


default search action
Nicolas Sendrier
Person information
- affiliation: INRIA, Le Chesnay, France
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c31]Nicolas Sendrier:
Wave Parameter Selection. PQCrypto 2023: 91-110 - [i25]Nicolas Sendrier:
Wave Parameter Selection. IACR Cryptol. ePrint Arch. 2023: 588 (2023) - 2022
- [c30]Loïc Bidoux, Philippe Gaborit, Mukul Kulkarni, Nicolas Sendrier:
Quasi-Cyclic Stern Proof of Knowledge. ISIT 2022: 1459-1464 - 2021
- [i24]Loïc Bidoux, Philippe Gaborit, Nicolas Sendrier:
Quasi-Cyclic Stern Proof of Knowledge. CoRR abs/2110.05005 (2021) - [i23]Nicolas Sendrier:
Secure Sampling of Constant-Weight Words â" Application to BIKE. IACR Cryptol. ePrint Arch. 2021: 1631 (2021) - 2020
- [c29]Nicolas Sendrier, Valentin Vasseur
:
About Low DFR for QC-MDPC Decoding. PQCrypto 2020: 20-34 - [i22]Nicolas Sendrier, Valentin Vasseur:
On the Existence of Weak Keys for QC-MDPC Decoding. IACR Cryptol. ePrint Arch. 2020: 1232 (2020)
2010 – 2019
- 2019
- [c28]Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich:
Wave: A New Family of Trapdoor One-Way Preimage Sampleable Functions Based on Codes. ASIACRYPT (1) 2019: 21-51 - [c27]Nicolas Sendrier, Valentin Vasseur
:
On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders. PQCrypto 2019: 404-416 - [i21]Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich:
About Wave Implementation and its Leakage Immunity. IACR Cryptol. ePrint Arch. 2019: 548 (2019) - [i20]Nicolas Sendrier, Valentin Vasseur:
About Low DFR for QC-MDPC Decoding. IACR Cryptol. ePrint Arch. 2019: 1434 (2019) - 2018
- [c26]Edward Eaton, Matthieu Lequesne, Alex Parent, Nicolas Sendrier:
QC-MDPC: A Timing Attack and a CCA2 KEM. PQCrypto 2018: 47-76 - [i19]Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich:
Wave: A New Code-Based Signature Scheme. CoRR abs/1810.07554 (2018) - [i18]Edward Eaton, Matthieu Lequesne, Alex Parent, Nicolas Sendrier:
QC-MDPC: A Timing Attack and a CCA2 KEM. IACR Cryptol. ePrint Arch. 2018: 256 (2018) - [i17]Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich:
Wave: A New Code-Based Signature Scheme. IACR Cryptol. ePrint Arch. 2018: 996 (2018) - [i16]Nicolas Sendrier, Valentin Vasseur:
On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders. IACR Cryptol. ePrint Arch. 2018: 1207 (2018) - [i15]Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich:
This is Not an Attack on Wave. IACR Cryptol. ePrint Arch. 2018: 1216 (2018) - 2017
- [j11]Pascale Charpin, Thomas Johansson
, Gohar M. Kyureghyan, Nicolas Sendrier, Jean-Pierre Tillich:
Editorial: Special issue on coding and cryptography. Des. Codes Cryptogr. 82(1-2): 1-2 (2017) - [j10]Nicolas Sendrier:
Code-Based Cryptography: State of the Art and Perspectives. IEEE Secur. Priv. 15(4): 44-50 (2017) - [c25]Paulo S. L. M. Barreto, Shay Gueron
, Tim Güneysu
, Rafael Misoczki, Edoardo Persichetti
, Nicolas Sendrier, Jean-Pierre Tillich:
CAKE: Code-Based Algorithm for Key Encapsulation. IMACC 2017: 207-226 - [c24]Olivier Blazy
, Philippe Gaborit, Julien Schrek, Nicolas Sendrier:
A code-based blind signature. ISIT 2017: 2718-2722 - [i14]Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich:
A new signature scheme based on $(U|U+V)$ codes. CoRR abs/1706.08065 (2017) - [i13]Michele Mosca, Nicolas Sendrier, Rainer Steinwandt, Krysta M. Svore:
Quantum Cryptanalysis (Dagstuhl Seminar 17401). Dagstuhl Reports 7(10): 1-13 (2017) - [i12]Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich:
A new signature scheme based on (U|U+V) codes. IACR Cryptol. ePrint Arch. 2017: 662 (2017) - [i11]Paulo S. L. M. Barreto, Shay Gueron, Tim Güneysu, Rafael Misoczki, Edoardo Persichetti, Nicolas Sendrier, Jean-Pierre Tillich:
CAKE: Code-based Algorithm for Key Encapsulation. IACR Cryptol. ePrint Arch. 2017: 757 (2017) - 2016
- [c23]Julia Chaulet, Nicolas Sendrier:
Worst case QC-MDPC decoder for McEliece cryptosystem. ISIT 2016: 1366-1370 - [c22]Rodolfo Canto Torres, Nicolas Sendrier:
Analysis of Information Set Decoding for a Sub-linear Error Weight. PQCrypto 2016: 144-161 - [i10]Julia Chaulet, Nicolas Sendrier:
Worst case QC-MDPC decoder for McEliece cryptosystem. CoRR abs/1608.06080 (2016) - [i9]Nicolas Sendrier, Jean-Pierre Tillich:
Code-Based Cryptography: New Security Solutions Against a Quantum Adversary. ERCIM News 2016(106) (2016) - 2015
- [i8]Michele Mosca, Martin Roetteler
, Nicolas Sendrier, Rainer Steinwandt:
Quantum Cryptanalysis (Dagstuhl Seminar 15371). Dagstuhl Reports 5(9): 1-17 (2015) - 2014
- [c21]Jean-Pierre Tillich, Audrey Tixier, Nicolas Sendrier:
Recovering the interleaver of an unknown turbo-code. ISIT 2014: 2784-2788 - 2013
- [c20]Rafael Misoczki, Jean-Pierre Tillich, Nicolas Sendrier, Paulo S. L. M. Barreto:
MDPC-McEliece: New McEliece variants from Moderate Density Parity-Check codes. ISIT 2013: 2069-2073 - [c19]Nicolas Sendrier, Dimitris E. Simos:
The Hardness of Code Equivalence over and Its Application to Code-Based Cryptography. PQCrypto 2013: 203-216 - [i7]Yann Hamdaoui, Nicolas Sendrier:
A Non Asymptotic Analysis of Information Set Decoding. IACR Cryptol. ePrint Arch. 2013: 162 (2013) - 2012
- [c18]Grégory Landais, Nicolas Sendrier:
Implementing CFS. INDOCRYPT 2012: 474-488 - [c17]Nicolas Sendrier, Marion Bellard:
Reconstruction of constellation labeling with convolutional coded data. ISITA 2012: 653-657 - [i6]Grégory Landais, Nicolas Sendrier:
CFS Software Implementation. IACR Cryptol. ePrint Arch. 2012: 132 (2012) - [i5]Rafael Misoczki, Jean-Pierre Tillich, Nicolas Sendrier, Paulo S. L. M. Barreto:
MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes. IACR Cryptol. ePrint Arch. 2012: 409 (2012) - 2011
- [c16]Nicolas Sendrier:
The tightness of security reductions in code-based cryptography. ITW 2011: 415-419 - [c15]Nicolas Sendrier:
Decoding One Out of Many. PQCrypto 2011: 51-67 - [r7]Nicolas Sendrier:
Code-Based Cryptography. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 215-216 - [r6]Matthieu Finiasz, Nicolas Sendrier:
Digital Signature Scheme Based on McEliece. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 342-343 - [r5]Philippe Gaborit, Nicolas Sendrier:
Digital Signature Schemes from Codes. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 344-347 - [r4]Nicolas Sendrier:
McEliece Public Key Cryptosystem. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 767-768 - [r3]Nicolas Sendrier:
Niederreiter Encryption Scheme. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 842-843 - [i4]Nicolas Sendrier:
Decoding One Out of Many. IACR Cryptol. ePrint Arch. 2011: 367 (2011) - 2010
- [c14]Maxime Côte, Nicolas Sendrier:
Reconstruction of a turbo-code interleaver from noisy observation. ISIT 2010: 2003-2007 - [e2]Nicolas Sendrier:
Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings. Lecture Notes in Computer Science 6061, Springer 2010, ISBN 978-3-642-12928-5 [contents]
2000 – 2009
- 2009
- [c13]Matthieu Finiasz, Nicolas Sendrier:
Security Bounds for the Design of Code-Based Cryptosystems. ASIACRYPT 2009: 88-105 - [c12]Maxime Côte, Nicolas Sendrier:
Reconstruction of convolutional codes from noisy observation. ISIT 2009: 546-550 - [e1]Bimal K. Roy, Nicolas Sendrier:
Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings. Lecture Notes in Computer Science 5922, Springer 2009, ISBN 978-3-642-10627-9 [contents] - [i3]Matthieu Finiasz, Nicolas Sendrier:
Security Bounds for the Design of Code-based Cryptosystems. IACR Cryptol. ePrint Arch. 2009: 414 (2009) - 2008
- [c11]Bhaskar Biswas, Nicolas Sendrier:
McEliece Cryptosystem Implementation: Theory and Practice. PQCrypto 2008: 47-62 - 2007
- [c10]Philippe Gaborit, Cédric Lauradoux, Nicolas Sendrier:
SYND: a Fast Code-Based Stream Cipher with a Security Reduction. ISIT 2007: 186-190 - 2005
- [c9]Nicolas Sendrier:
Encoding information into constant weight words. ISIT 2005: 435-438 - [c8]Daniel Augot, Matthieu Finiasz, Nicolas Sendrier:
A Family of Fast Syndrome Based Cryptographic Hash Functions. Mycrypt 2005: 64-83 - [r2]Nicolas Sendrier:
McEliece Public Key Cryptosystem. Encyclopedia of Cryptography and Security 2005 - [r1]Nicolas Sendrier:
Niederreiter Encryption Scheme. Encyclopedia of Cryptography and Security 2005 - 2004
- [j9]Nicolas Sendrier:
Linear codes with complementary duals meet the Gilbert-Varshamov bound. Discret. Math. 285(1-3): 345-347 (2004) - [c7]Nicolas Sendrier:
Linear codes with complementary duals meet the Gilbert-Varshamov bound. ISIT 2004: 456 - 2003
- [j8]André Seznec, Nicolas Sendrier:
HAVEGE: A user-level software heuristic for generating empirically strong random numbers. ACM Trans. Model. Comput. Simul. 13(4): 334-346 (2003) - [i2]Daniel Augot, Matthieu Finiasz, Nicolas Sendrier:
A Fast Provably Secure Cryptographic Hash Function. IACR Cryptol. ePrint Arch. 2003: 230 (2003) - 2001
- [j7]Pierre Loidreau, Nicolas Sendrier:
Weak keys in the McEliece public-key cryptosystem. IEEE Trans. Inf. Theory 47(3): 1207-1211 (2001) - [c6]Nicolas T. Courtois, Matthieu Finiasz, Nicolas Sendrier:
How to Achieve a McEliece-Based Digital Signature Scheme. ASIACRYPT 2001: 157-174 - [i1]Nicolas T. Courtois, Matthieu Finiasz, Nicolas Sendrier:
How to achieve a McEliece-based Digital Signature Scheme. IACR Cryptol. ePrint Arch. 2001: 10 (2001) - 2000
- [j6]Nicolas Sendrier:
Finding the permutation between equivalent linear codes: The support splitting algorithm. IEEE Trans. Inf. Theory 46(4): 1193-1203 (2000)
1990 – 1999
- 1998
- [j5]Nicolas Sendrier:
On the Concatenated Structure of a Linear Code. Appl. Algebra Eng. Commun. Comput. 9(3): 221-242 (1998) - [c5]Anne Canteaut, Nicolas Sendrier:
Cryptanalysis of the Original McEliece Cryptosystem. ASIACRYPT 1998: 187-199 - 1997
- [j4]Nicolas Sendrier:
On the Dimension of the Hull. SIAM J. Discret. Math. 10(2): 282-293 (1997) - 1995
- [c4]Nicolas Sendrier:
Efficient Generation of Binary Words of Given Weight. IMACC 1995: 184-187 - 1994
- [j3]Daniel Augot, Nicolas Sendrier:
Idempotents and the BCH bound. IEEE Trans. Inf. Theory 40(1): 204-207 (1994) - 1993
- [j2]Hervé Chabanne, Nicolas Sendrier:
On the concatenated structures of a [49, 18, 12] binary abelian code. Discret. Math. 112(1-3): 245-248 (1993) - [c3]Nicolas Sendrier:
Product codes and the Singleton bound. Algebraic Coding 1993: 304-315 - 1992
- [j1]Daniel Augot, Pascale Charpin, Nicolas Sendrier:
Studying the locator polynomials of minimum weight codewords of BCH codes. IEEE Trans. Inf. Theory 38(3): 960-973 (1992) - 1991
- [c2]Paul Camion, Claude Carlet, Pascale Charpin, Nicolas Sendrier:
On Correlation-Immune Functions. CRYPTO 1991: 86-100 - 1990
- [c1]Daniel Augot, Pascale Charpin, Nicolas Sendrier:
The minimum distance of some binary codes via the Newton's identities. EUROCODE 1990: 65-73
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint