Pseudorandom Functions and Lattices, Advances in Cryptology?EUROCRYPT 2012, pp.719-737, 2012. ,
DOI : 10.1007/978-3-642-29011-4_42
QUAD: A Practical Stream Cipher with Provable Security, Advances in Cryptology-EUROCRYPT 2006, pp.109-128, 2006. ,
DOI : 10.1007/11761679_8
On the inherent intractability of certain coding problems (Corresp.), IEEE Transactions on Information Theory, vol.24, issue.3, pp.384-386, 1978. ,
DOI : 10.1109/TIT.1978.1055873
Grover vs. McEliece, Lecture Notes in Comput. Sci, vol.6061, pp.73-80, 2010. ,
A Simple Unpredictable Pseudo-Random Number Generator, SIAM Journal on Computing, vol.15, issue.2, pp.364-383, 1986. ,
DOI : 10.1137/0215025
How to Generate Cryptographically Strong Sequences of Pseudorandom Bits, SIAM Journal on Computing, vol.13, issue.4, pp.850-864, 1984. ,
DOI : 10.1137/0213053
Tight Bounds on Quantum Searching, Fortschritte der Physik, vol.46, issue.4-5, p.493, 1998. ,
DOI : 10.1002/(SICI)1521-3978(199806)46:4/5<493::AID-PROP493>3.0.CO;2-P
The cryptographic security of the syndrome decoding problem for rank distance codes, Advances in Cryptology -ASI- ACRYPT 1996, pp.368-381, 1996. ,
DOI : 10.1007/BFb0034862
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank, Advances in Cryptology -ASIACRYPT 2001, pp.402-421, 2001. ,
DOI : 10.1007/3-540-45682-1_24
Recovering Short Generators of Principal Ideals in Cyclotomic Rings, Cryptology ePrint Archive, 2015. ,
DOI : 10.1007/978-3-662-49896-5_20
How To Prove Yourself: Practical Solutions to Identification and Signature Problems, Advances in Cryptology -CRYPTO '86, pp.186-194, 1987. ,
DOI : 10.1007/3-540-47721-7_12
An Efficient Pseudo-Random Generator Provably as Secure as Syndrome Decoding, Advances in Cryptology -EUROCRYPT'96, pp.245-255, 1996. ,
DOI : 10.1007/3-540-68339-9_22
SYND: a Fast Code-Based Stream Cipher with a Security Reduction, 2007 IEEE International Symposium on Information Theory, pp.186-190, 2007. ,
DOI : 10.1109/ISIT.2007.4557224
On the Complexity of the Rank Syndrome Decoding Problem, IEEE Transactions on Information Theory, vol.62, issue.2, 1026. ,
DOI : 10.1109/TIT.2015.2511786
URL : https://hal.archives-ouvertes.fr/hal-01280904
On the hardness of the decoding and the minimum distance problems for rank codes. CoRR, abs/1404, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01443111
The Security of the Gabidulin Public Key Cryptosystem, Advances in Cryptology -EUROCRYPT '96, pp.212-223, 1996. ,
DOI : 10.1007/3-540-68339-9_19
Cryptanalysis of the TTM Cryptosystem, Advances in Cryptology -ASIACRYPT 2000, pp.44-57, 1976. ,
DOI : 10.1007/3-540-44448-3_4
Quantum Mechanics Helps in Searching for a Needle in a Haystack, Physical Review Letters, vol.79, issue.2, p.325, 1997. ,
DOI : 10.1103/PhysRevLett.79.325
A Pseudorandom Generator from any One-way Function, SIAM Journal on Computing, vol.28, issue.4, pp.1364-1396, 1999. ,
DOI : 10.1137/S0097539793244708
New algorithms for decoding in the rank metric and an attack on the LRPC cryptosystem, 2015 IEEE International Symposium on Information Theory (ISIT), 2015. ,
DOI : 10.1109/ISIT.2015.7282956
URL : https://hal.archives-ouvertes.fr/hal-01244619
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization, Advances in Cryptology -CRYPTO'99, pp.19-30, 1999. ,
DOI : 10.1007/3-540-48405-1_2
One way functions and pseudorandom generators, Combinatorica, vol.7, issue.4, pp.357-363, 1987. ,
Algebraic decoding of codes in rank metric, proceedings of YACC06, 2006. ,
Finite fields, volume 20 of Encyclopedia of Mathematics and its Applications, 1997. ,
A Public-Key System Based on Algebraic Coding Theory, pp.114-116, 1978. ,
Improving the Performance of the SYND Stream Cipher, Progress in Cryptology - AFRICACRYPT 2012, pp.99-116, 2012. ,
DOI : 10.1007/978-3-642-31410-0_7
URL : https://hal.archives-ouvertes.fr/ujm-00865533
New technique for decoding codes in the rank metric and its cryptography applications. Problems of Information Transmission, pp.237-246, 2002. ,
Résolution de systèmes multi-homogènes et determinantiels, 2012. ,
Theory and application of trapdoor functions, Foundations of Computer Science SFCS'08. 23rd Annual Symposium on, pp.80-91, 1982. ,