Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
How to Achieve a McEliece-Based Digital Signature Scheme
- N. Courtois, M. Finiasz, N. Sendrier
- Computer Science
- ASIACRYPT
- 9 December 2001
TLDR
Security Bounds for the Design of Code-Based Cryptosystems
- M. Finiasz, N. Sendrier
- Computer Science
- ASIACRYPT
- 2 December 2009
TLDR
A Family of Fast Syndrome Based Cryptographic Hash Functions
- D. Augot, M. Finiasz, N. Sendrier
- Computer Science
- Mycrypt
- 28 September 2005
TLDR
Reconstruction of punctured convolutional codes
- M. Cluzeau, M. Finiasz
- Computer Science
- IEEE Information Theory Workshop
- 11 December 2009
TLDR
Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes
- D. Augot, M. Finiasz
- Computer Science, Mathematics
- FSE
- 3 March 2014
TLDR
Recovering a code's length and synchronization from a noisy intercepted bitstream
- M. Cluzeau, M. Finiasz
- Computer Science
- IEEE International Symposium on Information…
- 28 June 2009
TLDR
Exhaustive search for small dimension recursive MDS diffusion layers for block ciphers and hash functions
- D. Augot, M. Finiasz
- Mathematics, Computer Science
- IEEE International Symposium on Information…
- 15 May 2013
TLDR
A Fast Provably Secure Cryptographic Hash Function
- D. Augot, M. Finiasz, N. Sendrier
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2003
TLDR
Nouvelles constructions utilisant des codes correcteurs d'erreurs en cryptographie Ă clef publique
- M. Finiasz
- Computer Science
- 2004
- 25
- 4
TCHo: A Hardware-Oriented Trapdoor Cipher
- J. Aumasson, M. Finiasz, W. Meier, S. Vaudenay
- Mathematics, Computer Science
- ACISP
- 2 July 2007
TLDR