Pierre-Louis Cayrel

Orcid: 0000-0002-6708-868X

According to our database1, Pierre-Louis Cayrel authored at least 56 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Integer syndrome decoding in the presence of noise.
Cryptogr. Commun., September, 2024

Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation.
IACR Cryptol. ePrint Arch., 2024

2023
Punctured Syndrome Decoding Problem Efficient Side-Channel Attacks Against Classic McEliece.
IACR Cryptol. ePrint Arch., 2023

Horizontal Correlation Attack on Classic McEliece.
IACR Cryptol. ePrint Arch., 2023

A Side-Channel Attack Against Classic McEliece When Loading the Goppa Polynomial.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2023, 2023

2022
Profiled Side-Channel Attack on Cryptosystems Based on the Binary Syndrome Decoding Problem.
IEEE Trans. Inf. Forensics Secur., 2022

Message-recovery Profiled Side-channel Attack on the Classic McEliece Cryptosystem.
IACR Cryptol. ePrint Arch., 2022

Key-Recovery by Side-Channel Information on the Matrix-Vector Product in Code-Based Cryptosystems.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

Software Implementation of a Code-Based Key Encapsulation Mechanism from Binary QD Generalized Srivastava Codes.
Proceedings of the Code-Based Cryptography - 10th International Workshop, 2022

2021
A Novel Niederreiter-like cryptosystem based on the (u|u + υ)-construction codes.
RAIRO Theor. Informatics Appl., 2021

Message-Recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2020
Solving a Modified Syndrome Decoding Problem using Integer Programming.
Int. J. Comput. Commun. Control, August, 2020

Message-recovery Laser Fault Injection Attack on Code-based Cryptosystems.
IACR Cryptol. ePrint Arch., 2020

Optimized and Secure Implementation of ROLLO-I.
Proceedings of the Code-Based Cryptography - 8th International Workshop, 2020

2019
A privacy-preserving code-based authentication protocol for Internet of Things.
J. Supercomput., 2019

Optimized implementation of the NIST PQC submission ROLLO on microcontroller.
IACR Cryptol. ePrint Arch., 2019

Improvement of Binary and Non Binary Statistical Decoding Algorithm.
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019

2018
DAGS: Key encapsulation using dyadic GS codes.
J. Math. Cryptol., 2018

DAGS: Reloaded Revisiting Dyadic Key Encapsulation.
IACR Cryptol. ePrint Arch., 2018

2017
RFID Authentication Protocols Based on Error-Correcting Codes: A Survey.
Wirel. Pers. Commun., 2017

On lower bounds for information set decoding over <sub>q</sub> and on the effect of partial knowledge.
Int. J. Inf. Coding Theory, 2017

NP-completeness of the Goppa parameterised random binary quasi-dyadic syndrome decoding problem.
Int. J. Inf. Coding Theory, 2017

Improved Timing Attacks against the Secret Permutation in the McEliece PKC.
Int. J. Comput. Commun. Control, 2017

A pseudorandom number generator based on worst-case lattice problems.
Appl. Algebra Eng. Commun. Comput., 2017

Efficient Implementation of Hybrid Encryption from Coding Theory.
Proceedings of the Codes, Cryptology and Information Security, 2017

2016
Extended security arguments for signature schemes.
Des. Codes Cryptogr., 2016

2015
Improved RFID Authentication Protocol Based on Randomized McEliece Cryptosystem.
Int. J. Netw. Secur., 2015

Critical attacks in code-based cryptography.
Int. J. Inf. Coding Theory, 2015

Weaknesses in Two RFID Authentication Protocols.
Proceedings of the Codes, Cryptology, and Information Security, 2015

2014
Efficient Software Implementations of Code-Based Hash Functions and Stream-Ciphers.
Proceedings of the Arithmetic of Finite Fields - 5th International Workshop, 2014

2013
Polynomial Structures in Code-Based Cryptography.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013

Code-Based Identification and Signature Schemes in Software.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
An Improved Threshold Ring Signature Scheme Based on Error Correcting Codes.
Proceedings of the Arithmetic of Finite Fields - 4th International Workshop, 2012

Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Improving the Performance of the SYND Stream Cipher.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory.
IEEE Trans. Inf. Theory, 2011

Broadcast Attacks against Code-Based Schemes.
Proceedings of the Research in Cryptology - 4th Western European Workshop, 2011

S-FSB: An Improved Variant of the FSB Hash Family.
Proceedings of the Information Security and Assurance - International Conference, 2011

2SC: An Efficient Code-Based Stream Cipher.
Proceedings of the Information Security and Assurance - International Conference, 2011

GPU Implementation of the Keccak Hash Function Family.
Proceedings of the Information Security and Assurance - International Conference, 2011

Recent Progress in Code-Based Cryptography.
Proceedings of the Information Security and Assurance - International Conference, 2011

Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes.
Proceedings of the Information Security and Assurance - International Conference, 2011

A lattice-based batch identification scheme.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

2010
Quasi-cyclic codes as codes over rings of matrices.
Finite Fields Their Appl., 2010

Improved code-based identification scheme
CoRR, 2010

Post-quantum Cryptography: Code-Based Signatures.
Proceedings of the Advances in Computer Science and Information Technology, 2010

A Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding Problem.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Improved Zero-Knowledge Identification with Lattices.
Proceedings of the Provable Security - 4th International Conference, 2010

A Lattice-Based Threshold Ring Signature Scheme.
Proceedings of the Progress in Cryptology, 2010

Quasi-Dyadic CFS Signatures.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
Identity-Based Identification and Signature Schemes using Error Correcting Codes.
Proceedings of the Identity-Based Cryptography, 2009

Improved identity-based identification using correcting codes
CoRR, 2009

Reducing Key Length of the McEliece Cryptosystem.
Proceedings of the Progress in Cryptology, 2009

2008
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory.
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008

Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2008

2007
On Kabatianskii-Krouk-Smeets Signatures.
Proceedings of the Arithmetic of Finite Fields, First International Workshop, 2007


  Loading...