default search action
Pierre-Louis Cayrel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Vlad-Florin Dragoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso:
Integer syndrome decoding in the presence of noise. Cryptogr. Commun. 16(5): 1103-1134 (2024) - [i12]Vlad-Florin Dragoi, Brice Colombier, Nicolas Vallet, Pierre-Louis Cayrel, Vincent Grosso:
Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation. IACR Cryptol. ePrint Arch. 2024: 1694 (2024) - 2023
- [c34]Boly Seck, Pierre-Louis Cayrel, Vlad-Florin Dragoi, Idy Diop, Morgan Barbier, Jean Belo Klamti, Vincent Grosso, Brice Colombier:
A Side-Channel Attack Against Classic McEliece When Loading the Goppa Polynomial. AFRICACRYPT 2023: 105-125 - [c33]Vincent Grosso, Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi:
Punctured Syndrome Decoding Problem - Efficient Side-Channel Attacks Against Classic McEliece. COSADE 2023: 170-192 - [i11]Vincent Grosso, Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi:
Punctured Syndrome Decoding Problem Efficient Side-Channel Attacks Against Classic McEliece. IACR Cryptol. ePrint Arch. 2023: 308 (2023) - [i10]Brice Colombier, Vincent Grosso, Pierre-Louis Cayrel, Vlad-Florin Dragoi:
Horizontal Correlation Attack on Classic McEliece. IACR Cryptol. ePrint Arch. 2023: 546 (2023) - 2022
- [j15]Brice Colombier, Vlad-Florin Dragoi, Pierre-Louis Cayrel, Vincent Grosso:
Profiled Side-Channel Attack on Cryptosystems Based on the Binary Syndrome Decoding Problem. IEEE Trans. Inf. Forensics Secur. 17: 3407-3420 (2022) - [c32]Boly Seck, Cheikh Thiécoumba Gueye, Gilbert Ndollane Dione, Jean Belo Klamti, Pierre-Louis Cayrel, Idy Diop, Ousmane Ndiaye:
Software Implementation of a Code-Based Key Encapsulation Mechanism from Binary QD Generalized Srivastava Codes. CBCrypto 2022: 77-89 - [c31]Boly Seck, Pierre-Louis Cayrel, Idy Diop, Vlad-Florin Dragoi, Kalen Couzon, Brice Colombier, Vincent Grosso:
Key-Recovery by Side-Channel Information on the Matrix-Vector Product in Code-Based Cryptosystems. ICISC 2022: 219-234 - [c30]Vlad-Florin Dragoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso:
Integer Syndrome Decoding in the Presence of Noise. ITW 2022: 482-487 - [i9]Brice Colombier, Vlad-Florin Dragoi, Pierre-Louis Cayrel, Vincent Grosso:
Message-recovery Profiled Side-channel Attack on the Classic McEliece Cryptosystem. IACR Cryptol. ePrint Arch. 2022: 125 (2022) - [i8]Vlad-Florin Dragoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso:
Integer Syndrome Decoding in the Presence of Noise. IACR Cryptol. ePrint Arch. 2022: 636 (2022) - 2021
- [j14]Roumaissa Mahdjoubi, Pierre-Louis Cayrel, Sedat Akleylek, Kenza Guenda:
A Novel Niederreiter-like cryptosystem based on the (u|u + υ)-construction codes. RAIRO Theor. Informatics Appl. 55: 1-16 (2021) - [c29]Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi, Alexandre Menu, Lilian Bossuet:
Message-Recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem. EUROCRYPT (2) 2021: 438-467 - 2020
- [j13]Vlad-Florin Dragoi, Pierre-Louis Cayrel, Brice Colombier, Dominic Bucerzan, Sorin Hoara:
Solving a Modified Syndrome Decoding Problem using Integer Programming. Int. J. Comput. Commun. Control 15(5) (2020) - [c28]Lina Mortajine, Othman Benchaalal, Pierre-Louis Cayrel, Nadia El Mrabet, Jérôme Lablanche:
Optimized and Secure Implementation of ROLLO-I. CBCrypto 2020: 117-137 - [i7]Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi, Alexandre Menu, Lilian Bossuet:
Message-recovery Laser Fault Injection Attack on Code-based Cryptosystems. IACR Cryptol. ePrint Arch. 2020: 900 (2020)
2010 – 2019
- 2019
- [j12]Noureddine Chikouche, Pierre-Louis Cayrel, El Hadji Modou Mboup, Brice Odilon Boidje:
A privacy-preserving code-based authentication protocol for Internet of Things. J. Supercomput. 75(12): 8231-8261 (2019) - [c27]Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane Ndiaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini:
DAGS: Reloaded Revisiting Dyadic Key Encapsulation. CBC 2019: 69-85 - [c26]Pierre-Louis Cayrel, Cheikh Thiécoumba Gueye, Junaid Ahmad Khan, Jean Belo Klamti, Edoardo Persichetti:
Improvement of Binary and Non Binary Statistical Decoding Algorithm. ICISC 2019: 194-207 - [i6]Jérôme Lablanche, Lina Mortajine, Othman Benchaalal, Pierre-Louis Cayrel, Nadia El Mrabet:
Optimized implementation of the NIST PQC submission ROLLO on microcontroller. IACR Cryptol. ePrint Arch. 2019: 787 (2019) - 2018
- [j11]Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane Ndiaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini:
DAGS: Key encapsulation using dyadic GS codes. J. Math. Cryptol. 12(4): 221-239 (2018) - [i5]Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiecoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane Ndiaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini:
DAGS: Reloaded Revisiting Dyadic Key Encapsulation. IACR Cryptol. ePrint Arch. 2018: 1203 (2018) - 2017
- [j10]Pierre-Louis Cayrel, Mohammed Meziani, Ousmane Ndiaye, Richard Lindner, Rosemberg Silva:
A pseudorandom number generator based on worst-case lattice problems. Appl. Algebra Eng. Commun. Comput. 28(4): 283-294 (2017) - [j9]Dominic Bucerzan, Pierre-Louis Cayrel, Vlad Dragoi, Tania Richmond:
Improved Timing Attacks against the Secret Permutation in the McEliece PKC. Int. J. Comput. Commun. Control 12(1): 7-25 (2017) - [j8]Robert Niebuhr, Edoardo Persichetti, Pierre-Louis Cayrel, Stanislav Bulygin, Johannes Buchmann:
On lower bounds for information set decoding over q and on the effect of partial knowledge. Int. J. Inf. Coding Theory 4(1): 47-78 (2017) - [j7]Pierre-Louis Cayrel, Mbouye Khady Diagne, Cheikh Thiécoumba Gueye:
NP-completeness of the Goppa parameterised random binary quasi-dyadic syndrome decoding problem. Int. J. Inf. Coding Theory 4(4): 276-288 (2017) - [j6]Noureddine Chikouche, Cherif Foudil, Pierre-Louis Cayrel, Mohamed Benmohammed:
RFID Authentication Protocols Based on Error-Correcting Codes: A Survey. Wirel. Pers. Commun. 96(1): 509-527 (2017) - [c25]Pierre-Louis Cayrel, Cheikh Thiecoumba Gueye, El Hadji Modou Mboup, Ousmane Ndiaye, Edoardo Persichetti:
Efficient Implementation of Hybrid Encryption from Coding Theory. C2SI 2017: 254-264 - [i4]Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiecoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane Ndiaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini:
DAGS: Key Encapsulation using Dyadic GS Codes. IACR Cryptol. ePrint Arch. 2017: 1037 (2017) - 2016
- [j5]Özgür Dagdelen, David Galindo, Pascal Véron, Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel:
Extended security arguments for signature schemes. Des. Codes Cryptogr. 78(2): 441-461 (2016) - 2015
- [j4]Pierre-Louis Cayrel, Cheikh Thiecoumba Gueye, Ousmane Ndiaye, Robert Niebuhr:
Critical attacks in code-based cryptography. Int. J. Inf. Coding Theory 3(2): 158-176 (2015) - [j3]Noureddine Chikouche, Cherif Foudil, Pierre-Louis Cayrel, Mohamed Benmohammed:
Improved RFID Authentication Protocol Based on Randomized McEliece Cryptosystem. Int. J. Netw. Secur. 17(4): 413-422 (2015) - [c24]Noureddine Chikouche, Cherif Foudil, Pierre-Louis Cayrel, Mohamed Benmohammed:
Weaknesses in Two RFID Authentication Protocols. C2SI 2015: 162-172 - 2014
- [c23]Pierre-Louis Cayrel, Mohammed Meziani, Ousmane Ndiaye, Quentin Santos:
Efficient Software Implementations of Code-Based Hash Functions and Stream-Ciphers. WAIFI 2014: 187-203 - 2013
- [c22]Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Rachid El Bansarkhani, Gerhard Hoffmann:
Code-Based Identification and Signature Schemes in Software. CD-ARES Workshops 2013: 122-136 - [c21]Vlad Dragoi, Pierre-Louis Cayrel, Brice Colombier, Tania Richmond:
Polynomial Structures in Code-Based Cryptography. INDOCRYPT 2013: 286-296 - [i3]Pierre-Louis Cayrel, Mohammed Meziani:
Post-Quantum Cryptography: Code-based Signatures. CoRR abs/1312.4265 (2013) - 2012
- [c20]Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo, Pierre-Louis Cayrel:
Extended Security Arguments for Signature Schemes. AFRICACRYPT 2012: 19-34 - [c19]Mohammed Meziani, Gerhard Hoffmann, Pierre-Louis Cayrel:
Improving the Performance of the SYND Stream Cipher. AFRICACRYPT 2012: 99-116 - [c18]Pierre-Louis Cayrel, Gerhard Hoffmann, Edoardo Persichetti:
Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes. Public Key Cryptography 2012: 138-155 - [c17]Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui, Gerhard Hoffmann, Pascal Véron:
An Improved Threshold Ring Signature Scheme Based on Error Correcting Codes. WAIFI 2012: 45-63 - 2011
- [j2]Carlos Aguilar Melchor, Pierre-Louis Cayrel, Philippe Gaborit, Fabien Laguillaumie:
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory. IEEE Trans. Inf. Theory 57(7): 4833-4842 (2011) - [c16]Rosemberg Silva, Pierre-Louis Cayrel, Richard Lindner:
A lattice-based batch identification scheme. ITW 2011: 215-219 - [c15]Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui, Gerhard Hoffmann, Mohammed Meziani, Robert Niebuhr:
Recent Progress in Code-Based Cryptography. ISA 2011: 21-32 - [c14]Pierre-Louis Cayrel, Gerhard Hoffmann, Michael Schneider:
GPU Implementation of the Keccak Hash Function Family. ISA 2011: 33-42 - [c13]Mohammed Meziani, Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui:
2SC: An Efficient Code-Based Stream Cipher. ISA 2011: 111-122 - [c12]Mohammed Meziani, Özgür Dagdelen, Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui:
S-FSB: An Improved Variant of the FSB Hash Family. ISA 2011: 132-145 - [c11]Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Mohammed Meziani:
Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes. ISA 2011: 146-155 - [c10]Robert Niebuhr, Pierre-Louis Cayrel:
Broadcast Attacks against Code-Based Schemes. WEWoRC 2011: 1-17 - 2010
- [j1]Pierre-Louis Cayrel, Christophe Chabot, Abdelkader Necer:
Quasi-cyclic codes as codes over rings of matrices. Finite Fields Their Appl. 16(2): 100-115 (2010) - [c9]Paulo S. L. M. Barreto, Pierre-Louis Cayrel, Rafael Misoczki, Robert Niebuhr:
Quasi-Dyadic CFS Signatures. Inscrypt 2010: 336-349 - [c8]Pierre-Louis Cayrel, Richard Lindner, Markus Rückert, Rosemberg Silva:
A Lattice-Based Threshold Ring Signature Scheme. LATINCRYPT 2010: 255-272 - [c7]Pierre-Louis Cayrel, Richard Lindner, Markus Rückert, Rosemberg Silva:
Improved Zero-Knowledge Identification with Lattices. ProvSec 2010: 1-17 - [c6]Pierre-Louis Cayrel, Pascal Véron, Sidi Mohamed El Yousfi Alaoui:
A Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding Problem. Selected Areas in Cryptography 2010: 171-186 - [c5]Pierre-Louis Cayrel, Mohammed Meziani:
Post-quantum Cryptography: Code-Based Signatures. AST/UCMA/ISA/ACN 2010: 82-99 - [i2]Pierre-Louis Cayrel, Pascal Véron:
Improved code-based identification scheme. CoRR abs/1001.3017 (2010)
2000 – 2009
- 2009
- [c4]Thierry P. Berger, Pierre-Louis Cayrel, Philippe Gaborit, Ayoub Otmani:
Reducing Key Length of the McEliece Cryptosystem. AFRICACRYPT 2009: 77-97 - [p1]Pierre-Louis Cayrel, Philippe Gaborit, Marc Girault:
Identity-Based Identification and Signature Schemes using Error Correcting Codes. Identity-Based Cryptography 2009: 119-134 - [i1]Pierre-Louis Cayrel, Philippe Gaborit, David Galindo, Marc Girault:
Improved identity-based identification using correcting codes. CoRR abs/0903.0069 (2009) - 2008
- [c3]Pierre-Louis Cayrel, Philippe Gaborit, Emmanuel Prouff:
Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices. CARDIS 2008: 191-205 - [c2]Carlos Aguilar Melchor, Pierre-Louis Cayrel, Philippe Gaborit:
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory. PQCrypto 2008: 1-16 - 2007
- [c1]Pierre-Louis Cayrel, Ayoub Otmani, Damien Vergnaud:
On Kabatianskii-Krouk-Smeets Signatures. WAIFI 2007: 237-251
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint