![](https://dblp.uni-trier.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://fanyv88.com/img/search.dark.16x16.png)
default search action
Matthieu Finiasz
2010 – 2019
- 2015
- [i10]Thomas Baignères, Cécile Delerablée, Matthieu Finiasz, Louis Goubin, Tancrède Lepoint, Matthieu Rivain:
Trap Me If You Can - Million Dollar Curve. IACR Cryptol. ePrint Arch. 2015: 1249 (2015) - 2014
- [c18]Daniel Augot, Matthieu Finiasz:
Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes. FSE 2014: 3-17 - [c17]Giulia Fanti, Matthieu Finiasz, Gerald Friedland, Kannan Ramchandran:
Toward efficient, privacy-aware media classification on public databases. ICMR 2014: 49 - [i9]Daniel Augot, Matthieu Finiasz:
Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes. CoRR abs/1412.4626 (2014) - [i8]Daniel Augot, Matthieu Finiasz:
Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes. IACR Cryptol. ePrint Arch. 2014: 566 (2014) - 2013
- [j1]Giulia Fanti, Matthieu Finiasz, Kannan Ramchandran:
One-Way Private Media Search on Public Databases: The Role of Signal Processing. IEEE Signal Process. Mag. 30(2): 53-61 (2013) - [c16]Daniel Augot, Matthieu Finiasz:
Exhaustive search for small dimension recursive MDS diffusion layers for block ciphers and hash functions. ISIT 2013: 1551-1555 - [i7]Daniel Augot, Matthieu Finiasz:
Exhaustive Search for Small Dimension Recursive MDS Diffusion Layers for Block Ciphers and Hash Functions. CoRR abs/1305.3396 (2013) - 2012
- [c15]Matthieu Finiasz, Kannan Ramchandran:
Private Stream Search at the same communication cost as a regular search: Role of LDPC codes. ISIT 2012: 2556-2560 - [c14]Matthieu Finiasz, Kannan Ramchandran:
Private Stream Search at Almost the Same Communication Cost as a Regular Search. Selected Areas in Cryptography 2012: 372-389 - 2011
- [r1]Matthieu Finiasz, Nicolas Sendrier:
Digital Signature Scheme Based on McEliece. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 342-343 - 2010
- [c13]Mathieu Cluzeau, Matthieu Finiasz, Jean-Pierre Tillich:
Methods for the reconstruction of parallel turbo codes. ISIT 2010: 2008-2012 - [c12]Matthieu Finiasz:
Parallel-CFS - Strengthening the CFS McEliece-Based Signature Scheme. Selected Areas in Cryptography 2010: 159-170 - [i6]Mathieu Cluzeau, Matthieu Finiasz, Jean-Pierre Tillich:
Methods for the Reconstruction of Parallel Turbo Codes. CoRR abs/1006.0259 (2010)
2000 – 2009
- 2009
- [c11]Matthieu Finiasz, Nicolas Sendrier:
Security Bounds for the Design of Code-Based Cryptosystems. ASIACRYPT 2009: 88-105 - [c10]Mathieu Cluzeau, Matthieu Finiasz:
Recovering a code's length and synchronization from a noisy intercepted bitstream. ISIT 2009: 2737-2741 - [i5]Matthieu Finiasz:
NP-completeness of Certain Sub-classes of the Syndrome Decoding Problem. CoRR abs/0912.0453 (2009) - [i4]Matthieu Finiasz, Nicolas Sendrier:
Security Bounds for the Design of Code-based Cryptosystems. IACR Cryptol. ePrint Arch. 2009: 414 (2009) - 2008
- [c9]Matthieu Finiasz:
Syndrome Based Collision Resistant Hashing. PQCrypto 2008: 137-147 - 2007
- [c8]Jean-Philippe Aumasson, Matthieu Finiasz, Willi Meier, Serge Vaudenay:
TCHo: A Hardware-Oriented Trapdoor Cipher. ACISP 2007: 184-199 - 2006
- [c7]Thomas Baignères, Matthieu Finiasz:
KFC - The Krazy Feistel Cipher. ASIACRYPT 2006: 380-395 - [c6]Thomas Baignères, Matthieu Finiasz:
Dial C for Cipher. Selected Areas in Cryptography 2006: 76-95 - [c5]Matthieu Finiasz, Serge Vaudenay:
When Stream Cipher Analysis Meets Public-Key Cryptography. Selected Areas in Cryptography 2006: 266-284 - 2005
- [c4]Daniel Augot, Matthieu Finiasz, Nicolas Sendrier:
A Family of Fast Syndrome Based Cryptographic Hash Functions. Mycrypt 2005: 64-83 - 2003
- [c3]Daniel Augot, Matthieu Finiasz:
A Public Key Encryption Scheme Based on the Polynomial Reconstruction Problem. EUROCRYPT 2003: 229-240 - [i3]Daniel Augot, Matthieu Finiasz, Pierre Loidreau:
Using the Trace Operator to repair the Polynomial Reconstruction based Cryptosystem presented at Eurocrypt 2003. IACR Cryptol. ePrint Arch. 2003: 209 (2003) - [i2]Daniel Augot, Matthieu Finiasz, Nicolas Sendrier:
A Fast Provably Secure Cryptographic Hash Function. IACR Cryptol. ePrint Arch. 2003: 230 (2003) - 2002
- [c2]Anne Verroust
, Matthieu Finiasz:
A Control of Smooth Deformations with Topological Change on Polyhedral Mesh Based on Curves and Loops. Shape Modeling International 2002: 191-200 - 2001
- [c1]Nicolas T. Courtois, Matthieu Finiasz, Nicolas Sendrier:
How to Achieve a McEliece-Based Digital Signature Scheme. ASIACRYPT 2001: 157-174 - [i1]Nicolas T. Courtois, Matthieu Finiasz, Nicolas Sendrier:
How to achieve a McEliece-based Digital Signature Scheme. IACR Cryptol. ePrint Arch. 2001: 10 (2001)
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
![](https://fanyv88.com/img/new-feature-top-right.156x64.png)