Ayoub Otmani
Orcid: 0000-0001-8176-8692
According to our database1,
Ayoub Otmani
authored at least 37 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Access, 2024
2023
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post-quantum proposals.
IET Inf. Secur., March, 2023
PeerJ Comput. Sci., 2023
Proceedings of the Cryptography and Coding - 19th IMA International Conference, 2023
2022
Formal specification and model checking of Saber lattice-based key encapsulation mechanism in Maude.
Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering, 2022
Proceedings of the Selected Areas in Cryptography - 29th International Conference, 2022
Formal specification and model checking of lattice-based key encapsulation mechanisms in Maude.
Proceedings of the International Workshop on Formal Analysis and Verification of Post-Quantum Cryptographic Protocols co-located with the 23rd International Conference on Formal Engineering Methods (ICFEM 2022), 2022
2019
Permutation Code Equivalence is Not Harder Than Graph Isomorphism When Hulls Are Trivial.
Proceedings of the IEEE International Symposium on Information Theory, 2019
Proceedings of the Code-Based Cryptography - 7th International Workshop, 2019
2018
Int. J. Commun. Syst., 2018
Des. Codes Cryptogr., 2018
Polynomial-time key recovery attack on the Faure-Loidreau scheme based on Gabidulin codes.
Des. Codes Cryptogr., 2018
2017
IEEE Trans. Inf. Theory, 2017
2016
IEEE Trans. Inf. Theory, 2016
Des. Codes Cryptogr., 2016
Proceedings of the Post-Quantum Cryptography - 7th International Workshop, 2016
Proceedings of the IEEE International Symposium on Information Theory, 2016
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016
2015
Proceedings of the Codes, Cryptology, and Information Security, 2015
2014
Des. Codes Cryptogr., 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
2013
2012
A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes.
IACR Cryptol. ePrint Arch., 2012
A Distinguisher-Based Attack on a Variant of McEliece's Cryptosystem Based on Reed-Solomon Codes
CoRR, 2012
2011
Contribution à la cryptanalyse de primitives cryptographiques fondées sur la théorie des codes. (Contribution to the Cryptanalysis of Code-Based Primitives).
, 2011
2010
Math. Comput. Sci., 2010
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
2009
Proceedings of the Progress in Cryptology, 2009
2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
2007
Proceedings of the Arithmetic of Finite Fields, First International Workshop, 2007
Proceedings of the IEEE International Symposium on Information Theory, 2007
2003
2001
Low Complexity Tail-Biting Trellises of Self-dual codes of Length 24, 32 and 40 over GF(2) and Z<sub>4</sub> of Large Minimum Distance.
Proceedings of the Applied Algebra, 2001