URL https://hal. archives-ouvertes.fr/hal-01946894, submission to the NIST post quantum standardization process, p.3, 2017. ,
Efficient encryption from random quasi-cyclic codes, IEEE Trans Information Theory, vol.64, issue.5, pp.3927-3943, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01951335
Durandal: A rank metric based signature scheme, Advances in Cryptology -EURO-CRYPT 2019 -38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.728-758, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02307147
How to achieve a McEliece-based digital signature scheme, Heidelberg, vol.2248, pp.157-174, 2001. ,
URL : https://hal.archives-ouvertes.fr/inria-00072511
, COMMENT: RaCoSS. Official comments about NIST PQC submissions, 2017.
Two attacks on rank metric codebased schemes: Ranksign and an IBE scheme, Advances in Cryptology -ASIACRYPT 2018 -24th International Conference on the Theory and Application of Cryptology and Information Security, vol.11272, pp.62-92, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01957207
The problem with the SURF scheme, Cryptology ePrint Archive, vol.662, 2017. ,
Wave: A new code-based signature scheme, Cryptology ePrint Archive, vol.996, p.3, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01958175
Cryptanalysis of a code-based one-time signature, The Eleventh International Workshop on Coding and Cryptography, vol.2019, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-01961491
A distinguisher for high rate McEliece cryptosystems, Proc. IEEE Inf. Theory Workshop-ITW 2011, pp.282-286, 2011. ,
How to prove yourself: Practical solutions to identification and signature problems, Odlyzko AM (ed) CRYPTO'86, vol.263, pp.186-194, 1987. ,
On the hardness of the decoding and the minimum distance problems for rank codes, IEEE Trans Information Theory, vol.62, issue.12, pp.7245-7252, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01443111
Low rank parity check codes and their application to cryptography, Proceedings of the Workshop on Coding and Cryptography WCC'2013, vol.6, p.9, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00913719
New results for rank-based cryptography, Progress in Cryptology -AFRICACRYPT 2014, vol.8469, pp.1-12, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01261421
Trapdoors for hard lattices and new cryptographic constructions, 40th ACM STOC, pp.197-206, 2008. ,
NSS: An NTRU lattice-based signature scheme, LNCS, vol.2045, pp.211-228, 2001. ,
A digital signature scheme based on random error-correcting codes, IMA Int. Conf., Springer, vol.1355, pp.161-167, 1997. ,
Lattice signatures without trapdoors, p.6, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00864308
Trapdoors for lattices: Simpler, tighter, faster, smaller, 2012. ,
RaCoSS: Random code-based signature scheme. Submission to NIST post-quantum standardization process, vol.2, p.6, 2017. ,
Code-based signature scheme without trapdoors, IEICE Tech. Rep, vol.118, issue.151, pp.17-22, 2018. ,
Efficient digital signatures from coding theory, vol.397, p.6, 2017. ,
, EUROCRYPT 2012, vol.7237, p.12, 2012.
Cryptanalysis of a one-time codebased digital signature scheme, 2018. ,
Efficient identification and signatures for smart cards, LNCS, vol.435, p.6, 1990. ,
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM J Comput, vol.26, issue.5, pp.1484-1509, 1997. ,
A new code-based signature scheme with shorter public key, 053&version=20190125:204017&file=053.pdf 3, vol.7, p.10, 2019. ,
Practical attack on racoss-r. Cryptology ePrint Archive, vol.831, 2018. ,