How to Mask the Structure of Codes for a Cryptographic Use, Designs, Codes and Cryptography, vol.4, issue.3, pp.63-79, 2005. ,
DOI : 10.1007/s10623-003-6151-2
URL : https://hal.archives-ouvertes.fr/hal-00068424
Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes. Des. Codes Cryptogr, pp.1-26, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00830594
A polynomial time attack against algebraic geometry code based public key cryptosystems, 2014 IEEE International Symposium on Information Theory, 2014. ,
DOI : 10.1109/ISIT.2014.6875072
URL : https://hal.archives-ouvertes.fr/hal-00937476
Polynomial Time Attack on Wild McEliece over Quadratic Extensions, Advances in Cryptology -EURO- CRYPT 2014, pp.17-39, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00931774
Majority coset decoding, IEEE Transactions on Information Theory, vol.39, issue.3, pp.1067-1070, 1993. ,
DOI : 10.1109/18.256518
Cryptanalysis of the McEliece cryptosystem over hyperelliptic codes, pp.99-107, 2008. ,
Decoding algebraic-geometric codes up to the designed minimum distance, IEEE Transactions on Information Theory, vol.39, issue.1, pp.37-45, 1993. ,
DOI : 10.1109/18.179340
On the decoding of algebraic-geometric codes, IEEE Transactions on Information Theory, vol.41, issue.6, pp.1589-1614, 1995. ,
DOI : 10.1109/18.476214
McEliece public cryptosystem using algebraic-geometric codes. Des. Codes Cryptogr, pp.293-307, 1996. ,
DOI : 10.1109/isit.1995.550471
A unified description of an error locating procedure for linear codes, Proceedings of Algebraic and Combinatorial Coding Theory, pp.113-117, 1992. ,
The non-gap sequence of a subcode of a generalized Reed???Solomon code, Designs, Codes and Cryptography, vol.6, issue.2, pp.1-3, 2013. ,
DOI : 10.1007/s10623-012-9694-2
On the unique representation of very strong algebraic geometry codes, Designs, Codes and Cryptography, vol.19, issue.3???4, pp.215-230, 2014. ,
DOI : 10.1007/s10623-012-9758-3
Computational aspects of retrieving a representation of an algebraic geometry code, Journal of Symbolic Computation, vol.64, issue.0, pp.67-87, 2014. ,
DOI : 10.1016/j.jsc.2013.12.007
Error-correcting pairs for a public-key cryptosystem Code-based Cryptography Workshop, 2012. ,
A public-key cryptosystem based on algebraic coding theory, DSN Progress Report, vol.4244, pp.114-116, 1978. ,
Varieties Defined by Quadratic Equations, C.I.M.E., III Ciclo Varenna, pp.29-100, 1969. ,
DOI : 10.1007/978-3-642-11015-3_2
Knapsack-type cryptosystems and algebraic coding theory, Problems of Control and Information Theory, vol.15, issue.2, pp.159-166, 1986. ,
On decoding linear codes by error correcting pairs, 1988. ,
On decoding by error location and dependent sets of error positions. Discrete Math, pp.106-107, 1992. ,
Information-Set Decoding for Linear Codes over F q, pp.81-94, 2010. ,
DOI : 10.1007/978-3-642-12929-2_7
On insecurity of cryptosystems based on generalized Reed-Solomon codes, Discrete Mathematics and Applications, vol.2, issue.4, pp.439-444, 1992. ,
DOI : 10.1515/dma.1992.2.4.439
Algebraic function fields and codes, Graduate Texts in Mathematics, vol.254, 2009. ,
Algebraic geometric codes: basic notions, Mathematical Surveys and Monographs, vol.139, 2007. ,
DOI : 10.1090/surv/139
Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes, Lecture Notes in Comput. Sci, vol.6061, pp.61-72 ,
DOI : 10.1007/978-3-642-12929-2_5