Ayoub Otmani

Orcid: 0000-0001-8176-8692

According to our database1, Ayoub Otmani authored at least 37 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Security Assessment of the LG Cryptosystem.
CoRR, 2024

Formal Analysis of Post-Quantum Hybrid Key Exchange SSH Transport Layer Protocol.
IEEE Access, 2024

2023
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post-quantum proposals.
IET Inf. Secur., March, 2023

Modelling and verification of post-quantum key encapsulation mechanisms using Maude.
PeerJ Comput. Sci., 2023

An Upper-Bound on the Decoding Failure Probability of the LRPC Decoder.
Proceedings of the Cryptography and Coding - 19th IMA International Conference, 2023

2022
Formal specification and model checking of Saber lattice-based key encapsulation mechanism in Maude.
Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering, 2022

Injective Rank Metric Trapdoor Functions with Homogeneous Errors.
Proceedings of the Selected Areas in Cryptography - 29th International Conference, 2022

Formal specification and model checking of lattice-based key encapsulation mechanisms in Maude.
Proceedings of the International Workshop on Formal Analysis and Verification of Post-Quantum Cryptographic Protocols co-located with the 23rd International Conference on Formal Engineering Methods (ICFEM 2022), 2022

2019
Permutation Code Equivalence is Not Harder Than Graph Isomorphism When Hulls Are Trivial.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Practical Algebraic Attack on DAGS.
Proceedings of the Code-Based Cryptography - 7th International Workshop, 2019

2018
Cryptanalysis of an identity-based authenticated key exchange protocol.
Int. J. Commun. Syst., 2018

Improved cryptanalysis of rank metric schemes based on Gabidulin codes.
Des. Codes Cryptogr., 2018

Polynomial-time key recovery attack on the Faure-Loidreau scheme based on Gabidulin codes.
Des. Codes Cryptogr., 2018

2017
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions.
IEEE Trans. Inf. Theory, 2017

2016
Folding Alternant and Goppa Codes With Non-Trivial Automorphism Groups.
IEEE Trans. Inf. Theory, 2016

A Polynomial-Time Attack on the BBCRS Scheme.
IACR Cryptol. ePrint Arch., 2016

Structural cryptanalysis of McEliece schemes with compact keys.
Des. Codes Cryptogr., 2016

Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes.
Proceedings of the Post-Quantum Cryptography - 7th International Workshop, 2016

Algebraic properties of polar codes from a new polynomial formalism.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Weak Keys for the Quasi-Cyclic MDPC Public Key Encryption Scheme.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016

2015
Square Code Attack on a Modified Sidelnikov Cryptosystem.
Proceedings of the Codes, Cryptology, and Information Security, 2015

2014
New identities relating wild Goppa codes.
Finite Fields Their Appl., 2014

Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes.
Des. Codes Cryptogr., 2014

Structural weakness of compact variants of the McEliece cryptosystem.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

2013
A Distinguisher for High-Rate McEliece Cryptosystems.
IEEE Trans. Inf. Theory, 2013

2012
A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes.
IACR Cryptol. ePrint Arch., 2012

A Distinguisher-Based Attack on a Variant of McEliece's Cryptosystem Based on Reed-Solomon Codes
CoRR, 2012

2011
An Efficient Attack on All Concrete KKS Proposals.
IACR Cryptol. ePrint Arch., 2011

Contribution à la cryptanalyse de primitives cryptographiques fondées sur la théorie des codes. (Contribution to the Cryptanalysis of Code-Based Primitives).
, 2011

2010
Cryptanalysis of Two McEliece Cryptosystems Based on Quasi-Cyclic Codes.
Math. Comput. Sci., 2010

Algebraic Cryptanalysis of McEliece Variants with Compact Keys.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

2009
Reducing Key Length of the McEliece Cryptosystem.
Proceedings of the Progress in Cryptology, 2009

2008
The 2nd BOWS Contest: Wavelet-Based Bayesian Denoising Attack on Image Watermarking.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2007
On Kabatianskii-Krouk-Smeets Signatures.
Proceedings of the Arithmetic of Finite Fields, First International Workshop, 2007

On the Minimum Distance of Generalized LDPC Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2007

2003
A systematic construction of self-dual codes.
IEEE Trans. Inf. Theory, 2003

2001
Low Complexity Tail-Biting Trellises of Self-dual codes of Length 24, 32 and 40 over GF(2) and Z<sub>4</sub> of Large Minimum Distance.
Proceedings of the Applied Algebra, 2001


  Loading...