Loïc Bidoux

Orcid: 0000-0003-3455-926X

According to our database1, Loïc Bidoux authored at least 27 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PERK: compact signature scheme based on a new variant of the permuted kernel problem.
Des. Codes Cryptogr., August, 2024

RQC Revisited and More Cryptanalysis for Rank-Based Cryptography.
IEEE Trans. Inf. Theory, 2024

Enabling PERK and other MPC-in-the-Head Signatures on Resource-Constrained Devices.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Dual Support Decomposition in the Head: Shorter Signatures from Rank SD and MinRank.
IACR Cryptol. ePrint Arch., 2024

Modelings for generic PoK and Applications: Shorter SD and PKP based Signatures.
IACR Cryptol. ePrint Arch., 2024

Enabling PERK on Resource-Constrained Devices.
IACR Cryptol. ePrint Arch., 2024

2023
Code-based signatures from new proofs of knowledge for the syndrome decoding problem.
Des. Codes Cryptogr., February, 2023

RYDE: A Digital Signature Scheme based on Rank-Syndrome-Decoding Problem with MPCitH Paradigm.
CoRR, 2023

MIRA: a Digital Signature Scheme based on the MinRank problem and the MPC-in-the-Head paradigm.
CoRR, 2023

Compact Post-quantum Signatures from Proofs of Knowledge Leveraging Structure for the sfPKP, sfSD and sfRSD Problems.
Proceedings of the Codes, Cryptology and Information Security, 2023

2022
A gapless code-based hash proof system based on RQC and its applications.
Des. Codes Cryptogr., 2022

Post-Quantum Oblivious Transfer from Smooth Projective Hash Functions with Grey Zone.
CoRR, 2022

Shorter Signatures from Proofs of Knowledge for the SD, MQ, PKP and RSD Problems.
CoRR, 2022

A practicable timing attack against HQC and its countermeasure.
Adv. Math. Commun., 2022

Quasi-Cyclic Stern Proof of Knowledge.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey Zone.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

2021
Quasi-Cyclic Stern Proof of Knowledge.
CoRR, 2021

Zero-Knowledge Reparation of the Véron and AGS Code-based Identification Schemes.
Proceedings of the IEEE International Symposium on Information Theory, 2021

The Rank-Based Cryptography Library.
Proceedings of the Code-Based Cryptography - 9th International Workshop, 2021

Secure Decision Forest Evaluation.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2019
A Practicable Timing Attack Against HQC and its Countermeasure.
IACR Cryptol. ePrint Arch., 2019

Planning with preferences using Multi-Attribute Utility Theory along with a Choquet Integral.
Eng. Appl. Artif. Intell., 2019

Preventing Timing Attacks Against RQC Using Constant Time Decoding of Gabidulin Codes.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019

2018
The Learning with Rank Errors problem and an application to symmetric authentication.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

2017
On the use of automated planning for crisis management.
Proceedings of the 14th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2017

2014
A model driven system to support optimal collaborative processes design in crisis management.
Proceedings of the 11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2014

A Metamodel for Collaboration Formalization.
Proceedings of the Collaborative Systems for Smart Networked Environments, 2014


  Loading...