Philippe Gaborit
Orcid: 0000-0002-4034-521X
According to our database1,
Philippe Gaborit
authored at least 139 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
PERK: compact signature scheme based on a new variant of the permuted kernel problem.
Des. Codes Cryptogr., August, 2024
Des. Codes Cryptogr., April, 2024
IEEE Trans. Inf. Theory, 2024
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
2023
Des. Codes Cryptogr., November, 2023
Code-based signatures from new proofs of knowledge for the syndrome decoding problem.
Des. Codes Cryptogr., February, 2023
IACR Cryptol. ePrint Arch., 2023
Analysis of the security of the PSSI problem and cryptanalysis of the Durandal signature scheme.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
RYDE: A Digital Signature Scheme based on Rank-Syndrome-Decoding Problem with MPCitH Paradigm.
CoRR, 2023
MIRA: a Digital Signature Scheme based on the MinRank problem and the MPC-in-the-Head paradigm.
CoRR, 2023
Compact Post-quantum Signatures from Proofs of Knowledge Leveraging Structure for the sfPKP, sfSD and sfRSD Problems.
Proceedings of the Codes, Cryptology and Information Security, 2023
2022
IEEE Trans. Inf. Theory, 2022
Efficient image tampering localization using semi-fragile watermarking and error control codes.
Signal Process., 2022
Des. Codes Cryptogr., 2022
CoRR, 2022
Adv. Math. Commun., 2022
Proceedings of the Selected Areas in Cryptography - 29th International Conference, 2022
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022
Proceedings of the IEEE International Symposium on Information Theory, 2022
2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
Proceedings of the Cryptography and Coding - 18th IMA International Conference, 2021
Proceedings of the Code-Based Cryptography - 9th International Workshop, 2021
Proceedings of the Code-Based Cryptography - 9th International Workshop, 2021
Proceedings of the Code-Based Cryptography - 9th International Workshop, 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Des. Codes Cryptogr., 2020
HQC-RMRS, an instantiation of the HQC encryption framework with a more efficient auxiliary error-correcting code.
CoRR, 2020
Algebraic attacks for solving the Rank Decoding and MinRank problems without Gröbner basis.
CoRR, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
Low Rank Parity Check Codes: New Decoding Algorithms and Applications to Cryptography.
IEEE Trans. Inf. Theory, 2019
Signal Process. Image Commun., 2019
IACR Cryptol. ePrint Arch., 2019
Extended Low Rank Parity Check Codes and Their Efficient Decoding for Multisource Wireless Sensor Networks.
Proceedings of the Ubiquitous Networking - 5th International Symposium, 2019
Preventing Timing Attacks Against RQC Using Constant Time Decoding of Gabidulin Codes.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
2018
Polynomial-time key recovery attack on the Faure-Loidreau scheme based on Gabidulin codes.
Des. Codes Cryptogr., 2018
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
The Learning with Rank Errors problem and an application to symmetric authentication.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Ouroboros: A Simple, Secure and Efficient Key Exchange Protocol Based on Coding Theory.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Proceedings of the Progress in Cryptology - INDOCRYPT 2017, 2017
A new blind color image watermarking based on a psychovisual model and quantization approaches.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017
2016
IEEE Trans. Inf. Theory, 2016
IEEE Trans. Inf. Theory, 2016
Practical Reusable Fuzzy Extractors for the Set Difference Metric and Adaptive Fuzzy Extractors.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Arithmetic of Finite Fields - 6th International Workshop, 2016
Proceedings of the Post-Quantum Cryptography - 7th International Workshop, 2016
2015
Proceedings of the IEEE International Symposium on Power Line Communications and Its Applications, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Des. Codes Cryptogr., 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
EURASIP J. Inf. Secur., 2013
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013
2012
IEEE Trans. Inf. Theory, 2012
IEEE Trans. Inf. Theory, 2012
Efficient code-based one-time signature from automorphism groups with syndrome compatibility.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IEEE Trans. Inf. Theory, 2011
Improving Additive and Multiplicative Homomorphic Encryption Schemes Based on Worst-Case Hardness Assumptions}.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011
Proceedings of the 2011 IEEE Information Theory Workshop, 2011
2010
Int. J. Inf. Coding Theory, 2010
Proceedings of the Post-Quantum Cryptography, Third International Workshop, 2010
Proceedings of the Media Forensics and Security II, 2010
Proceedings of the International Conference on Image Processing, 2010
Proceedings of the Advances in Cryptology, 2010
2009
Proceedings of the Identity-Based Cryptography, 2009
A Collusion-Resistant Distributed Scalar Product Protocol with Application to Privacy-Preserving Computation of Trust.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009
List decoding of Reed Solomon codes for wavelet based colour image watermarking scheme.
Proceedings of the International Conference on Image Processing, 2009
Proceedings of the Progress in Cryptology, 2009
2008
IEEE Trans. Inf. Theory, 2008
IEEE Trans. Inf. Theory, 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Second International Conference on Emerging Security Information, 2008
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2008
AntTrust: A Novel Ant Routing Protocol for Wireless Ad-hoc Network Based on Trust between Nodes.
Proceedings of the The Third International Conference on Availability, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the IEEE International Symposium on Information Theory, 2007
Proceedings of the IEEE International Symposium on Information Theory, 2007
2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
2005
IEEE Trans. Inf. Theory, 2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
2004
2003
2002
2001
Electron. Notes Discret. Math., 2001
On the classification of extremal even formally self-dual codes of lengths 20 and 22.
Discret. Appl. Math., 2001
1999
IEEE Trans. Inf. Theory, 1999
IEEE Trans. Inf. Theory, 1999
Des. Codes Cryptogr., 1999
Proceedings of the Codes and Association Schemes, 1999
1998
IEEE Trans. Inf. Theory, 1998
1996
Mass formulas for self-dual codes over Z<sub>4</sub> and F<sub>q</sub>+uF<sub>q</sub> rings.
IEEE Trans. Inf. Theory, 1996