
Decoding supercodes of Gabidulin codes and applications to cryptanalysis
This article discusses the decoding of Gabidulin codes and shows how to ...
read it

Recovering or Testing ExtendedAffine Equivalence
Extended Affine (EA) equivalence is the equivalence relation between two...
read it

On the hardness of code equivalence problems in rank metric
In recent years, the notion of rank metric in the context of coding theo...
read it

On the security of subspace subcodes of ReedSolomon codes for public key encryption
This article discusses the security of McEliecelike encryption schemes ...
read it

Algebraic geometry codes and some applications
This article surveys the development of the theory of algebraic geometry...
read it

Rankmetric codes over arbitrary Galois extensions and rank analogues of ReedMuller codes
This paper extends the study of rankmetric codes in extension fields 𝕃 ...
read it

Toward good families of codes from towers of surfaces
We introduce in this article a new method to estimate the minimum distan...
read it

Power Error Locating Pairs
We present a new decoding algorithm based on error locating pairs and co...
read it

Practical Algebraic Attack on DAGS
DAGS scheme is a key encapsulation mechanism (KEM) based on quasidyadic...
read it

Anticanonical codes from del Pezzo surfaces with Picard rank one
We construct algebraic geometric codes from del Pezzo surfaces and focus...
read it

On the security of a Loidreau's rank metric code based encryption scheme
We present a polynomial time attack of a rank metric code based encrypti...
read it

Recovering short secret keys of RLCE in polynomial time
We present a key recovery attack against Y. Wang's Random Linear Code En...
read it

An efficient structural attack on NIST submission DAGS
We present an efficient key recovery attack on code based encryption sch...
read it
Alain Couvreur
is this you? claim profile