default search action
Ayoub Otmani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Duong Dinh Tran, Kazuhiro Ogata, Santiago Escobar, Sedat Akleylek, Ayoub Otmani:
Formal Analysis of Post-Quantum Hybrid Key Exchange SSH Transport Layer Protocol. IEEE Access 12: 1672-1687 (2024) - [i24]Étienne Burle, Hervé Talé Kalachi, Freddy Lende Metouke, Ayoub Otmani:
Security Assessment of the LG Cryptosystem. CoRR abs/2404.06815 (2024) - 2023
- [j14]Ayoub Otmani, Christophe Petit, Mehdi Tibouchi:
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post-quantum proposals. IET Inf. Secur. 17(2): 159-160 (2023) - [j13]Duong Dinh Tran, Kazuhiro Ogata, Santiago Escobar, Sedat Akleylek, Ayoub Otmani:
Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude. IET Inf. Secur. 2023: 1-17 (2023) - [j12]Víctor García, Santiago Escobar, Kazuhiro Ogata, Sedat Akleylek, Ayoub Otmani:
Modelling and verification of post-quantum key encapsulation mechanisms using Maude. PeerJ Comput. Sci. 9: e1547 (2023) - [c21]Étienne Burle, Ayoub Otmani:
An Upper-Bound on the Decoding Failure Probability of the LRPC Decoder. IMACC 2023: 3-16 - [i23]Étienne Burle, Ayoub Otmani:
An Upper-Bound on the Decoding Failure Probability of the LRPC Decoder. CoRR abs/2309.14028 (2023) - [i22]Étienne Burle, Philippe Gaborit, Younes Hatri, Ayoub Otmani:
Injective Rank Metric Trapdoor Functions with Homogeneous Errors. CoRR abs/2310.08962 (2023) - 2022
- [c20]Duong Dinh Tran, Kazuhiro Ogata, Santiago Escobar, Sedat Akleylek, Ayoub Otmani:
Formal specification and model checking of lattice-based key encapsulation mechanisms in Maude. FAVPQC@ICFEM 2022: 16-31 - [c19]Étienne Burle, Philippe Gaborit, Younes Hatri, Ayoub Otmani:
Injective Rank Metric Trapdoor Functions with Homogeneous Errors. SAC 2022: 139-158 - [c18]Duong Dinh Tran, Kazuhiro Ogata, Santiago Escobar, Sedat Akleylek, Ayoub Otmani:
Formal specification and model checking of Saber lattice-based key encapsulation mechanism in Maude. SEKE 2022: 382-387 - [e1]Sedat Akleylek, Santiago Escobar, Kazuhiro Ogata, Ayoub Otmani:
Proceedings of the International Workshop on Formal Analysis and Verification of Post-Quantum Cryptographic Protocols co-located with the 23rd International Conference on Formal Engineering Methods (ICFEM 2022), Madrid, Spain, October 24, 2022. CEUR Workshop Proceedings 3280, CEUR-WS.org 2022 [contents]
2010 – 2019
- 2019
- [c17]Magali Bardet, Manon Bertin, Alain Couvreur, Ayoub Otmani:
Practical Algebraic Attack on DAGS. CBC 2019: 86-101 - [c16]Magali Bardet, Ayoub Otmani, Mohamed Saeed-Taha:
Permutation Code Equivalence is Not Harder Than Graph Isomorphism When Hulls Are Trivial. ISIT 2019: 2464-2468 - [i21]Magali Bardet, Ayoub Otmani, Mohamed Saeed-Taha:
Permutation Code Equivalence is not Harder than Graph Isomorphism when Hulls are Trivial. CoRR abs/1905.00073 (2019) - [i20]Magali Bardet, Manon Bertin, Alain Couvreur, Ayoub Otmani:
Practical Algebraic Attack on DAGS. CoRR abs/1905.03635 (2019) - 2018
- [j11]Philippe Gaborit, Ayoub Otmani, Hervé Talé Kalachi:
Polynomial-time key recovery attack on the Faure-Loidreau scheme based on Gabidulin codes. Des. Codes Cryptogr. 86(7): 1391-1403 (2018) - [j10]Ayoub Otmani, Hervé Talé Kalachi, Sélestin Ndjeya:
Improved cryptanalysis of rank metric schemes based on Gabidulin codes. Des. Codes Cryptogr. 86(9): 1983-1996 (2018) - [j9]Younes Hatri, Ayoub Otmani, Kenza Guenda:
Cryptanalysis of an identity-based authenticated key exchange protocol. Int. J. Commun. Syst. 31(3) (2018) - 2017
- [j8]Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich:
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions. IEEE Trans. Inf. Theory 63(1): 404-427 (2017) - 2016
- [j7]Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich:
Structural cryptanalysis of McEliece schemes with compact keys. Des. Codes Cryptogr. 79(1): 87-112 (2016) - [j6]Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich:
Folding Alternant and Goppa Codes With Non-Trivial Automorphism Groups. IEEE Trans. Inf. Theory 62(1): 184-198 (2016) - [c15]Magali Bardet, Vlad Dragoi, Jean-Gabriel Luque, Ayoub Otmani:
Weak Keys for the Quasi-Cyclic MDPC Public Key Encryption Scheme. AFRICACRYPT 2016: 346-367 - [c14]Magali Bardet, Vlad Dragoi, Ayoub Otmani, Jean-Pierre Tillich:
Algebraic properties of polar codes from a new polynomial formalism. ISIT 2016: 230-234 - [c13]Magali Bardet, Julia Chaulet, Vlad Dragoi, Ayoub Otmani, Jean-Pierre Tillich:
Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes. PQCrypto 2016: 118-143 - [i19]Magali Bardet, Vlad Dragoi, Ayoub Otmani, Jean-Pierre Tillich:
Algebraic Properties of Polar Codes From a New Polynomial Formalism. CoRR abs/1601.06215 (2016) - [i18]Ayoub Otmani, Hervé Talé Kalachi, Sélestin Ndjeya:
Improved Cryptanalysis of Rank Metric Schemes Based on Gabidulin Codes. CoRR abs/1602.08549 (2016) - [i17]Philippe Gaborit, Ayoub Otmani, Hervé Talé Kalachi:
Polynomial-Time Key Recovery Attack on the Faure-Loidreau Scheme based on Gabidulin Codes. CoRR abs/1606.07760 (2016) - [i16]Younes Hatri, Ayoub Otmani, Kenza Guenda:
Cryptanalysis of an Identity-Based Authenticated Key Exchange Protocol. CoRR abs/1611.07299 (2016) - [i15]Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich, Valérie Gauthier-Umaña:
A Polynomial-Time Attack on the BBCRS Scheme. IACR Cryptol. ePrint Arch. 2016: 302 (2016) - 2015
- [c12]Ayoub Otmani, Hervé Talé Kalachi:
Square Code Attack on a Modified Sidelnikov Cryptosystem. C2SI 2015: 173-183 - [c11]Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich, Valérie Gauthier-Umaña:
A Polynomial-Time Attack on the BBCRS Scheme. Public Key Cryptography 2015: 175-193 - [i14]Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich, Valérie Gauthier-Umaña:
A Polynomial-Time Attack on the BBCRS Scheme. CoRR abs/1501.03736 (2015) - 2014
- [j5]Alain Couvreur, Philippe Gaborit, Valérie Gauthier-Umaña, Ayoub Otmani, Jean-Pierre Tillich:
Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes. Des. Codes Cryptogr. 73(2): 641-666 (2014) - [j4]Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich:
New identities relating wild Goppa codes. Finite Fields Their Appl. 29: 178-197 (2014) - [c10]Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich:
Polynomial Time Attack on Wild McEliece over Quadratic Extensions. EUROCRYPT 2014: 17-39 - [c9]Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich:
Structural weakness of compact variants of the McEliece cryptosystem. ISIT 2014: 1717-1721 - [i13]Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich:
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions. CoRR abs/1402.3264 (2014) - [i12]Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich:
Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups. CoRR abs/1405.5101 (2014) - [i11]Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich:
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions. IACR Cryptol. ePrint Arch. 2014: 112 (2014) - [i10]Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich:
Structural Cryptanalysis of McEliece Schemes with Compact Keys. IACR Cryptol. ePrint Arch. 2014: 210 (2014) - [i9]Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich:
Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups. IACR Cryptol. ePrint Arch. 2014: 353 (2014) - 2013
- [j3]Jean-Charles Faugère, Valérie Gauthier-Umaña, Ayoub Otmani, Ludovic Perret, Jean-Pierre Tillich:
A Distinguisher for High-Rate McEliece Cryptosystems. IEEE Trans. Inf. Theory 59(10): 6830-6844 (2013) - [i8]Alain Couvreur, Philippe Gaborit, Valérie Gauthier-Umaña, Ayoub Otmani, Jean-Pierre Tillich:
Distinguisher-Based Attacks on Public-Key Cryptosystems Using Reed-Solomon Codes. CoRR abs/1307.6458 (2013) - [i7]Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich:
New Identities Relating Wild Goppa Codes. CoRR abs/1310.3202 (2013) - 2012
- [i6]Valérie Gauthier, Ayoub Otmani, Jean-Pierre Tillich:
A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes. CoRR abs/1203.6686 (2012) - [i5]Valérie Gauthier, Ayoub Otmani, Jean-Pierre Tillich:
A Distinguisher-Based Attack on a Variant of McEliece's Cryptosystem Based on Reed-Solomon Codes. CoRR abs/1204.6459 (2012) - [i4]Valérie Gauthier, Ayoub Otmani, Jean-Pierre Tillich:
A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes. IACR Cryptol. ePrint Arch. 2012: 168 (2012) - 2011
- [b1]Ayoub Otmani:
Contribution à la cryptanalyse de primitives cryptographiques fondées sur la théorie des codes. (Contribution to the Cryptanalysis of Code-Based Primitives). University of Caen Normandy, France, 2011 - [c8]Jean-Charles Faugère, Valérie Gauthier-Umaña, Ayoub Otmani, Ludovic Perret, Jean-Pierre Tillich:
A distinguisher for high rate McEliece cryptosystems. ITW 2011: 282-286 - [c7]Ayoub Otmani, Jean-Pierre Tillich:
An Efficient Attack on All Concrete KKS Proposals. PQCrypto 2011: 98-116 - [i3]Ayoub Otmani, Jean-Pierre Tillich:
An Efficient Attack on All Concrete KKS Proposals. IACR Cryptol. ePrint Arch. 2011: 356 (2011) - 2010
- [j2]Ayoub Otmani, Jean-Pierre Tillich, Léonard Dallot:
Cryptanalysis of Two McEliece Cryptosystems Based on Quasi-Cyclic Codes. Math. Comput. Sci. 3(2): 129-140 (2010) - [c6]Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Jean-Pierre Tillich:
Algebraic Cryptanalysis of McEliece Variants with Compact Keys. EUROCRYPT 2010: 279-298 - [i2]Jean-Charles Faugère, Valérie Gauthier, Ayoub Otmani, Ludovic Perret, Jean-Pierre Tillich:
A Distinguisher for High Rate McEliece Cryptosystems. IACR Cryptol. ePrint Arch. 2010: 331 (2010)
2000 – 2009
- 2009
- [c5]Thierry P. Berger, Pierre-Louis Cayrel, Philippe Gaborit, Ayoub Otmani:
Reducing Key Length of the McEliece Cryptosystem. AFRICACRYPT 2009: 77-97 - 2008
- [c4]Larbi Boubchir, Ayoub Otmani, Nadia Zerida:
The 2nd BOWS Contest: Wavelet-Based Bayesian Denoising Attack on Image Watermarking. IIH-MSP 2008: 473-476 - [i1]Ayoub Otmani, Jean-Pierre Tillich, Léonard Dallot:
Cryptanalysis of Two McEliece Cryptosystems Based on Quasi-Cyclic Codes. CoRR abs/0804.0409 (2008) - 2007
- [c3]Ayoub Otmani, Jean-Pierre Tillich, Iryna Andriyanova:
On the Minimum Distance of Generalized LDPC Codes. ISIT 2007: 751-755 - [c2]Pierre-Louis Cayrel, Ayoub Otmani, Damien Vergnaud:
On Kabatianskii-Krouk-Smeets Signatures. WAIFI 2007: 237-251 - 2003
- [j1]Jean-Claude Carlach, Ayoub Otmani:
A systematic construction of self-dual codes. IEEE Trans. Inf. Theory 49(11): 3005-3009 (2003) - 2001
- [c1]E. Cadic, Jean-Claude Carlach, G. Olocco, Ayoub Otmani, Jean-Pierre Tillich:
Low Complexity Tail-Biting Trellises of Self-dual codes of Length 24, 32 and 40 over GF(2) and Z4 of Large Minimum Distance. AAECC 2001: 57-66
Coauthor Index
aka: Valérie Gauthier-Umaña
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-22 19:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint