Follow
Alain Couvreur
Alain Couvreur
Verified email at lix.polytechnique.fr
Title
Cited by
Cited by
Year
Distinguisher-based attacks on public-key cryptosystems using Reed–Solomon codes
A Couvreur, P Gaborit, V Gauthier-Umaña, A Otmani, JP Tillich
Designs, Codes and Cryptography 73 (2), 641-666, 2014
1552014
Polynomial time attack on wild McEliece over quadratic extensions
A Couvreur, A Otmani, JP Tillich
IEEE Transactions on Information Theory 63 (1), 404-427, 2016
1342016
A polynomial time attack against algebraic geometry code based public key cryptosystems
A Couvreur, I Márquez-Corbella, R Pellikaan
2014 IEEE International Symposium on Information Theory, 1446-1450, 2014
722014
Cryptanalysis of McEliece cryptosystem based on algebraic geometry codes and their subcodes
A Couvreur, I Márquez-Corbella, R Pellikaan
IEEE Transactions on Information Theory 63 (8), 5404-5418, 2017
682017
The dual minimum distance of arbitrary-dimensional algebraic–geometric codes
A Couvreur
Journal of Algebra 350 (1), 84-107, 2012
562012
A polynomial-time attack on the BBCRS scheme
A Couvreur, A Otmani, JP Tillich, V Gauthier–Umana
IACR International Workshop on Public Key Cryptography, 175-193, 2015
512015
A construction of quantum LDPC codes from Cayley graphs
A Couvreur, N Delfosse, G Zémor
IEEE transactions on information theory 59 (9), 6087-6098, 2013
482013
On the security of a Loidreau rank metric code based encryption scheme
D Coggia, A Couvreur
Designs, Codes and Cryptography 88, 1941-1957, 2020
372020
An efficient structural attack on NIST submission DAGS
É Barelli, A Couvreur
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
322018
Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes
A Couvreur, P Gaborit, V Gauthier-Umana, A Otmani, JP Tillich
arXiv preprint arXiv:1307.6458, 2013
322013
Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes
A Couvreur, I Márquez-Corbella, R Pellikaan
Coding Theory and Applications: 4th International Castle Meeting, Palmela …, 2015
312015
Performance analysis of a header compression protocol: The ROHC unidirectional mode
A Couvreur, LML Ny, A Minaburo, G Rubino, B Sericola, L Toutain
Telecommunication systems 31, 85-98, 2006
312006
New identities relating wild Goppa codes
A Couvreur, A Otmani, JP Tillich
Finite Fields and Their Applications 29, 178-197, 2014
302014
Evaluation codes from smooth quadric surfaces and twisted Segre varieties
A Couvreur, I Duursma
Designs, codes and cryptography 66, 291-303, 2013
252013
Rank quasi-cyclic (RQC)
C Aguilar Melchor, N Aragon, S Bettaieb, L Bidoux, O Blazy, ...
Second round submission to the NIST post-quantum cryptography call, 2020
232020
On tensor products of CSS codes
B Audoux, A Couvreur
Annales de l’Institut Henri Poincaré D 6 (2), 239-287, 2019
232019
An upper bound on the number of rational points of arbitrary projective varieties over finite fields
A Couvreur
Proceedings of the American Mathematical Society 144 (9), 3671-3685, 2016
212016
List-decoding of binary Goppa codes up to the binary Johnson bound
D Augot, M Barbier, A Couvreur
2011 IEEE Information Theory Workshop, 229-233, 2011
212011
Recovering short secret keys of RLCE in polynomial time
A Couvreur, M Lequesne, JP Tillich
Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019 …, 2019
192019
Recovering or testing extended-affine equivalence
A Canteaut, A Couvreur, L Perrin
IEEE Transactions on Information Theory 68 (9), 6187-6206, 2022
172022
The system can't perform the operation now. Try again later.
Articles 1–20