BibTeX records: Philippe Gaborit

download as .bib file

@article{DBLP:journals/dcc/GaboritOK18,
  author    = {Philippe Gaborit and
               Ayoub Otmani and
               Herv{\'{e}} Tal{\'{e}} Kalachi},
  title     = {Polynomial-time key recovery attack on the Faure-Loidreau scheme based
               on Gabidulin codes},
  journal   = {Des. Codes Cryptography},
  volume    = {86},
  number    = {7},
  pages     = {1391--1403},
  year      = {2018},
  url       = {https://doi.org/10.1007/s10623-017-0402-0},
  doi       = {10.1007/s10623-017-0402-0},
  timestamp = {Sun, 06 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/GaboritOK18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Aguilar-Melchor18,
  author    = {Carlos Aguilar Melchor and
               Olivier Blazy and
               Jean{-}Christophe Deneuville and
               Philippe Gaborit and
               Gilles Z{\'{e}}mor},
  title     = {Efficient Encryption From Random Quasi-Cyclic Codes},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {64},
  number    = {5},
  pages     = {3927--3943},
  year      = {2018},
  url       = {https://doi.org/10.1109/TIT.2018.2804444},
  doi       = {10.1109/TIT.2018.2804444},
  timestamp = {Sun, 06 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/Aguilar-Melchor18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlamelouBCCFGS18,
  author    = {Quentin Alam{\'{e}}lou and
               Paul{-}Edmond Berthier and
               Chlo{\'{e}} Cachet and
               St{\'{e}}phane Cauchie and
               Benjamin Fuller and
               Philippe Gaborit and
               Sailesh Simhadri},
  title     = {Pseudoentropic Isometries: {A} New Framework for Fuzzy Extractor Reusability},
  booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications
               Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages     = {673--684},
  year      = {2018},
  crossref  = {DBLP:conf/ccs/2018asia},
  url       = {http://doi.acm.org/10.1145/3196494.3196530},
  doi       = {10.1145/3196494.3196530},
  timestamp = {Mon, 04 Jun 2018 09:05:29 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/AlamelouBCCFGS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AlamelouBCG17,
  author    = {Quentin Alam{\'{e}}lou and
               Olivier Blazy and
               St{\'{e}}phane Cauchie and
               Philippe Gaborit},
  title     = {A code-based group signature scheme},
  journal   = {Des. Codes Cryptography},
  volume    = {82},
  number    = {1-2},
  pages     = {469--493},
  year      = {2017},
  url       = {https://doi.org/10.1007/s10623-016-0276-6},
  doi       = {10.1007/s10623-016-0276-6},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/AlamelouBCG17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GaboritHPT17,
  author    = {Philippe Gaborit and
               Adrien Hauteville and
               Duong Hieu Phan and
               Jean{-}Pierre Tillich},
  title     = {Identity-Based Encryption from Codes with Rank Metric},
  booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
               Proceedings, Part {III}},
  pages     = {194--224},
  year      = {2017},
  crossref  = {DBLP:conf/crypto/2017-3},
  url       = {https://doi.org/10.1007/978-3-319-63697-9_7},
  doi       = {10.1007/978-3-319-63697-9_7},
  timestamp = {Mon, 14 Aug 2017 14:44:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/GaboritHPT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/LefevreCG17,
  author    = {Pascal Lef{\`{e}}vre and
               Philippe Carr{\'{e}} and
               Philippe Gaborit},
  title     = {A new blind color image watermarking based on a psychovisual model
               and quantization approaches},
  booktitle = {2017 {IEEE} International Conference on Image Processing, {ICIP} 2017,
               Beijing, China, September 17-20, 2017},
  pages     = {505--509},
  year      = {2017},
  crossref  = {DBLP:conf/icip/2017},
  url       = {https://doi.org/10.1109/ICIP.2017.8296332},
  doi       = {10.1109/ICIP.2017.8296332},
  timestamp = {Fri, 23 Feb 2018 13:26:14 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icip/LefevreCG17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BergerGR17,
  author    = {Thierry P. Berger and
               Philippe Gaborit and
               Olivier Ruatta},
  title     = {Gabidulin Matrix Codes and Their Application to Small Ciphertext Size
               Cryptosystems},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2017 - 18th International Conference
               on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings},
  pages     = {247--266},
  year      = {2017},
  crossref  = {DBLP:conf/indocrypt/2017},
  url       = {https://doi.org/10.1007/978-3-319-71667-1_13},
  doi       = {10.1007/978-3-319-71667-1_13},
  timestamp = {Mon, 04 Dec 2017 18:46:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/BergerGR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/BlazyGSS17,
  author    = {Olivier Blazy and
               Philippe Gaborit and
               Julien Schrek and
               Nicolas Sendrier},
  title     = {A code-based blind signature},
  booktitle = {2017 {IEEE} International Symposium on Information Theory, {ISIT}
               2017, Aachen, Germany, June 25-30, 2017},
  pages     = {2718--2722},
  year      = {2017},
  crossref  = {DBLP:conf/isit/2017},
  url       = {https://doi.org/10.1109/ISIT.2017.8007023},
  doi       = {10.1109/ISIT.2017.8007023},
  timestamp = {Thu, 17 Aug 2017 10:00:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isit/BlazyGSS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/DeneuvilleGZ17,
  author    = {Jean{-}Christophe Deneuville and
               Philippe Gaborit and
               Gilles Z{\'{e}}mor},
  title     = {Ouroboros: {A} Simple, Secure and Efficient Key Exchange Protocol
               Based on Coding Theory},
  booktitle = {Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017,
               Utrecht, The Netherlands, June 26-28, 2017, Proceedings},
  pages     = {18--34},
  year      = {2017},
  crossref  = {DBLP:conf/pqcrypto/2017},
  url       = {https://doi.org/10.1007/978-3-319-59879-6_2},
  doi       = {10.1007/978-3-319-59879-6_2},
  timestamp = {Wed, 14 Jun 2017 12:36:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/DeneuvilleGZ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaboritHPT17,
  author    = {Philippe Gaborit and
               Adrien Hauteville and
               Duong Hieu Phan and
               Jean{-}Pierre Tillich},
  title     = {Identity-based Encryption from Codes with Rank Metric},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {514},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/514},
  timestamp = {Wed, 21 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GaboritHPT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/GaboritRS16,
  author    = {Philippe Gaborit and
               Olivier Ruatta and
               Julien Schrek},
  title     = {On the Complexity of the Rank Syndrome Decoding Problem},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {62},
  number    = {2},
  pages     = {1006--1019},
  year      = {2016},
  url       = {https://doi.org/10.1109/TIT.2015.2511786},
  doi       = {10.1109/TIT.2015.2511786},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/GaboritRS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/GaboritZ16,
  author    = {Philippe Gaborit and
               Gilles Z{\'{e}}mor},
  title     = {On the Hardness of the Decoding and the Minimum Distance Problems
               for Rank Codes},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {62},
  number    = {12},
  pages     = {7245--7252},
  year      = {2016},
  url       = {https://doi.org/10.1109/TIT.2016.2616127},
  doi       = {10.1109/TIT.2016.2616127},
  timestamp = {Thu, 27 Jul 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/GaboritZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/GaboritHT16,
  author    = {Philippe Gaborit and
               Adrien Hauteville and
               Jean{-}Pierre Tillich},
  title     = {RankSynd a {PRNG} Based on Rank Metric},
  booktitle = {Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016,
               Fukuoka, Japan, February 24-26, 2016, Proceedings},
  pages     = {18--28},
  year      = {2016},
  crossref  = {DBLP:conf/pqcrypto/2016},
  url       = {https://doi.org/10.1007/978-3-319-29360-8_2},
  doi       = {10.1007/978-3-319-29360-8_2},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/GaboritHT16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waifi/AlamelouBCG16,
  author    = {Quentin Alam{\'{e}}lou and
               Olivier Blazy and
               St{\'{e}}phane Cauchie and
               Philippe Gaborit},
  title     = {A Practical Group Signature Scheme Based on Rank Metric},
  booktitle = {Arithmetic of Finite Fields - 6th International Workshop, {WAIFI}
               2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers},
  pages     = {258--275},
  year      = {2016},
  crossref  = {DBLP:conf/waifi/2016},
  url       = {https://doi.org/10.1007/978-3-319-55227-9_18},
  doi       = {10.1007/978-3-319-55227-9_18},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/waifi/AlamelouBCG16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GaboritHT16,
  author    = {Philippe Gaborit and
               Adrien Hauteville and
               Jean{-}Pierre Tillich},
  title     = {RankSynd a {PRNG} Based on Rank Metric},
  journal   = {CoRR},
  volume    = {abs/1603.05128},
  year      = {2016},
  url       = {http://arxiv.org/abs/1603.05128},
  archivePrefix = {arXiv},
  eprint    = {1603.05128},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/GaboritHT16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GaboritRSZ16,
  author    = {Philippe Gaborit and
               Olivier Ruatta and
               Julien Schrek and
               Gilles Z{\'{e}}mor},
  title     = {RankSign : an efficient signature algorithm based on the rank metric},
  journal   = {CoRR},
  volume    = {abs/1606.00629},
  year      = {2016},
  url       = {http://arxiv.org/abs/1606.00629},
  archivePrefix = {arXiv},
  eprint    = {1606.00629},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/GaboritRSZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GaboritOK16,
  author    = {Philippe Gaborit and
               Ayoub Otmani and
               Herv{\'{e}} Tal{\'{e}} Kalachi},
  title     = {Polynomial-Time Key Recovery Attack on the Faure-Loidreau Scheme based
               on Gabidulin Codes},
  journal   = {CoRR},
  volume    = {abs/1606.07760},
  year      = {2016},
  url       = {http://arxiv.org/abs/1606.07760},
  archivePrefix = {arXiv},
  eprint    = {1606.07760},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/GaboritOK16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MelchorBDGZ16,
  author    = {Carlos Aguilar Melchor and
               Olivier Blazy and
               Jean{-}Christophe Deneuville and
               Philippe Gaborit and
               Gilles Z{\'{e}}mor},
  title     = {Efficient Encryption from Random Quasi-Cyclic Codes},
  journal   = {CoRR},
  volume    = {abs/1612.05572},
  year      = {2016},
  url       = {http://arxiv.org/abs/1612.05572},
  archivePrefix = {arXiv},
  eprint    = {1612.05572},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/MelchorBDGZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlamelouBCG16,
  author    = {Quentin Alam{\'{e}}lou and
               Paul{-}Edmond Berthier and
               St{\'{e}}phane Cauchie and
               Philippe Gaborit},
  title     = {Practical Reusable Fuzzy Extractors for the Set Difference Metric
               and Adaptive Fuzzy Extractors},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {1100},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/1100},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AlamelouBCG16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlamelouBCG16a,
  author    = {Quentin Alam{\'{e}}lou and
               Olivier Blazy and
               St{\'{e}}phane Cauchie and
               Philippe Gaborit},
  title     = {A Code-Based Group Signature Scheme},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {1119},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/1119},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AlamelouBCG16a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MelchorBDGZ16,
  author    = {Carlos Aguilar Melchor and
               Olivier Blazy and
               Jean{-}Christophe Deneuville and
               Philippe Gaborit and
               Gilles Z{\'{e}}mor},
  title     = {Efficient Encryption from Random Quasi-Cyclic Codes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {1194},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/1194},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/MelchorBDGZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CouvreurGGOT14,
  author    = {Alain Couvreur and
               Philippe Gaborit and
               Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
               Ayoub Otmani and
               Jean{-}Pierre Tillich},
  title     = {Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon
               codes},
  journal   = {Des. Codes Cryptography},
  volume    = {73},
  number    = {2},
  pages     = {641--666},
  year      = {2014},
  url       = {https://doi.org/10.1007/s10623-014-9967-z},
  doi       = {10.1007/s10623-014-9967-z},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/CouvreurGGOT14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/GaboritRSZ14,
  author    = {Philippe Gaborit and
               Olivier Ruatta and
               Julien Schrek and
               Gilles Z{\'{e}}mor},
  title     = {New Results for Rank-Based Cryptography},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
               on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  pages     = {1--12},
  year      = {2014},
  crossref  = {DBLP:conf/africacrypt/2014},
  url       = {https://doi.org/10.1007/978-3-319-06734-6_1},
  doi       = {10.1007/978-3-319-06734-6_1},
  timestamp = {Mon, 22 May 2017 17:11:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/GaboritRSZ14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/MelchorBDG14,
  author    = {Carlos Aguilar Melchor and
               Xavier Boyen and
               Jean{-}Christophe Deneuville and
               Philippe Gaborit},
  title     = {Sealing the Leak on Classical {NTRU} Signatures},
  booktitle = {Post-Quantum Cryptography - 6th International Workshop, PQCrypto 2014,
               Waterloo, ON, Canada, October 1-3, 2014. Proceedings},
  pages     = {1--21},
  year      = {2014},
  crossref  = {DBLP:conf/pqcrypto/2014},
  url       = {https://doi.org/10.1007/978-3-319-11659-4_1},
  doi       = {10.1007/978-3-319-11659-4_1},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/MelchorBDG14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/GaboritRSZ14,
  author    = {Philippe Gaborit and
               Olivier Ruatta and
               Julien Schrek and
               Gilles Z{\'{e}}mor},
  title     = {RankSign: An Efficient Signature Algorithm Based on the Rank Metric},
  booktitle = {Post-Quantum Cryptography - 6th International Workshop, PQCrypto 2014,
               Waterloo, ON, Canada, October 1-3, 2014. Proceedings},
  pages     = {88--107},
  year      = {2014},
  crossref  = {DBLP:conf/pqcrypto/2014},
  url       = {https://doi.org/10.1007/978-3-319-11659-4_6},
  doi       = {10.1007/978-3-319-11659-4_6},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/GaboritRSZ14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PhilippeG14,
  author    = {Philippe Gaborit and
               Gilles Z{\'{e}}mor},
  title     = {On the hardness of the decoding and the minimum distance problems
               for rank codes},
  journal   = {CoRR},
  volume    = {abs/1404.3482},
  year      = {2014},
  url       = {http://arxiv.org/abs/1404.3482},
  archivePrefix = {arXiv},
  eprint    = {1404.3482},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/PhilippeG14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DambraGRST14,
  author    = {Arnaud Dambra and
               Philippe Gaborit and
               Myl{\`{e}}ne Roussellet and
               Julien Schrek and
               Nicolas Tafforeau},
  title     = {Improved Secure Implementation of Code-Based Signature Schemes on
               Embedded Devices},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {163},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/163},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DambraGRST14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MelchorBDG14,
  author    = {Carlos Aguilar Melchor and
               Xavier Boyen and
               Jean{-}Christophe Deneuville and
               Philippe Gaborit},
  title     = {Sealing the Leak on Classical {NTRU} signatures},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {484},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/484},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/MelchorBDG14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/AbdulCG13,
  author    = {Wadood Abdul and
               Philippe Carr{\'{e}} and
               Philippe Gaborit},
  title     = {Error correcting codes for robust color wavelet watermarking},
  journal   = {{EURASIP} J. Information Security},
  volume    = {2013},
  pages     = {1},
  year      = {2013},
  url       = {https://doi.org/10.1186/1687-417X-2013-1},
  doi       = {10.1186/1687-417X-2013-1},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ejisec/AbdulCG13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/MelchorBBFG13,
  author    = {Carlos Aguilar Melchor and
               Slim Bettaieb and
               Xavier Boyen and
               Laurent Fousse and
               Philippe Gaborit},
  title     = {Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference
               on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings},
  pages     = {1--25},
  year      = {2013},
  crossref  = {DBLP:conf/africacrypt/2013},
  url       = {https://doi.org/10.1007/978-3-642-38553-7_1},
  doi       = {10.1007/978-3-642-38553-7_1},
  timestamp = {Mon, 22 May 2017 17:11:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/MelchorBBFG13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/MelchorBGS13,
  author    = {Carlos Aguilar Melchor and
               Slim Bettaieb and
               Philippe Gaborit and
               Julien Schrek},
  title     = {A Code-Based Undeniable Signature Scheme},
  booktitle = {Cryptography and Coding - 14th {IMA} International Conference, {IMACC}
               2013, Oxford, UK, December 17-19, 2013. Proceedings},
  pages     = {99--119},
  year      = {2013},
  crossref  = {DBLP:conf/ima/2013},
  url       = {https://doi.org/10.1007/978-3-642-45239-0_7},
  doi       = {10.1007/978-3-642-45239-0_7},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ima/MelchorBGS13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pqcrypto/2013,
  editor    = {Philippe Gaborit},
  title     = {Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013,
               Limoges, France, June 4-7, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7932},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38616-9},
  doi       = {10.1007/978-3-642-38616-9},
  isbn      = {978-3-642-38615-2},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1301-1026,
  author    = {Philippe Gaborit and
               Olivier Ruatta and
               Julien Schrek},
  title     = {On the complexity of the Rank Syndrome Decoding problem},
  journal   = {CoRR},
  volume    = {abs/1301.1026},
  year      = {2013},
  url       = {http://arxiv.org/abs/1301.1026},
  archivePrefix = {arXiv},
  eprint    = {1301.1026},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1301-1026},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CouvreurGGOT13,
  author    = {Alain Couvreur and
               Philippe Gaborit and
               Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
               Ayoub Otmani and
               Jean{-}Pierre Tillich},
  title     = {Distinguisher-Based Attacks on Public-Key Cryptosystems Using Reed-Solomon
               Codes},
  journal   = {CoRR},
  volume    = {abs/1307.6458},
  year      = {2013},
  url       = {http://arxiv.org/abs/1307.6458},
  archivePrefix = {arXiv},
  eprint    = {1307.6458},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/CouvreurGGOT13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MelchorBBFG13,
  author    = {Carlos Aguilar Melchor and
               Slim Bettaieb and
               Xavier Boyen and
               Laurent Fousse and
               Philippe Gaborit},
  title     = {Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {281},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/281},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/MelchorBBFG13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaboritRSZ13,
  author    = {Philippe Gaborit and
               Olivier Ruatta and
               Julien Schrek and
               Gilles Z{\'{e}}mor},
  title     = {RankSign : an efficient signature algorithm based on the rank metric},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {766},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/766},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GaboritRSZ13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/MelchorGKSS12,
  author    = {Carlos Aguilar Melchor and
               Philippe Gaborit and
               Jon{-}Lark Kim and
               Lin Sok and
               Patrick Sol{\'{e}}},
  title     = {Classification of Extremal and s-Extremal Binary Self-Dual Codes of
               Length 38},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {58},
  number    = {4},
  pages     = {2253--2262},
  year      = {2012},
  url       = {https://doi.org/10.1109/TIT.2011.2177809},
  doi       = {10.1109/TIT.2011.2177809},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/MelchorGKSS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CarletGKS12,
  author    = {Claude Carlet and
               Philippe Gaborit and
               Jon{-}Lark Kim and
               Patrick Sol{\'{e}}},
  title     = {A New Class of Codes for Boolean Masking of Cryptographic Computations},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {58},
  number    = {9},
  pages     = {6000--6011},
  year      = {2012},
  url       = {https://doi.org/10.1109/TIT.2012.2200651},
  doi       = {10.1109/TIT.2012.2200651},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/CarletGKS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/GaboritS12,
  author    = {Philippe Gaborit and
               Julien Schrek},
  title     = {Efficient code-based one-time signature from automorphism groups with
               syndrome compatibility},
  booktitle = {Proceedings of the 2012 {IEEE} International Symposium on Information
               Theory, {ISIT} 2012, Cambridge, MA, USA, July 1-6, 2012},
  pages     = {1982--1986},
  year      = {2012},
  crossref  = {DBLP:conf/isit/2012},
  url       = {https://doi.org/10.1109/ISIT.2012.6283646},
  doi       = {10.1109/ISIT.2012.6283646},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isit/GaboritS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/MelchorCGL11,
  author    = {Carlos Aguilar Melchor and
               Pierre{-}Louis Cayrel and
               Philippe Gaborit and
               Fabien Laguillaumie},
  title     = {A New Efficient Threshold Ring Signature Scheme Based on Coding Theory},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {57},
  number    = {7},
  pages     = {4833--4842},
  year      = {2011},
  url       = {https://doi.org/10.1109/TIT.2011.2145950},
  doi       = {10.1109/TIT.2011.2145950},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/MelchorCGL11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/MelchorGS11,
  author    = {Carlos Aguilar Melchor and
               Philippe Gaborit and
               Julien Schrek},
  title     = {A new zero-knowledge code based identification scheme with reduced
               communication},
  booktitle = {2011 {IEEE} Information Theory Workshop, {ITW} 2011, Paraty, Brazil,
               October 16-20, 2011},
  pages     = {648--652},
  year      = {2011},
  crossref  = {DBLP:conf/itw/2011},
  url       = {https://doi.org/10.1109/ITW.2011.6089577},
  doi       = {10.1109/ITW.2011.6089577},
  timestamp = {Mon, 22 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/itw/MelchorGS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/GaboritSZ11,
  author    = {Philippe Gaborit and
               Julien Schrek and
               Gilles Z{\'{e}}mor},
  title     = {Full Cryptanalysis of the Chen Identification Protocol},
  booktitle = {Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011,
               Taipei, Taiwan, November 29 - December 2, 2011. Proceedings},
  pages     = {35--50},
  year      = {2011},
  crossref  = {DBLP:conf/pqcrypto/2011},
  url       = {https://doi.org/10.1007/978-3-642-25405-5_3},
  doi       = {10.1007/978-3-642-25405-5_3},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/GaboritSZ11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/GaboritS11,
  author    = {Philippe Gaborit and
               Nicolas Sendrier},
  title     = {Digital Signature Schemes from Codes},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  pages     = {344--347},
  year      = {2011},
  crossref  = {DBLP:reference/crypt/2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5_379},
  doi       = {10.1007/978-1-4419-5906-5_379},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/reference/crypt/GaboritS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1110-1193,
  author    = {Claude Carlet and
               Philippe Gaborit and
               Jon{-}Lark Kim and
               Patrick Sol{\'{e}}},
  title     = {A new class of codes for Boolean masking of cryptographic computations},
  journal   = {CoRR},
  volume    = {abs/1110.1193},
  year      = {2011},
  url       = {http://arxiv.org/abs/1110.1193},
  archivePrefix = {arXiv},
  eprint    = {1110.1193},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1110-1193},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-0228,
  author    = {Carlos Aguilar Melchor and
               Philippe Gaborit and
               Jon{-}Lark Kim and
               Lin Sok and
               Patrick Sol{\'{e}}},
  title     = {Classification of extremal and {\textdollar}s{\textdollar}-extremal
               binary self-dual codes of length 38},
  journal   = {CoRR},
  volume    = {abs/1111.0228},
  year      = {2011},
  url       = {http://arxiv.org/abs/1111.0228},
  archivePrefix = {arXiv},
  eprint    = {1111.0228},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1111-0228},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-1644,
  author    = {Carlos Aguilar Melchor and
               Philippe Gaborit and
               Julien Schrek},
  title     = {A new zero-knowledge code based identification scheme with reduced
               communication},
  journal   = {CoRR},
  volume    = {abs/1111.1644},
  year      = {2011},
  url       = {http://arxiv.org/abs/1111.1644},
  archivePrefix = {arXiv},
  eprint    = {1111.1644},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1111-1644},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MelchorBGH11,
  author    = {Carlos Aguilar Melchor and
               Slim Bettaieb and
               Philippe Gaborit and
               Javier Herranz},
  title     = {Improving Additive and Multiplicative Homomorphic Encryption Schemes
               Based on Worst-Case Hardness Assumptions\}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {607},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/607},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/MelchorBGH11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijicot/MelchorCG10,
  author    = {Carlos Aguilar Melchor and
               Christophe Chabot and
               Philippe Gaborit},
  title     = {There is no Euclidean self-dual quaternary [18, 9, 7] code},
  journal   = {IJICoT},
  volume    = {1},
  number    = {2},
  pages     = {200--207},
  year      = {2010},
  url       = {https://doi.org/10.1504/IJICOT.2010.032135},
  doi       = {10.1504/IJICOT.2010.032135},
  timestamp = {Sat, 06 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijicot/MelchorCG10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MelchorGH10,
  author    = {Carlos Aguilar Melchor and
               Philippe Gaborit and
               Javier Herranz},
  title     = {Additively Homomorphic Encryption with \emph{d}-Operand Multiplications},
  booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  pages     = {138--154},
  year      = {2010},
  crossref  = {DBLP:conf/crypto/2010},
  url       = {https://doi.org/10.1007/978-3-642-14623-7_8},
  doi       = {10.1007/978-3-642-14623-7_8},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/MelchorGH10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/AbdulCSG10,
  author    = {Wadood Abdul and
               Philippe Carr{\'{e}} and
               Hakim Saadane and
               Philippe Gaborit},
  title     = {Watermarking using multiple visual channels for perceptual color spaces},
  booktitle = {Proceedings of the International Conference on Image Processing, {ICIP}
               2010, September 26-29, Hong Kong, China},
  pages     = {2597--2600},
  year      = {2010},
  crossref  = {DBLP:conf/icip/2010},
  url       = {https://doi.org/10.1109/ICIP.2010.5651627},
  doi       = {10.1109/ICIP.2010.5651627},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icip/AbdulCSG10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mediaforensics/AbdulCG10,
  author    = {Wadood Abdul and
               Philippe Carr{\'{e}} and
               Philippe Gaborit},
  title     = {Human visual system-based color image steganography using the contourlet
               transform},
  booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE Electronic
               Imaging Symposium, San Jose, CA, USA, January 18-20, 2010, Proceedings},
  pages     = {75410U},
  year      = {2010},
  crossref  = {DBLP:conf/mediaforensics/2010},
  url       = {https://doi.org/10.1117/12.838899},
  doi       = {10.1117/12.838899},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mediaforensics/AbdulCG10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BoucherGGRU10,
  author    = {Delphine Boucher and
               Philippe Gaborit and
               Willi Geiselmann and
               Olivier Ruatta and
               Felix Ulmer},
  title     = {Key Exchange and Encryption Schemes Based on Non-commutative Skew
               Polynomials},
  booktitle = {Post-Quantum Cryptography, Third International Workshop, PQCrypto
               2010, Darmstadt, Germany, May 25-28, 2010. Proceedings},
  pages     = {126--141},
  year      = {2010},
  crossref  = {DBLP:conf/pqcrypto/2010},
  url       = {https://doi.org/10.1007/978-3-642-12929-2_10},
  doi       = {10.1007/978-3-642-12929-2_10},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/BoucherGGRU10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BergerCGO09,
  author    = {Thierry P. Berger and
               Pierre{-}Louis Cayrel and
               Philippe Gaborit and
               Ayoub Otmani},
  title     = {Reducing Key Length of the McEliece Cryptosystem},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International
               Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25,
               2009. Proceedings},
  pages     = {77--97},
  year      = {2009},
  crossref  = {DBLP:conf/africacrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-02384-2_6},
  doi       = {10.1007/978-3-642-02384-2_6},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/BergerCGO09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/AbdulCG09,
  author    = {Wadood Abdul and
               Philippe Carr{\'{e}} and
               Philippe Gaborit},
  title     = {List decoding of Reed Solomon codes for wavelet based colour image
               watermarking scheme},
  booktitle = {Proceedings of the International Conference on Image Processing, {ICIP}
               2009, 7-10 November 2009, Cairo, Egypt},
  pages     = {3637--3640},
  year      = {2009},
  crossref  = {DBLP:conf/icip/2009},
  url       = {https://doi.org/10.1109/ICIP.2009.5414271},
  doi       = {10.1109/ICIP.2009.5414271},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icip/AbdulCG09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/MelchorSG09,
  author    = {Carlos Aguilar Melchor and
               Boussad Ait Salem and
               Philippe Gaborit},
  title     = {A Collusion-Resistant Distributed Scalar Product Protocol with Application
               to Privacy-Preserving Computation of Trust},
  booktitle = {Proceedings of The Eighth {IEEE} International Symposium on Networking
               Computing and Applications, {NCA} 2009, July 9-11, 2009, Cambridge,
               Massachusetts, {USA}},
  pages     = {140--147},
  year      = {2009},
  crossref  = {DBLP:conf/nca/2009},
  url       = {https://doi.org/10.1109/NCA.2009.48},
  doi       = {10.1109/NCA.2009.48},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nca/MelchorSG09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0903-0069,
  author    = {Pierre{-}Louis Cayrel and
               Philippe Gaborit and
               David Galindo and
               Marc Girault},
  title     = {Improved identity-based identification using correcting codes},
  journal   = {CoRR},
  volume    = {abs/0903.0069},
  year      = {2009},
  url       = {http://arxiv.org/abs/0903.0069},
  archivePrefix = {arXiv},
  eprint    = {0903.0069},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-0903-0069},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/GaboritZ08,
  author    = {Philippe Gaborit and
               Gilles Z{\'{e}}mor},
  title     = {Asymptotic Improvement of the Gilbert-Varshamov Bound for Linear Codes},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {54},
  number    = {9},
  pages     = {3865--3872},
  year      = {2008},
  url       = {https://doi.org/10.1109/TIT.2008.928288},
  doi       = {10.1109/TIT.2008.928288},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/GaboritZ08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/MelchorG08,
  author    = {Carlos Aguilar Melchor and
               Philippe Gaborit},
  title     = {On the Classification of Extremal [36, 18, 8] Binary Self-Dual Codes},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {54},
  number    = {10},
  pages     = {4743--4750},
  year      = {2008},
  url       = {https://doi.org/10.1109/TIT.2008.928976},
  doi       = {10.1109/TIT.2008.928976},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/MelchorG08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MelchorSGT08,
  author    = {Carlos Aguilar Melchor and
               Boussad Ait Salem and
               Philippe Gaborit and
               Karim Tamine},
  title     = {AntTrust: {A} Novel Ant Routing Protocol for Wireless Ad-hoc Network
               Based on Trust between Nodes},
  booktitle = {Proceedings of the The Third International Conference on Availability,
               Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
               University of Catalonia, Barcelona , Spain},
  pages     = {1052--1059},
  year      = {2008},
  crossref  = {DBLP:conf/IEEEares/2008},
  url       = {https://doi.org/10.1109/ARES.2008.110},
  doi       = {10.1109/ARES.2008.110},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/MelchorSGT08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/CayrelGP08,
  author    = {Pierre{-}Louis Cayrel and
               Philippe Gaborit and
               Emmanuel Prouff},
  title     = {Secure Implementation of the Stern Authentication and Signature Schemes
               for Low-Resource Devices},
  booktitle = {Smart Card Research and Advanced Applications, 8th {IFIP} {WG} 8.8/11.2
               International Conference, {CARDIS} 2008, London, UK, September 8-11,
               2008. Proceedings},
  pages     = {191--205},
  year      = {2008},
  crossref  = {DBLP:conf/cardis/2008},
  url       = {https://doi.org/10.1007/978-3-540-85893-5_14},
  doi       = {10.1007/978-3-540-85893-5_14},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cardis/CayrelGP08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/MelchorG08,
  author    = {Carlos Aguilar Melchor and
               Philippe Gaborit},
  title     = {A fast private information retrieval protocol},
  booktitle = {2008 {IEEE} International Symposium on Information Theory, {ISIT}
               2008, Toronto, ON, Canada, July 6-11, 2008},
  pages     = {1848--1852},
  year      = {2008},
  crossref  = {DBLP:conf/isit/2008},
  url       = {https://doi.org/10.1109/ISIT.2008.4595308},
  doi       = {10.1109/ISIT.2008.4595308},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isit/MelchorG08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/MelchorCG08,
  author    = {Carlos Aguilar Melchor and
               Guilhem Castagnos and
               Philippe Gaborit},
  title     = {Lattice-based homomorphic encryption of vector spaces},
  booktitle = {2008 {IEEE} International Symposium on Information Theory, {ISIT}
               2008, Toronto, ON, Canada, July 6-11, 2008},
  pages     = {1858--1862},
  year      = {2008},
  crossref  = {DBLP:conf/isit/2008},
  url       = {https://doi.org/10.1109/ISIT.2008.4595310},
  doi       = {10.1109/ISIT.2008.4595310},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isit/MelchorCG08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/MelchorCG08,
  author    = {Carlos Aguilar Melchor and
               Pierre{-}Louis Cayrel and
               Philippe Gaborit},
  title     = {A New Efficient Threshold Ring Signature Scheme Based on Coding Theory},
  booktitle = {Post-Quantum Cryptography, Second International Workshop, PQCrypto
               2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings},
  pages     = {1--16},
  year      = {2008},
  crossref  = {DBLP:conf/pqcrypto/2008},
  url       = {https://doi.org/10.1007/978-3-540-88403-3_1},
  doi       = {10.1007/978-3-540-88403-3_1},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/MelchorCG08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securware/MelchorCGJR08,
  author    = {Carlos Aguilar Melchor and
               Beno{\^{\i}}t Crespin and
               Philippe Gaborit and
               Vincent Jolivet and
               Pierre Rousseau},
  title     = {High-Speed Private Information Retrieval Computation on {GPU}},
  booktitle = {Proceedings of the Second International Conference on Emerging Security
               Information, Systems and Technologies, {SECURWARE} 2008, August 25-31,
               2008, Cap Esterel, France},
  pages     = {263--272},
  year      = {2008},
  crossref  = {DBLP:conf/securware/2008},
  url       = {https://doi.org/10.1109/SECURWARE.2008.55},
  doi       = {10.1109/SECURWARE.2008.55},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securware/MelchorCGJR08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MelchorGH08,
  author    = {Carlos Aguilar Melchor and
               Philippe Gaborit and
               Javier Herranz},
  title     = {Additively Homomorphic Encryption with d-Operand Multiplications},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {378},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/378},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/MelchorGH08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/BautistaGKW07,
  author    = {Evangeline P. Bautista and
               Philippe Gaborit and
               Jon{-}Lark Kim and
               Judy L. Walker},
  title     = {s-extremal additive F\({}_{\mbox{4}}\) codes},
  journal   = {Adv. in Math. of Comm.},
  volume    = {1},
  number    = {1},
  pages     = {111--130},
  year      = {2007},
  url       = {https://doi.org/10.3934/amc.2007.1.111},
  doi       = {10.3934/amc.2007.1.111},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/amco/BautistaGKW07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/KingG07,
  author    = {Oliver D. King and
               Philippe Gaborit},
  title     = {Binary templates for comma-free {DNA} codes},
  journal   = {Discrete Applied Mathematics},
  volume    = {155},
  number    = {6-7},
  pages     = {831--839},
  year      = {2007},
  url       = {https://doi.org/10.1016/j.dam.2005.07.015},
  doi       = {10.1016/j.dam.2005.07.015},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dam/KingG07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/GaboritLS07,
  author    = {Philippe Gaborit and
               C{\'{e}}dric Lauradoux and
               Nicolas Sendrier},
  title     = {{SYND:} a Fast Code-Based Stream Cipher with a Security Reduction},
  booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2007,
               Nice, France, June 24-29, 2007},
  pages     = {186--190},
  year      = {2007},
  crossref  = {DBLP:conf/isit/2007},
  url       = {https://doi.org/10.1109/ISIT.2007.4557224},
  doi       = {10.1109/ISIT.2007.4557224},
  timestamp = {Fri, 08 Jun 2018 13:37:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isit/GaboritLS07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/GaboritG07,
  author    = {Philippe Gaborit and
               Marc Girault},
  title     = {Lightweight code-based identification and signature},
  booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2007,
               Nice, France, June 24-29, 2007},
  pages     = {191--195},
  year      = {2007},
  crossref  = {DBLP:conf/isit/2007},
  url       = {https://doi.org/10.1109/ISIT.2007.4557225},
  doi       = {10.1109/ISIT.2007.4557225},
  timestamp = {Fri, 08 Jun 2018 13:37:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isit/GaboritG07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0708-4164,
  author    = {Philippe Gaborit and
               Gilles Z{\'{e}}mor},
  title     = {Asymptotic improvement of the Gilbert-Varshamov bound for linear codes},
  journal   = {CoRR},
  volume    = {abs/0708.4164},
  year      = {2007},
  url       = {http://arxiv.org/abs/0708.4164},
  archivePrefix = {arXiv},
  eprint    = {0708.4164},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-0708-4164},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MelchorG07,
  author    = {Carlos Aguilar Melchor and
               Philippe Gaborit},
  title     = {A Lattice-Based Computationally-Efficient Private Information Retrieval
               Protocol},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2007},
  pages     = {446},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/446},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/MelchorG07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/CarletG06,
  author    = {Claude Carlet and
               Philippe Gaborit},
  title     = {Hyper-bent functions and cyclic codes},
  journal   = {J. Comb. Theory, Ser. {A}},
  volume    = {113},
  number    = {3},
  pages     = {466--482},
  year      = {2006},
  url       = {https://doi.org/10.1016/j.jcta.2005.04.008},
  doi       = {10.1016/j.jcta.2005.04.008},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jct/CarletG06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/DobbertinLCCFG06,
  author    = {Hans Dobbertin and
               Gregor Leander and
               Anne Canteaut and
               Claude Carlet and
               Patrick Felke and
               Philippe Gaborit},
  title     = {Construction of bent functions via Niho power functions},
  journal   = {J. Comb. Theory, Ser. {A}},
  volume    = {113},
  number    = {5},
  pages     = {779--798},
  year      = {2006},
  url       = {https://doi.org/10.1016/j.jcta.2005.07.009},
  doi       = {10.1016/j.jcta.2005.07.009},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jct/DobbertinLCCFG06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ArmknechtCGKMR06,
  author    = {Frederik Armknecht and
               Claude Carlet and
               Philippe Gaborit and
               Simon K{\"{u}}nzli and
               Willi Meier and
               Olivier Ruatta},
  title     = {Efficient Computation of Algebraic Immunity for Algebraic and Fast
               Algebraic Attacks},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  pages     = {147--164},
  year      = {2006},
  crossref  = {DBLP:conf/eurocrypt/2006},
  url       = {https://doi.org/10.1007/11761679_10},
  doi       = {10.1007/11761679_10},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/ArmknechtCGKMR06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/GaboritK05,
  author    = {Philippe Gaborit and
               Oliver D. King},
  title     = {Linear constructions for {DNA} codes},
  journal   = {Theor. Comput. Sci.},
  volume    = {334},
  number    = {1-3},
  pages     = {99--113},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.tcs.2004.11.004},
  doi       = {10.1016/j.tcs.2004.11.004},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tcs/GaboritK05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/GaboritNW05,
  author    = {Philippe Gaborit and
               Carmen{-}Simona Nedeloaia and
               Alfred Wassermann},
  title     = {On the weight enumerators of duadic and quadratic residue codes},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {51},
  number    = {1},
  pages     = {402--407},
  year      = {2005},
  url       = {https://doi.org/10.1109/TIT.2004.839522},
  doi       = {10.1109/TIT.2004.839522},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/GaboritNW05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejc/Gaborit04,
  author    = {Philippe Gaborit},
  title     = {Construction of new extremal unimodular lattices},
  journal   = {Eur. J. Comb.},
  volume    = {25},
  number    = {4},
  pages     = {549--564},
  year      = {2004},
  url       = {https://doi.org/10.1016/j.ejc.2003.07.005},
  doi       = {10.1016/j.ejc.2003.07.005},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ejc/Gaborit04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/BachocG04,
  author    = {Christine Bachoc and
               Philippe Gaborit},
  title     = {Designs and self-dual codes with long shadows},
  journal   = {J. Comb. Theory, Ser. {A}},
  volume    = {105},
  number    = {1},
  pages     = {15--34},
  year      = {2004},
  url       = {https://doi.org/10.1016/j.jcta.2003.09.003},
  doi       = {10.1016/j.jcta.2003.09.003},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jct/BachocG04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dm/GaboritKP03,
  author    = {Philippe Gaborit and
               Jon{-}Lark Kim and
               Vera Pless},
  title     = {Decoding Binary ItR(25) by Hand},
  journal   = {Discrete Mathematics},
  volume    = {264},
  number    = {1-3},
  pages     = {55--74},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0012-365X(02)00550-2},
  doi       = {10.1016/S0012-365X(02)00550-2},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dm/GaboritKP03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/Gaborit02,
  author    = {Philippe Gaborit},
  title     = {Quadratic Double Circulant Codes over Fields},
  journal   = {J. Comb. Theory, Ser. {A}},
  volume    = {97},
  number    = {1},
  pages     = {85--107},
  year      = {2002},
  url       = {https://doi.org/10.1006/jcta.2001.3198},
  doi       = {10.1006/jcta.2001.3198},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jct/Gaborit02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/FieldsGHP01,
  author    = {J. E. Fields and
               Philippe Gaborit and
               W. Cary Huffman and
               Vera Pless},
  title     = {On the classification of extremal even formally self-dual codes of
               lengths 20 and 22},
  journal   = {Discrete Applied Mathematics},
  volume    = {111},
  number    = {1-2},
  pages     = {75--86},
  year      = {2001},
  url       = {https://doi.org/10.1016/S0166-218X(00)00345-0},
  doi       = {10.1016/S0166-218X(00)00345-0},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dam/FieldsGHP01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/endm/BachocG01,
  author    = {Christine Bachoc and
               Philippe Gaborit},
  title     = {On Extremal Additive \emph{I}\({}_{\mbox{4}}\) Codes of Length 10
               to 18},
  journal   = {Electronic Notes in Discrete Mathematics},
  volume    = {6},
  pages     = {55--64},
  year      = {2001},
  url       = {https://doi.org/10.1016/S1571-0653(04)00157-X},
  doi       = {10.1016/S1571-0653(04)00157-X},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/endm/BachocG01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/endm/Gaborit01,
  author    = {Philippe Gaborit},
  title     = {On Quadratic Double Circulant Codes over Fields},
  journal   = {Electronic Notes in Discrete Mathematics},
  volume    = {6},
  pages     = {423--432},
  year      = {2001},
  url       = {https://doi.org/10.1016/S1571-0653(04)00194-5},
  doi       = {10.1016/S1571-0653(04)00194-5},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/endm/Gaborit01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GaboritH99,
  author    = {Philippe Gaborit and
               Masaaki Harada},
  title     = {Construction of Extremal Type {II} Codes over {Z}},
  journal   = {Des. Codes Cryptography},
  volume    = {16},
  number    = {3},
  pages     = {257--269},
  year      = {1999},
  url       = {https://doi.org/10.1023/A:1008335912135},
  doi       = {10.1023/A:1008335912135},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/GaboritH99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FieldsGHP99,
  author    = {J. E. Fields and
               Philippe Gaborit and
               W. Cary Huffman and
               Vera Pless},
  title     = {On the Classification of Extremal Even Formally Self-Dual Codes},
  journal   = {Des. Codes Cryptography},
  volume    = {18},
  number    = {1/3},
  pages     = {125--148},
  year      = {1999},
  url       = {https://doi.org/10.1023/A:1008389220478},
  doi       = {10.1023/A:1008389220478},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/FieldsGHP99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dm/BonnecazeGHKS99,
  author    = {Alexis Bonnecaze and
               Philippe Gaborit and
               Masaaki Harada and
               Masaaki Kitazume and
               Patrick Sol{\'{e}}},
  title     = {Niemeier lattices and Type {II} codes over Z\({}_{\mbox{4}}\)},
  journal   = {Discrete Mathematics},
  volume    = {205},
  number    = {1-3},
  pages     = {1--21},
  year      = {1999},
  url       = {https://doi.org/10.1016/S0012-365X(99)00032-1},
  doi       = {10.1016/S0012-365X(99)00032-1},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dm/BonnecazeGHKS99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/DoughertyGHS99,
  author    = {Steven T. Dougherty and
               Philippe Gaborit and
               Masaaki Harada and
               Patrick Sol{\'{e}}},
  title     = {Type {II} Codes Over F\({}_{\mbox{2}}\) + u F\({}_{\mbox{2}}\)},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {45},
  number    = {1},
  pages     = {32--45},
  year      = {1999},
  url       = {https://doi.org/10.1109/18.746770},
  doi       = {10.1109/18.746770},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/DoughertyGHS99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/FieldsG99,
  author    = {Joe Fields and
               Philippe Gaborit},
  title     = {On the non Z\({}_{\mbox{4}}\)-linearity of certain good binary codes},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {45},
  number    = {5},
  pages     = {1674--1677},
  year      = {1999},
  url       = {https://doi.org/10.1109/18.771242},
  doi       = {10.1109/18.771242},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/FieldsG99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/AokiGHOS99,
  author    = {Toru Aoki and
               Philippe Gaborit and
               Masaaki Harada and
               Michio Ozeki and
               Patrick Sol{\'{e}}},
  title     = {On the covering radius of Z\({}_{\mbox{4}}\)-codes and their lattices},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {45},
  number    = {6},
  pages     = {2162--2168},
  year      = {1999},
  url       = {https://doi.org/10.1109/18.782168},
  doi       = {10.1109/18.782168},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/AokiGHOS99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/DoughertyGHMS99,
  author    = {Steven T. Dougherty and
               Philippe Gaborit and
               Masaaki Harada and
               Akihiro Munemasa and
               Patrick Sol{\'{e}}},
  title     = {Type {IV} self-dual codes over rings},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {45},
  number    = {7},
  pages     = {2345--2360},
  year      = {1999},
  url       = {https://doi.org/10.1109/18.796375},
  doi       = {10.1109/18.796375},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/DoughertyGHMS99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/GaboritHKP99,
  author    = {Philippe Gaborit and
               W. Cary Huffman and
               Jon{-}Lark Kim and
               Vera Pless},
  title     = {On additive \emph{GF}(4) codes},
  booktitle = {Codes and Association Schemes, Proceedings of a {DIMACS} Workshop,
               Piscataway, New Jersey, USA, November 9-12, 1999},
  pages     = {135--150},
  year      = {1999},
  crossref  = {DBLP:conf/dimacs/dimacs56},
  timestamp = {Tue, 15 Mar 2016 17:08:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dimacs/GaboritHKP99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/FieldsGLP98,
  author    = {Joe Fields and
               Philippe Gaborit and
               Jeffrey S. Leon and
               Vera Pless},
  title     = {All Self-Dual Z\({}_{\mbox{4}}\) Codes of Length 15 or Less Are Known},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {44},
  number    = {1},
  pages     = {311--322},
  year      = {1998},
  url       = {https://doi.org/10.1109/18.651058},
  doi       = {10.1109/18.651058},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/FieldsGLP98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Gaborit96,
  author    = {Philippe Gaborit},
  title     = {Mass formulas for self-dual codes over Z\({}_{\mbox{4}}\) and F\({}_{\mbox{q}}\)+uF\({}_{\mbox{q}}\)
               rings},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {42},
  number    = {4},
  pages     = {1222--1228},
  year      = {1996},
  url       = {https://doi.org/10.1109/18.508845},
  doi       = {10.1109/18.508845},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/Gaborit96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2018asia,
  editor    = {Jong Kim and
               Gail{-}Joon Ahn and
               Seungjoo Kim and
               Yongdae Kim and
               Javier L{\'{o}}pez and
               Taesoo Kim},
  title     = {Proceedings of the 2018 on Asia Conference on Computer and Communications
               Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {http://doi.acm.org/10.1145/3196494},
  doi       = {10.1145/3196494},
  timestamp = {Mon, 04 Jun 2018 09:05:29 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2018asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2017-3,
  editor    = {Jonathan Katz and
               Hovav Shacham},
  title     = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
               Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10403},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-63697-9},
  doi       = {10.1007/978-3-319-63697-9},
  isbn      = {978-3-319-63696-2},
  timestamp = {Mon, 14 Aug 2017 14:44:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2017-3},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icip/2017,
  title     = {2017 {IEEE} International Conference on Image Processing, {ICIP} 2017,
               Beijing, China, September 17-20, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8267582},
  isbn      = {978-1-5090-2175-8},
  timestamp = {Fri, 23 Feb 2018 13:26:14 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icip/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2017,
  editor    = {Arpita Patra and
               Nigel P. Smart},
  title     = {Progress in Cryptology - {INDOCRYPT} 2017 - 18th International Conference
               on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10698},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-71667-1},
  doi       = {10.1007/978-3-319-71667-1},
  isbn      = {978-3-319-71666-4},
  timestamp = {Mon, 04 Dec 2017 18:46:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isit/2017,
  title     = {2017 {IEEE} International Symposium on Information Theory, {ISIT}
               2017, Aachen, Germany, June 25-30, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7999336},
  isbn      = {978-1-5090-4096-4},
  timestamp = {Thu, 17 Aug 2017 10:00:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isit/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pqcrypto/2017,
  editor    = {Tanja Lange and
               Tsuyoshi Takagi},
  title     = {Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017,
               Utrecht, The Netherlands, June 26-28, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10346},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-59879-6},
  doi       = {10.1007/978-3-319-59879-6},
  isbn      = {978-3-319-59878-9},
  timestamp = {Wed, 14 Jun 2017 12:36:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pqcrypto/2016,
  editor    = {Tsuyoshi Takagi},
  title     = {Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016,
               Fukuoka, Japan, February 24-26, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9606},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-29360-8},
  doi       = {10.1007/978-3-319-29360-8},
  isbn      = {978-3-319-29359-2},
  timestamp = {Fri, 26 May 2017 00:51:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/waifi/2016,
  editor    = {Sylvain Duquesne and
               Svetla Petkova{-}Nikova},
  title     = {Arithmetic of Finite Fields - 6th International Workshop, {WAIFI}
               2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10064},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-55227-9},
  doi       = {10.1007/978-3-319-55227-9},
  isbn      = {978-3-319-55226-2},
  timestamp = {Fri, 26 May 2017 00:48:58 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/waifi/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2014,
  editor    = {David Pointcheval and
               Damien Vergnaud},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
               on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8469},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-06734-6},
  doi       = {10.1007/978-3-319-06734-6},
  isbn      = {978-3-319-06733-9},
  timestamp = {Mon, 22 May 2017 17:11:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pqcrypto/2014,
  editor    = {Michele Mosca},
  title     = {Post-Quantum Cryptography - 6th International Workshop, PQCrypto 2014,
               Waterloo, ON, Canada, October 1-3, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8772},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-11659-4},
  doi       = {10.1007/978-3-319-11659-4},
  isbn      = {978-3-319-11658-7},
  timestamp = {Fri, 26 May 2017 00:51:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2013,
  editor    = {Amr Youssef and
               Abderrahmane Nitaj and
               Aboul Ella Hassanien},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference
               on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7918},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38553-7},
  doi       = {10.1007/978-3-642-38553-7},
  isbn      = {978-3-642-38552-0},
  timestamp = {Mon, 22 May 2017 17:11:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ima/2013,
  editor    = {Martijn Stam},
  title     = {Cryptography and Coding - 14th {IMA} International Conference, {IMACC}
               2013, Oxford, UK, December 17-19, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8308},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45239-0},
  doi       = {10.1007/978-3-642-45239-0},
  isbn      = {978-3-642-45238-3},
  timestamp = {Fri, 26 May 2017 00:49:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ima/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isit/2012,
  title     = {Proceedings of the 2012 {IEEE} International Symposium on Information
               Theory, {ISIT} 2012, Cambridge, MA, USA, July 1-6, 2012},
  publisher = {{IEEE}},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6268627},
  isbn      = {978-1-4673-2580-6},
  timestamp = {Mon, 01 Oct 2012 17:33:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isit/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/itw/2011,
  title     = {2011 {IEEE} Information Theory Workshop, {ITW} 2011, Paraty, Brazil,
               October 16-20, 2011},
  publisher = {{IEEE}},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6081149},
  isbn      = {978-1-4577-0438-3},
  timestamp = {Mon, 08 Dec 2014 10:49:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/itw/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pqcrypto/2011,
  editor    = {Bo{-}Yin Yang},
  title     = {Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011,
               Taipei, Taiwan, November 29 - December 2, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7071},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25405-5},
  doi       = {10.1007/978-3-642-25405-5},
  isbn      = {978-3-642-25404-8},
  timestamp = {Fri, 26 May 2017 00:51:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:reference/crypt/2011,
  editor    = {Henk C. A. van Tilborg and
               Sushil Jajodia},
  title     = {Encyclopedia of Cryptography and Security, 2nd Ed},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5},
  doi       = {10.1007/978-1-4419-5906-5},
  isbn      = {978-1-4419-5905-8},
  timestamp = {Tue, 16 May 2017 14:01:51 +0200},
  biburl    = {https://dblp.org/rec/bib/reference/crypt/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2010,
  editor    = {Tal Rabin},
  title     = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6223},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14623-7},
  doi       = {10.1007/978-3-642-14623-7},
  isbn      = {978-3-642-14622-0},
  timestamp = {Fri, 26 May 2017 00:50:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icip/2010,
  title     = {Proceedings of the International Conference on Image Processing, {ICIP}
               2010, September 26-29, Hong Kong, China},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5641636},
  isbn      = {978-1-4244-7994-8},
  timestamp = {Thu, 12 May 2016 11:47:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icip/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mediaforensics/2010,
  editor    = {Nasir D. Memon and
               Jana Dittmann and
               Adnan M. Alattar and
               Edward J. Delp},
  title     = {Media Forensics and Security II, part of the IS{\&}T-SPIE Electronic
               Imaging Symposium, San Jose, CA, USA, January 18-20, 2010, Proceedings},
  series    = {{SPIE} Proceedings},
  volume    = {7541},
  publisher = {{SPIE}},
  year      = {2010},
  url       = {http://proceedings.spiedigitallibrary.org/volume.aspx?volume=7541},
  isbn      = {978-0-8194-7934-1},
  timestamp = {Tue, 28 Jun 2016 13:29:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mediaforensics/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pqcrypto/2010,
  editor    = {Nicolas Sendrier},
  title     = {Post-Quantum Cryptography, Third International Workshop, PQCrypto
               2010, Darmstadt, Germany, May 25-28, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6061},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-12929-2},
  doi       = {10.1007/978-3-642-12929-2},
  isbn      = {978-3-642-12928-5},
  timestamp = {Fri, 26 May 2017 00:51:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2009,
  editor    = {Bart Preneel},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International
               Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25,
               2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5580},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-02384-2},
  doi       = {10.1007/978-3-642-02384-2},
  isbn      = {978-3-642-02383-5},
  timestamp = {Mon, 22 May 2017 17:11:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icip/2009,
  title     = {Proceedings of the International Conference on Image Processing, {ICIP}
               2009, 7-10 November 2009, Cairo, Egypt},
  publisher = {{IEEE}},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5403221},
  isbn      = {978-1-4244-5654-3},
  timestamp = {Thu, 12 May 2016 11:47:26 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icip/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nca/2009,
  title     = {Proceedings of The Eighth {IEEE} International Symposium on Networking
               Computing and Applications, {NCA} 2009, July 9-11, 2009, Cambridge,
               Massachusetts, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5190341},
  isbn      = {978-0-7695-3698-9},
  timestamp = {Thu, 09 Oct 2014 16:51:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nca/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEares/2008,
  title     = {Proceedings of the The Third International Conference on Availability,
               Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
               University of Catalonia, Barcelona , Spain},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4529302},
  isbn      = {978-0-7695-3102-1},
  timestamp = {Mon, 13 Apr 2015 17:11:04 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cardis/2008,
  editor    = {Gilles Grimaud and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Smart Card Research and Advanced Applications, 8th {IFIP} {WG} 8.8/11.2
               International Conference, {CARDIS} 2008, London, UK, September 8-11,
               2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5189},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-85893-5},
  doi       = {10.1007/978-3-540-85893-5},
  isbn      = {978-3-540-85892-8},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cardis/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isit/2008,
  editor    = {Frank R. Kschischang and
               En{-}Hui Yang},
  title     = {2008 {IEEE} International Symposium on Information Theory, {ISIT}
               2008, Toronto, ON, Canada, July 6-11, 2008},
  publisher = {{IEEE}},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4586217},
  isbn      = {978-1-4244-2256-2},
  timestamp = {Wed, 18 Apr 2012 08:49:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isit/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pqcrypto/2008,
  editor    = {Johannes A. Buchmann and
               Jintai Ding},
  title     = {Post-Quantum Cryptography, Second International Workshop, PQCrypto
               2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5299},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-88403-3},
  doi       = {10.1007/978-3-540-88403-3},
  isbn      = {978-3-540-88402-6},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securware/2008,
  editor    = {Andr{\'{e}} Cotton and
               Oana Dini and
               Antonio Fernandez G{\'{o}}mez{-}Skarmeta and
               Mihaela Ion and
               Manuela Popescu and
               Masaru Takesue},
  title     = {Proceedings of the Second International Conference on Emerging Security
               Information, Systems and Technologies, {SECURWARE} 2008, August 25-31,
               2008, Cap Esterel, France},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4622544},
  isbn      = {978-0-7695-3329-2},
  timestamp = {Thu, 26 Jan 2017 18:08:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/securware/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isit/2007,
  title     = {{IEEE} International Symposium on Information Theory, {ISIT} 2007,
               Nice, France, June 24-29, 2007},
  publisher = {{IEEE}},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4497218},
  timestamp = {Fri, 08 Jun 2018 13:37:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isit/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2006,
  editor    = {Serge Vaudenay},
  title     = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4004},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11761679},
  doi       = {10.1007/11761679},
  isbn      = {3-540-34546-9},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dimacs/dimacs56,
  editor    = {Alexander Barg and
               Simon Litsyn},
  title     = {Codes and Association Schemes, Proceedings of a {DIMACS} Workshop,
               Piscataway, New Jersey, USA, November 9-12, 1999},
  series    = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume    = {56},
  publisher = {{DIMACS/AMS}},
  year      = {2001},
  url       = {http://dimacs.rutgers.edu/Volumes/Vol56.html},
  timestamp = {Tue, 15 Mar 2016 17:08:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dimacs/dimacs56},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier