Follow
Matthieu Finiasz
Matthieu Finiasz
Security Expert
Verified email at olvid.io - Homepage
Title
Cited by
Cited by
Year
How to achieve a McEliece-based digital signature scheme
N Courtois, M Finiasz, N Sendrier
Advances in Cryptology - ASIACRYPT 2001, 157-174, 2001
6772001
Security bounds for the design of code-based cryptosystems
M Finiasz, N Sendrier
Advances in Cryptology–ASIACRYPT 2009, 88-105, 2009
3562009
A family of fast syndrome based cryptographic hash functions
D Augot, M Finiasz, N Sendrier
Progress in Cryptology–Mycrypt 2005, 64-83, 2005
1412005
Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes
D Augot, M Finiasz
FSE 2014, 0
110*
Parallel-CFS
M Finiasz
Selected Areas in Cryptography - SAC 2011, 159-170, 2011
107*2011
Recovering a code's length and synchronization from a noisy intercepted bitstream
M Cluzeau, M Finiasz
2009 IEEE International Symposium on Information Theory, 2737-2741, 2009
852009
Exhaustive Search for Small Dimension Recursive MDS Diffusion Layers for Block Ciphers and Hash Functions
D Augot, M Finiasz
ISIT 2013, 2013
712013
A fast provably secure cryptographic hash function
D Augot, M Finiasz, N Sendrier
Cryptology ePrint Archive, Report 2003/230. Available at http://www. iacr …, 2003
652003
Reconstruction of punctured convolutional codes
M Cluzeau, M Finiasz
2009 IEEE Information Theory Workshop, 75-79, 2009
582009
A public key encryption scheme based on the polynomial reconstruction problem
D Augot, M Finiasz
Advances in Cryptology—EUROCRYPT 2003, 229-240, 2003
572003
Methods for the reconstruction of parallel turbo codes
M Cluzeau, M Finiasz, JP Tillich
Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on …, 2010
542010
Sha-3 proposal: FSB
D Augot, M Finiasz, P Gaborit, S Manuel, N Sendrier
Submission to NIST, 81-85, 2008
47*2008
Improved fast syndrome based cryptographic hash functions
M Finiasz, P Gaborit, N Sendrier
Proceedings of ECRYPT Hash Workshop 2007, 155, 2007
432007
Trap Me If You Can--Million Dollar Curve
T Baignères, C Delerablée, M Finiasz, L Goubin, T Lepoint, M Rivain
IACR Cryptology ePrint Archive, 2015: 1249, 2015
382015
Nouvelles constructions utilisant des codes correcteurs d’erreurs en cryptographie à clef publique
M Finiasz
These de doctorat, École Polytechnique (October 2004), 2004
372004
One-way private media search on public databases: The role of signal processing
G Fanti, M Finiasz, K Ramchandran
IEEE Signal Processing Magazine 30 (2), 53-61, 2013
282013
Private stream search at the same communication cost as a regular search: Role of ldpc codes
M Finiasz, K Ramchandran
2012 IEEE International Symposium on Information Theory Proceedings, 2556-2560, 2012
262012
: A Hardware-Oriented Trapdoor Cipher
JP Aumasson, M Finiasz, W Meier, S Vaudenay
Australasian Conference on Information Security and Privacy, 184-199, 2007
262007
When Stream Cipher Analysis Meets Public-Key Cryptography
S Vaudenay, M Finiasz
SAC 2006, 266-284, 2006
23*2006
Using the Trace Operator to repair the Polynomial Reconstruction based Cryptosystem presented at Eurocrypt 2003.
D Augot, M Finiasz, P Loidreau
IACR Cryptology ePrint Archive 2003, 209, 2003
192003
The system can't perform the operation now. Try again later.
Articles 1–20