISIT 2013, 2013
632013
Reconstruction of punctured convolutional codes
M Cluzeau, M Finiasz
2009 IEEE Information Theory Workshop, 75-79, 2009
572009
A public key encryption scheme based on the polynomial reconstruction problem
D Augot, M Finiasz
Advances in Cryptology—EUROCRYPT 2003, 229-240, 2003
532003
Methods for the reconstruction of parallel turbo codes
M Cluzeau, M Finiasz, JP Tillich
Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on …, 2010
452010
A fast provably secure cryptographic hash function
D Augot, M Finiasz, N Sendrier
Cryptology ePrint Archive, Report 2003/230. Available at http://www. iacr …, 2003
452003
Sha-3 proposal: FSB
D Augot, M Finiasz, P Gaborit, S Manuel, N Sendrier
Submission to NIST, 81-85, 2008
40*2008
Nouvelles constructions utilisant des codes correcteurs d’erreurs en cryptographie à clef publique
M Finiasz
These de doctorat, École Polytechnique (October 2004), 2004
342004
Improved fast syndrome based cryptographic hash functions
M Finiasz, P Gaborit, N Sendrier
Proceedings of ECRYPT Hash Workshop 2007, 155, 2007
332007
Trap Me If You Can--Million Dollar Curve
T Baignères, C Delerablée, M Finiasz, L Goubin, T Lepoint, M Rivain
IACR Cryptology ePrint Archive, 2015: 1249, 2015
302015
One-way private media search on public databases: The role of signal processing
G Fanti, M Finiasz, K Ramchandran
IEEE Signal Processing Magazine 30 (2), 53-61, 2013
282013
TCHo: a Hardware-Oriented Trapdoor Cipher
S Vaudenay, JP Aumasson, M Finiasz, W Meier
ACISP" 07: the 12th Australasian Conference on Information Security and …, 2007
28*2007
Private stream search at the same communication cost as a regular search: Role of ldpc codes
M Finiasz, K Ramchandran
2012 IEEE International Symposium on Information Theory Proceedings, 2556-2560, 2012
262012
When Stream Cipher Analysis Meets Public-Key Cryptography
S Vaudenay, M Finiasz
SAC 2006, 266-284, 2006
24*2006
Dial C for cipher
T Baigneres, M Finiasz
Selected Areas in Cryptography, 76-95, 2007
182007
The system can't perform the operation now. Try again later.
Articles 1–20